Dr. Tarunpreet Bhatia
Associate Professor
Specialization
Wireless Networks, Network and Information Security, Cryptography, Mobile Cloud Computing, Machine Learning and Deep Learning
tarunpreet@thapar.edu
Wireless Networks, Network and Information Security, Cryptography, Mobile Cloud Computing, Machine Learning and Deep Learning
Biography
Tarunpreet joined Computer Science and Engineering Department of Thapar Institute of Engineering & Technology, Patiala, India, in 2013 and presently working as Associate Professor. She received her Ph.D and M.E. degree in Computer Science & Engineering from Thapar Institute of Engineering & Technology and B.E. (with Honours) in Computer Science and Engineering from Kurukshetra University. She was a postdoctoral research fellow at University of Luxembourg, Luxembourg from February 2020 to January 2021. She has qualified GATE and UGC-NET for lectureship and JRF and received the Gold Medal in Master of Engineering. She has supervised several Master’s dissertation and guiding PhD scholars in the field of network security, machine learning and deep learning. She is a member of various program committees for different International/National Conferences and reviewer of various International/National journals. She has taught various subjects at UG and PG level such as Data Structures and Algorithms, Advanced Data Structures, Design and Analysis of Algorithms, Operating Systems, Computer System Architecture, Object Oriented Programming, Secure Coding etc. Along with teaching and research, she has handled various administrative responsibilities such as UG coordinator, member of SUGC and DAAC, Curriculum Coordinator etc.
Publications
International Journals (SCI/SCIE)
• Rao, S., Verma, A. K., & Bhatia, T. (2023). Hybrid Ensemble Framework with Self-Attention Mechanism for Social Spam Detection on Imbalanced Data. Expert Systems with Applications, 119594.
• Rao, S., Verma, A. K., & Bhatia, T. (2021). A review on social spam detection: Challenges, open issues, and future directions. Expert Systems with Applications, 186, 115742.
• Bhattacharya, J., Bhatia, T., & Pannu, H. S. (2021). Improved search space shrinking for medical image retrieval using capsule architecture and decision fusion. Expert Systems with Applications, 171, 114543.
• Bhatia, T., Verma, A. K., Sharma, G. (2020). Towards a Secure Incremental Proxy Re-encryption for E-healthcare Data Sharing in Mobile Cloud Computing. Concurrency and computation practice and experience, vol. 32, no. 5, e5520.
• Sachdeva, S., Bhatia, T., Verma, A. K (2020). A novel voting ensemble model for spatial prediction of landslides using GIS. International Journal of Remote Sensing, vol. 41, no. 3, pp. 929-952.
• Bhatia, T., Verma, A. K., Sharma, G. (2018). Secure Sharing of Mobile Personal Healthcare Records using Certificateless Proxy Re-Encryption in Cloud, Transactions on Emerging Telecommunications Technologies, vol. 29, no. 6, doi: 10.1002/ett.3309.
• Sachdeva S., Bhatia, T., and Verma, A. K. (2018). GIS-based evolutionary optimized Gradient Boosted Decision Trees for forest fire susceptibility mapping. Natural Hazards, vol. 92, pp. 1399–1418
• Bhatia, T., and Verma, A. K. (2017). Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. The Journal of Supercomputing, vol. 73, no. 6, pp 2558–2631.
• Bhatia, T., and Verma, A. K. (2017). Cryptanalysis and Improvement of Certificateless Proxy Signcryption Scheme for E-Prescription System in Mobile Cloud Computing, Annals of Telecommunication, vol. 72, pp. 563-576
• Bhatia, T., Kansal, S., Goel, S., and Verma, A.K. (2016). A genetic algorithm based distance-aware routing protocol for wireless sensor networks. Computers & Electrical Engineering, vol. 56, pp. 441-455.
International Journals (Scopus Indexed)
• Kumar, P., Sharma, V., Sharma, G., & Bhatia, T. (2019). An Efficient and Secure Certificateless Aggregate Signature From Bilinear Maps. International Journal of Information Security and Privacy (IJISP), 13(4), 89-108.
• Bala, S., Sharma, G., Bansal, H. and Bhatia, T. (2019). On the Security of Authenticated Group Key Agreement Protocols. Scalable Computing: Practice and Experience, vol. 20, no. 1, pp.93-99.
