Research Publications 2020-2021

Papers Published in Journals
Vivekanandan, M., V. N., S. & U., S.R. BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. Peer-to-Peer Netw. Appl. 14, 403–419 (2021).  https://doi.org/10.1007/s12083-020-00963-w
Manojkumar Vivekanandan, Sastry, V. N., & Srinivasulu Reddy U. 2021, Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment, 1572-1595, Volume 14, Issue 3, Peer-to-Peer Network Applications Journal, SCIE indexed, February 24, 2021, Springer. DOI: https://doi.org/10.1007/s12083-020-01065-3
Dorsala, Mallikarjun Reddy, V. N. Sastry, and Sudhakar Chapram. “Fair payments for privacy-preserving aggregation of mobile crowdsensing data.” Journal of King Saud University-Computer and Information Sciences. February 05, 2021. Science Direct. DOI:  https://doi.org/10.1016/j.jksuci.2021.01.009
Manojkumar Vivekanandan, Sastry, V. N., & Srinivasulu Reddy U. 2021, MAPM- CECCM: A Mutual Authentication Protocol for Mobile Cloud Environment using Chebyshev Chaotic Map. Telecommunication System Journal, SCIE indexed, (Accepted: 12 June 2021), Springer. DOI: https://doi.org/10.1007/s11235-021-00809-7
Gutha Jaya Krishna, Vadlamani Ravi, High utility itemset mining using binary differential evolution: An application to customer segmentation, Expert Systems with Applications, Volume 181, 2021, 115122, ISSN 0957-4174. April 29, 2021. Elsevier. DOI: https://doi.org/10.1016/j.eswa.2021.115122
Gutha Jaya Krishna, Vadlamani Ravi, Mining top high utility association rules using Binary Differential Evolution, Engineering Applications of Artificial Intelligence, Volume 96, 2020, 103935, ISSN 0952-1976. September 18, 2020. Elsevier. DOI: https://doi.org/10.1016/j.engappai.2020.103935
Shaik, T. Huq, Ravi, V. & Deb, K, Evolutionary Multi-Objective Optimization Algorithm for Community Detection in Complex Social Networks. SN COMPUT. SCI. 2, 1. November 07, 2020. Springer. DOI:  https://doi.org/10.1007/s42979-020-00382-x
Kamaruddin, Sk., Ravi, V., EGRNN++ and PNN++: Parallel and Distributed Neural Networks for Big Data Regression and Classification SN Computer Science 2, 109. February 20, 2021. Springer. DOI:  https://doi.org/10.1007/s42979-021-00504-z
Johnpaul C.I, Munaga V.N.K. Prasad, S. Nickolas and G.R. Gangadharan (2019). General representational automata using deep neural networks. Data & Knowledge Engineering, Elsevier, 122, 159–180, July 2019. DOI: https://doi.org/10.1016/j.datak.2019.06.004
Morampudi, Mahesh Kumar, Munaga VNK Prasad, Mridula Verma, and U. S. N. Raju. “Secure and verifiable iris authentication system using fully homomorphic encryption.” Computers & Electrical Engineering 89 (2021): 106924. November 23, 2020. Elsevier. DOI: https://doi.org/10.1016/j.compeleceng.2020.106924
Morampudi, Mahesh Kumar, Munaga VNK Prasad, and U. S. N. Raju. “Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor.” Applied Intelligence (2021): 1-14. February 15, 2021. Springer. DOI: https://doi.org/10.1007/s10489-021-02187-8
Morampudi, Mahesh Kumar, Munaga VNK Prasad, and Surya Narayana Raju Undi. “SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain.” IET Biometrics, May 12, 2021. DOI: https://doi.org/10.1049/bme2.12042
Sridhar Raj S, M.V.N.K.Prasad, Ramadoss Balakrishnan, “Spatial Segment-aware Clustering based Dynamic Reliability Threshold Determination (SSC-DRTD) for Unsupervised Person Re-identification”, Expert Systems with Applications, vol.170, 114502. December 24, 2020. Elsevier. DOI: https://doi.org/10.1016/j.eswa.2020.114502
Johnpaul C.I, Munaga V.N.K. Prasad, S. Nickolas and G.R. Gangadharan. Representational Primitives using Trend based Global Features for Time Series Classification, Expert Systems with Applications, 167, 114376. November 26, 2020. Elsevier. DOI: https://doi.org/10.1016/j.eswa.2020.114376
