default search action
Deepika Saxena
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Kishu Gupta, Deepika Saxena, Rishabh Gupta, Jatinder Kumar, Ashutosh Kumar Singh:
FedMUP: Federated learning driven malicious user prediction model for secure data distribution in cloud environments. Appl. Soft Comput. 157: 111519 (2024) - [j31]Ashutosh Kumar Singh, Jitendra Kumar, Deepika Saxena, Athanasios V. Vasilakos:
Introduction to the special section on eXplainable Artificial Intelligence (XAI): Methods, Applications, and Challenges (VSI-xai). Comput. Electr. Eng. 120: 109630 (2024) - [j30]Kishu Gupta, Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh:
MAIDS: malicious agent identification-based data security model for cloud environments. Clust. Comput. 27(5): 6167-6184 (2024) - [j29]Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh, Chung-Nan Lee:
A Multiple Controlled Toffoli Driven Adaptive Quantum Neural Network Model for Dynamic Workload Prediction in Cloud Environments. IEEE Trans. Pattern Anal. Mach. Intell. 46(12): 7574-7588 (2024) - [j28]Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh, Athanasios V. Vasilakos:
Emerging VM Threat Prediction and Dynamic Workload Estimation for Secure Resource Management in Industrial Clouds. IEEE Trans Autom. Sci. Eng. 21(4): 5837-5851 (2024) - [j27]Vinaytosh Mishra, Kishu Gupta, Deepika Saxena, Ashutosh Kumar Singh:
A Global Medical Data Security and Privacy Preserving Standards Identification Framework for Electronic Healthcare Consumers. IEEE Trans. Consumer Electron. 70(1): 4379-4387 (2024) - [j26]Deepika Saxena, Ashutosh Kumar Singh:
A High Up-Time and Security Centered Resource Provisioning Model Toward Sustainable Cloud Service Management. IEEE Trans. Green Commun. Netw. 8(3): 1182-1195 (2024) - [j25]Deepika Saxena, Ashutosh Kumar Singh:
An Oversubscription and Service Pricing Exploitation-Based Profit Maximization Framework for Industry Cloud Resource Management. IEEE Trans. Serv. Comput. 17(5): 2041-2053 (2024) - [c6]Deepika Saxena, Ashutosh Kumar Singh, Volker Lindenstruth:
A Latency Aware and Dynamic Caching Model for Heterogeneous Datalake Environments. COMPSAC 2024: 2302-2307 - [c5]Kazuki Tejima, Deepika Saxena, Rage Uday Kiran:
A Novel Multi-task Single-Step Traffic Congestion Forecasting Framework for Large-Scale Road Networks. IEA/AIE 2024: 277-288 - [i16]Kishu Gupta, Deepika Saxena, Pooja Rani, Jitendra Kumar, Aaisha Makkar, Ashutosh Kumar Singh, Chung-Nan Lee:
An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management. CoRR abs/2410.03217 (2024) - [i15]Vinaytosh Mishra, Kishu Gupta, Deepika Saxena, Ashutosh Kumar Singh:
A Global Medical Data Security and Privacy Preserving Standards Identification Framework for Electronic Healthcare Consumers. CoRR abs/2410.03621 (2024) - 2023
- [j24]Palla Likhitha, Penugonda Ravikumar, Deepika Saxena, Rage Uday Kiran, Yutaka Watanobe:
k-PFPMiner: Top-k Periodic Frequent Patterns in Big Temporal Databases. IEEE Access 11: 119033-119044 (2023) - [j23]Rishabh Gupta, Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh:
A differential approach and deep neural network based data privacy-preserving model in cloud environment. J. Ambient Intell. Humaniz. Comput. 14(5): 4659-4674 (2023) - [j22]Rishabh Gupta, Ishu Gupta, Ashutosh Kumar Singh, Deepika Saxena, Chung-Nan Lee:
An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud. IEEE Syst. J. 17(2): 2445-2454 (2023) - [j21]Ashutosh Kumar Singh, Smruti Rekha Swain, Deepika Saxena, Chung-Nan Lee:
A Bio-Inspired Virtual Machine Placement Toward Sustainable Cloud Resource Management. IEEE Syst. J. 17(3): 3894-3905 (2023) - [j20]Ishu Gupta, Deepika Saxena, Ashutosh Kumar Singh, Chung-Nan Lee:
