Deepak Gupta (software developer)

Deepak Gupta is an Indian writer, software developer, and researcher.[1][2]  He has authored and edited the books Handbook of Research on Multimedia Cyber Security[3] and Handbook of Computer Networks and Cyber Security.[4]

Education

edit

Gupta has a Master of Science in Computer Forensics and Cyber Security from the Illinois Institute of Technology in Chicago, United States.[4] As a graduate student, Gupta worked on and led VOIP-related research projects for Bell Labs.[4]

Career

edit

After graduation, Gupta worked at Sageworks as a software developer. In 2011, Gupta co-founded CIAM and social API provider LoginRadius with Rakesh Soni.[5][6] Gupta and Soni met while attending high school in India before moving to North America to start the company.[7] Prior to starting LoginRadius, Gupta had run a B2B startup.[8] The company was initially based in Edmonton, Canada before also acquiring offices in San Francisco, California.[9][5] The company also has offices in Vancouver, Jaipur, and Hyderabad.[10][7][11][12]

Gupta currently serves as LoginRadius’s Chief Technology Officer.[13]

Gupta served as a panel member at a televised Capital Ideas panel in Edmonton in 2014.[14]

In 2018, Gupta contributed a chapter to the book Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives.[15]

In 2019, he served as an editor for the book Handbook of Computer Networks and Cyber Security: Principles and Paradigms.[16][17]

In 2020, Gupta served as an editor for the Handbook of Research on Multimedia Cyber Security.[18]

Gupta expressed plans to release  another book titled The Power of Digital Identity in 2021. Gupta was one of the authors of the book Data Mining Approaches for Big Data and Sentiment Analysis in Social Media.[8]

Gupta has written articles for publications such as Forbes, FastCompany, Entrepreneur,[19] and DevOps.com.[17]

Gupta also holds several patents.[20][21]

Selected publications

edit

Books

edit
  • Mishra, A., Gupta, B., & Gupta, D. (2018). Identity theft, malware, and social engineering in dealing with cybercrime. In Gupta, B., Agrawal, D. P., & Wang, H. (Eds.). Computer and cyber security: Principles, algorithm, applications, and perspectives. (pp. 627–649). United States: CRC Press. ISBN 978-0-367-65691-1
  • Gupta, D., Agrawal, D. P., Perez, G. M., Gupta, B. B. (2019). Handbook of computer networks and cyber security: Principles and paradigms. Germany: Springer International Publishing. ISBN 978-3-030-22277-2
  • Gupta, B., & Gupta, D. (Eds.). (2020). Handbook of research on multimedia cyber security. IGI Global, Information Science Reference (an imprint of IGI Global). ISBN 978-1-7998-2702-3
  • Latif, A., Gupta, D., Gupta, D., Perakovic, D. (2021). Data Mining Approaches for Big Data and Sentiment Analysis in Social Media. United States: IGI Global. ISBN 978-1-6684-5629-3[8]

Patents

edit
  • Method and system for defense against Distributed Denial-of-Service attack, Peraković, D., Gupta, B.B., Gupta, D., Mishra, A., AU 2021102049 [20]
  • Method and system of performing a fine-grained searchable encryption for resource-constrained devices in m-health network, Nguyen, T., Castiglione, A., Gupta, B.B., Gupta, D., Mamta, AU 2021102048 [21]
  • Method and system for automatic fake news detection using feature selection on social networks, Sahoo, S.J., Yamaguchi, S., Gupta, D., Gupta, B.B., AU 2021103137 [22]
  • Method and system of performing a fine-grained searchable encryption for resource-constrained devices in m-health network, Castiglione, A., Gupta, B.B., Gupta, D., Mamta, M. Nguyen, T., AU 2021102048 [23]
  • A remote temperature monitoring system and method for IoT-based smart homes, Gupta, B.B., Gupta, D., Hsu, C., Garcia Peñalvo, F.J., Chui, K.T., Rafsanjani, M.K., AU 2021102835 [24]

