A high capacity text steganography scheme based on LZW compression and color coding A Malik, G Sikka, HK Verma Engineering Science and Technology, an International Journal 20 (1), 72-79, 2017 | 95 | 2017 |
Outlier detection of data in wireless sensor networks using kernel density estimation VSK Samparthi, HK Verma International Journal of Computer Applications 5 (7), 28-32, 2010 | 64 | 2010 |
Comprehensive survey on petya ransomware attack JS Aidan, HK Verma, LK Awasthi 2017 International conference on next generation computing and information …, 2017 | 63 | 2017 |
Performance analysis of RC6, Twofish and Rijndael block cipher algorithms HK Verma, RK Singh International Journal of Computer Applications 42 (16), 1-7, 2012 | 62 | 2012 |
Optimized fuzzy logic based framework for effort estimation in software development V Sharma, HK Verma arXiv preprint arXiv:1004.3270, 2010 | 59 | 2010 |
A hybrid approach for image security by combining encryption and steganography JK Saini, HK Verma 2013 IEEE second international conference on image information processing …, 2013 | 54 | 2013 |
Simulation modeling of cloud computing for smart grid using CloudSim S Mehmi, HK Verma, AL Sangal Journal of Electrical Systems and Information Technology 4 (1), 159-172, 2017 | 52 | 2017 |
Security for wireless sensor network S Singh, HK Verma International Journal on Computer Science and Engineering 3 (6), 2393-2399, 2011 | 52 | 2011 |
A reversible data hiding scheme for interpolated images based on pixel intensity range A Malik, G Sikka, HK Verma Multimedia Tools and Applications 79, 18005-18031, 2020 | 47 | 2020 |
An image interpolation based reversible data hiding scheme using pixel value adjusting feature A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 13025-13046, 2017 | 46 | 2017 |
An AMBTC compression based data hiding scheme using pixel value adjusting strategy A Malik, G Sikka, HK Verma Multidimensional Systems and Signal Processing 29, 1801-1818, 2018 | 43 | 2018 |
Image interpolation based high capacity reversible data hiding scheme A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 24107-24123, 2017 | 43 | 2017 |
Classification of diabetes using Naive Bayes and support vector machine as a technique S Gupta, HK Verma, D Bhardwaj Operations Management and Systems Engineering: Select Proceedings of CPIE …, 2021 | 37 | 2021 |
An intelligent and energy-efficient wireless body area network to control coronavirus outbreak N Bilandi, HK Verma, R Dhir Arabian Journal for Science and Engineering 46 (9), 8203-8222, 2021 | 36 | 2021 |
A high payload data hiding scheme based on modified AMBTC technique A Malik, G Sikka, HK Verma Multimedia Tools and Applications 76, 14151-14167, 2017 | 36 | 2017 |
Performance evaluation of RC6, blowfish, DES, IDEA, CAST-128 block ciphers K Aggarwal, JK Saini, HK Verma International Journal of Computer Applications 68 (25), 2013 | 34 | 2013 |
A static feature selection-based android malware detection using machine learning techniques A Sangal, HK Verma 2020 International conference on smart electronics and communication (ICOSEC …, 2020 | 33 | 2020 |
Correlates of farmers’ attitude towards buffalo management practices HK Verma, K Kumar Indian journal of Extension education 27 (1), 97-100, 1991 | 33 | 1991 |
A detailed study of an internet of things (Iot) A Malik, AT Magar, H Verma, M Singh, P Sagar International Journal of Scientific and Technology Research 8 (12), 2989-2994, 2019 | 32 | 2019 |
Robustness of the digital image watermarking techniques against brightness and rotation attack HK Verma, AN Singh, R Kumar arXiv preprint arXiv:0909.3554, 2009 | 32 | 2009 |