Research Publications 2020-2021
Papers Published in Journals | ||||
---|---|---|---|---|
Vivekanandan, M., V. N., S. & U., S.R. “BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology”. Peer-to-Peer Network Applications Journal. Volume 14, 403–419 (2021).
DOI:https://doi.org/10.1007/s12083-020-00963-w |
||||
Manojkumar Vivekanandan, Sastry, V. N., & Srinivasulu Reddy U., “Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment”, Peer-to-Peer Network Applications Journal, February 24, 2021, Springer.
DOI: https://doi.org/10.1007/s12083-020-01065-3 |
||||
Dorsala, Mallikarjun Reddy, V. N. Sastry, and Sudhakar Chapram. “Fair payments for privacy-preserving aggregation of mobile crowdsensing data.” Journal of King Saud University-Computer and Information Sciences. February 05, 2021. Science Direct. DOI: https://doi.org/10.1016/j.jksuci.2021.01.009 |
||||
Manojkumar Vivekanandan, Sastry, V. N., & Srinivasulu Reddy U., “MAPM- CECCM: A Mutual Authentication Protocol for Mobile Cloud Environment using Chebyshev Chaotic Map”. Telecommunication System Journal, 2021, Springer. DOI: https://doi.org/10.1007/s11235-021-00809-7 |
||||
Gutha Jaya Krishna, Vadlamani Ravi, “High utility itemset mining using binary differential evolution: An application to customer segmentation”, Expert Systems with Applications, Volume 181, 2021, 115122, ISSN 0957-4174. Elsevier. DOI: https://doi.org/10.1016/j.eswa.2021.115122 |
||||
Gutha Jaya Krishna, Vadlamani Ravi, “Mining top high utility association rules using Binary Differential Evolution”, Engineering Applications of Artificial Intelligence, Volume 96, 2020, 103935, ISSN 0952-1976.. Elsevier. DOI: https://doi.org/10.1016/j.engappai.2020.103935 |
||||
Shaik, T. Huq, Ravi, V. & Deb, K, “Evolutionary Multi-Objective Optimization Algorithm for Community Detection in Complex Social Networks”. SN Computer Science. Volume 2, Issue 1, 2020. Springer. DOI: https://doi.org/10.1007/s42979-020-00382-x | ||||
Kamaruddin, Sk., Ravi, V., “EGRNN++ and PNN++: Parallel and Distributed Neural Networks for Big Data Regression and Classification”, SN Computer Science, Volume 2, 2021, Springer. DOI: https://doi.org/10.1007/s42979-021-00504-z | ||||
Johnpaul C.I, Munaga V.N.K. Prasad, S. Nickolas and G.R. Gangadharan, “General representational automata using deep neural networks”. Data & Knowledge Engineering, Elsevier, 122, 159–180, July 2019. DOI: https://doi.org/10.1016/j.datak.2019.06.004 | ||||
Morampudi, Mahesh Kumar, Munaga VNK Prasad, Mridula Verma, and U. S. N. Raju. “Secure and verifiable iris authentication system using fully homomorphic encryption”, Computers & Electrical Engineering 89 (2021): 106924. Elsevier. DOI: https://doi.org/10.1016/j.compeleceng.2020.106924 |
||||
Morampudi, Mahesh Kumar, Munaga VNK Prasad, and U. S. N. Raju. “Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor”, Applied Intelligence (2021): 1-14, Springer. DOI: https://doi.org/10.1007/s10489-021-02187-8 | ||||
Morampudi, Mahesh Kumar, Munaga VNK Prasad, and Surya Narayana Raju Undi. “SviaB: Secure and verifiable multi‐instance iris remote authentication using blockchain.” IET Biometrics, 2021. DOI: https://doi.org/10.1049/bme2.12042 | ||||
Sridhar Raj S, M.V.N.K.Prasad, Ramadoss Balakrishnan, “Spatial Segment-aware Clustering based Dynamic Reliability Threshold Determination (SSC-DRTD) for Unsupervised Person Re-identification”, Expert Systems with Applications, vol.170, 114502. 2020, Elsevier. DOI: https://doi.org/10.1016/j.eswa.2020.114502 |
||||