References

edit
  1. ^ Pivcevic, Katya (2021-02-17). "LoginRadius extends native mobile device biometrics to app authentication | Biometric Update". www.biometricupdate.com. Retrieved 2024-03-05.
  2. ^ Rai, Supriya. "The customer information and security landscape in India: Deepak Gupta, LoginRadius". www.dqindia.com. Retrieved 2024-03-05.
  3. ^ Gupta, Brij B.; Gupta, Deepak (2020). Handbook of Research on Multimedia Cyber Security. IGI Global. ISBN 978-1-7998-2701-6.
  4. ^ a b c Handbook of Computer Networks and Cyber Security (1st ed.). Switzerland: Springer Cham. 2021-08-26. pp. XX, 959. ISBN 978-3-030-22277-2.
  5. ^ a b "LoginRadius Raises $1.3M". FinSMEs. 2014-02-17. Retrieved 2024-03-05.
  6. ^ "Leadership Compass: CIAM Platforms". KuppingerCole. 2020-11-20. Retrieved 2024-03-05.
  7. ^ a b "FounderFuel Grads LoginRadius Raises $1.3 Million in Funding | BetaKit". 2014-02-12. Retrieved 2024-03-05.
  8. ^ a b c B, Gupta, Brij; Dragan, Perakovi?; A, Abd El-Latif, Ahmed; Deepak, Gupta (2021-12-31). Data Mining Approaches for Big Data and Sentiment Analysis in Social Media. IGI Global. ISBN 978-1-7998-8415-6.{{cite book}}: CS1 maint: multiple names: authors list (link)
  9. ^ "LoginRadius Gets 1.3 Mln Funding To Increase API Based Social Website Logins!". Trak.in - Indian Business of Tech, Mobile & Startups. 2016-03-14. Retrieved 2024-03-05.
  10. ^ "LoginRadius founder sees huge growth opportunity in linking websites to social media". The Financial Post.
  11. ^ "Startup of the Week - LoginRadius". The Calgary Herald.
  12. ^ Jani, Shruti (2019-04-30). "LoginRadius and the Start Up Story". TechStory. Retrieved 2024-03-05.
  13. ^ Mathur, Nandita (2019-06-09). "Startups that make travel safe, fun for women, help manage client identities". mint. Retrieved 2024-03-05.
  14. ^ "Video: How did you find your first customers?". The Edmonton Journal.
  15. ^ Mishra, Anupama; Gupta, Brij B.; Gupta, Deepak (2018-11-19), "Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime", Computer and Cyber Security, Auerbach Publications, pp. 627–648, doi:10.1201/9780429424878-24, ISBN 978-0-429-42487-8, S2CID 169519907, retrieved 2024-03-05
  16. ^ Gupta, Brij B.; Perez, Gregorio Martinez; Agrawal, Dharma P.; Gupta, Deepak, eds. (December 2019). Handbook of Computer Networks and Cyber Security. Springer International Publishing. doi:10.1007/978-3-030-22277-2. ISBN 978-3-030-22276-5. S2CID 209510027.
  17. ^ a b "Exclusive insights of Deepak Gupta, Co-founder of LoginRadius - Valuetainment". valuetainment.com. 2021-07-08. Retrieved 2024-03-05.
  18. ^ Khan, Ahmed (2015-07-05). "W. G. Ganpat and W.-A. P. Isaac (eds): Impacts of Climate Change on Food Security in Small Island Developing States". Regional Environmental Change. 15 (7): 1393–1394. Bibcode:2015REnvC..15.1393K. doi:10.1007/s10113-015-0836-8. ISSN 1436-3798. S2CID 154842606.
  19. ^ "Deepak Gupta - Author Biography". Entrepreneur. Retrieved 2024-03-05.
  20. ^ a b "Method and system for defense against Distributed Denial-of-Service attack". scholar.google.com. Retrieved 2024-03-05.
  21. ^ a b "Method and system of performing a fine-grained searchable encryption for resource-constrained devices in m-health network". scholar.google.com. Retrieved 2024-03-05.
  22. ^ "IP Australia: AusPat Disclaimer". pericles.ipaustralia.gov.au. Retrieved 2024-03-05.
  23. ^ AU2021102048A4, Castiglione, Aniello; Gupta, Brij Bhooshan & Gupta, Deepak et al., "Method and system of performing a fine-grained searchable encryption for resource-constrained devices in m-health network", issued 2021-06-10 
  24. ^ "IP Australia: AusPat Disclaimer". pericles.ipaustralia.gov.au. Retrieved 2024-03-05.