Research Fellows - Awarded
S. No. | Name | Research Topic | Supervisor/s | Contact Details |
---|---|---|---|---|
48 | Medikonda Asha Kiran | Security and Privacy in Cloud assisted IoT | Dr. P. Syam Kumar |
Assistant Professor, Department of Artificial Intelligence and Machine Learning, Chaitanya Bharathi Institute of Technology, Gandipet, Hyderabad-500075 Mail: ashakiran2@gmail.com |
47 | P. V. Shalini | Detection and Mitigation of DDoS Attacks in SDN using Statistical Techniques | Dr. V. Radha | Mail: pvshalini@gmail.com |
46 | Narottam Das Patel | Statistical Machine Learning based Approaches for Developing Robust Intrusion Detection Systems | Dr. B. M. Mehtre |
Assistant Professor, School of Computing Science (SCSE) VIT Bhopal University Kotri Kalan, Ashta, Near, Indore Road, Bhopal, Madhya Pradesh - 466114 Mail: narottamdaspatel@vitbhopal.ac.in |
45 | S. Manimaran | Sensor based threats mitigation and sensor data security in Smartphones and Wearable Devices | Dr. V. N. Sastry |
Assistant Professor, Department of CSE VIT-AP University, Amaravathi Vijayawada - 522237, Andhra Pradesh. Mail: smaran.1989@gmail.com |
44 | Srinadh Swamy Majeti | Metric for Mobile Security and Application Testing | Dr. N. P. Dhavale |
Senior Assistant Professor, Keshav Memorial Institute of Technology, 11-16-26, Vedantham vari street, Railpet, Repalle, Bapatla (Dst), Andhra Pradesh - 522265 Mail: srinadhswamy.majeti@kmit.edu.in |
43 | K. Suresh | Cryptographic key Generation from Fingerprint Biometrics using Gray Code for Secure Storage and Secure Communication | Dr. Rajarshi Pal |
Assistant Professor, K P R Institute of Engineering and Technology, Avinashi - Coimbatore Road, Arasur, Uthupalayam, Tamil Nadu - 641407 Mail: suresh.k@kpriet.ac.in |
42 | Malvika Singh | Behavioral Research in Cyber Security | Dr. B. M. Mehtre |
Software Engineer Renesas Electronics Pvt. Ltd. Mail: singh23malvika23@gmail.com |
41 | Mukku Nisanth Kartheek | Texture based Feature Extraction Strategies for Facial Expression Recognition | Dr. M. V. N. K. Prasad |
Asst. Professor, Department of CSE GITAM University Hyderabad - 502329 Mail: nisanthkartheek@gmail.com; nmukku@gitam.edu |
40 | V. Uma Sankara Rao | Privacy-Preserving Ciphertext-Policy Attribute-Based Search over Encrypted Data in Cloud Storage | Dr. P. Syam Kumar |
Assistant Professor, Department of CSE SRM University, Andhra Pradesh Neerukonda, Mangalagiri Mandal, Guntur District, Mangalagiri, Andhra Pradesh 522240 Mail: shankarit54@gmail.com |
39 | Potluri Avinash | Some Strategies for Optimizing Communication Costs in MapReduce to execute Spatial and Graph queries | Dr. N. V. Narendra |
Assistant Professor, CSE, ITER - Siksha 'O' Anusandhan, Bhubaneswar. Mail: potluri.avinash1@gmail.com |
38 | Dorsala Mallikarjun Reddy | Blockchain-based Fair Payment Protocols for Cloud Services | Prof. V. N. Sastry |
Blockchain Researcher Mckinley Rice, Noida Indiqube, Tower B, 9th floor, Logix Cyber Park C-28 & 29, C Block, Phase 2, Industrial Area, Sector 62, Noida, Uttar Pradesh - 201301 Mail: Mallikarjun.reddy[at]mckinleyrice.com |
