C. Jayakumar

778 total citations
51 papers, 477 citations indexed

About

C. Jayakumar is a scholar working on Computer Networks and Communications, Artificial Intelligence and Computer Vision and Pattern Recognition. According to data from OpenAlex, C. Jayakumar has authored 51 papers receiving a total of 477 indexed citations (citations by other indexed papers that have themselves been cited), including 30 papers in Computer Networks and Communications, 14 papers in Artificial Intelligence and 12 papers in Computer Vision and Pattern Recognition. Recurrent topics in C. Jayakumar's work include Security in Wireless Sensor Networks (12 papers), Energy Efficient Wireless Sensor Networks (12 papers) and Network Security and Intrusion Detection (9 papers). C. Jayakumar is often cited by papers focused on Security in Wireless Sensor Networks (12 papers), Energy Efficient Wireless Sensor Networks (12 papers) and Network Security and Intrusion Detection (9 papers). C. Jayakumar collaborates with scholars based in India, Jordan and China. C. Jayakumar's co-authors include L. Sujihelen, K. Selvamani, G. Geetha, C. Chellappan, Anil Thomas, Thompson Stephan, Mohammad S. Obaidat, C. T. Manimegalai, T. M. Sridhar and Kuei‐Fang Hsiao and has published in prestigious journals such as Electric Power Systems Research, Multimedia Tools and Applications and IEEE Systems Journal.

In The Last Decade

C. Jayakumar

46 papers receiving 450 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
C. Jayakumar India 12 180 148 131 85 67 51 477
Jasmine Kah Phooi Seng Australia 12 205 1.1× 151 1.0× 66 0.5× 46 0.5× 67 1.0× 14 531
Surbhi Sharma India 11 183 1.0× 227 1.5× 93 0.7× 104 1.2× 168 2.5× 35 580
U. Sakthi India 10 152 0.8× 125 0.8× 70 0.5× 66 0.8× 48 0.7× 45 389
Hemant Kumar Gianey India 8 108 0.6× 71 0.5× 105 0.8× 64 0.8× 42 0.6× 13 396
Tri‐Hai Nguyen South Korea 15 182 1.0× 152 1.0× 104 0.8× 91 1.1× 45 0.7× 49 577
Ahmad F. Subahi Saudi Arabia 13 136 0.8× 54 0.4× 87 0.7× 109 1.3× 85 1.3× 24 425
Ravi Kumar India 14 72 0.4× 184 1.2× 91 0.7× 49 0.6× 93 1.4× 80 514
Ramesh Vatambeti India 12 192 1.1× 68 0.5× 127 1.0× 83 1.0× 19 0.3× 61 447
Koushik Majumder India 10 299 1.7× 150 1.0× 79 0.6× 112 1.3× 100 1.5× 63 566
P. Subbulakshmi India 10 88 0.5× 83 0.6× 88 0.7× 47 0.6× 58 0.9× 32 423

Countries citing papers authored by C. Jayakumar

Since Specialization
Citations

This map shows the geographic impact of C. Jayakumar's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by C. Jayakumar with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites C. Jayakumar more than expected).

Fields of papers citing papers by C. Jayakumar

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by C. Jayakumar. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by C. Jayakumar. The network helps show where C. Jayakumar may publish in the future.

Co-authorship network of co-authors of C. Jayakumar

This figure shows the co-authorship network connecting the top 25 collaborators of C. Jayakumar. A scholar is included among the top collaborators of C. Jayakumar based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with C. Jayakumar. C. Jayakumar is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
2.
Jayakumar, C., et al.. (2024). Efficient and Secure Long-Distance Quantum Key Distribution by using a Proxy Encryption Scheme. Multimedia Tools and Applications. 83(34). 80285–80298. 1 indexed citations
3.
Seetharaman, R., et al.. (2023). Task based Approach for Smart Secure Data Transmission using TinyOS RTOS. 1–5. 2 indexed citations
4.
Jayakumar, C., et al.. (2022). RecogNet-LSTM+CNN: a hybrid network with attention mechanism for aspect categorization and sentiment classification. Journal of Intelligent Information Systems. 58(2). 379–404. 39 indexed citations
5.
Jayakumar, C., et al.. (2022). Deep learning based short term load forecasting with hybrid feature selection. Electric Power Systems Research. 210. 108065–108065. 48 indexed citations
6.
Jayakumar, C., et al.. (2021). A Review of Bio-Inspired Computational Intelligence Algorithms in Electricity Load Forecasting. 169–192. 5 indexed citations
7.
Jayakumar, C., et al.. (2020). Pituitary stalk transection syndrome. International Journal of Contemporary Pediatrics. 7(12). 2397–2397.
8.
Jayakumar, C., et al.. (2019). Comparison of Multimodal Image Fusion In Brain Tumor Detection by ABC Optimization and Genetic Algorithm. Journal of Advanced Research in Dynamic and Control Systems. 11. 308–317. 1 indexed citations
9.
Jayakumar, C., et al.. (2019). Sequence Statistical Code Based Data Compression Algorithm for Wireless Sensor Network. Wireless Personal Communications. 106(3). 971–985. 5 indexed citations
10.
Sujihelen, L., et al.. (2018). SEC Approach for Detecting Node Replication Attacks in Static Wireless Sensor Networks. Journal of Electrical Engineering and Technology. 13(6). 2447–2455. 7 indexed citations
11.
Jayakumar, C., et al.. (2017). ESAA: Efficient Sequence Alignment Algorithm for Dynamic Malware Analysis in Windows Executable Using API Call Sequence. International journal of intelligent engineering and systems. 10(3). 290–298. 2 indexed citations
12.
Jayakumar, C., et al.. (2017). FlowAgent: Software Defined Firewall Rule Generator for Network Intrusion Detection System. International journal of intelligent engineering and systems. 10(3). 299–306. 6 indexed citations
13.
Jayakumar, C., et al.. (2017). Various lossless compression techniques surveyed. 65–68.
14.
Manimegalai, C. T., et al.. (2015). Using animal communication strategy (ACS) for MANET routing. Journal of the National Science Foundation of Sri Lanka. 43(3). 199–199. 1 indexed citations
15.
Jayakumar, C., et al.. (2015). Automatic drip irrigation system using fuzzy logic and mobile technology. 54–58. 36 indexed citations
16.
Manimegalai, C. T. & C. Jayakumar. (2013). A Conceptual Survey of MANET Routing Protocols. International Journal of Innovative Research in Science Engineering and Technology. 2(11). 6125–6130. 2 indexed citations
17.
Jayakumar, C., et al.. (2013). A Secure Key Pre-distribution Scheme in Wireless Sensor Networks using Elliptic Curve Diffie-Hellman Key Exchange. 34–38. 1 indexed citations
18.
Jayakumar, C., et al.. (2012). Node capture attack in Wireless Sensor Network: A survey. 1–3. 27 indexed citations
19.
Sridhar, T. M., et al.. (2012). An efficient and secure key agreement scheme using physiological signals in body area networks. 1143–1147. 11 indexed citations
20.
Geetha, G. & C. Jayakumar. (2011). Trust Enhanced Data Security in Free Roaming Mobile agents Using Symmetric Key cryptography. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026