A. S. N. CHAKRAVARTHY

Dr.A. S. N. CHAKRAVARTHY

professor
Department:Computer Science and Engineering
Qualification:B.E., M.Tech., Ph.D
Phone(Office):
Mobile:9618719229
Email:asnchakravarthy@jntucek.ac.in
Date of Birth:25/05/1980
Date of Joining:01/01/2013
Subjects Taught:C & Data Structures, Design & Analysis of Algorithms, Operating Systems & System Programming,
Advanced Computer Architecture, Distributed Systems, Artificial Intelligence, Computer
Organization, Software Engineering, Data Mining and Data Ware Housing, Computer
Communications, Human Computer Interaction, Network Security & Cryptography, Advanced
Computer Networks, Computer Forensics, E-Commerce, Advanced Operating Systems, Cyber Crime
Investigations and Digital Forensics, Operating Systems Administration and Security, Principles of
Secure Coding, Principles of Cyber Security, Cloud Computing, Wireless Network Security
Research Area:Computer Networks, Steganography, Watermarking, Data Security, Password Authentication, Biometrics, Cyber Security, Cloud Privacy and Digital Forensics.
Teaching Experience:21 Years
Research Experience:15 Years
Industry/Professional Experience:
Personal Webpage :
Staff Image

JOURNALPUBLICATIONS:
S. No. Publication Title Details of the Journal
Type
1. A Probabilistic Approach For Authenticating Text or Graphical
Passwords Using Back Propagation International Journal Of Computer Science And Network Security (IJCSNS), VOL.11 No.5, May 2011, pp. 242-251. International
2. A Study on Back Propagation Models through Hidden Units Advances in Computational Sciences and Technology (ACST) ISSN 09736107 Volume 4 Number 2 (2011) pp.
213-227. National
3. A Novel Approach For Intranet Mailing For Providing User
Authentication International Journal of Computer
Science and Information Security (IJCSIS), pp. 158-163, Vol. 9, No. 6, June 2011. International
4. A Novel Approach For Authenticating Textual Or
Graphical Passwords Using
Hopfield Neural Network Advanced Computing: An International Journal (ACIJ), pp. 33-46, Vol.2, No.4, July 2011. International
5. A Cryptosystem Based On Hilbert
Matrix Using Cipher Block Chaining Mode International Journal of Mathematics Trends and Technology (IJMTT), pp.
17-22, July to Aug Issue 2011. International
6. Handwritten Text Image Authentication Using Back
Propagation. International Journal of Network Security & Its Applications (IJNSA), pp.121-130, Vol.3, No.5, Sep 2011. International
7. Hilbert Matrix Based Cryptosystem Using A Session Key International Journal of Engineering Research and Applications (IJERA)Vol.
1, Issue 3, pp.711-715Sep-Oct 2011. International
8. A Novel Approach for Pass Word
Authentication Using Brain -State In -a Box (BSB) Model International Journal of Computer Science and Information Technologies (IJCSIT), pp. 2127-2131, Volume 2 Issue 5 September-October 2011. International
9. A Novel Approach for Pass Word
Authentication Using Bidirectional Associative Memory Advanced Computing: An International Journal (ACIJ), pp.123-135, volume 2 No. 6, November 2011. International
10 Performance Evaluation of Password Authentication Using
Associative Neural Memory Models International Journal of Advanced Information Technology (IJAIT) Vol. 2, No.1, pp. 75-85, February 2012. International
11. Security Evaluation of Online
Signature Verification System Using Webcams International Journal of Computer
Applications (0975 – 8887) Volume 41– No.15, pp. 28-33, March 2012. International (0.814IF)
12. A Novel Approach for Enhancing
Security in Smart Cards Using Biometrics International Journal of Computer
Applications (0975 – 8887) Volume 42– No.8, pp.38-42, March 2012. International (0.814IF)
13. A Novel Method for Enhancing
Biometric Systems Security Using Watermarking Global Journal of computer application and technology GJCAT, Vol. 2 (1), 2012, 969-976, ISSN: 2249-1945. International
14. Security Evaluation of Finger Print based Authentication Systems Global Journal of computer application and technology (GJCAT), Vol. 2 (1), 2012, 986-992, ISSN: 2249-1945. International
15. User Authentication in ATM Using Fingerprint Biometrics Global Journal of computer application and technology GJCAT, Vol. 2 (1), International

2012, 993-996, ISSN: 2249-1945.
16. A Novel Method of SAR Image Regularization with Fast Approximate Discrete
Minimization Advances in Digital Multimedia (ISSN
2166-2916) 64-79, Vol. 1, No. 2, June 2012. International (Free)
17. Novel Approach for the propagation and detection of active worm in a Virtual System Advances in Computer Science and its Applications (ISSN 2166-2924) 146150, Vol. 1, No. 1, March 2012, World Science Publisher, United States. International (Free)
18. Survey on Computer Crime Scene
Investigation Forensic Tools International Journal of Computer
Trends and Technology (IJCTT)-
Volume 3, pp. 278-281, Issue 2- 2012. International
19. Document Clustering in Web
Search Engine International Journal of Computer
Trends and Technology (IJCTT)-
Volume 3, pp. 290-293, Issue 2- 2012.
International
20. Evaluation of Watermarking Techniques International Journal of Mathematics
Trends and Technology (IJMTT)-
Volume 3, pp. 82-85, Issue 2- 2012. International
21. CRT and ART Based
Watermarking Scheme in DCT
Domain International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-4, April 2012. International
22. Survey on Hard Disk Duplication Advances in Mechanical Engineering and its Applications,pp.17-21,Vol. 1, No. 2, 2012, World Science Publisher, United States. International (Free)
23. Enhancing Security of Biometric Systems using Watermarking International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/Article No-12/269275. International
24 Security Evaluation of Signature Recognition System International Journal of Engineering & Science Research (IJESR)/April 2012/
Volume-2/Issue-4/Article No-7/222230. International
25 Security Evaluation of Finger print based Authentication Systems International Journal of Engineering & Science Research (IJESR)/April 2012/ Volume-2/Issue-4/158-175. International
26 Improve QOS In Wireless Sensor Network By Using BPA Algorithm International Journal of Advances in Science and Technology, Vol. 4, No.3, pp. 38-48 , March 2012. International

