Brij Gupta

According to our database1, Brij Gupta authored at least 90 papers between 2015 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 





Advanced Media-Based Smart Big Data on Intelligent Cloud Systems.
T-SUSC, 2019

A novel coverless information hiding method based on the average pixel value of the sub-images.
Multimedia Tools Appl., 2019

Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques.
Multimedia Tools Appl., 2019

Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing.
Multimedia Tools Appl., 2019

Impact of digital fingerprint image quality on the fingerprint recognition accuracy.
Multimedia Tools Appl., 2019

Multi-orientation geometric medical volumes segmentation using 3D multiresolution analysis.
Multimedia Tools Appl., 2019

An efficient employment of internet of multimedia things in smart and future agriculture.
Multimedia Tools Appl., 2019

An Identity-Based Signcryption on Lattice without Trapdoor.
J. UCS, 2019

Feature Based Approach for Detection of Smishing Messages in the Mobile Environment.
JITR, 2019

A machine learning based approach for phishing detection using hyperlinks information.
J. Ambient Intelligence and Humanized Computing, 2019

Deep learning models for human centered computing in fog and mobile edge networks.
J. Ambient Intelligence and Humanized Computing, 2019

Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment.
J. Ambient Intelligence and Humanized Computing, 2019

Efficient fingerprint matching on smart cards for high security and privacy in smart systems.
Inf. Sci., 2019

A novel CNN based security guaranteed image watermarking generation scenario for smart city applications.
Inf. Sci., 2019

Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations.
IEEE Internet of Things Journal, 2019

A Framework for Preserving the Privacy of Online Users Against XSS Worms on Online Social Network.
IJITWE, 2019

Classification of various attacks and their defence mechanism in online social networks: a survey.
Enterprise IS, 2019

Hybrid approach for detection of malicious profiles in twitter.
Computers & Electrical Engineering, 2019

Improving fuzzy C-mean-based community detection in social networks using dynamic parallelism.
Computers & Electrical Engineering, 2019

Recent Advances in Mobile Cloud Computing.
Wireless Communications and Mobile Computing, 2018

Guest Editorial Deep Learning Models for Industry Informatics.
IEEE Trans. Industrial Informatics, 2018

Towards detection of phishing websites on client-side using machine learning based approach.
Telecommunication Systems, 2018

Defending against phishing attacks: taxonomy of methods, current issues and future directions.
Telecommunication Systems, 2018

Security, privacy & efficiency of sustainable Cloud Computing for Big Data & IoT.
SUSCOM, 2018

Introduction to special issue on recent advances on sustainability for green cloud and fog computing.
SUSCOM, 2018

Advances in applying soft computing techniques for big data and cloud computing.
Soft Comput., 2018

Collusion attacks mitigation in internet of things: a fog based model.
Multimedia Tools Appl., 2018

Visual data mining for crowd anomaly detection using artificial bacteria colony.
Multimedia Tools Appl., 2018

Guest Editorial: Recent Advances on Security and Privacy of Multimedia Big Data in the Critical Infrastructure.
Multimedia Tools Appl., 2018

Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing.
Multimedia Tools Appl., 2018

XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud.
Multimedia Tools Appl., 2018

A novel approach to defend multimedia flash crowd in cloud environment.
Multimedia Tools Appl., 2018

Accelerating 3D medical volume segmentation using GPUs.
Multimedia Tools Appl., 2018

Socially-conforming cooperative computation in cloud networks.
J. Parallel Distrib. Comput., 2018

The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Science, 2018

Big data driven outlier detection for soybean straw near infrared spectroscopy.
J. Comput. Science, 2018

Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels' reviews.
J. Comput. Science, 2018

Deep learning for Arabic NLP: A survey.
J. Comput. Science, 2018

Two-level authentication approach to protect from phishing attacks in real time.
J. Ambient Intelligence and Humanized Computing, 2018

Plague of cross-site scripting on web applications: a review, taxonomy and challenges.
IJWBC, 2018

A lightweight mutual authentication approach for RFID tags in IoT devices.
IJNVO, 2018

Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation.
IJICS, 2018

Robust injection point-based framework for modern applications against XSS vulnerabilities in online social networks.
IJICS, 2018

Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing.
IJESMA, 2018

Petri net-based verification of security protocol implementation in software evolution.
IJES, 2018

Social media security and trustworthiness: Overview and new direction.
Future Generation Comp. Syst., 2018

Flexible data access control in D2D communications.
Future Generation Comp. Syst., 2018

Secure integration of IoT and Cloud Computing.
Future Generation Comp. Syst., 2018