Johnpaul C.I, Munaga V.N.K. Prasad, S. Nickolas, G.R. Gangadharan; Fuzzy Representational Structures for Trend based Analysis of Time Series Clustering and Classification, Knowledge Based Systems, Vol.222, p. 106991, 2021. [IF: 8.08] March 26, 2021.  Elsevier. DOI: https://doi.org/10.1016/j.knosys.2021.106991
Srinadh Swamy Majeti, Barnabas Janet, Narendra P Dhavale, “Security capability maturity model for mobile applications”, IJMA, vol. 9, no. 4, pp. 815-843, December. 2020. International Journal of Modern Agriculture. DOI:  http://modern-journals.com/index.php/ijma/article/view/443
Srinadh Swamy Majeti, Barnabas Janet, Narendra P Dhavale, “Attribute based usability metric framework for mobile applications”, International Journal of Future generation communication and networking, Vol. 14, no. 1, pp: 1298-1306. 2021. International Journal of Future Generation Communication and Networking. May 01, 2021. http://sersc.org/journals/index.php/IJFGCN/article/view/36198
Bhandari, A., Sharma, S., Uyyala, R., Pal, R., Verma, M.: Reversible data hiding using multi-layer perceptron based pixel prediction. In: Proceedings of 11th International Conference on Advances in Information Technology, Bangkok, Thailand. ACM. July 2020. DOI: https://doi.org/10.1145/3406601.340 6616
Narendra Kumar, N.V., Thakur, Abhishek, Raghuraj, G. and Lalit Mohan, S. (2020, December 1). The payment systems revolution: India’s story. In the Journal of Payments Strategy & Systems, Volume 14, Issue 4. https://www.henrystewartpublications.com/jpss/v14
Nunna Satya Krishna, Bhattu N, Somayajulu D.V.L.N. and N. V. Narendra Kumar. “Structure Sensitive Graph-based Multiple-Instance Semi-Supervised Learning”, Sādhanā. 46, 156. (Accepted: May 31, 2021). DOI: https://doi.org/10.1007/s12046-021-01659-4
Avinash Potluri, S. Nagesh Bhattu, N. V. Narendra Kumar, and R. B. V. Subramanyam, 2020. An Empirical Study on the Significance of Node Ordering for Computing Cliques using Map Reduce. Solid State Technology, 63(1), pp.145-164. http://solidstatetechnology.us/index.php/JSST/article/view/260
Jaya Rao Gudeme, Syam Kumar Pasupuleti, Ramesh Kandukuri, Certificateless Multi-replica public integrity auditing scheme for dynamic shared data in cloud storage, Computers & Security, Elsevier, Volume 103, 2021, 102176, ISSN 0167-4048, January 04, 2021. Elsevier. DOI: https://doi.org/10.1016/j.cose.2020.102176
Varri, U.S., Pasupuleti, S.K. & Kadambari, K.V. CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage. Peer-to-Peer Netw. Appl. Springer, 14, 1290–1302. January 29, 2021. Springer. DOI: https://doi.org/10.1007/s12083-020-01057-3
Jaya Rao Gudeme, Syamkumar Pasupuleti, Ramesh Kandukuri: Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage, Journal of Parallel and Distributed Computing, Elsevier, Volume 156,2021, Pages 163-175, ISSN 0743-7315, June 05, 2021, DOI: https://doi.org/10.1016/j.jpdc.2021.06.001
Gudeme, J.R., Pasupuleti, S.K. & Kandukuri, R.: Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage. J Ambient Intell Human Computing 12, 2019–2032. July 16, 2020. Springer. DOI: https://doi.org/10.1007/s12652-020-02302-6
Narendra Kumar, N.V., Thakur, Abhishek, Raghuraj, G. and Lalit Mohan, S. (2020, December 1). The payment systems revolution: India’s story. In the Journal of Payments Strategy & Systems, Volume 14, Issue 4, https://www.henrystewartpublications.com/jpss/v14
Morampudi, M. K., Prasad, M. V., Verma, M., & Raju, U. S. N. (2020). Secure and verifiable iris authentication system using fully homomorphic encryption. Computers & Electrical Engineering, 89, 106924. Impact Factor: 3.818. November 23, 2020. Elsevier. DOI: https://doi.org/10.1016/j.compeleceng.2020.106924
Papers Published in Conferences
