Deepika Saxena, Niharika Singh, Kishu Gupta, Abhishek Verma, Vinaytosh Mishra, Jitendra Kumar, Ishu Gupta, Sakshi Patni, Rishabh Gupta, Jatinder Kumar, and Ashutosh Kumar Singh, “An Intelligent Multi-Depot Vehicle Routing and Management Model for Smart Cities”, IEEE Transactions on Intelligent Transportation Systems, 2025. (SCI, IF= 8.4) DOI: 10.1109/TITS.2025.3557826.
Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh, and Chung-Nan Lee, “A Multiple Controlled Toffoli Driven Adaptive Quantum Neural Network Model for Dynamic Workload Prediction in Cloud Environments”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 46, no. 12, pp. 7574-7588, 2024. (SCI, IF= 18.6) DOI: 10.1109/TPAMI.2024.3402061
Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh, and Chung-Nan Lee, “SeCoM: An Outsourced Cloud based Secure Communication Model for Advanced Privacy Preserving Data Computing and Protection”, IEEE Systems Journal, vol. 17, no. 4, pp. 5130-5141, 2023. (SCI, IF=4.4) DOI: 10.1109/JSYST.2023.3272611
Rishabh Gupta, Ishu Gupta, Ashutosh Kumar Singh, Deepika Saxena, and Chung-Nan Lee, “An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud”, IEEE Systems Journal, vol. 17, no. 2, pp. 2445-2454, 2023. (SCI, IF= 4.4) DOI: 10.1109/JSYST.2022.3218894
Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, and Xiaoqing Wen, “An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis Based Cloud Cybersecurity”, IEEE Transactions on Systems, Man and Cybernetics: Systems, vol. 53, no. 11, pp. 6815 – 6827, 2023. (SCI, IF=8.7) DOI: 10.1109/TSMC.2023.3288081.
Rishabh Gupta, Ishu Gupta, Deepika Saxena, and Ashutosh Kumar Singh, “A Differential Approach and Deep Neural Network based Data Privacy-Preserving Model in Cloud Environment”, Journal of Ambient Intelligence & Humanized Computing, Springer, vol. 14, pp. 4659-4674, 2023. (SCI, IF=6.163) DOI: 10.1007/s12652-022-04367-x
I. Gupta, A.K. Singh, C.N. Lee, R. Buyya. Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions in IEEE Access, 71247–71277, July 2022. DOI, PDF, Video, IF=3.47.
D. Saxena, I. Gupta, A.K. Singh, C.N. Lee. A Fault Tolerant Elastic Resource Management Framework Towards High Availability of Cloud Services in IEEE Transactions on Network and Service Management, 2022, DOI, IF=4.75.
D. Saxena, I. Gupta, J. Kumar, A.K. Singh, X. Wen. A Secure and Multi-objective Virtual Machine Placement Framework for Cloud Data Center in IEEE Systems Journal, 3163-3174, 16(2), 2022 DOI, IF=4.80.
R. Gupta, D. Saxena, I. Gupta, Aaisha Makkar, and A.K. Singh. Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications, IEEE Networking Letters, Aug 2022 IF= 1.16.
I. Gupta, R. Gupta, A.K. Singh, R. Buyya. MLPAM: A Machine Learning and Probabilistic Analysis based Model for Preserving Security and Privacy in Cloud Environment in IEEE Systems Journal, 4248–4259, 15(3), Sept 2021, DOI, IF=4.80.
A.K. Singh, I. Gupta. Online Information Leaker Identification Scheme for Secure Data Sharing in Springer Multimedia Tools and Applications, 31165-31182, 79(41), 2020, DOI, IF=2.57.
I. Gupta, A.K. Singh. SELI: Statistical Evaluation based Leaker Identification Stochastic Scheme for Secure Data Sharing, IET Communications, 3607-3618, 2020, 14(20), DOI, IF=1.34.
I.Gupta, A.K.Singh. GUIM-SMD:Guilty User Identification Model using Summation Matrix based Distribution in IET Information Security, 773-782, 14(6), 2020, DOI, IF=1.30.
I. Gupta, A.K. Singh. Dynamic Threshold based Information Leaker Identification Scheme in Elsevier Information Processing Letters, 69-73, 147, 2020, DOI, IF=0.85.
I. Gupta, A.K. Singh. An Integrated Approach for Data Leaker Detection in Cloud Environment in Journal of Information Science and Engineering, 993-1005, 26(5), 2020, DOI, IF=0.54.
I. Gupta, N. Singh, A.K. Singh. Layer-based Privacy and Security Architecture for Cloud Data Sharing in Journal of Communication Software and Systems, 173-185, 15(2), 2019. DOI
I. Gupta, A.K. Singh. A Probabilistic Approach for Guilty Agent Detection using Bigraph after Distribution of Sample Data in Elsevier Procedia Computer Science, 662-668, 125, 2018. DOI
I. Gupta, A.K. Singh. ’A Confidentiality Preserving Data Leaker Detection Model for Secure Sharing of Cloud Data using IntegratedTechniques’, IEEE 7th Int. Conf. on Smart Computing and Communication Systems (ICSCC), Curtin University, Sarawak Malaysia,2019. DOI
I. Gupta, A.K. Singh. ’A Probability based Model for Data Leakage Detection using Bigraph’, ACM 7th Int. Conf. Commun. andNetwork Security (ICCNS), Tokyo, Japan, 2017. DOI, (Excellent Oral Presentation Award)
K. Kaur,I. Gupta, A.K. Singh. ’A Comparative Evaluation of Data Leakage/Loss Prevention Systems (DLPS)’, Proc. 4thInt. Conf. Computer Science & Information Technology (CS & IT-CSCP), Dubai, UAE, 2017. DOI