37 | Nunna Satya Krishna | Learning Extreme Data Characteristics with Novel Machine Learning Models | Dr. N. V. Narendra |
Assistant Professor, Dept. of IT VR Siddhartha Engineering College, Vijayawada Mail: satya.krishna.nunna[at]gmail[dot]com |
36 | G. Jaya Rao | Secure public auditing schemes for shared data with user revocation in cloud storage | Dr. P. Syam Kumar |
Assistant Professor, Department of CSE VNRVJIET, Bachupally, Hyderabad. Mail: jaysonjoel007007[at]gmail[dot]com |
35 | S K Kamaruddin | Big Data Analytics and Applications | Prof. V. Ravi |
Data Scientist, SAGE Informatics India Pvt. Ltd. A 101, Godavari Apartments, Begumpet, Hyderabad - 500016 Telangana Mail: skkamaruddin[at]gmail[dot]com |
34 | V. Manoj Kumar | Efficient Authentication Protocols for Distributed Mobile Cloud and IoT Environment | Prof. V. N. Sastry |
Assistant Professor, School of Computer Science and Engineering (SCOPE), Vellore Institute of Technology (VIT)-AP University, H. C - 456, Annanagar, Navalpattu, Trichy, Pincode: 620026. Mail: vmanojk88[at]gmail[dot]com |
33 | S. Sridhar Raj | Clustering based Unsupervised Person Re-identification Techniques for Multi-camera Surveillance System | Dr. M. V. N. K. Prasad |
Assistant Professor (Senior) School of Computer Science and Engineering (SCOPE), Vellore Institute of Technology (VIT), Vellore - 632014 Mail: sridharraj[dot]s[at]vit[dot]ac[dot]in |
32 | John Paul C. I | Feature based Representational Structures for Time Series | Dr. M. V. N. K. Prasad |
Assistant professor Information science and engineering dept. The national institute of engineering, Mysuru, Karnataka Mail: johnpaulci[at]nie[dot]ac[dot]in |
31 | Gutha Jaya Krishna | Evolutionary Computing applied to solve some Analytical and Operational problems in Banking, Financial Services and Insurance | Prof. V. Ravi |
Assistant Professor, Centre for Innovation and Technology Administrative Staff College of India, Bella Vista, Raj Bhavan Road, Hyderabad - 500 082., Telangana, INDIA, Mail : gjayakrishna@asci(dot)org(dot)in |
30 | Morampudi Mahesh Kumar | Reliable and Privacy-preserving Iris Remote Authentication Techniques | Dr. M. V. N. K. Prasad |
Associate Professor, BVRIT, Hyderabad Mail : maheshkumarm[dot]bvrithyderabad[at]edu.in |
29 | Ravi Uyyala | Prediction Error Expansion (PEE) Based Reversible Watermarking for Images | Dr. Rajarshi Pal |
Associate Professor, ACE Engineering College, Hyderabad Mail : uyyala[dot]ravi[at]gmail.com |
28 | P. Praveen Kumar | Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Schemes for Big Data Access Control in Cloud Storage | Dr. P. Syam Kumar |
Assistant Professor, Department of Information Technology, Kamaraj College of Engineering and Technology, Madurai Mail: tvp[dot]praveen[at]gmail[dot]com |
27 | Sriramulu Bojjagani | Formal Methods for Secure Mobile Payment Protocols | Prof. V. N. Sastry |
Assistant Professor, SRM University, AP Amravati - 522502 Mail: sriramulu[dot]b[at]srmap[dot]edu[dot]in |
26 | Anup Kumar Maurya | Security and Routing Aspects in Wireless Sensor Networks | Prof. V. N. Sastry |
Assistant Professor, Goa Institute of Management, Goa - 403505 Mail: anup[at]gim[dot]ac[dot]in |
