Department of Computer Science and Engineering

Faculty Publications :

N Siva Kumar have called as a resource person on “Advanced Computing using Java Technologies” conducted at Sudershan College of Arts and Science, Pudhukkottai, Tamilnadu during 01-02-2019 and 04-02-2019.

S.No Name of the Faculty Topic Name of the Event Place Date of the Event
1 N Siva Kumar Database Programming with PLSQL Oracle Academy Course Crescent Institute of Science & Technology, Chennai 26-10-2018
2 M Vijay Kumar Data Sciences AICTE Margadarshan Scheme VR Siddhardha Engineering College 12-11-2018 to 16-11-2018
3 Sd Yasin Data Sciences AICTE Margadarshan Scheme VR Siddhardha Engineering College 12-11-2018 to 16-11-2018

Author Title of The Paper Journal
Dr. K Sai Manoj,
Dr.P Chiranjeevi,
Ms. K Mrudula
A Study On Data Controller-Preserving Public Auditing For Secure Cloud Storage IJMER
Dr. P Chiranjeevi,
Dr.K Sai Manoj
Protecting Sensitive Labels In Social Network Data Anonymization IJMER
M Sowjanya A Novel Password Security Based Social Authentication IJMTST
V Madhavi SOA Based Central Identity And Access Managed IJERST, Vol-6,Pg:126-136
L Vijaya Varma
Ch Srinivasa Rao
Open Source Solution for Mobile GIS and location Intelligence IJMTST
Dr.K Sai Monoj
Dr. P Chiranjeevi
Faster content sharing over smart phone based delay tolerance networks IJERO
Pathan Irfan Khan
M.Vijay Kumar
K.Gopal Reddy
Secure Auditing in Cloud using Attribute Based Encryption IJDCST
M Vijay Kumar
K Gopala Reddy
An Appraisal on: Internet Of Things for Smart Cities IJCMI
S Tejaswini
Ch Srinivas Rao
A Profit Enhancement Scheme with assured Quality of Service in Cloud Computing IJMTST
Dr. K Sai Monoj
Dr. P Chiranjeevi
A dynamic framework of advanced mobile video streaming and social video sharing in clouds IJERO
Dr. K Sai Monoj
Dr. P Chiranjeevi
SOA based cam cloud assisted privacy preserving mobile health monitoring IJCSM
Dr. K Sai Monoj
Dr. P Chiranjeevi
An Efficient and novel approach using T.H.E.S. methodology for CBIR  IJCSM
Dr. K Sai Monoj
K Mrudala
K Phani Srinivas
A survey on protection of multimedia content in cloud computing IJCSMC
K Phani Srinivas
Dr. K Sai Monoj
K Mrudala
Analysis of rectangular micro strip patch antenna for Wi-Fi applications IRJET
K Phani Srinivas
Dr. K Sai Monoj
Dr. M Sasidhar
Dr. P Chiranjeevi
Data acquisition through telephone IJRERD
K Phani Srinivas
Dr. K Sai Monoj
K Mrudala
Literature survey on the destruction of attacks with Mh Hop to Hop-Aodv routing protocol in vehicular Adhoc network IJIRT
P Ramesh Babu
M Rajesh reddy
An Analysis of Agricultural Soils by using Data Mining Techniques IJESC
P.VENKATASRINIVASA CHARI
M SIVA ANJANEYULU
My Privacy My Decision: Control Of Photo Sharing On Online Social Networks IJCMI
M DEEPTHI
CH SRINIVAS RAO
Audit- Free Cloud Storage Via Deniable Attribute - Based Encryption. IJCMI
R VENKATA PRASAD
K SWAMI
Continuous And Transparent User Identity Verification For Secure Internet Services IJCMI
K NEELAVENI
A DURGA BHAVANI
