
Dr. Chandra Prakash Gupta
Qualification : Ph.D. (University of Kota)
Designation : Professor
Details of Educational Qualification:
Course | Specialization | Group | College Name/University | Year of Passing |
---|---|---|---|---|
Ph.D. | Modelling of Nature Inspired Routing Algorithm for Wireless Sensor Networks with Mobile Base Station | Computer Networks | University of Kota | 2014 |
M.Tech. | Computer Technology | Computer Technology | Indian Institute of Technology, Delhi | 1995 |
B.E. | Electrical Engineering | Electrical Engineering | Malviya Regional Engineering College, Jaipur, University of Rajasthan | 1987 |
List of Publications
S.No | Title of the Paper | Full Details of Journal Name / Conference Name, Volume number, page number, Date |
---|---|---|
1 | Analysis of Impact of The Charging on Propogation Dynamics of Malware in Rechargeable Wireless Sensor Networks | 2024 2nd International Conference on Disruptive Technologies (ICDT),1184-1190,2024,IEEE |
2 | Epidemiological model for stability analysis of wireless sensor network under malware attack | Journal of Information Technology Management,14,Special Issue: Security and Resource Management challenges for Internet of Things,69-88,2022,Univrsity Of Tehran Press |
3 | A new hybrid chaotic map-based image steganography using spectral graph wavelet | Intelligent Computing Techniques for Smart Energy Systems: Proceedings of ICTSES 2021,211-223,2022,Springer Nature Singapore Singapore |
4 | Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling | Journal of Discrete Mathematical Sciences and Cryptography,25,7,2159-2171,2022,Taylor & Francis |
5 | Supervised Machine Learning Methods for Early Detection of Untrue Information | International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies",12,4,01-Nov,2021, |
6 | A taxonomy on distributed controllers in software defined networking | 2021 5th International Conference on Computing Methodologies and Communication (ICCMC),,,120-126,2021,IEEE |
7 | ISFO-CS: An Improved Sailfish Optimization Algorithm for Controller Selection in SDWSN. | Wireless Pers Commun 140, 299–331 (2025). https://doi.org/10.1007/s11277-024-11710-2 |
8 | Sailfish optimization-based controller selection (SFO-CS) for energy-aware multi-hop routing in software defined wireless sensor network (SDWSN). | Int. j. inf. tecnol. 15, 3935–3948 (2023). https://doi.org/10.1007/s41870- 023-01426-0 |
9 | SO-CPP: Sailfish optimization-based controller placement in IoT-enabled software‐defined wireless sensor networks | International Journal of Communication Systems 37.9 (2024): e5757. |
10 | Topology based controller placement in software defined network | AIP Conference Proceedings. Vol. 2755. No. 1. AIP Publishing, 2023. |
11 | A Review on Epidemiological Methods to Detect Untrue Information | International Journal of Innovative Technology and Exploring Engineering,10,11,16-19,2021, |
12 | Spectral Graph Wavelet Based Image Steganography Using SVD and Arnold Transform. | Traitement du Signal,38,4,1113-1121,2021, |
13 | Big data challenges and issues: A review | Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI- 2018)", 446-452,2020,Springer International Publishing |
14 | Dynamic SEIZ in Online Social Networks: Epidemiological Modeling of Untrue Information | International Journal of Advanced Computer Science and Applications,11,7,577- 585,2020,www.ijacsa.thesai.org |
15 | VNE-NR: A node-ranking method for performing topology-aware and resource-driven virtual network embedding | 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)",,,01-Jun,2020,IEEE |
16 | Dynamic spot price forecasting using stacked LSTM networks | 2020 3rd international conference on intelligent sustainable systems (ICISS),1080-1085,2020,IEEE |
17 | Magnetic induction based modified depth based routing for underwater wireless sensor networks | 2019 International Conference on Intelligent Sustainable Systems (ICISS),Jul-14,2019,IEEE |
18 | A detailed survey on virtual network embedding | 2019 International Conference on Communication and Electronics Systems (ICCES),,,730- 737,2019,IEEE |
19 | Perceptive bidding strategy for Amazon EC2 spot instance market | Multiagent and Grid Systems,14,1,83-102,2018,"SAGE Publications Sage UK: London, England" |
20 | Delay minimising depth-based routing for multi-sink underwater wireless sensor networks | International Journal of Sensor Networks,27,2,85-94,2018,Inderscience Publishers (IEL) |
21 | Bidding strategies for Amazon EC2 Spot Instances-A comprehensive review | 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA),,,01-May,2018,IEEE |
