


default search action
Chirag N. Modi
Person information
- affiliation: National Institute of Technology (NIT) Goa, Farmagudi, Ponda, India
Other persons with the same name
- Chirag Modi — disambiguation page
- Chirag Modi 0002
— Flatiron Institute, Center for Computational Astrophysics, New York, NY, USA (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Nivedita Naik
, Chintamani Vyjayanthi
, Chirag Modi
:
Filter-Based Active Damping of DAB Converter to Lower Battery Degradation in EV Fast Charging Application. IEEE Access 11: 74277-74289 (2023) - 2022
- [j11]Ajit Muzumdar
, Chirag N. Modi
, G. M. Madhu
, Chintamani Vyjayanthi
:
Designing a Robust and Accurate Model for Consumer-Centric Short-Term Load Forecasting in Microgrid Environment. IEEE Syst. J. 16(2): 2448-2459 (2022) - 2021
- [j10]G. M. Madhu
, Chintamani Vyjayanthi
, Chirag N. Modi
:
Investigation on Effect of Irradiance Change in Maximum Power Extraction From PV Array Interconnection Schemes During Partial Shading Conditions. IEEE Access 9: 96995-97009 (2021) - [j9]Ajit Muzumdar
, Chirag Modi
, G. M. Madhu
, Chintamani Vyjayanthi
:
A trustworthy and incentivized smart grid energy trading framework using distributed ledger and smart contracts. J. Netw. Comput. Appl. 183-184: 103074 (2021) - 2020
- [j8]Rajendra Patil
, Harsha Dudeja, Chirag Modi
:
Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing. Int. J. Inf. Sec. 19(2): 147-162 (2020) - [c15]Ajit Muzumdar
, Chirag Modi
, Chintamani Vyjayanthi:
An Efficient Regional Short-Term Load Forecasting Model for Smart Grid Energy Management. IECON 2020: 2089-2094
2010 – 2019
- 2019
- [j7]Rajendra Patil, Harsha Dudeja, Chirag Modi
:
Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. Comput. Secur. 85: 402-422 (2019) - [j6]Rajendra Patil
, Chirag Modi
:
An Exhaustive Survey on Security Concerns and Solutions at Different Components of Virtualization. ACM Comput. Surv. 52(1): 12:1-12:38 (2019) - [j5]Rajendra Patil
, Chirag Modi
:
Designing an efficient framework for vulnerability assessment and patching (VAP) in virtual environment of cloud computing. J. Supercomput. 75(5): 2862-2889 (2019) - [c14]Sandip Jangir, Ajit Muzumdar
, Alok Jaiswal, Chirag N. Modi
, Sheetal Chandel, Chintamani Vyjayanthi:
A Novel Framework for Pharmaceutical Supply Chain Management using Distributed Ledger and Smart Contracts. ICCCNT 2019: 1-7 - [c13]G. M. Madhu
, Chintamani Vyjayanthi, Chirag N. Modi
:
A Novel Framework for Monitoring Solar PV based Electric Vehicle Community Charging Station and Grid Frequency Regulation using Blockchain. ICCCNT 2019: 1-7 - [c12]Ajit Muzumdar
, Chirag N. Modi
, G. M. Madhu
, Chintamani Vyjayanthi:
Analyzing the Feasibility of Different Machine Learning Techniques for Energy Imbalance Classification in Smart Grid. ICCCNT 2019: 1-6 - [c11]Ashwini R. Patil, Amol D. Rahulkar, Chirag N. Modi
:
Designing an Efficient Fingerprint Recognition System for Infants and Toddlers. ICCCNT 2019: 1-7 - [c10]P. Swathi
, Chirag Modi, Dhiren Patel:
Preventing Sybil Attack in Blockchain using Distributed Behavior Monitoring of Miners. ICCCNT 2019: 1-6 - [c9]G. M. Madhu
, Chintamani Vyjayanthi, Chirag N. Modi
:
Design and Development of a Novel IoT based Smart Meter for Power Quality Monitoring in Smart Grid Infrastructure. TENCON 2019: 2204-2209 - 2018
- [c8]Rajendra Patil, Harsha Dudeja, Snehal Gawade, Chirag Modi:
Protocol Specific Multi-Threaded Network Intrusion Detection System (PM-NIDS) for DoS/DDoS Attack Detection in Cloud. ICCCNT 2018: 1-7 - 2017
- [j4]Chirag N. Modi
, Kamatchi Acha:
Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review. J. Supercomput. 73(3): 1192-1234 (2017) - 2016
- [j3]Dinesh Singh, Dhiren Patel, Bhavesh Borisaniya, Chirag Modi:
Collaborative IDS Framework for Cloud. Int. J. Netw. Secur. 18(4): 699-709 (2016) - [c7]Kamatchi Acha, Chirag N. Modi:
An Efficient Security Framework to Detect Intrusions At Virtual Network Layer of Cloud Computing. ICIN 2016 - [c6]Rajendra Patil, Chirag Modi:
A novel approach to detect extraneous network traffic from the compromised router. RAIT 2016: 352-358 - 2015
- [c5]Chirag Modi
, Ashwini R. Patil, Nishant Doshi
:
An efficient approach for privacy preserving distributed mining of association rules in unsecured environment. ICACCI 2015: 753-758 - 2013
- [j2]Chirag Modi
, Dhiren R. Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan:
A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36(1): 42-57 (2013) - [j1]Chirag Modi
, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan:
A survey on security issues and solutions at different layers of Cloud computing. J. Supercomput. 63(2): 561-592 (2013) - [c4]Chirag Modi, Dhiren R. Patel:
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing. CICS 2013: 23-30 - 2012
- [c3]Chirag Modi
, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan:
A novel framework for intrusion detection in cloud. SIN 2012: 67-74 - [i1]Vishal Vadgama, Bhavin Tanti, Chirag Modi, Nishant Doshi:
A novel approach for e-payment using virtual password system. CoRR abs/1208.3859 (2012) - 2010
- [c2]Chirag Modi
, Udai Pratap Rao, Dhiren R. Patel:
A Survey on Preserving Privacy for Sensitive Association Rules in Databases. BAIP 2010: 538-544 - [c1]Chirag Modi, Udai Pratap Rao, Dhiren R. Patel:
An Efficient Approach for Preventing Disclosure of Sensitive Association Rules in Databases. IKE 2010: 303-309
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-27 18:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint