Name: Dr. Kamlesh Kumar Gupta
Designation: Associate Professor
Department: Department of Information Technology
Email: kamlesh_rjitbsf@yahoo.co.in
Mobile: 9425757684
Address: 19, Natraj Estate Alkapuri, New City Centre Gwalior(M.P), 474001
Experience: 21 Years
Date of Joining: 20-Dec-2013
Education & Qualification:
B.E. (Computer Science and Engg) from MPCT Gwalior in 2001
M. Tech. (Computer Science & Engineering) from SATI, Vidisha in 2005
Ph.D. (Computer Science and Engg) from UIT, RGPV Bhopal in 2013
Last Updated: 12-Jul-2025
S.No. | Title | Publisher | ISBN |
---|---|---|---|
1 | Swarm Intelligent and Machine Learning: Application in Healthcare | CRC Press | 9781032145822 |
Last Updated: 30-Jun-2025
S.No. | Title of FDP/STTP | Organized By | Organized At | Approved By | Duration |
---|---|---|---|---|---|
1 | Application Specific Algorithm Design And Analysis | Department of Computer Science and Engg | IIT Guwahati Organized | MHRD | One Week 07-Apr-2006 to 07-Aug-2006 |
2 | IT In Health Care | Department of Computer Science and Engg | IIT Delhi | MHRD | One Week 12-Dec-2007 to 11-Feb-2007 |
3 | Data Mining and Business Intelligence | Department of Computer Science and Engg, | ABV- IIITM Gwalior | MHRD | Two Weeks 07-Jul-2008 to 07-Dec-2008 |
4 | Image and Signal Processing | Department of Electronic Communication Engineering | MANIT, Bhopal | MHRD | One Week 11-Feb-2011 to 12-Feb-2011 |
5 | Selected Topics On Distributed System & Computer Security | Depatrment of Computer Science and Engineering | Jaypee University of Engg. & Technology, Guna (Mp) | Jaypee University | One Week 30-Nov--0001 to 06-Mar-2011 |
6 | Information Security And Computer Forensics (WISCF-2014) | Department of Computer Science & Engineering | MNNIT, Allahabad | MHRD | One Week 23-Jun-2014 to 28-Jun-2014 |
7 | Development of Web Based Application using PHP | Department of Computer Science and Engineering | NITTTR, Bhopal | MHRD | One Week 18-Dec-2017 to 22-Dec-2017 |
8 | Simulation & Modeling Techniques and their Application in Science and Engineering | Department of ECE | RJIT Tekanpur | IITR | One Week 06-Dec-2020 to 10-Dec-2020 |
9 | Modern Cryptography, Blockchain & IoT Security: Challenge solution and future prospects (MCB-IoTs | Department of CSE | RGPV Bhopal | TEQIP-III | One Week 23-Mar-2021 to 27-Mar-2021 |
10 | AICTE-RGPV Teacher Training Program on “An Interdisciplinary Approach to Data Analysis and Visualization tools and Technology” | Department of Computer Science | IPSCTM Gwalior | AICTE, New Delhi | One Week 05-Jul-2021 to 10-Jul-2021 |
S.No. | Title of Publication | Journal | Month-Year of Publication | ISSN & DOI | No. of Co-Authors |
---|---|---|---|---|---|
1 | Improving the End-to-End Protection in E-Voting Using BVM- Block chain Based E-Voting Mechanism(SCIE Index) View Paper | Concurrency and Computation : Practice and Experience (SCIE) | Jan-2024 | online ISSN:1532-Pr DOI: 10.21203/rs.3.rs-3973544/v1 | 2 |
2 | An efficient transfer learning appeoach for prediction and classification of SARS-Covid-19 View Paper | Multimedia Tools and Applications (SCIE) | Sep-2023 | 39435–39457 DOI: https://doi.org/10.1007/s11042-023-17086-y | 2 |
3 | An efficient image encryption technique based on two-level security for internet of things View Paper | Multimedia Tools and Applications (SCIE) | Feb-2022 | 1573-7721 https://d DOI: https://doi.org/10.1007/s11042-022-12169-8 | 2 |
4 | Breast cancer-caps: A breast cancer screening system based on capsule network1 utilizing the multi-view breast thermal infrared images View Paper | Turkish Journal of Electrical Engineering & Computer Sciences (SCIE) Volume: 30, Issue: 5 | May-2022 | 1300-0632 DOI: 10.55730/1300-0632.3906 | 2 |