SeCoM: An Outsourced Cloud-Based Secure Communication Model for Advanced Privacy Preserving Data Computing and Protection. IEEE Syst. J. 17(4): 5130-5141 (2023) - [j19]Jatinder Kumar, Deepika Saxena, Ashutosh Kumar Singh, Athanasios V. Vasilakos:
A Quantum Controlled-NOT Neural Network-Based Load Forecast and Management Model for Smart Grid. IEEE Syst. J. 17(4): 5714-5725 (2023) - [j18]Ashutosh Kumar Singh, Sakshi Chhabra, Rishabh Gupta, Deepika Saxena:
A Reliable Client Detection System during Load Balancing for Multi-tenant Cloud Environment. SN Comput. Sci. 4(1): 86 (2023) - [j17]Bhawana Sharma, Deepika Saxena:
Design and Analysis of Energy Efficient Service Discovery Routing Protocol in MANETs. SN Comput. Sci. 4(5): 495 (2023) - [j16]Jatinder Kumar, Rishabh Gupta, Deepika Saxena, Ashutosh Kumar Singh:
Power consumption forecast model using ensemble learning for smart grid. J. Supercomput. 79(10): 11007-11028 (2023) - [j15]Deepika Saxena, Jitendra Kumar, Ashutosh Kumar Singh, Stefan Schmid:
Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud. IEEE Trans. Parallel Distributed Syst. 34(4): 1313-1330 (2023) - [j14]Deepika Saxena, Ashutosh Kumar Singh:
A High Availability Management Model Based on VM Significance Ranking and Resource Estimation for Cloud Applications. IEEE Trans. Serv. Comput. 16(3): 1604-1615 (2023) - [j13]Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen:
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity. IEEE Trans. Syst. Man Cybern. Syst. 53(11): 6815-6827 (2023) - [j12]Smruti Rekha Swain, Deepika Saxena, Jatinder Kumar, Ashutosh Kumar Singh, Chung-Nan Lee:
An AI-Driven Intelligent Traffic Management Model for 6G Cloud Radio Access Networks. IEEE Wirel. Commun. Lett. 12(6): 1056-1060 (2023) - [c4]Vivek Saxena, Shiladitya Bhattacharjee, Deepika Saxena:
A Lightweight Security Technique for Processing Large Data Over a Distributed Cloud Environment. ICIMMI 2023: 143:1-143:5 - [i14]Deepika Saxena, Jitendra Kumar, Ashutosh Kumar Singh, Stefan Schmid:
Performance Analysis of Machine Learning Centered Workload Prediction Models for Cloud. CoRR abs/2302.02452 (2023) - [i13]Smruti Rekha Swain, Deepika Saxena, Jatinder Kumar, Ashutosh Kumar Singh, Chung-Nan Lee:
An AI-driven intelligent traffic management model for 6G cloud radio access networks. CoRR abs/2303.14372 (2023) - [i12]Rishabh Gupta, Deepika Saxena, Ashutosh Kumar Singh:
Cryptography approach for Secure Outsourced Data Storage in Cloud Environment. CoRR abs/2306.08322 (2023) - [i11]Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen:
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity. CoRR abs/2308.09578 (2023) - 2022
- [j11]Deepika Saxena, Ashutosh Kumar Singh:
An Intelligent Traffic Entropy Learning-Based Load Management Model for Cloud Networks. IEEE Netw. Lett. 4(2): 59-63 (2022) - [j10]Rishabh Gupta, Deepika Saxena, Ishu Gupta, Aaisha Makkar, Ashutosh Kumar Singh:
Quantum Machine Learning Driven Malicious User Prediction for Cloud Network Communications. IEEE Netw. Lett. 4(4): 174-178 (2022) - [j9]Rishabh Gupta, Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh:
Differential and TriPhase Adaptive Learning-Based Privacy-Preserving Model for Medical Data in Cloud Environment. IEEE Netw. Lett. 4(4): 217-221 (2022) - [j8]Deepika Saxena, Ishu Gupta, Jitendra Kumar, Ashutosh Kumar Singh, Xiaoqing Wen:
A Secure and Multiobjective Virtual Machine Placement Framework for Cloud Data Center. IEEE Syst. J. 16(2): 3163-3174 (2022) - [j7]Deepika Saxena, Ashutosh Kumar Singh, Rajkumar Buyya:
OP-MLB: An Online VM Prediction-Based Multi-Objective Load Balancing Framework for Resource Management at Cloud Data Center. IEEE Trans. Cloud Comput. 10(4): 2804-2816 (2022) - [j6]Deepika Saxena, Ashutosh Kumar Singh:
OFP-TM: an online VM failure prediction and tolerance model towards high availability of cloud computing environments. J. Supercomput. 78(6): 8003-8024 (2022) - [j5]Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee:
A Fault Tolerant Elastic Resource Management Framework Toward High Availability of Cloud Services. IEEE Trans. Netw. Serv. Manag. 19(3): 3048-3061 (2022) - [c3]Vivek Saxena, Deepika Saxena, Uday Pratap Singh:
Security Enhancement using Image verification method to Secure Docker Containers. ICIMMI 2022: 42:1-42:5 - [c2]Uday Pratap Singh, Vivek Saxena, Anil Kumar, Purushottam Bhari, Deepika Saxena:
Unraveling the Prediction of Fine Particulate Matter over Jaipur, India using Long Short-Term Memory Neural Network. ICIMMI 2022: 51:1-51:5 - [i10]Deepika Saxena, Ashutosh Kumar Singh:
an intelligent security centered resource-efficient resource management model for cloud computing environments. CoRR abs/2210.16602 (2022) - [i9]Ashutosh Kumar Singh, Deepika Saxena, Jitendra Kumar, Vrinda Gupta:
A Quantum Approach Towards the Adaptive Prediction of Cloud Workloads. CoRR abs/2211.14619 (2022) - [i8]Deepika Saxena, Ashutosh Kumar Singh:
A High Availability Management Model based on VM Significance Ranking and Resource Estimation for Cloud Applications. CoRR abs/2211.16117 (2022) - [i7]Deepika Saxena, Ashutosh Kumar Singh:
A proactive autoscaling and energy-efficient VM allocation framework using online multi-resource neural network for cloud data center. CoRR abs/2212.01896 (2022) - [i6]Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee:
A Fault Tolerant Elastic Resource Management Framework Towards High Availability of Cloud Services. CoRR abs/2212.03547 (2022) - [i5]Deepika Saxena, Ashutosh Kumar Singh:
OSC-MC: Online Secure Communication Model for Cloud Environment. CoRR abs/2212.05451 (2022) - 2021
- [j4]Deepika Saxena, Ashutosh Kumar Singh:
OSC-MC: Online Secure Communication Model for Cloud Environment. IEEE Commun. Lett. 25(9): 2844-2848 (2021) - [j3]Deepika Saxena, Ashutosh Kumar Singh:
A proactive autoscaling and energy-efficient VM allocation framework using online multi-resource neural network for cloud data center. Neurocomputing 426: 248-264 (2021) - [j2]Ashutosh Kumar Singh, Deepika Saxena, Jitendra Kumar, Vrinda Gupta:
A Quantum Approach Towards the Adaptive Prediction of Cloud Workloads. IEEE Trans. Parallel Distributed Syst. 32(12): 2893-2905 (2021) - [i4]Deepika Saxena, Ashutosh Kumar Singh:
workload forecasting and resource management models based on machine learning for cloud computing environments. CoRR abs/2106.15112 (2021) - [i3]Deepika Saxena, Ishu Gupta, Jitendra Kumar, Ashutosh Kumar Singh, Xiaoqing Wen:
A Secure and Multi-objective Virtual Machine Placement Framework for Cloud Data Centre. CoRR abs/2107.13502 (2021) - [i2]Rishabh Gupta, Deepika Saxena, Ashutosh Kumar Singh:
Data Security and Privacy in Cloud Computing: Concepts and Emerging Trends. CoRR abs/2108.09508 (2021) - [i1]Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh:
A Survey and Comparative Study on Multi-Cloud Architectures: Emerging Issues And Challenges For Cloud Federation. CoRR abs/2108.12831 (2021) - 2020
- [j1]Jitendra Kumar, Deepika Saxena, Ashutosh Kumar Singh, Anand Mohan:
BiPhase adaptive learning-based neural network model for cloud datacenter workload forecasting. Soft Comput. 24(19): 14593-14610 (2020)
2010 – 2019
- 2015
- [c1]Deepika Saxena, Shilpi Saxena:
Highly advanced cloudlet scheduling algorithm based on Particle Swarm Optimization. IC3 2015: 111-116
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint