I. Gupta, A.K. Singh, C.N. Lee, R. Buyya. Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions in IEEE Access, 71247–71277, July 2022. DOI, PDF, Video, IF=3.47.
D. Saxena, I. Gupta, A.K. Singh, C.N. Lee. A Fault Tolerant Elastic Resource Management Framework Towards High Availability of Cloud Services in IEEE Transactions on Network and Service Management, 2022, DOI, IF=4.75.
D. Saxena, I. Gupta, J. Kumar, A.K. Singh, X. Wen. A Secure and Multi-objective Virtual Machine Placement Framework for Cloud Data Center in IEEE Systems Journal, 3163-3174, 16(2), 2022 DOI, IF=4.80.
R. Gupta, D. Saxena, I. Gupta, Aaisha Makkar, and A.K. Singh. Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications, IEEE Networking Letters, Aug 2022 IF= 1.16.
I. Gupta, R. Gupta, A.K. Singh, R. Buyya. MLPAM: A Machine Learning and Probabilistic Analysis based Model for Preserving Security and Privacy in Cloud Environment in IEEE Systems Journal, 4248–4259, 15(3), Sept 2021, DOI, IF=4.80.
A.K. Singh, I. Gupta. Online Information Leaker Identification Scheme for Secure Data Sharing in Springer Multimedia Tools and Applications, 31165-31182, 79(41), 2020, DOI, IF=2.57.
I. Gupta, A.K. Singh. SELI: Statistical Evaluation based Leaker Identification Stochastic Scheme for Secure Data Sharing, IET Communications, 3607-3618, 2020, 14(20), DOI, IF=1.34.
I.Gupta, A.K.Singh. GUIM-SMD:Guilty User Identification Model using Summation Matrix based Distribution in IET Information Security, 773-782, 14(6), 2020, DOI, IF=1.30.
I. Gupta, A.K. Singh. Dynamic Threshold based Information Leaker Identification Scheme in Elsevier Information Processing Letters, 69-73, 147, 2020, DOI, IF=0.85.
I. Gupta, A.K. Singh. An Integrated Approach for Data Leaker Detection in Cloud Environment in Journal of Information Science and Engineering, 993-1005, 26(5), 2020, DOI, IF=0.54.
I. Gupta, N. Singh, A.K. Singh. Layer-based Privacy and Security Architecture for Cloud Data Sharing in Journal of Communication Software and Systems, 173-185, 15(2), 2019. DOI
I. Gupta, A.K. Singh. A Probabilistic Approach for Guilty Agent Detection using Bigraph after Distribution of Sample Data in Elsevier Procedia Computer Science, 662-668, 125, 2018. DOI
I. Gupta, A. Tiwari, P. Agarwal, S. Mittal, A.K. Singh. Dodging Security Attacks and Data Leakage Prevention for Cloud and IoT Environments in Intelligent Analytics for Industry 4.0 Applications, CRC Press-Taylor & Francis Group, FL, USA, 2022.
N. Singh, I. Gupta, A.K. Singh. Senso_Scale: A Framework to Preserve Privacy over Cloud using Sensitivity Range in Advances in Cyber Security and Intelligent Analytics, CRC Press-Taylor & Francis Group, FL, USA, 2022.
A. Acharya, H. Prasad, V. Kumar,I. Gupta, A.K. Singh. ’MACI: Malicious API Call Identifier Model to Secure the Host Platform’,Springer 7th Int. Conf. on Mathematics and Computing (ICMC-2021), IIEST-Shibpur, India, 2021. DOI
I. Gupta, A.K. Singh. ’A Confidentiality Preserving Data Leaker Detection Model for Secure Sharing of Cloud Data using IntegratedTechniques’, IEEE 7th Int. Conf. on Smart Computing and Communication Systems (ICSCC), Curtin University, Sarawak Malaysia,2019. DOI
I. Gupta, A.K. Singh. ’A Probability based Model for Data Leakage Detection using Bigraph’, ACM 7th Int. Conf. Commun. andNetwork Security (ICCNS), Tokyo, Japan, 2017. DOI, (Excellent Oral Presentation Award)
K. Kaur,I. Gupta, A.K. Singh. ’A Comparative Evaluation of Data Leakage/Loss Prevention Systems (DLPS)’, Proc. 4thInt. Conf. Computer Science & Information Technology (CS & IT-CSCP), Dubai, UAE, 2017. DOI