5 | A Random Dual-Security based An Image Encryption Scheme for IoT View Paper | Journal of Scientific Research (UGC Care) Volume: 65, Issue: 1 | Jun-2021 | DOI: DOI: 10.37398/JSR.2021.650133 | 2 |
6 | Session Key based Image Cryptographic Algorithm using Logistic-Sine Map and Crossover Operator for IoT View Paper | Journal of Scientific Research (UGC Care) Volume: 65, Issue: 1 | Jul-2021 | DOI: 10.37398/JSR.2021.650133 | 260 |
7 | Session Key based Fast, Secure and Lightweight Image Encryption Algorithm(SCI Index) View Paper | Multimedia Tools and Applications, Springer Volume: 80, Issue: 25 | Oct-2021 | 1573-7721 DOI: https://doi.org/10.1007/s11042-021-11160-z | 2 |
8 | Session Key based Novel Lightweight Image Encryption Algorithm using a hybrid of Chebyshev Chaotic map and Crossover View Paper | Multimedia Tools and Applications, Springer (SCIE) | Aug-2021 | 1573-7721 DOI: https://doi.org/10.1007/s11042-021-11160-z | 2 |
9 | Deep Multi-View Breast Cancer Detection: A Multi-View Concatenated Infrared Thermal Images Based Breast Cancer Detection System Using Deep Transfer Learning(SCI Index) View Paper | Traitement du Signal (SCIE) Volume: 38, Issue: 6 | Dec-2021 | 1958-5608 DOI: https://doi.org/10.18280/ts.380613 | 2 |
10 | An Intelligent Session Key?Based Hybrid Lightweight Image Encryption Algorithm Using Logistic?Tent Map and?Crossover Operator for?Internet of?Multimedia Things(SCI Index) View Paper | Wireless Personal Communications (SCIE) | Aug-2021 | 1572-834X DOI: https://doi.org/10.1007/s11277-021-08742-3 | 2 |
11 | An Optimization Approach for Transportation problem of transplant organ using Self-Adoptive Bear Hibernation Algorithm View Paper | Taylor & FrancisJournal of Information and Optimization Sciences (ESCI) Volume: 41, Issue: 2 | Apr-2020 | 0252-2667 DOI: https://doi.org/10.1080/02522667.2020.1733189 | 2 |
12 | An Effectual Classification Approach to Detect Copy-Move Forgery Using Support Vector Machines View Paper | Multimedia Tools and Applications, Springer (SCIE) | Oct-2018 | 1573-7721 DOI: https://doi.org/10.1007/s11042-018-6707-9 | 2 |
13 | Novel Underwater Image Enhancement Technique | International Journal of Innovative Technology and Exploring Engineering | Jan-2018 | 2278-3075 | 2 |
14 | Enhanced Security For Encrypted Image Transmission Over Communication Network: A Review | International Journal of Current Trends In Engineering & Technology | Jan-2017 | 2395-3152 | 2 |
15 | Secure Image Transmission using SHA and Route Security Methods in MANET | International Journal of Current Trends in Engineering and Technology | Jan-2016 | 2395-3152 | 2 |
16 | To Maintain Public Conservation for Secure Mobile Cloud Storage | Recent Trends in Programming Language | Jan-2015 | 2455-1821 | 2 |
17 | Novel Approach For Image Compression Using Curvelet Transform View Paper | International Journal of Signal Processing, Image Processing and Pattern Recognition Volume: 8, Issue: 7 | Jul-2015 | 2005-4254 DOI: DOI: 10.14257/ijsip.2015.8.7.19 | 1 |
18 | An Ethical Approach of Block Based Image Encryption Using Chaotic Map View Paper | International Journal of Security and Its Applications Volume: 9, Issue: 9 | Jan-2015 | 1738-9976 DOI: http://dx.doi.org/10.14257/ijsia.2015.9.9.10 | 3 |
19 | An Effective Approach of Digital Image Watermarking For Copyright Protection View Paper | International Journal of Big Data Security Intelligence Volume: 2, Issue: 1 | Jan-2015 | 1738-9976 DOI: DOI: 10.14257/ijbdsi.2015.2.1.02 | 1 |
20 | Secure Routing in Wireless Mobile Ad-hoc Network | International Journal of Computing, Communications and Networking Volume: 2, Issue: 4 | Dec-2013 | 2319-2720 | 1 |
21 | Novel Approach For Fast Compressed Hybrid Color Image Crypto- System View Paper | Advances In Engineering Software, Elsevier (SCI) | Jan-2012 | 0965-9978 DOI: https://doi.org/10.1016/j.advengsoft.2012.03.001 | 1 |