27 ARM Based USB Flash Drives for Data Communication Without using USB Cables and USB Ports Advances in Computer Science and its Applications (ACSA),pp. 228-230,Vol.
1, No. 3, 2012. International (Free)
28 Design of an Intelligent Spy Robot for Military Based Appliances International Journal of Computer Information Systems (IJCIS), Vol. 4, No.5, pp. 1-5,May 2012. International
29 A Survey on Password
Authentication Using Gödel
Number International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May-Jun 2012, pp. 534538. International
30 Design of a Rescue Robot Assist at Fire Disaster International Journal of Computer Applications (IJCA) (0975 – 888) International (0.814 IF)

Volume 47– No.10, pp.25-30, June 2012.
31 CDMA and MAI Problem
Elimination Methods International Journal of Scientific and Research Publications (IJSRP), Volume 2, Issue 7, pp.1-13, July 2012. International
32 A Novel Approach of Techniques for Building Intrusion Tolerant Server Systems International Journal of Research in Engineering Science & Technology (IJREST), Volume 1, Issue 1, pages, 1 – 5,July-August 2012. International
33 A Survey On Keystroke
Authentication By Using Local Search Algorithm Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 5, September- October 2012, pp.256-259. International
34 A Novel Approach of Intrusion Detection using Classification Rules International Journal of Advanced Computer Communications and Control Vol. 01, No. 01, December 2012, pp.
19-21. International
35 An Enhanced Multilevel Authentication Scheme Using
Graphical Passwords International Journal of Engineering Sciences & Emerging Technologies, June 2013, Volume 5, Issue 2, pp.104118. International (0.51 IF)
36 A Novel Soft Computing
Authentication Scheme for Textual and Graphical Passwords International Journal of Computer
Applications (0975 – 8887), Volume 71– No.10, May 2013, pp. 42-54. International (0.8 IF)
37 An Enhanced Mutual
Authentication Scheme Using One Time Passwords International Journal of Computer Networks and Security, ISSN: 20516878, Vol.,23 Issue.1,pp. 1113-1122. International (2.51IF)
38 A Novel Timer and Counter
Synchronized Challenge-Response
Based One-Time Password
Authentication International Journal of Computer
Networks And Security, ISSN: 20516878, Vol.23, Issue.1, pp. 1123-1128. International (2.51IF)
39 Improving the message capacity by using CDMA Watermarking
Scheme Advances in Computer Science and its Applications (ACSA) Vol. 2, No. 3, 2013, ISSN 2166-2924. International (Free)
40 BSC: A Novel Scheme for
Providing Security using Biometric Smart Card International Journal of Computer Applications (0975 – 8887) Volume 80 – No1, October 2013 International (0.8 IF)
41 A Novel Symmetric Key
Cryptography using Multiple Random Secret Keys International Journal of Computer Applications (0975 – 8887) Volume 80 – No 16, October 2013 International (0.8 IF)
42 A Fusion of PLSB and SVD based Image Watermarking Approach International Journal of Advanced Computer Communications and
Control, Volume 02, No. 02, April 2014 International

43 An Evolution of the Pixel Embedding
Techniques in Image Based
Adaptive Steganography Journal of Web Engineering & Technology (JoWET), Volume 1,
Issue 1, Jan-April 2014, pp.1-18. International

44 Prevention of Fire Accidents In
Villages Using Wireless Sensor
Networks International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (3), 2014, pp. 39683971. International (2.9 IF)
45 Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions International Journal of Computer Applications (0975 – 8887), Volume 112 – No. 9, February 2015 International (0.8 IF)

46 Analysis of Canonical Character Segmentation Technique for
Ancient Telugu Text Documents Journal of Theoretical and Applied
Information Technology, 20th December 2015. Vol.82. No.2, pp. 311-320 International
Scopus
Indexed
47 Performance Evaluation Of Quantitative Metrics on Ancient
Text Documents Using MIGT Journal of Theoretical and Applied
Information Technology, 31st
December 2015. Vol.82. No.3 pp. 360365 International
Scopus
Indexed
48 Gesture Recognition Technology to Annihilate Burglaries amid ATM
Transactions International Research Journal of Engineering and Technology (IRJET),
Volume: 02 Issue: 08 | Dec-2015, pp.
2293-2297 International

49 Optical Character Recognition Technique Algorithms Journal of Theoretical and Applied
Information Technology, 20th January 2016. Vol.83. No.2, pp. 275-282 International
Scopus
Indexed
50 A Study on Developing
Groundwater Information System
(GWIS) for Sustainable Management of Groundwater Resources-A Case Study from
Visakhapatnam Urban Region International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 2185-2190. International (6.39 IF)

51 Variable Modulation Schemes for AWGN Channel based Device to Device Communication Indian Journal of Science and Technology, Vol 9(20), May 2016, pp.1-6. International (Indexed in
SCOPUS)
52 Design of WSN based Water Quality Monitoring System in a Mining District International Journal of Science and
Research (IJSR), Volume 5 Issue 6, June 2016, pp.1183-1188 International (6.39 IF)
53 Providing A Secure Group Communication By Using A Novel Key Transfer Protocol and by
Generating Multiple Session Keys International Journal of Advance
Research in Science and
Engineering (IJARSE), Volume 5 Issue 10, October 2016, pp.36-45. International (2.83 IF)