Manojkumar Vivekanandan, Sastry, V. N., & Srinivasulu Reddy U. 2021, MAPM- CECCM: A Mutual Authentication Protocol for Mobile Cloud Environment using Chebyshev Chaotic Map (Accepted: June 12, 2021), DOI: https://doi.org/10.1007/s11235-021-00809-7
V. Sarveswararao and V. Ravi, “Chaos, Machine Learning and Deep Learning based Hybrid to forecast Consumer Price Index Inflation in India,” 2020 IEEE Symposium Series on Computational Intelligence (SSCI), 2020, pp. 2551-2557. December 01-04, 2020. IEEE Xplore. DOI: 10.1109/SSCI47803.2020.9308309
Vishnuvardhan G., Ravi V. (2021) Face Recognition Using Transfer Learning on Facenet: Application to Banking Operations. In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 956. Springer, Cham.  April 27, 2021. Springer.  DOI: https://doi.org/10.1007/978-3-030-68291-0_23
Ali B., Ravi V., Bhushan C., Santhosh M.G., Shiva Shankar O. (2021) Chatbot via Machine Learning and Deep Learning Hybrid. In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 956. Springer, Cham, April, 2021. DOI: https://doi.org/10.1007/978-3-030-68291-0_19
Sarveswararao V., Ravi V. Prediction Intervals for Macroeconomic Variables Using LSTM Based LUBE Method. In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 956. Springer, Cham. 27 April, 2021. DOI: https://doi.org/10.1007/978-3-030-68291-0_20
Ali B., Ravi V.  Deep Learning Chatbot with Feedback. In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, Vol 956. Springer, Cham.  April 27, 2021. Springer. DOI: https://doi.org/10.1007/978-3-030-68291-0_24
Vishnuvardhan G., Ravi V., Santhosh M. (2021) Intelligent Character Recognition with Shared Features from Resnet. In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 956. Springer, Cham. April 27, 2021. Springer. DOI: https://doi.org/10.1007/978-3-030-68291-0_21
Singh, Malvika, Babu M. Mehtre, and S. Sangeetha. “User Behaviour based Insider Threat Detection in Critical Infrastructures.” In 2021 IEEE 2nd International Conference on Secure Cyber Computing and Communications (ICSCCC), IEEE, 21-23 May, 2021. DOI: 10.1109/ICSCCC51823.2021.9478137
ND Patel, BM Mehtre, Rajeev Wankar, “Spoofed packet detection and prevention mechanism”, 1st International Conference on Nanoelectronics, Machine Learning, Internet of Things & Computing Systems, Springer, 7th March 2021
Johnpaul C.I, Munaga V.N.K. Prasad, S. Nickolas, G.R. Gangadharan and Aiello M (2021). An Optimal Wavelet Detailed-Coefficient Determination Using Time-Series Clustering. Advances in Artificial Intelligence and Data Engineering. Advances in Intelligent Systems and Computing, 1133,857–872, Springer, Mangaluru, Karnataka. (Scopus) August 14, 2020. Springer. DOI: https://doi.org/10.1007/978-981-15-3514-7_63
Srinadh Swamy Majeti, Barnabas Janet, N. P. Dhavale: Analysis of inappropriate usage of cryptographic primitives in Indian mobile financial applications” in Proceedings of International Conference on Computational Intelligence and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 56. Springer, Singapore, Print ISBN: 978-981-15-8766-5, (Published: December 21, 2020). DOI: https://doi.org/10.1007/978-981-15-8767-2_19
Shalini, P. V., V. Radha, and Sriram G. Sanjeevi. “DDoS Attack Detection in SDN Using CUSUM.” In Proceedings of International Conference on Computational Intelligence and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 56. Springer, Singapore, pp. 301-309, (Published: December 21, 2020). DOI: https://doi.org/10.1007/978-981-15-8767-2_26
Aramanda A., Md. Abdul S., Vedala R. (2021) A Comparison Analysis of Collaborative Filtering Techniques for Recommeder Systems. In: Kumar, A., Mozar, S. (eds) ICCCE 2020. Lecture Notes in Electrical Engineering, vol 698. Springer, Singapore. DOI: https://doi.org/10.1007/978-981-15-7961-5_9
