​
Login / Signup
Ishu Gupta
ORCID
Publication Activity (10 Years)
Years Active: 2017-2024
Publications (10 Years): 26
Top Topics
Fault Tolerant
Virtual Machine
Prediction Model
Data Protection
Top Venues
CoRR
IEEE Syst. J.
Multim. Tools Appl.
IEEE Netw. Lett.
</>
Publications
</>
Ashutosh Kumar Singh
,
Niharika Singh
,
Ishu Gupta
Cloud-HPA: hierarchical privacy perseverance anatomy for data storage in cloud environment.
Multim. Tools Appl.
83 (13) (2024)
Ishu Gupta
,
Deepika Saxena
,
Ashutosh Kumar Singh
,
Chung-Nan Lee
SeCoM: An Outsourced Cloud-Based Secure Communication Model for Advanced Privacy Preserving Data Computing and Protection.
IEEE Syst. J.
17 (4) (2023)
Rishabh Gupta
,
Ishu Gupta
,
Deepika Saxena
,
Ashutosh Kumar Singh
A differential approach and deep neural network based data privacy-preserving model in cloud environment.
J. Ambient Intell. Humaniz. Comput.
14 (5) (2023)
Rishabh Gupta
,
Ishu Gupta
,
Ashutosh Kumar Singh
,
Deepika Saxena
,
Chung-Nan Lee
An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud.
IEEE Syst. J.
17 (2) (2023)
Deepika Saxena
,
Ishu Gupta
,
Rishabh Gupta
,
Ashutosh Kumar Singh
,
Xiaoqing Wen
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity.
CoRR
(2023)
Deepika Saxena
,
Ishu Gupta
,
Rishabh Gupta
,
Ashutosh Kumar Singh
,
Xiaoqing Wen
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity.
IEEE Trans. Syst. Man Cybern. Syst.
53 (11) (2023)
Ishu Gupta
,
Sloni Mittal
,
Ankit Tiwari
,
Priya Agarwal
,
Ashutosh Kumar Singh
TIDF-DLPM: Term and Inverse Document Frequency based Data Leakage Prevention Model.
CoRR
(2022)
Deepika Saxena
,
Ishu Gupta
,
Ashutosh Kumar Singh
,
Chung-Nan Lee
A Fault Tolerant Elastic Resource Management Framework Towards High Availability of Cloud Services.
CoRR
(2022)
Ishu Gupta
,
Ashutosh Kumar Singh
A Holistic View on Data Protection for Sharing, Communicating, and Computing Environments: Taxonomy and Future Directions.
CoRR
(2022)
Ishu Gupta
,
Tarun Kumar Madan
,
Sukhman Singh
,
Ashutosh Kumar Singh
HiSA-SMFM: Historical and Sentiment Analysis based Stock Market Forecasting Model.
CoRR
(2022)
Rishabh Gupta
,
Deepika Saxena
,
Ishu Gupta
,
Ashutosh Kumar Singh
Differential and TriPhase Adaptive Learning-Based Privacy-Preserving Model for Medical Data in Cloud Environment.
IEEE Netw. Lett.
4 (4) (2022)
Deepika Saxena
,
Ishu Gupta
,
Jitendra Kumar
,
Ashutosh Kumar Singh
,
Xiaoqing Wen
A Secure and Multiobjective Virtual Machine Placement Framework for Cloud Data Center.
IEEE Syst. J.
16 (2) (2022)
Ishu Gupta
,
Ashutosh Kumar Singh
,
Chung-Nan Lee
,
Rajkumar Buyya
Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions.
IEEE Access
10 (2022)
Deepika Saxena
,
Ishu Gupta
,
Ashutosh Kumar Singh
,
Chung-Nan Lee
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services.
IEEE Trans. Netw. Serv. Manag.
19 (3) (2022)
Ishu Gupta
,
Harsh Mittal
,
Deepak Rikhari
,
Ashutosh Kumar Singh
MLRM: A Multiple Linear Regression based Model for Average Temperature Prediction of A Day.
CoRR
(2022)
Ishu Gupta
,
Vartika Sharma
,
Sizman Kaur
,
Ashutosh Kumar Singh
PCA-RF: An Efficient Parkinson's Disease Prediction Model based on Random Forest Classification.
CoRR
(2022)
Rishabh Gupta
,
Deepika Saxena
,
Ishu Gupta
,
Aaisha Makkar
,
Ashutosh Kumar Singh
Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications.
IEEE Netw. Lett.
4 (4) (2022)
Ayushi Acharya
,
Hari Prasad
,
Vinod Kumar Singh
,
Ishu Gupta
,
Ashutosh Kumar Singh
MACI: Malicious API Call Identifier Model to Secure the Host Platform.
ICMC
(2021)
Deepika Saxena
,
Ishu Gupta
,
Jitendra Kumar
,
Ashutosh Kumar Singh
,
Xiaoqing Wen
A Secure and Multi-objective Virtual Machine Placement Framework for Cloud Data Centre.
CoRR
(2021)
Ishu Gupta
,
Rishabh Gupta
,
Ashutosh Kumar Singh
,
Rajkumar Buyya
MLPAM: A Machine Learning and Probabilistic Analysis Based Model for Preserving Security and Privacy in Cloud Environment.
IEEE Syst. J.
15 (3) (2021)
Ishu Gupta
,
Ashutosh Kumar Singh
GUIM-SMD: guilty user identification model using summation matrix-based distribution.
IET Inf. Secur.
14 (6) (2020)
Ishu Gupta
,
Ashutosh Kumar Singh
An Integrated Approach for Data Leaker Detection in Cloud Environment.
J. Inf. Sci. Eng.
36 (5) (2020)
Ashutosh Kumar Singh
,
Ishu Gupta
Online information leaker identification scheme for secure data sharing.
Multim. Tools Appl.
79 (41-42) (2020)
Ishu Gupta
,
Ashutosh Kumar Singh
SELI: statistical evaluation based leaker identification stochastic scheme for secure data sharing.
IET Commun.
14 (20) (2020)
Ishu Gupta
,
Ashutosh Kumar Singh
Dynamic threshold based information leaker identification scheme.
Inf. Process. Lett.
147 (2019)
Ishu Gupta
,
Ashutosh Kumar Singh
A Probability based Model for Data Leakage Detection using Bigraph.
ICCNS
(2017)