22 | Magnetic induction based routing in underwater wireless sensor networks | 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT),,,223-228,2018,IEEE |
23 | User response based information quality assessment of social media news posts | 2018 4th International Conference on Computing Communication and Automation (ICCCA),,,01-Jun,2018,IEEE |
24 | Special Issue on Smart and Connecting Technologies Using Internet of Things Preface | International Journal Of Information Technology And Web Engineering,13,2,V-VI,2018,"IGI GLOBAL 701 E CHOCOLATE AVE, STE 200, HERSHEY, PA 17033-1240 USA" |
25 | Amazon EC2 spot price prediction using regression random forests | IEEE Transactions on Cloud Computing,8,1,59-72,2017,IEEE |
26 | Cost Optimization over Amazon EC2 Spot Instances-Research Challenges | International Journal of Distributed & Cloud Computing,5,2,,2017, |
27 | DHAC based routing in wireless sensor network with asymmetric links | Proceedings of the International Conference on Signal, Networks, Computing, and Systems: ICSNCS 2016, Volume 1",171-181,2017,Springer India |
28 | Temporal and spatial trend analysis of cloud spot instance pricing in amazon EC2, | 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech)",,,909-912,2016,IEEE |
29 | Prefix length-based disjoint set tries for IPv6 lookup | Proceedings of International Conference on ICT for Sustainable Development: ICT4SD 2015 Volume 2,193-202,2016,Springer Singapore |
30 | A survey on VANETs security attacks and sybil attack detection | International Journal of Sensors Wireless Communications and Control,6,1,45-62,2016,Bentham Science Publishers |
31 | Addressing data aggregation using polynomial regression in wsns | International Journal of Sensors Wireless Communications and Control,5,2,114-120,2015,Bentham Science Publishers |
32 | SGR: A New Efficient Kernel for Outlier Detection in Sensor Data Minimizing Mise | Sensors & Transducers,189,6,97,2015,"IFSA Publishing, SL" |
33 | A New Kernel for Outlier Detection in WSNs Minimizing MISE. | SENSORNETS,169-175,2015, |
34 | Making data in cloud secure and usable: fully homomorphic encryption with symmetric keys | International Journal of Communication Networks and Distributed Systems,14,4,379-399,2015,Inderscience Publishers (IEL) |
35 | Hybrid virtual network embedding with K-core decomposition using path splitting, | International Conference on Computing and Communication Technologies,01-Jun,2014,IEEE |
36 | Priority Enabled Distance-energy based Routing Algorithm for UWSN. | SENSORNETS,133-138,2014, |
37 | Delay constrained routing algorithm for wsn with mobile sink | 2014 IEEE 17th International Conference on Computational Science and Engineering,,,1449-1454,2014,IEEE |
38 | Fully homomorphic symmetric scheme without bootstrapping | Proceedings of 2014 International Conference on Cloud Computing and Internet of Things,14-17,2014,IEEE |
39 | A fully homomorphic encryption scheme with symmetric keys with application to private data processing in clouds | 2013 Fourth International Conference on the Network of the Future (NoF),,,01-Apr,2013,IEEE |
40 | Wireless sensor networks: a review | International Journal of Sensors Wireless Communications and Control,3,1,25-36,2013,Bentham Science Publishers |
41 | Distance energy based routing algorithm with priority handling for UWSN | arXiv preprint arXiv:1310.2518, 2013 |
42 | Distance-energy based routing algorithm with priority handling for UWSN | International Journal of Sensors Wireless Communications and Control,3,2,108-117,2013,Bentham Science Publishers |
43 | Joint AES encryption and LDPC coding | International Journal of Scientific & Engineering Research,4,7,4,2013, |
44 | Optimal number of clusters in wireless sensor networks with mobile sink | International Journal of Scientific and Engineering Research,4,8,1706-1710,2013, |
45 | Description of a wave- wave interaction model by Variational and Decomposition methods | Mathematica Æterna,1,1,,2011,Arastirmax Scientific Publication Index |
46 | Review on Multiobjective Task Scheduling in Cloud Computing using Nature Inspired Algorithms | International Journal of Emerging Research in Management &Technology, ISSN: 2278",9359 |
47 | Sybil Attack Analysis and Detection Techniques in MANET | International Journal on Recent and Innovation Trends in Computing and Communication,6,7,102-105,, |
48 | A Parallel Branch-and-Bound Algorithm for 0-1 | Integer Linear Programming 1995 |