Admissions
Madanapalle Institute of Technology & Science is now MITS Deemed to be University.
Dr. Chandra Prakash Gupta

Qualification : Ph.D. (University of Kota)

Designation : Professor & Dean-School of Computing

Email: [email protected]

Details of Educational Qualification:

Course Specialization Branch Institute / University Year of Passing
Ph.D. Wireless Sensor Networks Computer Networks University of Kota 2014
M.Tech. Computer Technology Computer Technology Indian Institute of Technology, Delhi 1995
B.E. Electrical Engineering Electrical Engineering Malviya Regional Engineering College, Jaipur, University of Rajasthan 1987

 

Research Areas: 

  • Computer Networks, Information Security, Internet of Things, Social Networks Analysis

 

Research Identifiers: 

 

Publication Details:

S.No Publication Affiliation  Academic Year Author Position Full Details of Research Publication Indexing Article/ Conference/ Book/ Book Chapter Journal Quartile (Q1/Q2/Q3/Q4)
1 Others 2024-25 2 ISFO-CS: An Improved Sailfish Optimization Algorithm for Controller Selection in SDWSN. https://doi.org/10.1007/s11277-024-11710-2     SCIE Article Q2
2 Others 2024-25 2 SO‐CPP: Sailfish optimization‐based controller placement in IoT‐enabled software‐defined wireless sensor networks.  https://doi.org/10.1002/dac.5757 SCIE Article Q2
3 Others 2024-25 2  Effect of vaccination on stability of wireless sensor network against malware attack: an epidemiological model. https://doi.org/10.1007/s42979-023-02532-3 Scopus Article Q2
4 Others 2024-25 2 Analysis of Impact of The Charging on Propogation Dynamics of Malware in Rechargeable Wireless Sensor Networks. doi: 10.1109/ICDT61202.2024.10489809 Scopus Conference Proceedings    
5 Others 2024-25 2 Sailfish optimization-based controller selection (SFO-CS) for energy-aware multi-hop routing in software defined wireless sensor network (SDWSN). https://doi.org/10.1007/s41870-023-01426-0 Scopus Article Q2
6 Others 2023-24 2 Topology based controller placement in software defined network. https://doi.org/10.1063/5.0148746 Scopus Conference Proceedings    
7 Others 2022 2 Epidemiological model for stability analysis of wireless sensor network under malware attack SCIE Article Q3
8 Others 2022 3 Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling. https://doi.org/10.1080/09720529.2022.2139934 SCIE Article Q3
9 Others 2022 3 A new hybrid chaotic map-based image steganography using spectral graph wavelet. https://doi.org/10.1007/978-981-19-0252-9_20  Scopus Conference Proceedings    
10 Others 2021 3 Spectral Graph Wavelet Based Image Steganography Using SVD and Arnold Transform. DOI: https://doi.org/10.18280/ts.380422     SCIE Article Q3
11 Others 2021 2 Dynamic spot price forecasting using stacked LSTM networks. DOI: 10.1109/ICISS49785.2020.9315988 Scopus Conference Proceedings    
12 Others 2021 2 VNE-NR: A node-ranking method for performing topology-aware and resource-driven virtual network embedding. DOI: 10.1109/ICCCNT49239.2020.9225533 Scopus Conference Proceedings    
13 Others 2021 2 A taxonomy on distributed controllers in software defined networking. DOI: 10.1109/ICCMC51019.2021.9418048   Conference Proceedings   
14 Others 2021 2 Supervised Machine Learning Methods for Early Detection of Untrue Information DOI:10.14456/itjemast.2021.68    Article  
15 Others 2021 2 A Review on Epidemiological Methods to Detect Untrue Information. DoI: 10.35940/ijitee.K9456.09101121   Article Q4
16 Others 2020 2 Big data challenges and issues: A review. DOI:10.1007/978-3-030-24643-3_53 Scopus Conference Proceedings    
17 Others 2020 2 Dynamic seiz in online social networks: epidemiological modeling of untrue information. DOI: 10.14569/IJACSA.2020.0110771 ESCI Article Q3
18 Others 2020 3 Amazon EC2 spot price prediction using regression random forests. DOI: 10.1109/TCC.2017.2780159 SCIE Article Q1
19 Others 2019 2 A detailed survey on virtual network embedding. DOI: 10.1109/ICCES45898.2019.9002416 Scopus Conference Proceedings    
20 Others 2019 2 Magnetic induction based modified depth based routing for underwater wireless sensor networks. DOI: 10.1109/ISS1.2019.8908073   Scopus Conference Proceedings    
21 Others 2018 2 User response based information quality assessment of social media news posts. DOI: 10.1109/CCAA.2018.8777685 Scopus Conference Proceedings    
22 Others 2018 2 Magnetic induction based routing in underwater wireless sensor networks. DOI: 10.1109/ICICCT.2018.8473114 Scopus Conference Proceedings    
23 Others 2018 2 Bidding strategies for Amazon EC2 Spot Instances-A comprehensive review. DOI: 10.1109/ICCUBEA.2018.8697462 Scopus Conference Proceedings    
24 Others 2018 2 Smart and Connecting Technologies Using Internet of Things Preface   Article  
25 Others 2018 2 Perceptive bidding strategy for Amazon EC2 spot instance market. https://doi.org/10.3233/MGS-180282 ESCI Article Q2
26 Others 2018 2 Delay minimising depth-based routing for multi-sink underwater wireless sensor networks. https://doi.org/10.1504/IJSNET.2018.092627 SCIE Article Q2
27 Others 2017 2 Dhac based routing in wireless sensor network with asymmetric links. https://doi.org/10.1007/978-81-322-3592-7_17 Scopus Conference Proceedings    
28 Others 2017 3 Cost Optimization over Amazon EC2 Spot Instances-Research Challenges   Article  
29 Others 2016 3 Temporal and spatial trend analysis of cloud spot instance pricing in amazon EC2. DOI: 10.1109/DASC-PICom-DataCom-CyberSciTec.2016.157 Scopus Conference Proceedings    
30 Others 2016 2 A survey on VANETs security attacks and sybil attack detection Scopus Article Q4
31 Others 2016 2 Prefix length-based disjoint set tries for IPv6 lookup. https://doi.org/10.1007/978-981-10-0135-2_18 Scopus Conference Proceedings   
32 Others 2016 2 Addressing data aggregation using polynomial regression in wsns SCIE Article Q4
33 Others 2016 2 SGR: A New Efficient Kernel for Outlier Detection in Sensor Data Minimizing Mise SCIE Article Q4
34 Others 2015 2 Delay constrained routing algorithm for wsn with mobile sink. DOI: 10.1109/CSE.2014.272 Scopus Conference Proceedings   
35 Others 2015 2 Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys. https://doi.org/10.1504/IJCNDS.2015.069673 ESCI Article Q3
36 Others 2015 2 A New Kernel for Outlier Detection in WSNs Minimizing MISE Scopus Conference Proceedings   
37 Others 2014 2 Hybrid virtual network embedding with K-core decomposition using path splitting. DOI: 10.1109/ICCCT2.2014.7066726 Scopus Conference Proceedings   
38 Others 2014 2 Fully homomorphic symmetric scheme without bootstrapping. DOI: 10.1109/CCIOT.2014.7062497 Scopus Conference Proceedings   
39 Others 2014 1 Priority Enabled Distance-energy based Routing Algorithm for UWSN Scopus Conference Proceedings   
40 Others 2013 1 Distance-energy based routing algorithm with priority handling for UWSN. DOI: https://doi.org/10.2174/2210327903666131209234510 SCIE Article Q4
41 Others 2013 1 A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds. DOI: 10.1109 NOF.2013.6724526 Scopus Conference Proceedings   
42 Others 2013 1 Wireless sensor networks: a review. DOI:10.2174/22103279112029990001 SCIE Article Q4
43 Others 2013 1 Optimal number of clusters in wireless sensor networks with mobile sink   Article  
44 Others 2013 1 Joint AES encryption and LDPC coding. International Journal of Scientific & Engineering Research, 4(7), 603   Article  
45 Others 2011 3 Description of a wave-wave interaction model by Variational and Decomposition methods.   Article  
46 Others 2011 2 Sybil Attack Analysis and Detection Techniques in MANET   Article  
47 Others 2011 3 Review on Multiobjective Task Scheduling in Cloud Computing using Nature Inspired Algorithms.  DOI:10.23956/ijermt.v6i8.153   Article