54 Survey on Android Forensic Tools and Methodologies International Journal of Computer Applications (0975 – 8887) Volume 154 – No.8, November 2016. International (0.8 IF)
55 A Hybrid Cryptographic System for
Secured Device to Device
Communication International Journal of Electrical and
Computer Engineering (IJECE), Volume 6, No 6: December 2016,pp. 2962~2970
International (Indexed in
SCOPUS)
56 Evolution of Higher Education in India: Ancient to Golden Era University News: Association of Indian
Universities, Volume 55 N0. 05, January 30-Febraruary 05 2017. National
57 Utilization of SC-FDMA And OFDMA Based Uplink and Downlink Resources In LTE-A
Network Assisted Device To
Device Communication For
Effective Spectrum Management ARPN Journal of Engineering and
Applied Sciences, VOL. 12, NO. 5, March 2017 International (Indexed in
SCOPUS)
58 Inhibiting Cognitive Bias in Forensic Investigation Using DNA
Smart Card with IOT International Journal of Computer
Technology and Applications(IJCTA),
Volume 10, Number 14, pp 251-255,
May 2017 International
(Indexed in
SCOPUS)

59 Robust and indiscernible multimedia watermarking using lightweight mutational
methodology Traitement du signal
30 June 2017, Volume 34, Issue1-2, pp:
45-55 International (Indexed in
SCOPUS)
IF 0.057
60 A Taxonomical Review on
MANET Networks for IoT based
Air Pollution Controls International Journal of Computer Science And Technology (IJCST) Vol.
8, Issue 3, July - Sept 2017 International
(0.6 IF)

61 A Novel Route Optimized Cluster Based Routing Protocol for Pollution Controlling Network
Architecture International Research Journal of Engineering and Technology (IRJET),
Volume: 04 Issue: 07 July -2017 International

62 A Fault Tolerant Framework to Detect Routing Failures in Air
Pollution Monitoring MANET
Using 2ACK International Journal of Scientific & Engineering Research Volume 8, Issue
9, September-2017 International (Indexed by Thomson
Reuters)
63 Cryptanalysis of Design and
Analysis of a
Provably Secure Multi-server
Authentication Scheme International Journal of Network
Security, Vol.20, No.2, PP.1-8, Mar.
2018 International
(Indexed in
SCOPUS)
64 A Novel Feature Selection based
Classification Model for Disease Severity Prediction on Alzheimer’s Database Journal of Advanced Research in
Dynamic Control Systems Volume: 10,
Issue: 4, Pages: 245-255 ISSN:1943023X, Apr,2018 International
(Indexed in SCOPUS )
IF 0.13
65 A novel integrated approach using
Euclid’s and Fuzzylogic for secure communication Int. J. Information Privacy, Security and
Integrity, Vol. 3, No. 4, 2018 (Inder Science) International ( Free)
66 Despeckle Of SAR Images Using Adaptive Threshold In Non Sub Sampled Shearlet Transform
Domain Journal of Advanced Research in
Dynamical and Control Systems, ISSN 1943-023X, Vol. 10, 09-Special Issue, April 2018, pp. 765-772.
International
( Free)
(Indexed in
SCOPUS )
67 A Review of Blockchain
Technology and Its Application in Internet of Things International Journal of Management, Technology And Engineering, Volume 8, Issue12, December 2018. International ( Free)
69 EPNN Based High Secure Intensive
Hidden Digital Watermark
Application in Telemedicine Advances in Modelling and Analysis A, Vol. 56, No. 1, March 2019, pp. 21-25.
International
(Indexed in SCOPUS )
70 Optimized AODV Routing Algorithm in MANET for
Maximizing the Network Lifetime International Journal of Recent
Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, July 2019. International (Indexed in SCOPUS )
71 An Iterative Probabilistic NonLocal Filter Based Denoising Framework For SAR And Medical Images Journal of Critical Reviews, ISSN-
2394-5125 Vol 6, Issue 6, December 2019, pp. 386-392.
International (Indexed in
SCOPUS )

72 A Hybrid Segmentation based majority voting based classification framework for Alzheimer Disease prediction Journal of Critical Reviews, ISSN: 2394-5125, pp.: 376-385 Issue6, Volume 6, 2019.

International
(Indexed in
SCOPUS)
73 A Secure Biometrics-Based User Authenticated Key Agreement
Protocol for Multi-Server International Journal of Advanced Science and Technology Vol. 29, No.
9s, March 2020, pp. 517-532 International
(Indexed in
SCOPUS )

Environments
74 Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based
SVNN Journal of Evolutionary Intelligence,
Springer Professional, Special Issue, 28 April 2020, published by Springer Verlag
International
(Indexed in
SCOPUS )
75 Future Internet for Service Oriented Applications International Journal of Innovative Technology and Exploring Engineering Vol.- 9 Issue-6 published April 2020,pp-1996-2001,ISSN: 2278-3075. International
(Indexed in
SCOPUS )
76 Packet Crafting Tools for Cyber Crime Security Attacks International Journal of Computer Applications, Foundation of Computer
Science (FCS), NY, USA, Vol.-176
Issue-31 published June 2020, pp-2830, ISSN: 0975 – 8887
International
77 A Secure and Light Weight Privacy Preserving Data Aggregation Algorithm for Wireless Sensor
Networks Journal of Green Engineering, issue 12, pp. 13329-13336, Dec. 2020. ISSN:
2245-4586