22 | Performance Analysis of Image Compression Using Curvelet Tansform | Journal of Signal and Image Processing | Jan-2011 | 0976-8882 | 1 |
23 | New Approach For Fast Color Image Encryption Using Chaotic Map View Paper | Journal of Information Security Journal of Signal and Image Processing Volume: 2, Issue: 4 | Jan-2011 | 2327- DOI: 10.4236/jis.2011.24014 | 1 |
24 | ECC Over RSA For Asymmetric Encryption: A Review View Paper | International Journal of Computer Science Issues Volume: 8, Issue: 3 | May-2011 | 1694-0814 | 1 |
25 | Efficient Hybrid Image Cryptosystem Using ECC And Chaotic Map View Paper | International Journal of Computer Applications Volume: 29, Issue: 3 | Jan-2011 | 0975 – 0888 DOI: 10.5120/3548-4866 | 1 |
S.No. | Title of Publication | Conference | Month-Year of Publication | ISBN & DOI | No. of Co-Authors |
---|---|---|---|---|---|
1 | Detection and Classification of Epiletic Seizures Using Machine Learning and Deep Learning: A Systematic Review and Challenges | ASCIS-2025 | Mar-2025 | DOI: https://doi.org/10.1007/978-3-031-86302-8_12 | 2 |
2 | BSeVS – A Smart e-Voting System based on Blockchain Technology | International Conference on Computing Communication and Networking Technologies (ICCCNT) | Jul-2024 | 979-8-3503-3509-5/2 DOI: 10.1109/ICCCNT56998.2023.10307745 | 2 |
3 | Prediction of SARS-COVID-19 Based on Transfer Machine Learning Techniques Using Lungs CT Scan Images View Paper | Data Engineering and Applications, Lecture Notes in Electrical Engineering, Springer Nature Singapore | Sep-2024 | 978-981-97-0036-3 DOI: https://doi.org/10.1007/978-981-97-0037-0_17 | 2 |
4 | The Classification of Breast Cancer based on Hyper-Tuned AdaBoost Ensemble Model | International conference on Machine Intelligence Techniques for Data Analysis and Signal Processing (Scopus Index) | Sep-2023 | 729-739 | 2 |
5 | BVKCS - A Blockchain based e-Voting System with Key Covering Scheme | IEEE International Conference on ICT in Business Industry & Government (ICTBIG) | Jul-2023 | 979-8-3503-4327-4/2 DOI: 10.1109/ICTBIG59752.2023.10456233 | 2 |
6 | A Novel Machine Learning Approach for Forgery Detection and Verification in Digital Image View Paper | IOP Science | Jan-2022 | DOI: DOI 10.1149/10701.11791ecst | 2 |
7 | Blockchain-based voting system powered by post-quantum cryptography (BBVSP-pqc) View Paper | 2022 Second International Conference on Power, Control and Computing Technologies (ICPC2T), IEEE (Scopus Index) | Mar-2022 | DOI: 10.1109/ICPC2T53885.2022.9776966 | 3 |
8 | The Breast Cancer Detection Approaches: A Review | International Journal of Computer Science and Network | Jan-2021 | 2277-5420 | 2 |
9 | Random Dual-Security based an Image Encryption Scheme for IoT | 3rd International Conference on Data, Engineering and Applications Scopus Indexed)( | Jan-2021 | 2 | |
10 | A Review on Application of Machine Learning in Medical Diagnosis View Paper | IEEE 2nd International Conference on Data, Engineering and Applications (IDEA) | Aug-2020 | DOI: 10.1109/IDEA49133.2020.9170733 | 2 |
11 | EFFICIENT IMAGE ENCRYPTION USING MRF AND ECC View Paper | International Journal of Information Technology and Knowledge Management Volume: 2, Issue: 2 | Jul-2009 | 0973-4414 | 1 |
12 | An Ethical Way For Image Encryption Using ECC | IEEE First International Conference On Computational Intelligence, Communication Systems And Networks (Scopus Indexed) | Jan-2009 | 978-0-7695-3743-6/09 | 2 |
13 | Performance Analysis For Image Encryption Using ECC | IEEE International Conference On Computational Intelligence and Communication Networks (Scopus Indexed) | Jan-2008 | 978-0-7895-4254-6/10 | 2 |
14 | An Ethical Way Of Encrypt Data Transfer In Bluetooth Mobile Using Chaos Based Feedback Technique | IEEE Sixth International Conference On Information Technology (Scopus Indexed) | Jan-2008 | 978-0-7695-3596-8 | 2 |