Login / Signup
R. Vinoth
ORCID
Publication Activity (10 Years)
Years Active: 2013-2023
Publications (10 Years): 9
Top Topics
Authentication Scheme
Diffie Hellman Assumption
Machine Learning Models
Authenticated Key Agreement
Top Venues
Int. J. Pattern Recognit. Artif. Intell.
CoRR
IEEE Internet Things J.
Wirel. Pers. Commun.
</>
Publications
</>
Vigna K. Ramachandaramurthy
,
Aidha Muhammad Ajmal
,
Padmanathan Kasinathan
,
Kang Miao Tan
,
Jia Ying Yong
,
R. Vinoth
Social Acceptance and Preference of EV Users - A Review.
IEEE Access
11 (2023)
R. Vinoth
,
Lazarus Jegatha Deborah
An efficient key agreement and authentication protocol for secure communication in industrial IoT applications.
J. Ambient Intell. Humaniz. Comput.
14 (3) (2023)
R. Vinoth
,
R. Sasireka
Ultrasound Kidney Images with IKNN-Dependent FPGA Abnormality Classification.
J. Circuits Syst. Comput.
32 (4) (2023)
R. Vinoth
,
J. P. Ananth
Deep Recurrent Encoder Network and Spark Model for Angiographic Disease Risk Classification.
Int. J. Pattern Recognit. Artif. Intell.
36 (4) (2022)
R. Vinoth
,
Lazarus Jegatha Deborah
,
Pandi Vijayakumar
,
Brij B. Gupta
An Anonymous Pre-Authentication and Post-Authentication Scheme Assisted by Cloud for Medical IoT Environments.
IEEE Trans. Netw. Sci. Eng.
9 (5) (2022)
R. Vinoth
,
J. P. Ananth
Rider Chicken Optimization Algorithm-Based Recurrent Neural Network for Big Data Classification in Spark Architecture.
Comput. J.
65 (8) (2022)
Shashi Kumar G. S.
,
Ahalya Arun
,
Niranjana Sampathila
,
R. Vinoth
Machine Learning Models for Classification of Human Emotions Using Multivariate Brain Signals.
Comput.
11 (10) (2022)
R. Vinoth
,
Lazarus Jegatha Deborah
,
Pandi Vijayakumar
,
Neeraj Kumar
Secure Multifactor Authenticated Key Agreement Scheme for Industrial IoT.
IEEE Internet Things J.
8 (5) (2021)
A. Ranjith Kumar
,
R. Vinoth
,
Padmanathan Kasinathan
Opposition Based Artificial Flora Algorithm for Load Balancing in LTE Network.
Wirel. Pers. Commun.
118 (1) (2021)
A. S. Syed Navaz
,
H. Iyyappa Narayanan
,
R. Vinoth
Security Protocol Review Method Analyzer.
CoRR
(2013)