http://www.jgenng.com/volume10issue12.php
International
(Indexed in
SCOPUS )
78 Chemical Sensing Through CognoMonitoring System for Air Quality Evaluation Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough, Studies in Computational
Intelligence 885,
https://doi.org/10.1007/978-3-03038445-6_3
International
Springer-
VerlagGmbH Germany
79 Multi-Level and Mutual Log
Integrity Preservation Approach for Cloud Forensics using Public Key
Infrastructure International Journal of Scientific Research in Network Security and Communication (ISSN: 2321-3256),
Vol.9, Issue.1, February 2021 Edition
International
(Indexed in
SCOPUS )
80 Smell Print: CMS-SEN Model for Odor Perception International Journal of Scientific Research in Computer Science and
Engineering Vol.9, Issue.4, pp.01-07, August (2021) E-ISSN: 2320-7639 DOI:
https://doi.org/10.26438/ijsrcse/v9i4.17 International
(Indexed in
SCOPUS )
81 Human Identification with their
VOC distribution through CMS– SEN
Model Soft Computing (2021) 25:13015–
13025
https://doi.org/10.1007/s00500-02106180-8
International
Springer-
VerlagGmbH Germany
82 Spectrum Of Research Challenges
In Design Optimizations In Cyber
Physical Systems Advances and Applications in
Mathematical Sciences", Volume 20,
Issue 11, September 2021, Pages 25852594, Mili Publications International
UGC Care,
Web of
Science
(ESCI)
83 Automatic identification of drug sensitivity of cancer cell with novel regression-based ensemble
convolution neural network model Soft Computing (2022) 26:5399–5408 https://doi.org/10.1007/s00500-022-
07098-5(0123456789().,volV)(0123456789,, Published online: 21 April 2022-().volV) International
SpringerVerlag
GmbH
Germany, part of
Springer Nature 2022
84 Novel Heuristic Hybrid Model To Handle Automatic Prediction Of
Cancer Disease Classification Over
Cancer Drug Data Sets Indian Journal of Computer Science and Engineering (IJCSE) DOI :
10.21817/indjcse/2022/v13i5/22130509 9 Vol. 13 No. 4 Sep-Oct 2022, e-ISSN :
0976-5166 p-ISSN : 2231-3850 International
85 Content-Based Collaborative
Filtering
With Predictive Error Reduction-
Based CNN Using IPU Model International Journal of Information
Security and Privacy, Volume 16 Issue
2, Nov 18, 2022
DOI: 10.4018/IJISP.308309 International Indexed In:
Compendex
(Elsevier
Engineering
Index),
INSPEC,
SCOPUS,
Web of
Science (ESCI)
86 Novel and Heuristic MolDoc Scoring Procedure for
Identification of Staphylococcus Aureus International Journal of Intelligent
Systems and Applications in
Engineering (IJISAE Int J Intell Syst Appl Eng, vol. 11, no. 2s, pp. 125 –, Jan. 2023. ISSN:2147-67992. International
(Scopus indexing)
87 Application of Distributed
Constraint Optimization Technique for Privacy Preservation in Cyber-
Physical Systems Springer, Cham ,Feb 4, 2023,Online
ISBN-978-3-031-18497-0,DOI https://doi.org/10.1007/978-3-03118497-0_24.
International

88 Role of Privacy Metrics in NextGeneration smart cities Journal of Propulsion Technology, ISSN:1001-4055, Vol.44 No.4(2023) Scopus indexing
89 Comprehensive Analysis on Drug Resistance Prediction, ProteinProtein Interaction, RNA Interaction on Drugs Using
Machine Learning Techniques Eur. Chem. Bull. Dec-2021,10(issue 4), 262-279, Section A-Research paper ISSN 2063-5346. International

90 Cancer Disease Treatment Classification Using Extended Rough-based Intuitionistic Fuzzy
C-means Learning Methodology Tuijin Jishu/Journal of Propulsion Technology ISSN: 1001-4055 Vol. 44 No. 3 (2023). International

91 A Review on Machine Learning Based Routing Protocols for Delay
Tolerant Networks IOS Press- Intelligent Decision
Technologies 17 (May, 2023) 287–299.
DOI:10.3233/IDT-220018
SCOPUS,
Web of
Science (ESCI)

Book Chapters/Books Authored:1) Password Authentication Using Associative Memories -A Probabilistic Approach, Lap Lambert Academic Publishing, Germany, 2012, ISBN: 978-3-659-26797-0.

2) Crypto Authentication Using Hilbert Matrices-A Novel Approach, Lap Lambert Academic Publishing, Germany, 2014, ISBN: 978-3-8473-4755-2.

3) Hadoop & R Language, Shree Publishing House, INDIA, 2019, ISBN: 978-938-819640-6.

4) Data Warehousing and Data Mining, Shree Publishing House, INDIA, 2020, ISBN:978-93-88196-53-6.

5) Qualitative and Quantitative Parametric Substantiation for Recognition of Text in Ancient Documents, Lambert Publications, India, 2020, ISBN: 978-81-948321-6-4.

6) Log Analysis Methods for Cloud Forensics: For Assisting Cybercrime Investigatons in Cloud Environments, LAP LAMBERT Academic Publishing (September 6, 2023), ISBN-13 : 978-6206755517

7) Privacy in Cyber Physical Systems: A Primer for Practitioners, Notion Press (30 October 2023), ISBN: 979-8891861725


BOOK CHAPTERS AUTHORED:
1. "Novel Method for Private Data Release in Cyber-Physical Systems “, pp. 47 – 54 , Advances in Computer Science and Information Technology Bhumi Publishing, Nigave Khalasa, Kolhapur 416207, Maharashtra, India, ISBN: 978-93-91768-28-7.
2. “Privacy-Preserving Mechanism by Application, of Constrained Nonlinear
Optimization Methods in Cyber-Physical System”, Cyber Security and Network Security, Wiley Data and Cybersecurity pp.: 157 – 168, 27 March 2022 (DOI: 10.1002/9781119812555.ch7) Print ISBN:9781119812494 |Online ISBN:9781119812555.
3. “Application of Exact Barrier-Penalty Function for Developing Privacy Mechanisms in Cyber-Physical Systems”, Security Analytics: A Data-Centric Approach to Information Security, June 24, 2022, by Taylor and Francis, ISBN:9781032072418.
4. “Application of Temporal Logic for Construction of Threat Models for Intelligent Cyber-Physical Systems”, Intelligent Cyber-Physical Systems Security for Industry 4.0 Applications, Challenges and Management, Published by Chapman and Hall/CRC, Dec 11, 2022, Pages 284, eBook ISBN: 9781003241348.
5. Privacy Preserving Mechanism by Application of Constrained Nonlinear Optimization Methods in Cyber-Physical System, Cyber Security and Network
Security, Scrivener Publishing LLC, 27 March 2022 Print ISBN:9781119812494 |Online ISBN:9781119812555 (https://doi.org/10.1002/9781119812555.ch7).
6. “Privacy Preservation in Cyber Physical Systems using Entropy Based Techniques”,
Internet of Things Vulnerabilities and Recovery Strategies, June 4, 2024 by Auerbach
Publications, ISBN: 9781032473314
Conferences:CONFERENCE PUBLICATIONS
S. No. Publication Title Details of the Conference

Type
1. Extended Alternate
Heterogeneous Earliest Finish Time Algorithm Proceedings of the 95th session of Indian
Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-09. National
2. Internet Protocol Security (IPSec) Proceedings of the 95th session of Indian
Science Congress, Visakhapatnam-2008, Part II (Abstracts), page-25. National
3. Evaluating the Effectiveness of Personalized Web Search
AICTE Sponsored National Conference on - High Performance Computing and
Networking,13th-14th August 2011,
Rajampet, Andhra Pradesh, India. National
4. Password Authentication Using Context-Sensitive Associative Memory Neural Networks: A
Novel Approach Proceedings of Springer Lecture Notes of the LNICST-85 Series, part-II, pp. 464– 478 at the CCSIT 2012, in January 2012 held at Bangalore, India. International
5. Protocol Sensor-Based Embedded Technique for Efficient Water-Saving
Agriculture Proceedings of ACNCN2012 conference on advances in communication, navigation and computer networks 17th -18th March 2012, A.U, Visakhapatnam. National
6. A Multi Cloud-based Approach to Enhance Data Security and Availability in Cloud Storage Proceedings of International Conference on
ComNet CIIT & ITC 2013, pp.58-63.
(Published by Elsevier, with ISBN 978-81910691-6-3), Organized by ACEEE, in Hyderabad from 08th -09th November 2013. International
7 Analysis of Cyber-Criminal Profiling and Cyber-Attacks: A
Comprehensive Study 3rd World Conference on Applied
Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
8 An Innovative Progress Approach for Quantity Mining
of Item Sets 3rd World Conference on Applied
Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal (ISBN 13: 978-81-930222-0-7). International
9 An Integrated Approach to Provide Security and Resist
Thefts on Digital Data 3rd World Conference on Applied
Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal( ISBN 13: 978-81-930222-0-7). International
10 Cloud Forensics: The Need and
Challenges A Research & Fact
Compendium 3rd World Conference on Applied
Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International
11 Implementation of X.509
Attribute Certificates for Cloud
Environments 3rd World Conference on Applied
Sciences, Engineering & Technology 27th 29th Sept. 2014, Kathmandu, Nepal ( ISBN 13: 978-81-930222-0-7). International
12 A Unified Model for Cherishing
Privacy in Database System: An
Approach to Overhaul
Vulnerabilities

First International Conference on Networks & Soft Computing,2014, organized by
Vignan's Foundation for Science, Technology & Research, Guntur, with the Technical Sponsorship of IEEE Hyderabad Section during 19th -20th August 2014(ISBN-978-1-4799-3486-7/14). International (IEEE)

13 Enhanced DES Algorithm International Conference on Recent Trends and Research Issues in Computer Science and Engineering, held from 02nd - 03rd May 2015. International
14 Information Security using
Genetic Algorithm with
Penultimate and Least
Significant Bits Fifth International Conference on
Advances in Information Technology and Mobile Communication – AIM 2015, held during 11th -12th July 2015, Bangalore, India. International
15 MFAT: Security Enhancements in Integrated Biometric Smart Cards to Condense Identity
Thefts 4th World Conference on Applied Sciences, Engineering & Technology 2426 October 2015, Kumamoto University, Japan (ISBN13:978-81-930222-1-4). International
16 Accelerating SQL Queries by
Unravelling Performance
Bottlenecks in DBMS Engine IEEE International Conference on Energy Systems and Application (ICESA - 2015) 30th October to 01st November 2015, DYPIET Pimpri, Pune India. International (IEEE)
17 Electronic Noses: Forestalling Fire Disasters: A Techniques to Prevent False Fire Alarms and
Fatal Casualties 2015 IEEE International Conference on
Computational Intelligence and Computing
Research (ICCIC), held from 10th -12th December 2015 at Vickram College Of Engineering, Madurai, Tamilnadu, India. International
International
(IEEE
Xplore,
SCOPUS)
18 A Robust Authenticated Privacy-
Preserving Attribute Matchmaking Protocol for
Mobile Social Networks International Conference on Computational Intelligence and Informatics-2016(ICCII2016), held during May 28th-30th, 2016 organized by Dept. of CSE, JNTUH
College of Engineering, Hyderabad, India. International

19 Revamping SQL Queries for
Cost Based Optimization International Conference on Circuits, Controls, Communication and Computing ( I4c-2016), held during 4th-6th October 2016 at M.S.Ramaiah Institute of Technology, Bangalore, India. International
20 Cognitive Perceptive Framework with Gait Recognition
Technology 2nd International Conference on Next Generation Computing Technologies (NGCT-2016), Dehradun, India, 14-16 October 2016. International (Indexed in
SCOPUS)
21 Bypassing Android Pattern Lock and Analysis IEEE International Conference on Computational Intelligence and Computing
Research (ICCIC), held during 15th-17th of December 2016 at Agni College of Technology Old Mahabalipuram Road,
Thalambur, Chennai - 600 130, Tamil
Nadu, India. International (IEEE)
22 Forensics Analysis of Android Mobile Devices II International Conference on Recent
Advances and Innovations in Engineering (ICRAIE2016), 23-25,
December - 2016, Poornima College of
Engg., Jaipur, India, Sponsored by IEEE Delhi Section International (Indexed in
SCOPUS)
23 Evolution of Higher Education
in India: Ancient to Golden Era

University News: A Weekly Journal of Higher Education January 30-February 05, 2017 by Association of Indian Universities, Volume 55 N0. o5. ISSN-0566-2257. National

24 Intensifying the Security of Information by the Fusion of Random Substitution Technique and Enhanced DES First International Conference on Smart Computing and Informatics" Conducted at ANITS, VIZAG from 3- 4 March 2017. (Published in SPRINGER SIST Series Vol 1. pp. 487-496) International (Springer)
25 The Design of a Secure Three Factor Authentication Protocol for Wireless Sensor Networks The International Conference on Nextgen
Electronic Technologies, organized by the
VIT University, 23- 25 March 2017 at VIT University Chennai in Chennai, India9781-5090-5913-3/17/$31.00_c 2017 IEEE. International (IEEE)
26 A Robust Authenticated Privacy-
Preserving Attribute
Matchmaking Protocol for
Mobile Social Networks International Conference on Computational Intelligence and Informatics-2017(ICCII2017) held during 25-27 September 2017 at JNTU, Hyderabad. International (Springer)
27 Cogno-Detective System for Body Odor Sensing 017 IEEE International Conference on Computational Intelligence and Computing
Research, Tamilnadu College of Engineering, Coimbatore, 14 to 16 Dec 2017. International
IEEE Xplore SCOPUS
[Best Paper]
28 Smart-Trace: A Future Security Aid using Body Odor Sensing of an Individual with IoT, 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018, Malaviya National Institute of Technology (MNIT), Jaipur, March 26-27, 2018. International
29 Emotional Intelligence through Body Temperature using Hybrid
Progressive Approach International Conference on Intelligent
Computing and Remote Sensing (ICICRS-
2019) C.V. Raman College of Engineering, Bhubaneswar, India, 19th and 20th July 2019. International
30 Chemical Sensing through Cogno-Monitoring System for
Air Quality Evaluation International Conference on Cybernetics,
Cognition and Machine Learning Applications, 16-17 August 2019, Goa,
India.
(https://link.springer.com/chapter/10.1007
%2F978-3-030-38445-6_3)
International (Springer)
31 Spectrum of Research
Challenges in Design
Optimizations in Cyber Physical
Systems AICTE Sponsored the National EConference on Advances in Computer Vision, Artificial Intelligence and
Computer Applications
(NECACAC-2020), Organized by the Department of CSE, Pragati Engineering
College, Surampalem, Andhra Pradesh,
India National
32 An Investigative Study on
Security Attacks in CyberPhysical Systems 1st International Conference on
Multidisciplinary Industry and Academic Research (ICMIAR) organized by Institute of Industry and Academic Research
Incorporated, Philippines on 12-12-2020.
International
33 Balancing Control Performance and Multiple Privacy Preserving
Requirements in a Cyber-
Physical System 1st Online National Conference On Recent Trends in Science & Technology (RTST2020) Organized by Department of
Applied Sciences Faculty of Engineering & National
Technology Manav Rachna International Institute of Research & Studies, Faridabad HARYANA on 21-11-2020.
34 An Investigative Study on Minimizing Security Attacks using Deep learning in a Cyber-
Physical System AICTE Sponsored “International Conference on Recent Advances in Deep Learning (ICRADL-2021)”, Conference
Proceedings in the Journal International Journal of Engineering Research & Technology (IJERT), ICRADL – 2021 (Volume 09 – Issue 05), ISSN Online:
2278-0181, CrossRef DOI:10.17577. International
35 Planning Protection of CyberPhysical Systems by Applying
Chaos Theory 3rd International Conference on Recent
Advances in Management & Technology( ICRAMT-2020), organized by Faculty of Management, Invertis University, Bareilly, UP, India on January 08th and 9th 2021. International

36 Application of Metric Temporal Logic for Designing Secure
Cyber-Physical System
International Conference on Computational
Techniques( ICCT-2021) organized by Dept. of CSE, Invertis University, Bareilly in association with CSI- Allahabad Chapter on January 22-23 2021. International

37 Novel Perspectives of Security and Privacy Challenges in
Virtual Reality Technologies 3rd International Conference on Virtual Reality conducted on Dec 31, 2021, organized by Harran University, Sanliurfa Turkey,Pp. 109-112 ISBN: 978-605-
86579-1-5. International

38 Comparative Analysis between LSTM and GRU in Stock Price
Prediction International Conference on Edge
Computing and Applications (ICECAA 2022), organized by Gnanamani College of Technology, Namakkal, Tamil Nadu,
India. International
(IEEE
Explore)

