Search Results - "Gupta, B.B"

Refine Results
  1. 1

    A novel framework for risk assessment and resilience of critical infrastructure towards climate change by Kumar, Nikhil, Poonia, Vikas, Gupta, B.B., Goyal, Manish Kumar

    Published in Technological forecasting & social change (01-04-2021)
    “…•A robust review to understand the impact of climate extremes on critical infrastructure.•Bivariate assessment of precipitation extremes using copula for 621…”
    Get full text
    Journal Article
  2. 2

    Efficient IoT-based sensor BIG Data collection–processing and analysis in smart buildings by Plageras, Andreas P., Psannis, Kostas E., Stergiou, Christos, Wang, Haoxiang, Gupta, B.B.

    Published in Future generation computer systems (01-05-2018)
    “…Internet of Things (IoT) provides to everyone new types of services in order to improve everyday life. Through this new technology, other recently developed…”
    Get full text
    Journal Article
  3. 3

    A combination of clustering-based under-sampling with ensemble methods for solving imbalanced class problem in intelligent systems by Ebrahimi Shahabadi, Mohammad Saleh, Tabrizchi, Hamed, Kuchaki Rafsanjani, Marjan, Gupta, B.B., Palmieri, Francesco

    Published in Technological forecasting & social change (01-08-2021)
    “…•This paper introduces undersampling approach based on cluster under-sampling method.•Our method uses Mahalanobis distance to preserve data distribution in…”
    Get full text
    Journal Article
  4. 4

    Crowdsourcing based scientific issue tracking with topic analysis by Kim, Mucheol, Gupta, B.B., Rho, Seunmin

    Published in Applied soft computing (01-05-2018)
    “…[Display omitted] With the advancement of web technologies, many people are participating in the information production and distribution process in the Web…”
    Get full text
    Journal Article
  5. 5

    Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework by Tewari, Aakanksha, Gupta, B.B.

    Published in Future generation computer systems (01-07-2020)
    “…Internet of Things (IoT) is playing an important role after its showing up, it covers from traditional equipment to general household objects such as WSNs and…”
    Get full text
    Journal Article
  6. 6

    Critical flux concept for microfiltration fouling by Field, R.W., Wu, D., Howell, J.A., Gupta, B.B.

    Published in Journal of membrane science (28-04-1995)
    “…Several constant-flux filtration experiments for yeast cell suspensions, yeast cell debris, and dodecane-water emulsion were performed at various operating…”
    Get full text
    Journal Article
  7. 7

    Multiple features based approach for automatic fake news detection on social networks using deep learning by Sahoo, Somya Ranjan, Gupta, B.B.

    Published in Applied soft computing (01-03-2021)
    “…In recent years, the rise of Online Social Networks has led to proliferation of social news such as product advertisement, political news, celebrity’s…”
    Get full text
    Journal Article
  8. 8

    An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols by Gupta, B.B., Quamara, Megha

    Published in Concurrency and computation (10-11-2020)
    “…Summary Understanding of any computing environment requires familiarity with its underlying technologies. Internet of Things (IoT), being a new era of…”
    Get full text
    Journal Article
  9. 9

    A survey of phishing attack techniques, defence mechanisms and open research challenges by Jain, Ankit Kumar, Gupta, B.B.

    Published in Enterprise information systems (03-04-2022)
    “…Phishing is an identity theft, which deceives Internet users into revealing their sensitive data, e.g., login information, credit/debit card details, and so…”
    Get full text
    Journal Article
  10. 10

    Visual saliency guided complex image retrieval by Wang, Haoxiang, Li, Zhihui, Li, Yang, Gupta, B.B., Choi, Chang

    Published in Pattern recognition letters (01-02-2020)
    “…•This paper proposes a novel visual saliency guided complex image retrieval model.•The overall saliency map is generated by the integration of direction,…”
    Get full text
    Journal Article
  11. 11

    A helical baffle for cross-flow microfiltration by Gupta, B.B., Howell, J.A., Wu, D., Field, R.W.

