Dr. Chandra Prakash Gupta
Qualification : Ph.D. (University of Kota)
Designation : Professor & Dean-School of Computing
Email: [email protected]
Details of Educational Qualification:
| Course | Specialization | Branch | Institute / University | Year of Passing |
|---|---|---|---|---|
| Ph.D. | Wireless Sensor Networks | Computer Networks | University of Kota | 2014 |
| M.Tech. | Computer Technology | Computer Technology | Indian Institute of Technology, Delhi | 1995 |
| B.E. | Electrical Engineering | Electrical Engineering | Malviya Regional Engineering College, Jaipur, University of Rajasthan | 1987 |
Research Areas:
- Computer Networks, Information Security, Internet of Things, Social Networks Analysis
Research Identifiers:
- Scopus Link: https://www.scopus.com/authid/detail.uri?authorId=8286616100
- Vidwan Link: https://vidwan.inflibnet.ac.in/profile/132114
- Google scholar Link: https://scholar.google.com/citations?user=ZA9up-oAAAAJ&hl=en&oi=ao
- h-Index (As per Scopus Data) : 9
Publication Details:
| S.No | Publication Affiliation | Academic Year | Author Position | Full Details of Research Publication | Indexing | Article/ Conference/ Book/ Book Chapter | Journal Quartile (Q1/Q2/Q3/Q4) |
|---|---|---|---|---|---|---|---|
| 1 | Others | 2024-25 | 2 | ISFO-CS: An Improved Sailfish Optimization Algorithm for Controller Selection in SDWSN. https://doi.org/10.1007/s11277-024-11710-2 | SCIE | Article | Q2 |
| 2 | Others | 2024-25 | 2 | SO‐CPP: Sailfish optimization‐based controller placement in IoT‐enabled software‐defined wireless sensor networks. https://doi.org/10.1002/dac.5757 | SCIE | Article | Q2 |
| 3 | Others | 2024-25 | 2 | Effect of vaccination on stability of wireless sensor network against malware attack: an epidemiological model. https://doi.org/10.1007/s42979-023-02532-3 | Scopus | Article | Q2 |
| 4 | Others | 2024-25 | 2 | Analysis of Impact of The Charging on Propogation Dynamics of Malware in Rechargeable Wireless Sensor Networks. doi: 10.1109/ICDT61202.2024.10489809 | Scopus | Conference Proceedings | |
| 5 | Others | 2024-25 | 2 | Sailfish optimization-based controller selection (SFO-CS) for energy-aware multi-hop routing in software defined wireless sensor network (SDWSN). https://doi.org/10.1007/s41870-023-01426-0 | Scopus | Article | Q2 |
| 6 | Others | 2023-24 | 2 | Topology based controller placement in software defined network. https://doi.org/10.1063/5.0148746 | Scopus | Conference Proceedings | |
| 7 | Others | 2022 | 2 | Epidemiological model for stability analysis of wireless sensor network under malware attack | SCIE | Article | Q3 |
| 8 | Others | 2022 | 3 | Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling. https://doi.org/10.1080/09720529.2022.2139934 | SCIE | Article | Q3 |
| 9 | Others | 2022 | 3 | A new hybrid chaotic map-based image steganography using spectral graph wavelet. https://doi.org/10.1007/978-981-19-0252-9_20 | Scopus | Conference Proceedings | |
| 10 | Others | 2021 | 3 | Spectral Graph Wavelet Based Image Steganography Using SVD and Arnold Transform. DOI: https://doi.org/10.18280/ts.380422 | SCIE | Article | Q3 |
| 11 | Others | 2021 | 2 | Dynamic spot price forecasting using stacked LSTM networks. DOI: 10.1109/ICISS49785.2020.9315988 | Scopus | Conference Proceedings | |
| 12 | Others | 2021 | 2 | VNE-NR: A node-ranking method for performing topology-aware and resource-driven virtual network embedding. DOI: 10.1109/ICCCNT49239.2020.9225533 | Scopus | Conference Proceedings | |
| 13 | Others | 2021 | 2 | A taxonomy on distributed controllers in software defined networking. DOI: 10.1109/ICCMC51019.2021.9418048 | Conference Proceedings | ||
| 14 | Others | 2021 | 2 | Supervised Machine Learning Methods for Early Detection of Untrue Information DOI:10.14456/itjemast.2021.68 | Article | ||
| 15 | Others | 2021 | 2 | A Review on Epidemiological Methods to Detect Untrue Information. DoI: 10.35940/ijitee.K9456.09101121 | Article | Q4 | |
| 16 | Others | 2020 | 2 | Big data challenges and issues: A review. DOI:10.1007/978-3-030-24643-3_53 | Scopus | Conference Proceedings | |
| 17 | Others | 2020 | 2 | Dynamic seiz in online social networks: epidemiological modeling of untrue information. DOI: 10.14569/IJACSA.2020.0110771 | ESCI | Article | Q3 |
| 18 | Others | 2020 | 3 | Amazon EC2 spot price prediction using regression random forests. DOI: 10.1109/TCC.2017.2780159 | SCIE | Article | Q1 |