39 Application of Distributed Constraint Optimization Technique for Privacy
Preservation in Cyber-Physical
Systems International Conference on Intelligent Cyber-Physical Systems and Internet of Things (ICoICI 2022) conducted on 11-12, August 2022,JCT College of Engineering and Technology, Coimbatore, India. International

40 A Critical Investigation of Variants of Differential Privacy for Cyber-Physical Systems National E-CONFERENCE On Data Engineering and Communication Technology (NCDECT) 2023 25th March
2023 National E-CONFERENCE On Data Engineering and Communication Technology (NCDECT) 2023, ISBN:97893-5768-432, conducted by Sri Vasavi Engineering College (Autonomous), Pedatadepalli, Tadepalligudem, West Godavari District, Andhra Pradesh, India.
International

Ph.D Scholars guided:SCOPUS AUTHOR ID: 57008858300
ORCID ID: 0000-0002-3437-5498
------------------------------------------------------------------------------------------------------- Research Supervision (PhD): 1. Completed
S.No. Name of the Research Scholar Title of the Work Year of
Awarded Registered University Supervisor/ Co-Supervisor
1. Mr. Nekkanti Venkata
Rao
(Reg.No.10305001)
Qualitative and
Quantitative
Parametric
Substantiation for
Recognition of
Text in Ancient
Documents 2018 KL University

Vaddeswaram
India Supervisor
2. Mr. Akella
Ramakrishna
(Reg.No.13304005)
Hybrid Directional Channel Models
for
Secured Device to
Device
Communication 2018 KL University

Vaddeswaram India Supervisor
3. Mr.Kameswara Rao Buragapu (Reg.No.
10022P0542)
An Optimized Routing Technique for Cluster based Pollution Control
MANET 2019 JNTU
Kakinada

Kakinada India Supervisor
4. Mrs. Rayi.Sailaja (Reg.No.
13022P0514) Privacy and
Protection of
Medical Sensitive
Data Using an
Integrated Secured
Framework 2020 JNTU
Kakinada

Kakinada India Co- Supervisor
5. Mr. T.Siva Rama
Krishna
(Reg.No. 13022P0505)


Log Analysis
Methods for
Assisting Crime
Investigations in
Cloud
Environments 2021 JNTU
Kakinada

Kakinada India Supervisor
6. Ms.K. Pratyusha (Reg.No.
15022P0534) A Cognitive
Forensics Olfactory Biometric Scheme for an Intelligent
Environment 2022 JNTU
Kakinada

Kakinada India Supervisor













2. Under Process-Supervisor: 11
S.No
. Name of the Research Scholar Area of the work Year of
Registr ation Registered University Supervisor/ Co-
Supervisor
1 Mr.S.Suresh Babu (Reg.No.
12022P0530) Image Processing 2012 JNTUK Supervisor
2 Mr.V.
VenkateswaraRao
(Reg.No.13022P052
6) Network Security & Forensics 2013 JNTUK Supervisor
3 Mr.T. Anji Kumar (Reg.No.
15022P0511) Network Security 2016 JNTUK Supervisor
4 Mr.A. Chandra (Reg.No.
15022P0530) Adhoc Networks & Security 2016 JNTUK Supervisor
5 Mr. Anil Kumar
Prathipati (Reg.No.
18022P0520) Speech Processing 2018 JNTUK Supervisor
6 Manas Kumar Yogi (Reg.No.
19022P0502) Cyber Security 2019 JNTUK Supervisor
7 Tamminina Ammannamma
(Reg.No.
19022P0549) Cyber Security 2019 JNTUK Supervisor
8 Sridevi Gadde (Reg.No.
Y19CSEPT003) Machine Learning 2019 Centurion University Supervisor
9 Chintalapudi Subhash
(Reg.No.
21022P0541) Digital Forensics and Cyber Security 2022 JNTUK Supervisor
10 Cholla. Priyadarshini (Reg.No.
21022P0561) Cyber Security 2022 JNTUK Supervisor
11 Burra Lalitha
Rajeswari
(Reg.No
22022P0515) Cyber Security and Machine Learning 2022 JNTUK Supervisor
12 Shaik. Saida (Reg.No.
22022P0527) Network Security
2022 JNTUK Supervisor








Co-Supervisor: 08

S.No Name of the Research Scholar Area of the work Year of
Registra tion Registered University Supervisor/ Co-Supervisor
1 Ch S V V S N Murty
(Reg.No. 12022P0520)
Data Mining 2012 JNTUK Co-Supervisor
2 Mr.Immadi Murali
Krishna
(Reg.No. 12022P0519) Image Processing 2012 JNTUK Co-Supervisor
3 Mr. M.M NareshBabu (Reg.No. 13022P0529) Network
Security &
Cryptography 2013 JNTUK Co-Supervisor
4 Mr. Katari Praveen
Kumar
(Reg.No.14022P0526 ) Network
Security &
Cryptography 2014 JNTUK Co-Supervisor
5 A. Bhavani
(Reg.No. 19022P0537) Delay Tolerant Network 2019 JNTUK Co-Supervisor
6 Suryakala Eswari
(Reg.No. 19022P0507)
Image
Processing
2019 JNTUK Co-Supervisor
7 Nagalakshmi
Panchakatla
(Reg.No. 21022P0558) Cyber Security with Machine
Learning 2022 JNTUK Co-Supervisor
8 Babu Bulla
(Reg.No. 21022P0537) Intrusion
Detection
System using Machine learning 2022 JNTUK Co-Supervisor

Memberships in Professional bodies:MEMBERSHIPS

1) Senior Member of “IEEE” with membership id 92932156.

2) Professional Member of “Association for Computing Machinery” (A C M) with membership id 7001281.

3) Life Member of “Computer Society of India” (CSI) with membership id I0171314.

4) Life Member of “The Indian Society for Technical Education” (ISTE) with membership id LM-83243.