    Published in Journal of membrane science (15-06-1995)
    “…The use of a helical-shape baffle in a mineral (Carbosep) membrane provided an increase of more than 50% in permeate flux compared with that obtained without a…”
    Get full text
    Journal Article Conference Proceeding
  12. 12

    An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework by Memos, Vasileios A., Psannis, Kostas E., Ishibashi, Yutaka, Kim, Byung-Gyu, Gupta, B.B.

    Published in Future generation computer systems (01-06-2018)
    “…Internet of Things (IoT) is the new technological revolution that aspires to connect all the everyday physical objects to the Internet, making a huge global…”
    Get full text
    Journal Article
  13. 13

    Cloud-assisted secure video transmission and sharing framework for smart cities by Hossain, M. Shamim, Muhammad, Ghulam, Abdul, Wadood, Song, Biao, Gupta, B.B.

    Published in Future generation computer systems (01-06-2018)
    “…With the innovations and increasing popularity of smart cities, video analytics (e.g., from social media, entertainment, surveillance, smart health monitoring,…”
    Get full text
    Journal Article
  14. 14

    PBNM and Economic Incentive Based Framework for Protection Against DDoS Attacks by Dahiya, Amrita, Gupta, B.B.

    “…DDoS attacks need to be handled by a technological solution built on mechanisms based on cooperation among different Internet entities by using economic…”
    Get full text
    Conference Proceeding
  15. 15

    Anomaly based Mitigation of Volumetric DDoS Attack Using Client Puzzle as Proof-of-Work by Gulihar, Prachi, Gupta, B.B.

    “…Increasing use of Internet has made its users vulnerable to various types of attacks like Distributed Denial of Service (DDoS) attack which makes the resources…”
    Get full text
    Conference Proceeding
  16. 16

    Secure blockchain enabled Cyber–physical systems in healthcare using deep belief network with ResNet model by Nguyen, Gia Nhu, Viet, Nin Ho Le, Elhoseny, Mohamed, Shankar, K., Gupta, B.B., El-Latif, Ahmed A. Abd

    “…Cyber–physical system (CPS) is the incorporation of physical processes with processing and data transmission. Cybersecurity is a primary and challenging issue…”
    Get full text
    Journal Article
  17. 17

    Drought occurrence in Different River Basins of India and blockchain technology based framework for disaster management by Poonia, Vikas, Goyal, Manish Kumar, Gupta, B.B., Gupta, Anil Kumar, Jha, Srinidhi, Das, Jew

    Published in Journal of cleaner production (20-08-2021)
    “…Drought assessment is crucial to mitigate its adverse impact, especially in India, where risk is more due to an increase in population and climate change…”
    Get full text
    Journal Article
  18. 18

    An efficient KP design framework of attribute‐based searchable encryption for user level revocation in cloud by Mamta, Gupta, B.B.

    Published in Concurrency and computation (25-09-2020)
    “…Summary Attribute‐based searchable encryption (ABSE) is the combination of attribute‐based encryption (ABE) and searchable encryption with the inherent…”
    Get full text
    Journal Article
  19. 19

    Smart defense against distributed Denial of service attack in IoT networks using supervised learning classifiers by Gupta, B.B., Chaudhary, Pooja, Chang, Xiaojun, Nedjah, Nadia

    Published in Computers & electrical engineering (01-03-2022)
    “…•Design an approach to detect DDoS attack in consumer IoT networks.•Prepare a dataset containing relevant IoT network features for enhanced attack…”
    Get full text
    Journal Article
  20. 20

    Multi attribute auction based incentivized solution against DDoS attacks by Dahiya, Amrita, Gupta, B.B.

    Published in Computers & security (01-05-2020)
    “…Complexity and severity of DDoS attacks is increasing day by day. Internet has highly inconsistent structure in terms of resource distribution. Numerous…”
    Get full text
    Journal Article