Comparative study of firefly algorithm and particle swarm optimization for noisy non-linear optimization problems SK Pal, CS Rai, AP Singh International Journal of intelligent systems and applications 4 (10), 50, 2012 | 267 | 2012 |
Analysis of support vector machine-based intrusion detection techniques BS Bhati, CS Rai Arabian Journal for Science and Engineering 45 (4), 2371-2383, 2020 | 80 | 2020 |
Analysis of some feedforward artificial neural network training algorithms for developing localization framework in wireless sensor networks A Payal, CS Rai, BVR Reddy Wireless Personal Communications 82, 2519-2536, 2015 | 64 | 2015 |
Comparative analysis of Bayesian regularization and Levenberg-Marquardt training algorithm for localization in wireless sensor network A Payal, CS Rai, BVR Reddy 2013 15th International Conference on Advanced Communications Technology …, 2013 | 58 | 2013 |
An intrusion detection scheme based on the ensemble of discriminant classifiers BS Bhati, CS Rai, B Balamurugan, F Al-Turjman Computers & Electrical Engineering 86, 106742, 2020 | 57 | 2020 |
Ensemble based approach for intrusion detection using extra tree classifier BS Bhati, CS Rai Intelligent Computing in Engineering: Select Proceedings of RICE 2019, 213-220, 2020 | 54 | 2020 |
Artificial neural networks for developing localization framework in wireless sensor networks A Payal, CS Rai, BVR Reddy 2014 international conference on data mining and intelligent computing …, 2014 | 51 | 2014 |
Face recognition using self-organizing map and principal component analysis D Kumar, CS Rai, S Kumar 2005 International Conference on Neural Networks and Brain 3, 1469-1473, 2005 | 42 | 2005 |
Swarm based intelligent routing for MANETs S Prasad, YP Singh, CS Rai International Journal of Recent Trends in Engineering 1 (1), 153, 2009 | 39 | 2009 |
Blind source separation and ICA techniques: a review SN Jain, C Rai International Journal of Engineering Science and Technology 4 (4), 1490-1503, 2012 | 38 | 2012 |
TiD: Standalone software for mining putative drug targets from bacterial proteome R Gupta, D Pradhan, AK Jain, CS Rai Genomics 109 (1), 51-57, 2017 | 28 | 2017 |
Feature selection for face recognition: a memetic algorithmic approach D Kumar, S Kumar, CS Rai Journal of Zhejiang University-Science A 10, 1140-1152, 2009 | 26 | 2009 |
Source distribution models for blind source separation CS Rai, Y Singh Neurocomputing 57, 501-505, 2004 | 19 | 2004 |
An in silico approach towards identification of novel drug targets in pathogenic species of Leptospira R Gupta, R Verma, D Pradhan, AK Jain, A Umamaheswari, CS Rai PLoS One 14 (8), e0221446, 2019 | 17 | 2019 |
Memetic algorithms for feature selection in face recognition D Kumar, S Kumar, CS Rai 2008 Eighth International Conference on Hybrid Intelligent Systems, 931-934, 2008 | 17 | 2008 |
Intrusion detection systems and techniques: a review BS Bhati, CS Rai International Journal of Critical Computer-Based Systems 6 (3), 173-190, 2016 | 16 | 2016 |
Principal component analysis for data compression and face recognition D Kumar, CS Rai, S Kumar INFOCOMP Journal of Computer Science 7 (4), 48-59, 2008 | 15 | 2008 |
Performance evaluation of IEEE 802.11 DCF in single hop ad hoc networks N Gupta, CS Rai Wireless personal communications 79, 2171-2193, 2014 | 14 | 2014 |
Intrusion detection technique using Coarse Gaussian SVM BS Bhati, CS Rai International Journal of Grid and Utility Computing 12 (1), 27-32, 2021 | 11 | 2021 |
Blind channel equalization using modified constant modulus algorithm P Priyadarshi, CS Rai 2016 International Conference on Computing, Communication and Automation …, 2016 | 11 | 2016 |