default search action
Ishu Gupta
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j16]Ashutosh Kumar Singh, Niharika Singh, Ishu Gupta:
Cloud-HPA: hierarchical privacy perseverance anatomy for data storage in cloud environment. Multim. Tools Appl. 83(13): 37431-37451 (2024) - 2023
- [j15]Rishabh Gupta, Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh:
A differential approach and deep neural network based data privacy-preserving model in cloud environment. J. Ambient Intell. Humaniz. Comput. 14(5): 4659-4674 (2023) - [j14]Rishabh Gupta, Ishu Gupta, Ashutosh Kumar Singh, Deepika Saxena, Chung-Nan Lee:
An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud. IEEE Syst. J. 17(2): 2445-2454 (2023) - [j13]Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh, Chung-Nan Lee:
SeCoM: An Outsourced Cloud-Based Secure Communication Model for Advanced Privacy Preserving Data Computing and Protection. IEEE Syst. J. 17(4): 5130-5141 (2023) - [j12]Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen:
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity. IEEE Trans. Syst. Man Cybern. Syst. 53(11): 6815-6827 (2023) - 2022
- [j11]Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee, Rajkumar Buyya:
Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions. IEEE Access 10: 71247-71277 (2022) - [j10]Rishabh Gupta, Deepika Saxena, Ishu Gupta, Aaisha Makkar, Ashutosh Kumar Singh:
Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications. IEEE Netw. Lett. 4(4): 174-178 (2022) - [j9]Rishabh Gupta, Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh:
Differential and TriPhase Adaptive Learning-Based Privacy-Preserving Model for Medical Data in Cloud Environment. IEEE Netw. Lett. 4(4): 217-221 (2022) - [j8]Deepika Saxena, Ishu Gupta, Jitendra Kumar, Ashutosh Kumar Singh, Xiaoqing Wen:
A Secure and Multiobjective Virtual Machine Placement Framework for Cloud Data Center. IEEE Syst. J. 16(2): 3163-3174 (2022) - [j7]Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee:
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services. IEEE Trans. Netw. Serv. Manag. 19(3): 3048-3061 (2022) - 2021
- [j6]Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Rajkumar Buyya:
MLPAM: A Machine Learning and Probabilistic Analysis Based Model for Preserving Security and Privacy in Cloud Environment. IEEE Syst. J. 15(3): 4248-4259 (2021) - 2020
- [j5]Ishu Gupta, Ashutosh Kumar Singh:
SELI: statistical evaluation based leaker identification stochastic scheme for secure data sharing. IET Commun. 14(20): 3607-3618 (2020) - [j4]Ishu Gupta, Ashutosh Kumar Singh:
GUIM-SMD: guilty user identification model using summation matrix-based distribution. IET Inf. Secur. 14(6): 773-782 (2020) - [j3]Ishu Gupta, Ashutosh Kumar Singh:
An Integrated Approach for Data Leaker Detection in Cloud Environment. J. Inf. Sci. Eng. 36(5): 993-1005 (2020) - [j2]Ashutosh Kumar Singh, Ishu Gupta:
Online information leaker identification scheme for secure data sharing. Multim. Tools Appl. 79(41-42): 31165-31182 (2020) - 2019
- [j1]Ishu Gupta, Ashutosh Kumar Singh:
Dynamic threshold based information leaker identification scheme. Inf. Process. Lett. 147: 69-73 (2019)
Conference and Workshop Papers
- 2024
- [c3]Pranav Singh Chib, Achintya Nath, Paritosh Kabra, Ishu Gupta, Pravendra Singh:
MS-TIP: Imputation Aware Pedestrian Trajectory Prediction. ICML 2024 - 2021
- [c2]Ayushi Acharya, Hari Prasad, Vinod Kumar Singh, Ishu Gupta, Ashutosh Kumar Singh:
MACI: Malicious API Call Identifier Model to Secure the Host Platform. ICMC 2021: 309-320 - 2017
- [c1]Ishu Gupta, Ashutosh Kumar Singh:
A Probability based Model for Data Leakage Detection using Bigraph. ICCNS 2017: 1-5
Informal and Other Publications
- 2023
- [i8]Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen:
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity. CoRR abs/2308.09578 (2023) - 2022
- [i7]Ishu Gupta, Ashutosh Kumar Singh:
A Holistic View on Data Protection for Sharing, Communicating, and Computing Environments: Taxonomy and Future Directions. CoRR abs/2202.11965 (2022) - [i6]Ishu Gupta, Sloni Mittal, Ankit Tiwari, Priya Agarwal, Ashutosh Kumar Singh:
TIDF-DLPM: Term and Inverse Document Frequency based Data Leakage Prevention Model. CoRR abs/2203.05367 (2022) - [i5]Ishu Gupta, Harsh Mittal, Deepak Rikhari, Ashutosh Kumar Singh:
MLRM: A Multiple Linear Regression based Model for Average Temperature Prediction of A Day. CoRR abs/2203.05835 (2022) - [i4]Ishu Gupta, Tarun Kumar Madan, Sukhman Singh, Ashutosh Kumar Singh:
HiSA-SMFM: Historical and Sentiment Analysis based Stock Market Forecasting Model. CoRR abs/2203.08143 (2022) - [i3]Ishu Gupta, Vartika Sharma, Sizman Kaur, Ashutosh Kumar Singh:
PCA-RF: An Efficient Parkinson's Disease Prediction Model based on Random Forest Classification. CoRR abs/2203.11287 (2022) - [i2]Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee:
A Fault Tolerant Elastic Resource Management Framework Towards High Availability of Cloud Services. CoRR abs/2212.03547 (2022) - 2021
- [i1]Deepika Saxena, Ishu Gupta, Jitendra Kumar, Ashutosh Kumar Singh, Xiaoqing Wen:
A Secure and Multi-objective Virtual Machine Placement Framework for Cloud Data Centre. CoRR abs/2107.13502 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 01:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint