1. J.K. Samriya, Kumar, A., Bhansali, A. et al. Sentimental analysis based federated learning privacy detection in fake web recommendations using blockchain model. Sci Rep 15, 13551 (2025). https://doi.org/10.1038/s41598-025-97800-y (SCIE, Springer Nature, Q1)

2. M. Kumar, Jitendra K. Samriya, G. K. Walia et.al., "Blockchain Empowered Secure Federated Learning for Consumer IoT Applications in Cloud-Edge Collaborative Environment," in IEEE Transactions on Consumer Electronics, [DoI: 10.1109/TCE.2025.3532676 ] (Q1 Indexing).

3. Md Arquam, Utkarsh Tiwari, and Suchi Kumari. "Statistical Analysis of the Properties of Geometric Network with Node Mobility." In 2024 IEEE 29th Asia Pacific Conference on Communications (APCC), pp. 462-469. IEEE, 2024. [DOI: 10.1109/APCC62576.2024.10768028 ]

4. Jitendra K Samriya, Mohit Kumar et.al Machine Learning based Network Intrusion Detection Optimization for Cloud Computing Environments", IEEE Transactions on Consumer Electronics;  [DOI: https://doi.org/10.1109/TCE.2024.3458810]

5. Kodali Radha, Mohan Bansal, Ram Bilas Pachori “Speech and Speaker Recognition using Raw Waveform Modeling for Adult and Children's Speech: A Comprehensive Review”, Engineering Applications of Artificial Intelligence, Elsevier, vol. 131, pp. 107661  2024 [DOI: https://doi.org/10.1016/j.engappai.2023.107661 ]

6. Shaik Mulla Shabber, Mohan Bansal, “Temporal Feature-Based Approaches for Enhancing Phoneme Boundary Detection and Masking in Speech”, International Journal of Speech Technology, Springer, 1-12, 2024 [DOI: https://doi.org/10.1007/s10772-024-10117-5 ]

7. Kodali Radha, Mohan Bansal, Ram Bilas Pachori, “Automatic Speaker and Age Identification of Non-Native Children from Raw Speech using SincNet over ERB Scale”, Speech Communication, Elsevier, vol. 159, pp. 103069, 2024 [DOI: https://doi.org/10.1016/j.specom.2024.103069 ]

8. Tumpa pal, Ramesh Saha, and Suparna Biswas. "Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network." Journal of Network and Systems Management 32, no. 3 (2024): 1-31 [DOI: https://doi.org/10.1007/s10922-024-09821-z]

9. Diddi Kumara Swamy, Vishwajit Kaushik, Mayana Rajkumar. "Exponential B-Spline Method for Second Order Singularly Perturbed Boundary Value Problem with Negative Shift." "Communications on Applied Nonlinear Analysis" Vol. 31, No. 3s (2024).

10. Tayyab Khan and Karan Singh. "DTMS: A Dual Trust-based Multi-level Sybil Attack Detection Approach in WSNs." Wireless Personal Communications 134, no. 3 (2024): 1389-1420. [DOI: https://doi.org/10.1007/s11277-024-10948-0]

11. Wakar Ahmad, Gaurav Gautam, Bashir Alam, and Bhoopesh Singh Bhati. "An Analytical Review and Performance Measures of State-of-Art Scheduling Algorithms in Heterogenous Computing Environments." Archives of Computational Methods in Engineering (2024): 1-23 [DOI: https://doi.org/10.1007/s11831-024-10069-8 Impact Factor: 9.7]

12. Ramesh Saha, Lokesh Malviya, Akshay Jadhav, and Ramraj Dangi. "Early stage HIV diagnosis using optimized ensemble learning technique." Biomedical Signal Processing and Control 89 (2024). [DOI: https://doi.org/10.1016/j.bspc.2023.105787]

13. D. Kumara Swamy, R. P. Singh, Bishwajit Kaushik. "Domain Decomposition Method for a Class of Singularly Perturbed Differential-Difference Equations." Advances in Nonlinear Variational Inequalities (2023): pp. 54-69. [DOI: https://doi.org/10.52783/anvi.v26.i2.263]

14. Jitendra Kumar Samriya, Chinmay Chakraborty, Aditi Sharma, and Mohit Kumar. "Adversarial ML-Based Secured Cloud Architecture for Consumer Internet of Things of Smart Healthcare." IEEE Transactions on Consumer Electronics (2023). [DOI: 10.1109/TCE.2023.3341696]

15. Jitendra Kumar Samriya, Surendra Kumar, Mohit Kumar, Minxian Xu, Huaming Wu, and Sukhpal Singh Gill. "Blockchain and Reinforcement Neural Network for Trusted Cloud-Enabled IoT Network." IEEE Transactions on Consumer Electronics (2023). [DOI: 10.1109/TCE.2023.3347690]