Lav Gupta

ORCID: 0000-0002-0524-654X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Software System Performance and Reliability
  • IoT and Edge/Fog Computing
  • Smart Grid Security and Resilience
  • Privacy-Preserving Technologies in Data
  • Anomaly Detection Techniques and Applications
  • Blockchain Technology Applications and Security
  • Information and Cyber Security
  • Caching and Content Delivery
  • Advanced Malware Detection Techniques
  • Advanced Optical Network Technologies
  • Brain Tumor Detection and Classification
  • Internet Traffic Analysis and Secure E-voting
  • Power Line Communications and Noise
  • Opportunistic and Delay-Tolerant Networks
  • Privacy, Security, and Data Protection
  • Spacecraft and Cryogenic Technologies
  • Spam and Phishing Detection
  • Parallel Computing and Optimization Techniques
  • Retinal Imaging and Analysis
  • Cloud Data Security Solutions
  • Adversarial Robustness in Machine Learning
  • Advanced Photonic Communication Systems

University of Missouri–St. Louis
2019-2025

Washington University in St. Louis
2015-2019

South Eastern Railway
2015

Government of India
2013

Indian Space Research Organisation
2006

University of Toronto
2002

Unmanned Aerial Vehicles (UAVs) have enormous potential in the public and civil domains. These are particularly useful applications where human lives would otherwise be endangered. Multi-UAV systems can collaboratively complete missions more efficiently economically as compared to single UAV systems. However, there many issues resolved before effective use of UAVs made provide stable reliable context-specific networks. Much work carried out areas Mobile Ad Hoc Networks (MANETs), Vehicular...

10.1109/comst.2015.2495297 article EN IEEE Communications Surveys & Tutorials 2015-11-03

It is critical to secure the Industrial Internet of Things (IIoT) devices because potentially devastating consequences in case an attack. Machine learning (ML) and big data analytics are two powerful leverages for analyzing securing (IoT) technology. By extension, these techniques can help improve security IIoT systems as well. In this paper, we first present common protocols their associated vulnerabilities. Then, run a cyber-vulnerability assessment discuss utilization ML countering...

10.1109/jiot.2019.2912022 article EN cc-by IEEE Internet of Things Journal 2019-04-25

Network slicing for 5G provides Network-as-a-Service (NaaS) different use cases, allowing network operators to build multiple virtual networks on a shared infrastructure. With slicing, service providers can deploy their applications and services flexibly quickly accommodate diverse services' specific requirements. As an emerging technology with number of advantages, has raised many issues the industry academia alike. Here, authors discuss this technology's background propose framework. They...

10.1109/mic.2017.3481355 article EN IEEE Internet Computing 2017-01-01

Lately application service providers (ASPs) and Internet (ISPs) are being confronted with the unprecedented challenge of accommodating increasing traffic demands from their geographically distributed users. Many ASPs ISPs, such as Facebook, Netflix, AT&T others have adopted micro-service architecture to tackle this problem. Instead building a single, monolithic application, idea is split into set smaller, interconnected services, called micro-services (or simply services). Such services...

10.1109/icc.2017.7996729 article EN 2017-05-01

Network slicing in 5G is expected to essentially change the way which network operators deploy and manage vertical services with different performance requirements. Efficient secure slice provisioning algorithms are important since slices share limited resources of physical network. In this article, we first analyze security issues formulate an Integer Linear Programming (ILP) model for core provisioning. Then, propose a heuristic algorithm called VIKOR-CNSP based on VIKOR, multi-criteria...

10.1109/access.2019.2947454 article EN cc-by IEEE Access 2019-01-01

Wireless communication advancements have significantly improved connectivity and user experience with each generation. The recent release of the framework M.2160 for upcoming sixth generation (6G or IMT-2030) cellular wireless standard by ITU-R has heightened expectations, particularly Internet Things (IoT) driven use cases. However, this progress introduces significant security risks, as technologies like O-RAN, terahertz communication, native AI pose threats such eavesdropping, supply...

10.3390/s25030854 article EN cc-by Sensors 2025-01-30

Network function virtualization (NFV) over multi-cloud promises network service providers amazing flexibility in deployment and optimizing cost. Telecommunications applications are, however, sensitive to performance indicators, especially latency, which tend get degraded by both the multiple cloud requirement for widely distributed coverage. In this work we propose an efficient framework that uses novel concept of random selection combined with a support vector regression based predictive...

10.1109/ccwc.2017.7868377 article EN 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) 2017-01-01

Network slicing for 5G provides Network-as-a-Service (NaaS) different use cases, allowing network operators to build multiple virtual networks on a shared infrastructure. With slicing, service providers can deploy their applications and services flexibly quickly accommodate diverse services’ specific requirements. As an emerging technology with number of advantages, has raised many issues the industry academia alike. Here, authors discuss this technology’s background propose framework. They...