25 | Sitara K | Video and Camera Tamper Detection Techniques for Securing Video Surveillance Systems | Prof. B. M. Mehtre |
Assistant Professor, Department of Computer Science & Engineering, National Institute of Technology(NIT) Tiruchirappalli - 620015 Mail: sitara[at]nitt[dot]edu |
24 | Manu V T | Image Tamper Detection Techniques for Social Media | Prof. B. M. Mehtre |
Associate Professor, Department of CSE, Vel Tech Rangarajan Dr.Sagunthala R & D Institute of Science and Technology, No.42, Avadi-Vel Tech Road, Vel Nagar, Avadi, Chennai – 600 062, Tamil Nadu, India. Mail: drmanuvt[at]veltech[dot]edu[dot]in |
23 | V Dinesh | Next Generation Smart Data Centers | Dr. G. R. Gangadharan |
Researcher, GTO- Foundational Research, Cognizant Technology Solutions, Hyderabad-81, Telangana Mail: dineshvemula[at]gmail[dot]com |
22 | Kumar Ravi | Social Media Analytics, Ontology, and Machine Learning | Prof. V. Ravi |
Senior Data Scientist (Technical Architect) HCL Technologies Ltd Mail: kumar_ravi66[at]yahoo[dot]co[dot]in |
21 | B. Shravan Kumar | Unstructured Data Mining | Prof. V. Ravi |
Chief Manager, Adithya Birla Capital, Mumbai Mail: bangaaris[at]gmail[dot]com |
20 | Jatoth Chandrashekar | QoS-aware Web Service Composition using Computational Intelligence Techniques | Dr. G. R. Gangadharan |
Assistant Professor, Dept. of Computer Science & Engineering, NIT, Hamirpur Hamirpur (H. P) -177005, India Mail: jcs[at]nith[dot]ac[dot]in |
19 | Deepnarayan Tiwari | Cryptography Method for the Cloud Computing | Dr. G. R. Gangadharan |
Manager- Full Stack Developer, ReBIT, 18th Floor, CyberOne, Opposite CIDCO Exhibition Center, Sector 30, Vashi, Navi Mumbai 400703 Mail: deepnarayan.tiwari[at]rebit.org[dot]in |
18 | Pradeep Kumar Dadabada | Time Series Data Mining: Applications to Banking | Prof. V. Ravi |
Assistant Professor, Indian Institute of Management, Shillong Email: dpradeep1982[at]gmail[dot]com |
17 | Ghanshyam Bopche | Attack Graph based Approach to Network Hardening | Prof. B. M. Mehtre |
Assistant Professor, Department of Computer Applications, NIT Tiruchirappalli Tamil Nadu, India - 620015 Mail: bopche[at]nitt[dot]edu |
16 | Gopal Narayan Rai | Modelling and Verification of Web Services using Recursive Composition Algebra | Dr. G. R. Gangadharan |
Sr. Technical Lead, Collins Aerospace (An RTX Business), 302, II Block, RV Brindavanam, Miyapur, Hyderabad, Telangana - 500049. Mail: gopalnrai[at]gmail[.]com |
15 | Hiran V Nath | Malware Surveillance for Cyber Defense | Dr. B. M. Mehtre |
Assistant Professor, CSED, National Institute of Technology Calicut, Kerala Mail: hiranvnath[at]nitc[dot]ac[dot]in |
14 | M. Sandhya | Novel Methods for Protecting Fingerprint Templates | Dr. M. V. N. K. Prasad |
Assistant Professor, Dept. of Computer Science & Engineering, National Institute of Technology, Warangal Warangal - 506004, Telangana Mail: msandhya[at]nitw[dot]ac[dot]in |
13 | Ilaiah Kavati | Biometric Indexing | Dr. M.V.N.K. Prasad & Prof. Chakravarthy Bhagvati |
Assistant Professor, National Institiute of Technology, Warangal Mail: kavati089[at]gmail[dot]com |
