1. Md Arquam, Utkarsh Tiwari, and Suchi Kumari. "Statistical Analysis of the Properties of Geometric Network with Node Mobility." In 2024 IEEE 29th Asia Pacific Conference on Communications (APCC), pp. 462-469. IEEE, 2024. [DOI: 10.1109/APCC62576.2024.10768028 ]

2. Jitendra K Samriya, Mohit Kumar et.al Machine Learning based Network Intrusion Detection Optimization for Cloud Computing Environments", IEEE Transactions on Consumer Electronics;  [DOI: https://doi.org/10.1109/TCE.2024.3458810]

3. Kodali Radha, Mohan Bansal, Ram Bilas Pachori “Speech and Speaker Recognition using Raw Waveform Modeling for Adult and Children's Speech: A Comprehensive Review”, Engineering Applications of Artificial Intelligence, Elsevier, vol. 131, pp. 107661  2024 [DOI: https://doi.org/10.1016/j.engappai.2023.107661 ]

4. Shaik Mulla Shabber, Mohan Bansal, “Temporal Feature-Based Approaches for Enhancing Phoneme Boundary Detection and Masking in Speech”, International Journal of Speech Technology, Springer, 1-12, 2024 [DOI: https://doi.org/10.1007/s10772-024-10117-5 ]

5. Kodali Radha, Mohan Bansal, Ram Bilas Pachori, “Automatic Speaker and Age Identification of Non-Native Children from Raw Speech using SincNet over ERB Scale”, Speech Communication, Elsevier, vol. 159, pp. 103069, 2024 [DOI: https://doi.org/10.1016/j.specom.2024.103069 ]

6. Tumpa pal, Ramesh Saha, and Suparna Biswas. "Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network." Journal of Network and Systems Management 32, no. 3 (2024): 1-31 [DOI: https://doi.org/10.1007/s10922-024-09821-z]

7. Diddi Kumara Swamy, Vishwajit Kaushik, Mayana Rajkumar. "Exponential B-Spline Method for Second Order Singularly Perturbed Boundary Value Problem with Negative Shift." "Communications on Applied Nonlinear Analysis" Vol. 31, No. 3s (2024).

8. Tayyab Khan and Karan Singh. "DTMS: A Dual Trust-based Multi-level Sybil Attack Detection Approach in WSNs." Wireless Personal Communications 134, no. 3 (2024): 1389-1420. [DOI: https://doi.org/10.1007/s11277-024-10948-0]

9. Wakar Ahmad, Gaurav Gautam, Bashir Alam, and Bhoopesh Singh Bhati. "An Analytical Review and Performance Measures of State-of-Art Scheduling Algorithms in Heterogenous Computing Environments." Archives of Computational Methods in Engineering (2024): 1-23 [DOI: https://doi.org/10.1007/s11831-024-10069-8 Impact Factor: 9.7]

10. Ramesh Saha, Lokesh Malviya, Akshay Jadhav, and Ramraj Dangi. "Early stage HIV diagnosis using optimized ensemble learning technique." Biomedical Signal Processing and Control 89 (2024). [DOI: https://doi.org/10.1016/j.bspc.2023.105787]

11. D. Kumara Swamy, R. P. Singh, Bishwajit Kaushik. "Domain Decomposition Method for a Class of Singularly Perturbed Differential-Difference Equations." Advances in Nonlinear Variational Inequalities (2023): pp. 54-69. [DOI: https://doi.org/10.52783/anvi.v26.i2.263]

12. Diwakar Tripathi, YCA Padmanabha Reddy, Shailendra Kumar Tripathi, B. Ramachandra Reddy, and Ram Kishan Dewangan. "Experimental Result Analysis of Extreme Learning Machine with Various Activation Functions: An Application in Credit Scoring." In Machine Vision and Augmented Intelligence: Select Proceedings of MAI 2022, pp. 519-530. Singapore: Springer Nature Singapore, 2023. [DOI: https://doi.org/10.1007/978-981-99-0189-0_40]

13. Jitendra Kumar Samriya, Chinmay Chakraborty, Aditi Sharma, and Mohit Kumar. "Adversarial ML-Based Secured Cloud Architecture for Consumer Internet of Things of Smart Healthcare." IEEE Transactions on Consumer Electronics (2023). [DOI: 10.1109/TCE.2023.3341696]

14. Jitendra Kumar Samriya, Surendra Kumar, Mohit Kumar, Minxian Xu, Huaming Wu, and Sukhpal Singh Gill. "Blockchain and Reinforcement Neural Network for Trusted Cloud-Enabled IoT Network." IEEE Transactions on Consumer Electronics (2023). [DOI: 10.1109/TCE.2023.3347690]