Johnpaul C.I, Munaga V.N.K. Prasad, S. Nickolas and G.R. Gangadharan. “Representational Primitives using Trend based Global Features for Time Series Classification”, Expert Systems with Applications, 167, 114376, 2020. Elsevier. DOI: https://doi.org/10.1016/j.eswa. 2020.114376 | ||||
Johnpaul C.I, Munaga V.N.K. Prasad, S. Nickolas, G.R. Gangadharan; “Fuzzy Representational Structures for Trend based Analysis of Time Series Clustering and Classification”, Knowledge Based Systems, Vol.222, p. 106991, 2021, Elsevier. DOI: https://doi.org/10.1016/j. knosys.2021.106991 |
||||
Srinadh Swamy Majeti, Barnabas Janet, Narendra P Dhavale, “Security capability maturity model for mobile applications”, International Journal of Modern Agriculture, vol. 9, no. 4, pp. 815-843, December 2020. DOI: http://modern-journals.com/index.php/ijma/article/view/443 | ||||
Srinadh Swamy Majeti, Barnabas Janet, Narendra P Dhavale, “Attribute based usability metric framework for mobile applications”, International Journal of Future generation communication and networking, Vol. 14, no. 1, pp: 1298-1306. 2021. DOI: http://sersc.org/journals/index.php/IJFGCN/article/view/36198 |
||||
Dansena, P., Bag, S., Pal, R.: “Generation of synthetic data for hand-written word alteration detection”. IEEE Access, Vol. 9, pages 38979-38990, 2021. DOI: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9354159 | ||||
Narendra Kumar, N.V., Thakur, Abhishek, Raghuraj, G. and Lalit Mohan, S., “The payment systems revolution: India’s story”, The Journal of Payments Strategy & Systems, Volume 14, Issue 4. DOI: https://www.henrystewartpublications.com/jpss/v14 | ||||
Nunna Satya Krishna, Bhattu N, Somayajulu D.V.L.N. and N. V. Narendra Kumar. “Structure Sensitive Graph-based Multiple-Instance Semi-Supervised Learning”, Sādhanā. 46, 156, 2021. DOI: https://doi.org/10.1007/s12046-021-01659-4 | ||||
Avinash Potluri, S. Nagesh Bhattu, N. V. Narendra Kumar, and R. B. V. Subramanyam, “An Empirical Study on the Significance of Node Ordering for Computing Cliques using Map Reduce”, Solid State Technology, 63(1), pp.145-164., 2020. DOI: http://solidstatetechnology.us/index.php/JSST/article/view/260 |
||||
Jaya Rao Gudeme, Syam Kumar Pasupuleti, Ramesh Kandukuri, “Certificateless Multi-replica public integrity auditing scheme for dynamic shared data in cloud storage”, Computers & Security, Elsevier, Volume 103, 2021, 102176, ISSN 0167-4048. DOI: https://doi.org/10.1016/j.cose.2020.102176 |
||||
Varri, U.S., Pasupuleti, S.K. & Kadambari, K.V.. “CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage”, Peer-to-Peer Network Applications, Springer, 14, 1290–1302, 2021. DOI: https://doi.org/10.1007/s12083-020-01057-3 | ||||
Jaya Rao Gudeme, Syamkumar Pasupuleti, Ramesh Kandukuri, “Certificateless privacy preserving public auditing for dynamic shared data with group user revocation in cloud storage”, Journal of Parallel and Distributed Computing, Elsevier, Volume 156, 2021, Pages 163-175, ISSN 0743-7315. DOI: https://doi.org/10.1016/j.jpdc.2021.06.001 | ||||
Gudeme, J.R., Pasupuleti, S.K. & Kandukuri, R., “Attribute-based public integrity auditing for shared data with efficient user revocation in cloud storage”, Journal of Ambient Intelligence and Humanized Computing, Vol. 12, 2021, 2019–2032. DOI: https://doi.org/10.1007/s12652-020-02302-6 |
||||
Papers Published in Conferences | ||||
V. Sarveswararao and V. Ravi, “Chaos, Machine Learning and Deep Learning based Hybrid to forecast Consumer Price Index Inflation in India”, in: IEEE Symposium Series on Computational Intelligence (SSCI), 2020, pp. 2551-2557. IEEE Xplore. DOI: https://doi.org/10.1109/SSCI47803.2020.9308309 |
||||
Singh, Malvika, Babu M. Mehtre, and S. Sangeetha. “User Behaviour based Insider Threat Detection in Critical Infrastructures”, In Second IEEE International Conference on Secure Cyber Computing and Communications (ICSCCC), 021. DOI: https://doi.org/10.1109/ICSCCC51823.2021.9478137 |
||||
ND Patel, BM Mehtre, Rajeev Wankar, “Spoofed packet detection and prevention mechanism”, In First International Conference on Nanoelectronics, Machine Learning, Internet of Things & Computing Systems, Springer, 2021. | ||||
Johnpaul C.I, Munaga V.N.K. Prasad, S. Nickolas, G.R. Gangadharan and Aiello M, “An Optimal Wavelet Detailed-Coefficient Determination Using Time-Series Clustering”. In proceedings: AIDE: International Conference on Artificial Intelligence and Data Engineering, 2021, 1133,857–872, Springer, Mangaluru, Karnataka. DOI: https://doi.org/10.1007/978-981-15-3514-7_63 | ||||
Srinadh Swamy Majeti, Barnabas Janet, N. P. Dhavale, “Analysis of inappropriate usage of cryptographic primitives in Indian mobile financial applications” in Proceedings of International Conference on Computational Intelligence and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 56. Springer, Singapore, Print ISBN: 978-981-15-8766-5. DOI: https://doi.org/10.1007/978-981-15-8767-2_19 |
||||
Shalini, P. V., V. Radha, and Sriram G. Sanjeevi. “DDoS Attack Detection in SDN Using CUSUM.” In Proceedings of International Conference on Computational Intelligence and Data Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 56. Springer, Singapore, pp. 301-309. DOI: https://doi.org/10.1007/978-981-15-8767-2_26 | ||||
Aramanda A., Md. Abdul S., Vedala R, “A Comparison Analysis of Collaborative Filtering Techniques for Recommeder Systems”, In Proceedings of the 3rd International Conference on Communications and Cyber Physical Engineering, 2020. Lecture Notes in Electrical Engineering, vol 698. Springer, Singapore. DOI: https://doi.org/10.1007/978-981-15-7961-5_9 | ||||
Bhandari, A., Sharma, S., Uyyala, R., Pal, R., Verma, M., “Reversible data hiding using multi-layer perceptron based pixel prediction”, In: Proceedings of 11th International Conference on Advances in Information Technology, Bangkok, Thailand. July 01, 2020. ACM Digital Library. DOI: https://doi.org/10.1145/3406601.3406616 |
||||
Uyyala, R., Pal, R., “Reversible data hiding with selected directional context based prediction using 8-neighborhood”. In: Proceedings of 6th International Conference on Electronics, Computing, and Communication Technologies, Bangalore, pages 219-224. July 02-04, 2020. IEEE Xplore. DOI: https://doi.org/10.1109/CONECCT50063.2020.9198609 | ||||
B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar, “Towards Unifying RBAC with Information Flow Control, in Proceedings of the 26th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 45-54. June 11, 2021. ACM Digital Library. DOI: https://doi.org/10.1145/3450569.3463570 |
||||
Avinash Potluri and N.V. Narendra Kumar, “Context-aware Multi-data Fusion to Achieve Finest Ride-share Schedule Using Big Data”, IOP Conference Series: Materials Science and Engineering, Volume 1074, International Conference on Computer Vision, (February 2021). ProQuest. https://iopscience.iop.org/article/10.1088/1757-899X/1074/1/012013 |
||||
Vamshi, G. J. Rao, S. K. Pasupuleti and R. Eswari, “EPF-CLPA: An Efficient Pairing-Free Certificateless Public Auditing for Cloud-based CPS,” In, 5th International Conference on Intelligent Computing and Control Systems (ICICCS), 2021, pp. 48-54, IEEE Xplore. DOI: https://doi.org/10.1109/ICICCS51141.2021.9432204 |
||||
Uma Sankararao Varri, Syam Kumar Pasupuleti and Kv Kadambari, “Key-Escrow Free Attribute-Based Multi-Keyword Search with Dynamic Policy Update in Cloud Computing”, In 20th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID), Melbourne, Victoria, Australia. May11-14, 2020. IEEE Xplore. DOI: https://doi.org/10.1109/CCGrid49817.2020.00-48 | ||||
P. Jain, M. Verma and K. K. Shukla, “Convergence Rate Analysis of Viscosity Approximation based Gradient Algorithms,” In: International Joint Conference on Neural Networks (IJCNN), pp. 1-6. July 19-24, 2020. IEEE Xplore. DOI: https://doi.org/10.1109/IJCNN48605.2020.9207456 | ||||
Somorjit, L., Verma, M, “Variants of Generative Adversarial Networks for Credit Card Fraud Detection”. In: International Conference on Computational Intelligence, Security and Internet of Things, 2020, Trends in Computational Intelligence, Security and Internet of Things. Communications in Computer and Information Science, vol 1358. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-66763-4_12 | ||||
Books / Book Chapters | ||||
Vishnuvardhan G., Ravi V, “Face Recognition Using Transfer Learning on Facenet: Application to Banking Operations”. In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 956. Springer, Cham. April 27, 2021. Springer. DOI: https://doi.org/10.1007/978-3-030-68291-0_23 | ||||
Ali B., Ravi V., Bhushan C., Santhosh M.G., Shiva Shankar O, “Chatbot via Machine Learning and Deep Learning Hybrid”, In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 956. Springer, Cham, April, 2021. DOI: https://doi.org/10.1007/978-3-030-68291-0_19 | ||||
Sarveswararao V., Ravi V., "Prediction Intervals for Macroeconomic Variables Using LSTM Based LUBE Method", In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 956. Springer, Cham. 27 April, 2021. DOI: https://doi.org/10.1007/978-3-030-68291-0_20 | ||||
Ali B., Ravi V. Deep Learning Chatbot with Feedback. In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, Vol 956. Springer, Cham. DOI: https://doi.org/10.1007/978-3-030-68291-0_24 | ||||
Kamaruddin, S., Ravi, V.: Big Data Analytics: Survey of algorithms, data mining tasks, and applications, in: Handbooks on Big Data, IET, UK. | ||||
Vishnuvardhan G., Ravi V., Santhosh M., "Intelligent Character Recognition with Shared Features from Resnet", In: Gunjan V.K., Zurada J.M. (eds) Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough. Studies in Computational Intelligence, vol 956. Springer, Cham. April 27, 2021. Springer. DOI: https://doi.org/10.1007/978-3-030-68291-0_21 | ||||
Kamaruddin, S., Ravi, V, “PRBFN: A Parallel and Distributed Radial Basis Function Network for Regression and Classification in Big Data Paradigm”. Handbooks on Big Data, IET, UK. October 29, 2019, Springer. | ||||
Majeti Srinadh, Swamy, Barnabas. Janet, and N. P. Dhavale, "Usability Evaluation of COVID-19 mobile apps using SUS (System Usability Scale)”, “HCI and Beyond: Advances Towards Smart and Interconnected Environments”, 2020, Bentham Science Publishers. | ||||
Sengupta, A., Roy, D., “Securing dedicated DSP Coprocessors (Hardware IP) using Structural Obfuscation for IoT-oriented platforms”. CRC Book, Taylor & Francis “Security of Internet of Things Nodes Challenges, Attacks, and Countermeasures”, 2020. |
Menu