12 | Nenavath Srinivas Naik | Scheduling Approaches to Enhance Map Reduce Performance in Heterogeneous Environments | Prof. V. N. Sastry & Prof. Atul Negi |
Assistant Professor Dept. of Computer Science and Engineering, IIIT Naya Raipur Flat No. 403, 120 Building, Faculty Quarters, IIIT–Naya Raipur, Sector 24, Near Purkhoti Muktangan, Atal Nagar – 493661 Chhattisgarh. Mail: srinu[at]iiitnr[dot]edu[dot]in |
11 | Akhter Mohiuddin Rather | Neural Networks and Genetic Algorithms based Approach for Stok Prediction and Portfolio Selection | Prof. V. N. Sastry & Prof. Arun Agarwal |
Associate Professor Machine learning & Data Sciences Great Lakes Institute of Management, Gurgaon - 122413 Email: akhter.m[at]greatlakes[dot]edu[dot]in |
10 | Shaik Shakeel Ahamad | Development of Secure Electronic Payment Protocols in Wireless Environment with Formal Verification | Dr. V.N.Sastry & Dr.Siba K. Udgata |
Assistant Professor, IT Dept & Certified EC-Council Instructor (CEI) Majmaah University, Kingdom of Saudi Arabia Email: s[dot]ahamad[at]mu[dot]edu[dot]sa |
9 | N. Naveen | Rule Extraction from Global Optimization Techniques |
Dr. V. Ravi & Prof. C. Raghavendra Rao |
Asst Professor, SCIS, University of Hyderabad Hyderabad - 500046 Mail: naveen[dot]nekuri[at]gmail.com |
8 | A. Kavitha | Efficient Approaches to Mutual Authentication and Key Agreement in Wireless Communication Networks |
Dr. V.N. Sastry & Dr. Atul Negi |
Senior Cyber Professional, GE, India Mail: akdina[at]gmail[dot]com |
7 | T. M. Padmaja | Class Prediction from Highly Overlapped and Imblanced Data Sets |
Dr. P.Radha Krishna & Dr. S.Bapi Raju |
Associate Professor, Vignan Institute of Technology and Science, Hyderabad - 508284 Mail: drpadmaja[at]vignanits[dot]ac[dot]in |
6 | Md. Abdul Haque Farquad | Rule Extraction from Neural Networks |
Dr. V.Ravi & Dr. S.Bapi Raju |
Senior Associate Professor, SR International Institute of Technology, Telangana - 501301 Mail: farquadonline[at]gmail[dot]com |
5 | G. Geetha Kumari | Access Control Modeling for Grid Computing Systems |
Dr. V. N. Sastry & Dr. Atul Negi |
Associate Professor, BITS Pilani Campus, Hyderabad - 500078 Mail: geetha[at]hyderabad[dot]bits-pilani[dot]co[dot]in |
4 | Pradeep Kumar | An Investigation of Classification and Clustering of Sequential Data |
Dr. P.Radha Krishna & Dr. S.Bapi Raju |
Associate Professor, Indian Institute of Management, Lucknow Lucknow - 226013 Mail : pradeepkumar[at]iiml[dot]ac[dot]in |
3 | Sanjay Rawat | Efficient Data Mining Algorithms for Intrusion Detection |
Dr. V. P. Gulati & Prof. A. K. Pujari |
Assistant Professor, IIIT Hyderabad Prof. CR Rao Road, Gachibowli, Hyderabad - 500 032, Telangana Mail: sanjayr[at]ymail[dot]com |
2 | Manik Lal Das | Design and Analysis of Authentication Techniques |
Dr. A.Saxena & Prof. D. B. Phatak |
Professor, Dhirubhai Ambani Institute of Information and Communication Technology, (DA-IICT) Office: 2103, Faculty Block 2, DA-IICT, Gandhinagar - 382007, Gujarat, India. Mail: maniklal_das[at]daiict[dot]ac[dot]in |
1 | V. Ravi Shankar | Coding Schemes for Digital Fingerprinting and Traitor Tracing |
Dr V.P.Gulati, Dr. A.Saxena & Prof. A.K.Pujari |
IT Security Professional, Wipro |