


default search action
Ashutosh Bhatia
- > Home > Persons > Ashutosh Bhatia
Publications
- 2026
[j18]Arti Jha
, Ashutosh Bhatia
, Kamlesh Tiwari
, Hari Mohan Pandey
:
Hierarchical Bayesian Deep Learning for return on advertising spend prediction: A probabilistic approach to e-commerce advertising. Eng. Appl. Artif. Intell. 164: 113200 (2026)- 2025
[j17]Tarun Jain
, Sainath Bitragunta
, Ashutosh Bhatia
:
Secrecy Capacity and Efficiency Outage Analysis of Cooperative PHY-Secure Wireless Systems and Secrecy Capacity-Based RIS Design. IEEE Access 13: 54808-54822 (2025)
[j16]Arti Jha
, Ashutosh Bhatia
, Kamlesh Tiwari
:
Bayesian Deep Learning Meets Self-Attention: A Risk-Aware Approach to Advertisement Optimization. IEEE Access 13: 86413-86429 (2025)
[j15]Shreyan Prakash
, Raj Bhattacherjee
, Sainath Bitragunta
, Ashutosh Bhatia
, Kamlesh Tiwari
:
Quantum Computing-Accelerated Kalman Filtering for Satellite Clusters: Algorithms and Comparative Analysis. IEEE Open J. Comput. Soc. 6: 307-316 (2025)
[j14]Ankit Agrawal
, Ashutosh Bhatia
, Kamlesh Tiwari
:
Sybil-Resilient Publisher Selection Mechanism in Blockchain-Based MCS Systems. IEEE Open J. Comput. Soc. 6: 586-598 (2025)
[j13]Ashutosh Bhatia
, Sainath Bitragunta
, Kamlesh Tiwari
:
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security. IEEE Open J. Commun. Soc. 6: 926-943 (2025)
[j12]Ashutosh Bhatia
, Sainath Bitragunta
, Kamlesh Tiwari
:
PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation. IEEE Open J. Commun. Soc. 6: 4923-4942 (2025)
[c61]Arti Jha, Kamlesh Tiwari, Ashutosh Bhatia:
ExProCO: An Explainable Probabilistic Campaign Optimizer for eCommerce Advertising. AINA (2) 2025: 152-164
[c60]Kaustubh Dwivedi, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
A Layered Framework for Blockchain Security: Classification of Threats and the Quantum Computing Impact. AINA (8) 2025: 257-269
[c59]Ankit Agrawal, Aditi Bansal, Ashutosh Bhatia, Kamlesh Tiwari:
Layered Blockchain-Based Mobile CrowdSensing Architecture: Exploring Privacy and Scalability Challenges Across Layers. AINA (8) 2025: 281-292
[c58]Pranav Deepak Tanna, Saumya Sharma, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Decentralized Marketplace for Maintenance of Electric Vehicles. AINA (7) 2025: 378-389
[c57]Vikas Kumawat, Yashvardhan Sharma, Ashutosh Bhatia, Kamlesh Tiwari:
TrPrNet: Early Parkinson Detection Network Using Marker-Less Gait Analysis. AINA (3) 2025: 415-427
[i11]Bhaskar Mangal, Ashutosh Bhatia, Yashvardhan Sharma, Kamlesh Tiwari, Rashmi Verma:
KTBox: A Modular LaTeX Framework for Semantic Color, Structured Highlighting, and Scholarly Communication. CoRR abs/2510.01961 (2025)- 2024
[j11]Laxmi Divya Chhibbar, Sujay Patni
, Siddarth Todi, Ashutosh Bhatia
, Kamlesh Tiwari:
Enhancing security through continuous biometric authentication using wearable sensors. Internet Things 28: 101374 (2024)
[c56]Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, Ashutosh Bhatia, Kamlesh Tiwari:
SmartDriveAuth: Enhancing Vehicle Security with Continuous Driver Authentication via Wearable PPG Sensors and Deep Learning. AINA (3) 2024: 59-72
[c55]Ankit Agrawal, Bhaskar Mangal
, Ashutosh Bhatia, Kamlesh Tiwari:
Enabling AI in Agriculture 4.0: A Blockchain-Based Mobile CrowdSensing Architecture. AINA (2) 2024: 173-186
[c54]Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Enhancing Mobile Crowdsensing Security: A Proof of Stake-Based Publisher Selection Algorithm to Combat Sybil Attacks in Blockchain-Assisted MCS Systems. AINA (4) 2024: 174-186