Dansena, P., Bag, S., Pal, R.: Generation of synthetic data for hand-written word alteration detection. IEEE Access, 9, pages 38979-38990, (Published: February 12, 2021), https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9354159
Bhandari, A., Sharma, S., Uyyala, R., Pal, R., Verma, M.: Reversible data hiding using multi-layer perceptron based pixel prediction. In: Proceedings of 11th International Conference on Advances in Information Technology, Bangkok, Thailand. July 01, 2020. ACM Digital Library. DOI: https://doi.org/10.1145/3406601.3406616
Uyyala, R., Pal, R.: Reversible data hiding with selected directional context based prediction using 8-neighborhood. In: Proceedings of 6th International Conference on Electronics, Computing, and Communication Technologies, Bangalore, pages 219-224. July 02-04, 2020. IEEE Xplore. DOI: 10.1109/CONECCT50063.2020.9198609
B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar: Towards Unifying RBAC with Information Flow Control. SACMAT 2021: 45-54. June 11, 2021. ACM Digital Library. DOI: https://doi.org/10.1145/3450569.3463570
Avinash Potluri and N.V. Narendra Kumar 2021. Context-aware Multi-data Fusion to Achieve Finest Ride-share Schedule Using Big Data. IOP Conference Series: Materials Science and Engineering, Volume 1074, International Conference on Computer Vision, (February 2021). ProQuest. https://iopscience.iop.org/article/10.1088/1757-899X/1074/1/012013
Vamshi, G. J. Rao, S. K. Pasupuleti and R. Eswari, “EPF-CLPA: An Efficient Pairing-Free Certificateless Public Auditing for Cloud-based CPS,” 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021, pp. 48-54, May 06-08, 2021. IEEE Xplore. DOI: 10.1109/ICICCS51141.2021.9432204
Uma Sankararao Varri, Syam Kumar Pasupuleti and Kv Kadambari, Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing, Accepted for presentation in 20th IEEE CCGrid-2020. Melbourne, Victoria, Australia. May11-14, 2020. IEEE Xplore.  DOI: 10.1109/CCGrid49817.2020.00-48
Bhandari, A., Sharma, S., Uyyala, R., Pal, R., Verma, M.: Reversible Data Hiding Using Multi-Layer Perceptron Based Pixel Prediction, Proceedings of the 11th International Conference on Advances in Information Technology, 1–8. ACM, July 01-03, 2020. DOI: https://doi.org/10.1145/3406601.3406616
P. Jain, M. Verma and K. K. Shukla, “Convergence Rate Analysis of Viscosity Approximation based Gradient Algorithms,” 2020 International Joint Conference on Neural Networks (IJCNN), 2020, pp. 1-6. July 19-24, 2020. IEEE Xplore. DOI: 10.1109/IJCNN48605.2020.9207456
Somorjit, L., Verma, M. (2020). Variants of Generative Adversarial Networks for Credit Card Fraud Detection. In: Kar, N., Saha, A., Deb, S. (eds) Trends in Computational Intelligence, Security and Internet of Things. ICCISIoT 2020. Communications in Computer and Information Science, vol 1358. Springer, Cham. https://doi.org/10.1007/978-3-030-66763-4_12
Book Chapter
Kamaruddin, S., Ravi, V.: Big Data Analytics: Survey of algorithms, data mining tasks, and applications Handbooks on Big Data, IET, UK.
Kamaruddin, S., Ravi, V.: PRBFN: A Parallel and Distributed Radial Basis Function Network for Regression and Classification in Big Data Paradigm. Handbooks on Big Data, IET, UK. October 29, 2019, Springer.
Majeti Srinadh, Swamy, Barnabas. Janet, and N. P. Dhavale: Usability Evaluation of COVID-19 mobile apps using SUS (System Usability Scale)”, “HCI and Beyond: Advances Towards Smart and Interconnected Environments”, 2020, Bentham Science Publishers.
Sengupta, A., Roy, D.: Securing dedicated DSP Coprocessors (Hardware IP) using Structural Obfuscation for IoT-oriented platforms. CRC Book, Taylor & Francis “Security of Internet of Things Nodes Challenges, Attacks, and Countermeasures”, 2020, (Eds.Chinmay Chakrabarty, Sree Ranjani Rajendran, Rajat Subhra Chakraborty, Muhammad Habib ur Rehman)