10.1109/mic.2018.326150452 article EN IEEE Internet Computing 2018-01-01

Recently, leading research communities have been investigating the use of blockchains for Artificial Intelligence (AI) applications, where multiple participants, or agents, collaborate to make consensus decisions. To achieve this, data in blockchain storage be transformed into knowledge. We refer these types as knowledge-based blockchains. Knowledge-based are potentially useful building efficient risk assessment applications. An earlier work introduced probabilistic which facilitates This...

10.1109/blockchain.2019.00078 article EN 2019-07-01

Abstract With the enhancements in field of software‐defined networking and virtualization technologies, novel paradigms such as network function Internet Things are rapidly gaining ground. The development 5G networks explosion online services has resulted an exponential growth devices connected to network. As a result, application service providers being confronted with unprecedented challenge accommodating increasing traffic demands from geographically distributed users. To tackle this...

10.1002/ett.3445 article EN Transactions on Emerging Telecommunications Technologies 2018-06-21

Carriers’ network services are distributed, dynamic, and investment intensive. Deploying them as virtual (VNS) brings the promise of low-cost agile deployments, which reduce time to market new services. If these hosted dynamically over multiple clouds, greater flexibility in optimizing performance cost can be achieved. On flip side, when orchestrated stringent norms for carrier become difficult meet, necessitating novel innovative placement strategies. In selecting appropriate combination...

10.1016/j.comcom.2019.03.003 article EN cc-by-nc-nd Computer Communications 2019-03-18

A blockchain provides a securedparadigm to achieve consensus using distributed and peer-to-peer network in which no trusted central party is required. As result, it has the potential resolve many challenges that are faced with current centralized controllers globally applications. To date, technology been used for recording transactions tracking objects multiple participants reach on whether transaction valid or not. This paper introduces novel paradigm of probabilistic blockchains, an...

10.1109/uemcon.2018.8796512 article EN 2018-11-01

Inguinal hernia with vermiform appendix as content is known Amyand’s hernia. It a rare entity but we encountered four cases within six months. A 52-year-old female had high grade fever and evidence of inflammatory pathology involving the ileocaecal region. She was initially managed conservatively subsequently underwent exploratory laparatomy. The perforated herniating in inguinal canal. Appendectomy done herniorrhaphy without mesh placement. 74-year-old male bilateral hernia, which, right...

10.1155/2015/629127 article EN cc-by Case Reports in Gastrointestinal Medicine 2015-01-01

Efficient provisioning of 5G network slices is a major challenge for slicing technology. Previous slice methods have only considered resource attributes and ignored topology attributes. These may result in decrease the acceptance ratio revenue. To address these issues, we propose two-stage heuristic algorithm, called RT-CSP, core by jointly considering this paper. The first stage our method node stage, which an approach to scoring ranking nodes using (i.e., CPU capacity bandwidth) degree...

10.3390/app9204361 article EN cc-by Applied Sciences 2019-10-16

Most global enterprises and application service providers need to use resources from multiple clouds managed by different cloud providers, located throughout the world. The ability manage these geographically distributed requires of specialized management control platforms. Such platforms allow deploy their applications across remote that meet objectives. Generally, are multi-threaded, highly complex. They be optimized perform well cost effective for all players. For optimization succeed, it...

10.2174/2215081105999160523095630 article EN Recent Advances in Communications and Networking Technology 2016-12-29

Communication and coordination play an important role in achieving concurrency the design of large complex artifacts. It is also widely accepted that constraint oriented involving recognition, formulation satisfaction constraints. In this paper we have described how constraints can be used to achieve communication concurrent projects. The system are implementing towards (but not limited to) engineering domain, supports multiple perspectives, notification mechanisms, a management agent...

10.1109/enabl.1996.555186 article EN 2002-12-24

Fault and performance management systems, in the traditional carrier networks, are based on rule-based diagnostics that correlate alarms other markers to detect localize faults issues. As carriers move Virtual Network Services, Function Virtualization multi-cloud deployments, methods fail deliver because of intangibility constituent Functions increased complexity resulting architecture. In this paper, we propose a framework, called HYPER-VINES, interfaces with various platforms involved...

10.1109/iccnc.2019.8685496 article EN 2016 International Conference on Computing, Networking and Communications (ICNC) 2019-02-01

In healthcare applications like monitoring patients in ICUs and performing precision robotic surgeries, IoT sensor networks have become indispensable. These sensors generate a large amount of data that, when processed visually presented to medical professional, assists the more accurate diagnosis treatment ailments. For some time now, hospital administrations been taking advantage public cloud(referred as main clouds this paper) resources store process patient using advanced AI analytical...

10.1109/syscon53073.2023.10131082 article EN 2022 IEEE International Systems Conference (SysCon) 2023-04-17

Centralized clouds processing the large amount of data generated by Internet-of-Things (IoT) can lead to unacceptable latencies for end user. Against this backdrop, Edge Computing (EC) is an emerging paradigm that address shortcomings traditional centralized Cloud (CC). Its use associated with improved performance, productivity, and security. Some its cases include smart grids, healthcare Augmented Reality (AR)/Virtual (VR). EC uses servers strategically placed near users, reducing latency...

10.48550/arxiv.2406.00301 preprint EN arXiv (Cornell University) 2024-06-01
Coming Soon ...