[c53]Ashutosh Bhatia, Sainath Bitragunta
, Kamlesh Tiwari:
QC-Stack: A Layered Reference Model for Quantum Computers. COMSNETS 2024: 962-967
[c52]Ashutosh Bhatia, Sainath Bitragunta
, Kamlesh Tiwari:
Quantum Key Distribution Optimization: Reducing Communication Overhead in Post-Processing Steps. TENCON 2024: 645-648
[c51]Aayush Jain, Adwait Gondhalekar, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Privacy-Preserving Password-Based Authentication Using Zero-Knowledge Proofs. TENCON 2024: 891-894
[i10]Kaustubh Dwivedi, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions. CoRR abs/2404.18090 (2024)- 2023
[j10]Ankit Agrawal
, Sarthak Choudhary
, Ashutosh Bhatia, Kamlesh Tiwari
:
Pub-SubMCS: A privacy-preserving publish-subscribe and blockchain-based mobile crowdsensing framework. Future Gener. Comput. Syst. 146: 234-249 (2023)
[c50]Yadagiri Shiva Sai Sashank, Ankit Agrawal
, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari:
D-insta: A Decentralized Image Sharing Platform. AINA (3) 2023: 206-217
[c49]Gerard Christopher Aloysius, Ashutosh Bhatia, Kamlesh Tiwari:
Stability and Availability Optimization of Distributed ERP Systems During Cloud Migration. AINA (2) 2023: 343-354
[c48]Usneek Singh, Nisarg Vora, Punit Lohia, Yashvardhan Sharma, Ashutosh Bhatia, Kamlesh Tiwari:
Multilingual Chatbot for Indian Languages. ICCCNT 2023: 1-5
[c47]K. Haribabu, Ankit Agrawal, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari:
T-PASS: A Blockchain-based NFT Enabled Property Management and Exchange System. ICOIN 2023: 140-145
[c46]Ritik Bavdekar, Eashan Jayant Chopde, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Post Quantum Cryptography: A Review of Techniques, Challenges and Standardizations. ICOIN 2023: 146-151
[c45]Pratham Gupta, Kunjan Shah, Ankit Agrawal
, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari:
DCGit: Decentralized Internet Hosting for Software Development. ICOIN 2023: 660-665
[c44]Geetika Arora, Arsh Kumbhat, Ashutosh Bhatia, Kamlesh Tiwari:
CP-Net: Multi-Scale Core Point Localization in Fingerprints Using Hourglass Network. IWBF 2023: 1-6- 2022
[j9]Ankit Agrawal
, Ashutosh Bhatia
, Ayush Bahuguna
, Kamlesh Tiwari, K. Haribabu
, Deepak Vishwakarma, Rekha Kaushik:
A survey on analyzing encrypted network traffic of mobile devices. Int. J. Inf. Sec. 21(4): 873-915 (2022)
[j8]Ashutosh Bhatia, Deepak Kumar Vishvakarma, Rekha Kaushik, Ankit Agrawal:
Entropy and likelihood-based detection of DGA generated domain names and their families. Int. J. Secur. Networks 17(3): 147-192 (2022)
[j7]Sandhya Rathee, Shubham Tiwari
, K. Haribabu, Ashutosh Bhatia:
qMon: A method to monitor queueing delay in OpenFlow networks. J. Commun. Networks 24(4): 463-474 (2022)
[c43]Aman Sharma, Ankit Agrawal
, Ashutosh Bhatia, Kamlesh Tiwari:
Bitcoin's Blockchain Data Analytics: A Graph Theoretic Perspective. AINA (1) 2022: 459-470
[c42]Amit Pandia, Geetika Arora, Archit Jain, Rohit Bharadwaj, Ashutosh Bhatia, Kamlesh Tiwari:
DTeeth: Teeth-photo Based Human Authentication for Mobile Devices. IJCB 2022: 1-8
[c41]Jai Singhal, Ankit Singh Gautam, Ashutosh Bhatia, Ankit Agrawal, Rekha Kaushik
:
DD-Locker: Blockchain-based Decentralized Personal Document Locker. ICOIN 2022: 68-73
[c40]Rudraraju Sacin Varma, Ankit Agrawal, Ashutosh Bhatia, Kamlesh Tiwari:
Multi-vendor IoT-based Resource Sharing using OAuth and Blockchain. ICOIN 2022: 74-77
[c39]Rohit Bharadwaj
, Ashutosh Bhatia, Laxmi Divya Chhibbar, Kamlesh Tiwari, Ankit Agrawal
:
Is this URL Safe: Detection of Malicious URLs Using Global Vector for Word Representation. ICOIN 2022: 486-491
[i9]Ritik Bavdekar, Eashan Jayant Chopde, Ashutosh Bhatia, Kamlesh Tiwari, Sandeep Joshua Daniel, Atul:
Post Quantum Cryptography: Techniques, Challenges, Standardization, and Directions for Future Research. CoRR abs/2202.02826 (2022)- 2021
[j6]Geetika Arora
, Sumit Kalra
, Ashutosh Bhatia
, Kamlesh Tiwari
:
PalmHashNet: Palmprint Hashing Network for Indexing Large Databases to Boost Identification. IEEE Access 9: 145912-145928 (2021)
[j5]Sandhya Rathee
, Nitin Varyani, K. Haribabu
, Aakash Bajaj, Ashutosh Bhatia, Ram Jashnani, Zhi-Li Zhang:
GlobeSnap: An Efficient Globally Consistent Statistics Collection for Software-Defined Networks. J. Netw. Syst. Manag. 29(3): 35 (2021)
[c37]Ayush Bahuguna
, Ankit Agrawal
, Ashutosh Bhatia, Kamlesh Tiwari, Deepak Vishwakarma:
User Profiling Using Smartphone Network Traffic Analysis. COMSNETS 2021: 69-73
[c36]Sandhya Rathee, Divesh Uttamchandani, K. Haribabu
, Ashutosh Bhatia:
An Efficient Method to Collect Statistics in SDN Using Curvature Based Sampling. ICOIN 2021: 175-180
[c35]Indraneel Ghosh, Subham Kumar, Ashutosh Bhatia, Deepak Kumar Vishwakarma:
Using Auxiliary Inputs in Deep Learning Models for Detecting DGA-based Domain Names. ICOIN 2021: 391-396
[c34]Adityan Gurunarayanan, Ankit Agrawal, Ashutosh Bhatia, Deepak Kumar Vishwakarma:
Improving the performance of Machine Learning Algorithms for TOR detection. ICOIN 2021: 439-444
[c33]Aaron Fernandes, Karan Garg, Ankit Agrawal
, Ashutosh Bhatia:
Decentralized Online Voting using Blockchain and Secret Contracts. ICOIN 2021: 582-587- 2020
[c32]Yashita Goswami, Ankit Agrawal
, Ashutosh Bhatia:
E-Governance: A Tendering Framework Using Blockchain With Active Participation of Citizens. IEEE ANTS 2020: 1-4
[c30]Sandhya Rathee, K. Haribabu
, Parth Patel, Ashutosh Bhatia, Ujjwal Gandhi:
Analysis and Performance Evaluation of Different Methods to Achieve Way-Point Enforcement in Hybrid SDN. AINA Workshops 2020: 190-200
[c28]Mihika Naik, Ashutosh Bhatia, Kamlesh Tiwari:
I Know Who You are: A Learning Framework to Profile Smartphone Users. COMSNETS 2020: 555-558
[c27]Gaurang Bansal
, Ashutosh Bhatia:
A Fast, Secure and Distributed Consensus Mechanism for Energy Trading Among Vehicles using Hashgraph. ICOIN 2020: 772-777
[i7]Ashutosh Bhatia, R. C. Hansdah:
A Classification Framework for TDMA Scheduling techniques in WSNs. CoRR abs/2002.00458 (2020)
[i6]Aman Sharma, Ashutosh Bhatia:
Bitcoin's Blockchain Data Analytics: A Graph Theoretic Perspective. CoRR abs/2002.06403 (2020)
[i5]Ayush Bahuguna, Ashutosh Bhatia, Kamlesh Tiwari, Deepak Vishwakarma:
User profiling using smartphone network traffic analysis. CoRR abs/2003.00542 (2020)
[i4]Sreelakshmi K. K., Ashutosh Bhatia, Ankit Agrawal:
Securing IoT Applications using Blockchain: A Survey. CoRR abs/2006.03317 (2020)
[i3]Ashutosh Bhatia, Ankit Agrawal, Ayush Bahuguna, Kamlesh Tiwari, K. Haribabu, Deepak Vishwakarma:
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices. CoRR abs/2006.12352 (2020)- 2019
[c26]Denson George, Anand Wani, Ashutosh Bhatia:
A Blockchain based Solution to Know Your Customer (KYC) Dilemma. ANTS 2019: 1-6
[c25]Subham Kumar, Ashutosh Bhatia:
Detecting Domain Generation Algorithms to prevent DDoS attacks using Deep Learning. ANTS 2019: 1-4
[c24]Sandhya Rathee, T. Dinesh Ram Kumar, K. Haribabu
, Ashutosh Bhatia:
A Framework to Achieve Full Waypoint Enforcement in Hybrid SDN Networks. AINA 2019: 325-340
[c23]T. Dinesh Ram Kumar, Ashutosh Bhatia, R. C. Hansdah:
Exploiting Multiple Paths in Multi-hop Co-operative Ad-Hoc Networks for Providing Security without Trusted Third Party. AINA 2019: 1254-1265
[c22]Deepak Kumar Vishvakarma, Ashutosh Bhatia, Zdenek Ríha:
Detection of Algorithmically Generated Domain Names in Botnets. AINA 2019: 1279-1290
[c21]Sandhya Rathee, Rahul Sharma, Piyush Kumar Jain, K. Haribabu, Ashutosh Bhatia, Sundar Balasubramaniam:
OpenSnap: Collection of Globally Consistent Statistics in Software Defined Networks. COMSNETS 2019: 149-156
[c20]Pravin Murkya, Jasmeet Singh, Ashutosh Bhatia:
A Topology Independent TDMA-based MAC protocol for Vehicular Networks. COMSNETS 2019: 407-409
[c19]Ashutosh Bhatia, Rahul Nehete, Praveen Kaushik
, Pravin Murkya, K. Haribabu
:
A Lightweight ARQ Scheme to Minimize Communication Overhead. COMSNETS 2019: 507-509
[i1]Ashutosh Bhatia, R. C. Hansdah:
A Two-Phase Scheme for Distributed TDMA Scheduling in WSNs with Flexibility to Trade-off between Schedule Length and Scheduling Time. CoRR abs/1912.12039 (2019)- 2018
[c17]Sandhya, Mallikarjun Swamy, K. Haribabu
, Ashutosh Bhatia:
Achieving waypoint enforcement in multi-VLAN hybrid SDN. COMSNETS 2018: 519-521
[c15]Ashutosh Bhatia, K. Haribabu
, Kartikeya Gupta, Aakash Sahu:
Realization of flexible and scalable VANETs through SDN and virtualization. ICOIN 2018: 280-282
[c14]Ganesh Bellikar, Ashutosh Bhatia, R. C. Hansdah, Sudhanshu Singh:
3TAAV: A three-tier architecture for pseudonym-based anonymous authentication in VANETs. ICOIN 2018: 420-425- 2017
[c12]Ashutosh Bhatia, Sudhanshu Singh:
Bandwidth Efficient Clock Skew Compensation in TDMA-Based Star Topology Wireless Networks. AINA 2017: 522-529- 2016
[j3]Ashutosh Bhatia, R. C. Hansdah:
TRM-MAC: A TDMA-based reliable multicast MAC protocol for WSNs with flexibility to trade-off between latency and reliability. Comput. Networks 104: 79-93 (2016)- 2015
[j2]Ashutosh Bhatia, Ramesh C. Hansdah:
A Distributed TDMA Slot Scheduling Algorithm for Spatially Correlated Contention in WSNs. Mob. Inf. Syst. 2015: 234143:1-234143:16 (2015)
[c10]Ashutosh Bhatia, R. C. Hansdah:
DSLR: A Distributed Schedule Length Reduction Algorithm for WSNs. IPDPS 2015: 365-374- 2014
[j1]Ashutosh Bhatia, R. C. Hansdah:
A media access and feedback protocol for reliable multicast over wireless channel. Wirel. Networks 20(8): 2371-2383 (2014)
[c9]Siddharth Watwe, Ashutosh Bhatia, R. C. Hansdah:
A Design for Performance Improvement of Clock Synchronization in WSNs Using a TDMA-Based MAC Protocol. AINA Workshops 2014: 366-371
[c8]Ashutosh Bhatia, R. C. Hansdah:
RD-TDMA: A Randomized Distributed TDMA Scheduling for Correlated Contention in WSNs. AINA Workshops 2014: 378-384
[c7]Ashutosh Bhatia, R. C. Hansdah:
A TDMA-Based Energy Aware MAC (TEA-MAC) Protocol for Reliable Multicast in WSNs. AINA 2014: 798-805
[c6]Ashutosh Bhatia, R. C. Hansdah:
A Fast and Fault-Tolerant Distributed Algorithm for Near-Optimal TDMA Scheduling in WSNs. DCOSS 2014: 294-301- 2013
[c5]Ashutosh Bhatia, R. C. Hansdah:
A Distributed TDMA Slot Scheduling Algorithm for Spatially Correlated Contention in WSNs. AINA Workshops 2013: 377-384
[c4]Ashutosh Bhatia, R. C. Hansdah:
A Media Access and Feedback Protocol for Reliable Multicast over Wireless Channel. ICDCN 2013: 445-449- 2008
[c1]Ashutosh Bhatia, Praveen Kaushik
:
A cluster based minimum battery cost AODV routing using multipath route for zigbee. ICON 2008: 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-05 00:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