• Bhatia, T., Verma, A.K., Sharma, G., Bala, S. (2017). A Novel Defense Scheme against Flooding Attack in Mobile Adhoc Networks. Recent Patents on Engineering, 12(1), 15-22.
International Conferences
• Kuchta, V., Sharma, G., Sahu, R., Bhatia, T., Markowitch O. (2017). Secure Certificateless Proxy Reencryption without Pairing. In Proceedings of 12th International Workshop on Security, International Conference Center Hiroshima, Hiroshima, Japan.
• Sachdeva, S., Bhatia, T., Verma, A.K. (2017) “Flood Susceptibility Mapping using GIS-based Support Vector Machine and Particle Swarm Optimization: A case study in Uttarakhand (India)”, In Proceedings of Eight International Conference On Computing, Communication And Networking Technologies (ICCCNT), IIT Delhi, India.
• Jain, B., Bhatia, T., and Verma, A.K. (2017). Security of Big Data in Cloud: A Review. In Proceedings of International Conference on Communication, Computing and Networking (ICCCN), IEEE, Chandigarh, India, pp. 154-150.
• Jain, B., Bhatia, T., and Verma, A.K. (2017). ABE based Secure Distributed Storage Scheme for Big Data in Cloud. In Proceedings of International Conference on Smart Technologies in Computer and Communication (SmartTech 2017), Jaipur, India.
• Dagar, V., Prakash, V., and Bhatia, T.(2016) "Analysis of pattern matching algorithms in network intrusion detection systems", 2nd International Conference on Advances in Computing, Communication, & Automation (ICACCA), Bareilly, India, pp. 1-5.
• Aneja, M.J.S., and Bhatia, T. (2016) "Artificial Intelligence based IDS in VANETs : A Review“, In Proceedings of 2nd IEEE International Conference on Engineering & Technology (ICETECH), Coimbatore, India, pp. 639-644.
• Rani, R., and Bhatia, T. (2016). "A Survey on Machine Learning And Data Mining Techniques For Real-Time Intrusion Detection System“, In Proceedings of 2nd IEEE International Conference on Engineering & Technology (ICETECH), Coimbatore, India, pp. 561-566.
• Kaur, G., and Bhatia, T. (2016). "Trust Based Security in Opportunistic Networks: A Survey”, In Proceedings of 2nd IEEE International Conference of Engineering & Technology (ICETECH), Coimbatore, India, pp. 634-638.
• Kansal, S., Bhatia, T., Goel, S. (2015) “Performance analysis of LEACH and its variants”, Electronics and Communication Systems (ICECS), 2015 2nd International Conference on, IEEE, pp. 630-634.
• Goyal, S., Bhatia, T., Verma, A.K. (2015). “Wormhole and Sybil Attack in WSN: A Review”, INDIACOM 2015:09th INDIACOM, 2nd IEEE International Conference on Computing for Sustainable Global Development, pp. 1463-1468.
• Miglani, A., Bhatia, T., Goel, S. (2015)“Trust based energy efficient routing in LEACH for wireless sensor network, In Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015), IEEE, pp. 361-365.
Book Chapters (Scopus Indexed)
• Rao, S., Verma, A. K., & Bhatia, T. (2021). Online Social Networks Misuse, Cyber Crimes, and Counter Mechanisms. In Analyzing Global Social Media Consumption (pp. 183-203). IGI Global.
• Rao, S., Verma, A. K., & Bhatia, T. (2021). Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks. In Handbook of Research on Cyber Crime and Information Privacy (pp. 219-235). IGI Global.
• Chhikara P., Singh P., Gupta P., Bhatia T. (2020) “Deep Convolutional Neural Network with Transfer Learning for Detecting Pneumonia on Chest X-Rays”. In: Jain L., Virvou M., Piuri V., Balas V. (eds) Advances in Bioinformatics, Multimedia, and Electronics Circuits and Signals. Advances in Intelligent Systems and Computing, vol 1064. Springer, Singapore.
• Aneja, M.J.S., Bhatia, T., Sharma, G. and Shrivastava, G., (2018) “Artificial Intelligence Based Intrusion Detection System to Detect Flooding Attack in VANETs”, In Handbook of Research on Network Forensics and Analysis Techniques, IGI Global, pp. 87-100.
• Bhatia, T., and Verma, A.K. (2014). “Biometric Authentication for Cloud Computing”, Handbook of Research on Securing Cloud-Based Databases with Biometric Applications, IGI Global, pp. 209-235.