5) Life Member of “The Institution of Electronics and Telecommunication Engineers” (IETE) with membership id M-230243.

6) Life Member of “The Institution of Engineers, India” (IEI) with membership id M145610-5.

7) Life Member of “The Indian Science Congress Association of India” (ISCA) with membership id L13821.

8) Life Member of “The Cryptology Research Society of India” (CRSI) with membership id L/540.

9) Life Member of “Association of Scientists, Developers and Faculties” (ASDF) with membership id 4357700016860710.

10) Life Member of “Youth Hostels Association” of India with membership id027-AP12--LO--TEMP--6873.

11) Fellow member (Life member) of “International Science Congress Association” (ISCA) with Membership id ISCA-FM-258.

12) Member of “Association of Computer Communication and Education for National Triumph” (ACCENTS) with Membership id -PM21068205.

13) Honorary member of The “Association of Computer Electronics and Electrical Engineers” (ACEEE) with Membership No. 1155.

14) Associate Member of “International Association of Engineers” (IAENG)with membership id 100181.

15) Member for “Academy & Industry Research Collaboration Center” (AIRCC) with Community membership id 128683.

16) Member for “Computer Science Teachers Association” (CSTA) with membership id 7001281.

17) Senior member for “International Association of Computer Science and Information Technology (IACSIT)” with Membership Number 80343991.

18) Member in the “Institute for Computer Sciences, Social Informatics and Telecommunications Engineering” (ICST).

19) Member of “Universal Association of Computer and Electronics Engineers (UACEES)” with Membership Id SNM1002871.

20) Member OF “Internet Society” India - Kolkata Chapter with registration id 357012.

21) Member of “Internet Society” India- Bangalore Chapter with registration id 372720.

22) Member of “The International Research Association of Computer Science and Technology” (IRACST).

23) Senior Member of “The Indian Association for Research in Computer Science” (IARCS).

24) Senior Member of “The Institute of Research Engineers and Doctors” (IRED) with membership ID - SNM1002871.

25) Distinguished member of “The Institute for Computer Sciences, Social Informatics & Tele Communications Engineering” (ICST), Belgium.

26) Member of “Asia-Pacific Chemical, Biological& Environmental Engineering Society” (APCBEES) with Membership Number-200953.

27) Professional Member of Institute for Engineering Research and Publication (IFERP) with membership id PMIN36019475.

Honors & Awards:AWARDS

 Received the Association of Scientists, Developers and Faculties “Best Professor” award from Shri. Virendra Kataria, Lt. Governor of Pondicherry, at Global Awards 2013 held on 30-12-2013 at Hotel Anandha Inn, Puducherry, India.

 Received Association of Scientists, Developers and Faculties “Best Academic Researcher” Award from Audi Kalayanamitr, President, board of director at one development company, Bangkok at Global Awards 2014 held on 30-12-2014at Hotel Holiday Inn Silom, Bangkok, Thailand.

 Received Association of Scientists, Developers and Faculties “Best Computer Science
Faculty” award from Shri. P.Rajavelu,(Minister for tourism) and T. Thiagarajan (Minister for Electricity, & School Education, at Global Awards 2015 held on 30-12-2015 at Hotel Shenbaga, Pondicherry, India.

 Received “Uttam Acharya(Best Faculty)” award during the National Award Presentation Ceremony held on 02-10- 2019 at VR Siddartha Engineering College, Vijayawada, India. Award was conferred by Indian Servers in association with Lions Club International, Telangana IT Association and Information Technology Companies Association of Andhra Pradesh.

 Received “Outstanding Scientist” award during the International Scientist Awards on Engineering, Science and Medicine held on 28 & 29- August-2021 at Trivandrum, India. Award was conferred by VDGOOD Professional Association.
Patents :PATENTS

Published
1. Title of the Invention: Inertial Measurement Unit for Wearable Continuous Human
Information System
Patent Number: 2020102947
Validity: 22-10-2020 to 21-10-2028 (Eight Years)
Issued by: Commissioner of Patents, Patent Office, Australia

2. Title of the Invention: A System and a Method for Preventing Theft Using Blockchain Technology
Patent Number: 2020103943
Validity: 08-12-2020 to 08-12-2028 (Eight Years)
Issued by: Commissioner of Patents, Patent Office, Australia

3. Title of the Invention: A Process for Improve the Trustworthiness of Mobile Crowd
Sensing Data Collection
Patent Number: 2020104113
Validity: 15-12-2020 to 15-12-2028 (Eight Years)
Issued by: Commissioner of Patents, Patent Office, Australia

4. Title of the Invention: Secured IOT Based Data Streaming Network for Containers in Ports and Ships Using IETF Solace Framework
Patent Number: 202141004681
Validity: 12-02-2021 to 12-02-2029 (Eight Years)
Issued by: Indian Patents

5. Title of the Invention: A Regression-Based Ensemble CNN System to Predict
Cancer Drug Sensitivity and Method Thereof
Patent Number: 202241057105 Publication Date: 04-10-2022
Issued by: Indian Patents

6. Title of the Invention: Application of Synthetic Data for Privacy Preservation in
Cyber Physical Systems
Patent Number: 202341057084 A Publication Date: 08-09-2023
Issued by: Indian Patents

7. Title of the Invention: A Novel Query Auditing Mechanism for Privacy
Preservation in Medical Cyber Physical Systems
Patent Number: 202341062057 A Publication Date: 06-10-2023
Issued by: Indian Patents

Granted
1. Title of the Invention: Artificial Intelligence and IoT-Based Efficient Management of Economical Vehicles Utilized on Sharing Basis
Patent Number: 1201546 Publication Date: 02-03-2023
Issued by: Canadian Patents