Privacy Policy Inference Of User- Uploaded Images On Content Sharing Sites. IJCMI
M VINEELA
M VIJAY KUMAR
Privacy-Preserving And Truthful Detection Of Packet Dropping Attacks On Wireless Adhoc Networks. IJCMI, Vol-13
CH RAJESH KUMAR
SOMEN KUMAR ROY
P RAMESH BABU
A Framework For Cloud Services Provider Selection Using MCDM Techniques IJOAASE
J PRABUDAS A Decision support system for predicting diabetic retinopathy using neural networks JATIT
K NANDINI
M VIJAY KUMAR
Detecting Malicious Face book Applications IJDCS
A S N M SWETHA
Dr B VEERAMALLU
Discovery Of Ranking Fraud For Mobile Apps. IJCDST
G PRAMEELA
P RAMESH BABU
Malware Propagation In Large-Scale Networks. IJCDST
M YEDUKONDALU
V P S VIJAY KUMAR
Secure Auditing And De Duplicating Data In Cloud. IJCDST
PSAHITHYA,
M NIKITHA
Secure Distributing And De Duplication Systems. IJCDST
M VIJAY KUMAR,
CH SRINIVASA RAO
Public Auditing With Privacy For Secure Public Cloud Storage. IJRCSE
CH MARY Integrity verification and encrypted data deduplication in cloud IJSETR
Y.PREDEEP KUMAR Extended Web-Based Applications Quality Factors RJCSE
CH P V SRINIVASA RAO Secured Personalized Web Search Using Adopted Algorithm IJDCSIT
K SRINIVASA RAO
Dr Y VAMSI DHAR
Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Cloud Data. IJAEM
K SUSHMA
Y VAMSIDHAR
A Distributed Three-Hop Routing Protocol To Increase The Capacity Of Hybrid Wireless Networks. IJAEM
P RAMESH
M SIVA ANJANEYULU
Security Evaluation Of Pattern Classifiers Under Attack. IJAEM
PAVANI POTNURI
G BHARATH KUMAR
M VENKATESARA RAO
Vampire Attacks: Draining Life From Wireless Adhoc-Sensor Networks. IJSEAT
K SWAMI
V P S VINAY KUMAR
CH SRINIVASA RAO
Parallel Mining Of Frequent Item Search Based On Map Reduce Approach IJMCA
P RAMYA LATH
P RAMESH BABU
Detecting Malicious Facebook Applications. IJAEM
A SWANI NALAM
P RAMESH BABU
Privacy Using Adaptive Privacy Policy Prediction For User Uploaded Images On Content Sharing Sites. IJAEM
K MADHAVI
M VIJAY KUMAR
Cloud Armor: A Trusty Supporting Reputation- Based Management For Cloud Services IJAEM
M VIJAY KUMAR
M VSD KIRAN
A Computational Dynamic Trust Model For User Authorization. IJAEM
T LATHA
V P S VINAY KUMAR
Enabling Fine-Grained Multi Keyword Search Supporting Classified Sub-Dictionaries Over Encrypted Cloud Data. IJAEM, Vol-4, Pg: 31-36
G SANKAR
CH SRINIVASA RAO
Towards Effective Bug Triage With Software Data Reduction Techniques. IJAEM
Y SIVAJI
B NAGA RAJU
Context-Based Diversification For Keyword Queries Over Xml Data. IJAEM
T KAVYA
B NAGA RAJU
A Hybrid Cloud Approach For Secure Authroized Duplication. IJAEM
U TEJASWI
V P S VINAY KUMAR
Identity based Encryption with outsourced revocation in Cloud Computing IJAEM
Duvvuru, Rajesh, P. Jagadeeswara Rao, Gudikandhula Narasimha Rao, Lasya, and Y L N Swami Papolu. Multi-Level Chaos Based Encryption Mechanism to Enhance Security of High Security Zone Areas on Google Map Satellite Images of India." International Journal of Applied Engineering Research 10.3 (2015): 8059-8072. (Scopus Indexed).