Efficient IoT-based sensor BIG Data collection-processing and analysis in smart buildings.
Future Generation Comp. Syst., 2018

An Efficient Algorithm for Media-based Surveillance System (EAMSuS) in IoT Smart City Framework.
Future Generation Comp. Syst., 2018

Recent research in computational intelligence paradigms into security and privacy for online social networks (OSNs).
Future Generation Comp. Syst., 2018

Hunting for DOM-Based XSS vulnerabilities in mobile cloud-based online social network.
Future Generation Comp. Syst., 2018

Recent advances in fog and mobile edge computing.
Trans. Emerging Telecommunications Technologies, 2018

Edge Computing with Cloud for Voice Disorder Assessment and Treatment.
IEEE Communications Magazine, 2018

Medical Image Forgery Detection for Smart Healthcare.
IEEE Communications Magazine, 2018

Studying the controversy in online crowds' interactions.
Appl. Soft Comput., 2018

Efficient Compressed Ciphertext Length Scheme Using Multi-Authority CP-ABE for Hierarchical Attributes.
IEEE Access, 2018

A Practical Public Key Encryption Scheme Based on Learning Parity With Noise.
IEEE Access, 2018

A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding.
IEEE Access, 2018

Cognitive Privacy Middleware for Deep Learning Mashup in Environmental IoT.
IEEE Access, 2018

Evaluation Models for the Nearest Closer Routing Protocol in Wireless Sensor Networks.
IEEE Access, 2018

Security and privacy of big data for social networking services in cloud.
Proceedings of the IEEE INFOCOM 2018, 2018

Malware propagation effects on SCADA system and smart power grid.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Internet of surveillance: a cloud supported large-scale wireless surveillance system.
The Journal of Supercomputing, 2017

Phishing Detection: Analysis of Visual Similarity Based Approaches.
Security and Communication Networks, 2017

Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art.
Int. J. Systems Assurance Engineering and Management, 2017

Fighting against phishing attacks: state of the art and future challenges.
Neural Computing and Applications, 2017

CyVOD: a novel trinity multimedia social network scheme.
Multimedia Tools Appl., 2017

Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations.
Multimedia Tools Appl., 2017

Smart XSS Attack Surveillance System for OSN in Virtualized Intelligence Network of Nodes of Fog Computing.
Int. J. Web Service Res., 2017

Automated wireless video surveillance: an evaluation framework.
J. Real-Time Image Processing, 2017

Enhancing the Browser-Side Context-Aware Sanitization of Suspicious HTML5 Code for Halting the DOM-Based XSS Vulnerabilities in Cloud.
IJCAC, 2017

Detection, Avoidance, and Attack Pattern Mechanisms in Modern Web Application Vulnerabilities: Present and Future Challenges.
IJCAC, 2017

Security challenges in cloud computing: state-of-art.
IJBDI, 2017

Efficient yet robust biometric iris matching on smart cards for data high security and privacy.
Future Generation Comp. Syst., 2017

Software-Defined System Support for Enabling Ubiquitous Mobile Edge Computing.
Comput. J., 2017

Editorial security, privacy, and forensics in the critical infrastructure: advances and future directions.
Annales des Télécommunications, 2017

A Comparative Evaluation of Atrial Fibrillation Detection Methods in Koreans Based on Optical Recordings Using a Smartphone.
IEEE Access, 2017

Efficient Large-scale Medical Data (eHealth Big Data) Analytics in Internet of Things.
Proceedings of the 19th IEEE Conference on Business Informatics, 2017

Solutions for inter-connectivity and security in a smart hospital building.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

XSS-immune: a Google chrome extension-based XSS defensive framework for contemporary platforms of web applications.
Security and Communication Networks, 2016

JS-SAN: defense mechanism for HTML5-based web applications against javascript code injection vulnerabilities.
Security and Communication Networks, 2016

A novel approach to protect against phishing attacks at client side using auto-updated white-list.
EURASIP J. Information Security, 2016

Guest editorial special issues on security trends in mobile cloud computing, web, and social networking.
EURASIP J. Information Security, 2016

An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms.
Proceedings of the Network and System Security - 10th International Conference, 2016

On privacy verification in the IoT service based on PN2.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

XSS detection with automatic view isolation on online social network.
Proceedings of the IEEE 5th Global Conference on Consumer Electronics, 2016

A Petri net-based framework of intrusion detection systems.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

DDoS detection and filtering technique in cloud environment using GARCH model.
Proceedings of the IEEE 4th Global Conference on Consumer Electronics, 2015

PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications.
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015