| 19 | Others | 2019 | 2 | A detailed survey on virtual network embedding. DOI: 10.1109/ICCES45898.2019.9002416 | Scopus | Conference Proceedings | |
| 20 | Others | 2019 | 2 | Magnetic induction based modified depth based routing for underwater wireless sensor networks. DOI: 10.1109/ISS1.2019.8908073 | Scopus | Conference Proceedings | |
| 21 | Others | 2018 | 2 | User response based information quality assessment of social media news posts. DOI: 10.1109/CCAA.2018.8777685 | Scopus | Conference Proceedings | |
| 22 | Others | 2018 | 2 | Magnetic induction based routing in underwater wireless sensor networks. DOI: 10.1109/ICICCT.2018.8473114 | Scopus | Conference Proceedings | |
| 23 | Others | 2018 | 2 | Bidding strategies for Amazon EC2 Spot Instances-A comprehensive review. DOI: 10.1109/ICCUBEA.2018.8697462 | Scopus | Conference Proceedings | |
| 24 | Others | 2018 | 2 | Smart and Connecting Technologies Using Internet of Things Preface | Article | ||
| 25 | Others | 2018 | 2 | Perceptive bidding strategy for Amazon EC2 spot instance market. https://doi.org/10.3233/MGS-180282 | ESCI | Article | Q2 |
| 26 | Others | 2018 | 2 | Delay minimising depth-based routing for multi-sink underwater wireless sensor networks. https://doi.org/10.1504/IJSNET.2018.092627 | SCIE | Article | Q2 |
| 27 | Others | 2017 | 2 | Dhac based routing in wireless sensor network with asymmetric links. https://doi.org/10.1007/978-81-322-3592-7_17 | Scopus | Conference Proceedings | |
| 28 | Others | 2017 | 3 | Cost Optimization over Amazon EC2 Spot Instances-Research Challenges | Article | ||
| 29 | Others | 2016 | 3 | Temporal and spatial trend analysis of cloud spot instance pricing in amazon EC2. DOI: 10.1109/DASC-PICom-DataCom-CyberSciTec.2016.157 | Scopus | Conference Proceedings | |
| 30 | Others | 2016 | 2 | A survey on VANETs security attacks and sybil attack detection | Scopus | Article | Q4 |
| 31 | Others | 2016 | 2 | Prefix length-based disjoint set tries for IPv6 lookup. https://doi.org/10.1007/978-981-10-0135-2_18 | Scopus | Conference Proceedings | |
| 32 | Others | 2016 | 2 | Addressing data aggregation using polynomial regression in wsns | SCIE | Article | Q4 |
| 33 | Others | 2016 | 2 | SGR: A New Efficient Kernel for Outlier Detection in Sensor Data Minimizing Mise | SCIE | Article | Q4 |
| 34 | Others | 2015 | 2 | Delay constrained routing algorithm for wsn with mobile sink. DOI: 10.1109/CSE.2014.272 | Scopus | Conference Proceedings | |
| 35 | Others | 2015 | 2 | Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys. https://doi.org/10.1504/IJCNDS.2015.069673 | ESCI | Article | Q3 |
| 36 | Others | 2015 | 2 | A New Kernel for Outlier Detection in WSNs Minimizing MISE | Scopus | Conference Proceedings | |
| 37 | Others | 2014 | 2 | Hybrid virtual network embedding with K-core decomposition using path splitting. DOI: 10.1109/ICCCT2.2014.7066726 | Scopus | Conference Proceedings | |
| 38 | Others | 2014 | 2 | Fully homomorphic symmetric scheme without bootstrapping. DOI: 10.1109/CCIOT.2014.7062497 | Scopus | Conference Proceedings | |
| 39 | Others | 2014 | 1 | Priority Enabled Distance-energy based Routing Algorithm for UWSN | Scopus | Conference Proceedings | |
| 40 | Others | 2013 | 1 | Distance-energy based routing algorithm with priority handling for UWSN. DOI: https://doi.org/10.2174/2210327903666131209234510 | SCIE | Article | Q4 |
| 41 | Others | 2013 | 1 | A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds. DOI: 10.1109 NOF.2013.6724526 | Scopus | Conference Proceedings | |
| 42 | Others | 2013 | 1 | Wireless sensor networks: a review. DOI:10.2174/22103279112029990001 | SCIE | Article | Q4 |
| 43 | Others | 2013 | 1 | Optimal number of clusters in wireless sensor networks with mobile sink | Article | ||
| 44 | Others | 2013 | 1 | Joint AES encryption and LDPC coding. International Journal of Scientific & Engineering Research, 4(7), 603 | Article | ||
| 45 | Others | 2011 | 3 | Description of a wave-wave interaction model by Variational and Decomposition methods. | Article | ||
| 46 | Others | 2011 | 2 | Sybil Attack Analysis and Detection Techniques in MANET | Article | ||
| 47 | Others | 2011 | 3 | Review on Multiobjective Task Scheduling in Cloud Computing using Nature Inspired Algorithms. DOI:10.23956/ijermt.v6i8.153 | Article |
