@sharda.ac.in
ARTIFICIAL INTELLIGENCE
SHARDA UNIVERSITY
Profile: Academic:7 Years. Industry: 2 Years. Total: 9 Y; 11 Papers+ 08 FDPs+
3 Expert talks + 3 courses organized + 2 Patent+1 Book Chapter (Scopus papers
05) Total: 28
Sl.
No Examination Passed Year Name of the
Board/Universit
y
Division
/Grade % Of
marks
1 PhD (Thesis Submitted-CSE) 2022 Sharda University - Thesis
Submitted
2 M. Tech (CSE) 2015 Sharda University
3 B. Tech (IT) 2011 UPTU, Lucknow
5 10+2 2007
6 Secondary exams 2005
MACHINE LEARNING, DEEP LEARNING, NLP
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Koushik Chakraborty, Amrita Parashar, Pawan Bhambu, Durga Prasad Tripathi, Pratap Patil, and Gaurav Kumar Srivastav
MDPI
: Security is currently the main boundary for cloud-based administrations. It is not adequate to just consolidate the cloud by adding a couple of additional controls or component answers for your current organization security programming. Businesses must utilize both virtual and physical information center security frameworks to keep them secure. The objective is to defend it from dangers that may jeopardize the secrecy, judgment, or openness of mental property or commerce data resources. These are the fundamental central focuses of all assigned attacks, and in this way, they require a high degree of security. Hundreds to thousands of physical and virtual servers are partitioned up into information centers agreeing to sort applications, information classification zones, and other criteria. To protect applications, frameworks, information, and clients, information center security takes on the workload over physical information centers and multi-cloud situations. It also applies to open cloud data centers. All server ranches ought to protect their applications and data from a rising number of refined threats and around-the-world ambushes. Each organization is at risk of assault, and numerous organizations have been compromised without being mindful of it. An evaluation of your resources and business necessities is important to improve a spotless way to deal with your way of life and cloud security technique. To deal with a strong mixture of multi-cloud wellbeing program, you should lay out perceivability and control. You can consolidate incredible controls, organize responsibility dispersion, and lay out fantastic gambles on the board with the assistance of safety items and experts.
Gaurav Srivastav, Shri Kant, Durgesh Srivastava, and Satvik Vats
IEEE
Nowadays, one of the most intriguing fields of research in information technology is artificial intelligence (AI) and machine learning (ML). For educational researchers and scientists, it offers an excellent prospect. Since education practitioners have little awareness about utilizing AI in the educational system (AIEd), it is, therefore, a promising field of research for improving the quality of educational practices. This study aims to investigate AI-ML to create an AI-enabled educational eco-system. Researchers have expressed interest in using educational data mining and the data science approach to find patterns in extensive educational data collections. This study demonstrates how intelligent applications based on AI can be used to improve teaching and learning.
Richa Singh, Gaurav Srivastav, Rekha Kashyap, and Satvik Vats
IEEE
Intelligent network orchestration and management are crucial components of the 6G network. Therefore, machine learning and artificial intelligence play a big part in the 6G paradigm that is being imagined. However, the combination of 6G and AIML utilization may frequently be a double-edged sword because AI has the capacity to either protect or compromise security and privacy. Proactive threat detection, the use of mitigating intelligent techniques, and network automation in future are needed to enable the achievement of independent networks in 6G. As a result, this paper has detailed focus on the ongoing projects based on 6G and factors that make 6G technology necessary. The role of ZT architecture is discussed in detail, use of AIML in 6G, Various application areas and challenges associated in 6G has been mentioned in this paper.
Gaurav Srivastav and Richa Singh
AIP Publishing
Gaurav Srivastav, Mamoon Rashid, Richa Singh, Anita Gehlot, and Neha Sharma
IEEE
Breast cancer is one of the most common cancer types. This is the second-leading cause of cancer-related death in women. It ranked 2nd according to available data lung cancers is the only one causing more causalities. It’s critical to receive a breast cancer diagnosis quickly. The MIAS data set is used in this study to examine machine learning-based categorization approaches used to study breast cancer. Important image data is fetched from mammograms. We choose eight distinct classifiers and assess each one’s precision, recall, accuracy, and F-score. The analysis’s findings were higher than 69.88%.
Pramod Vishwakarma, Vijay Kumar Soni, Gaurav Srivastav, and Abhishek Jain
Wiley
Richa Singh and Gaurav Srivastav
IEEE
There are various deep learning-based IDS techniques are implemented in large scale. Intrusion detection systems are critical components for protecting ICT infrastructure (IDSs). Keeping this in mind, solid solution is required for different types of new attacks and complexity control. Deep learning and machine learning is widely used to handle high dimensional, complex type data. The IDS detects and attracts various attack types such as known, unknown, and zero-day attacks using unsupervised machine learning techniques. To detect threats without prior knowledge, a framework has been designed that uses the concept of One Class SVM (OCSVM) and active learning. The CIC-IDS2017 dataset was used to test the performance of the framework and compare the result with UNSW-NB15 and KDD cup 99 dataset. The final output shows that this framework gives better performance than other.
Mahima Sharma and Gaurav Srivastav
Springer Singapore
Gaurav Srivastav and Shri Kant
IEEE
Internet has open platforms for various domains to interact with each other. e-leaning is a domain which consistently getting attention because of “Learn any-time, anywhere” approach. Since, the start of e-learning environment development phase semantic web base ontology is used for describing and making relation between Learning Objects (LO's). Since contents are increasing every day, on this point ontologies are lagging to recommend. Development of recommendation using deep learning techniques are producing comparatively better results. Deep learning is now been used for classification, predictions, recommendations. It is also used in detection and segmentation techniques as well. This paper presents discussion various categories of recommendation systems. Then a comparative study is on deep learning-based recommendation systems. Major challenge that an e-learning environment is facing is because of “Cold-Start” and “Sparsity” in content based (CB) & collaborative Filter (CF) based recommendation systems. How to reduce Cold-Start and Sparsity is tried to find out in this paper.