Valli Kumari Vatsavayi

Orcid: 0000-0002-7252-8301

Affiliations:
  • Andhra University


According to our database1, Valli Kumari Vatsavayi authored at least 55 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Time Series Dataset For DDOS Attack Detection.
Dataset, January, 2022

Identification and classification of wild animals from video sequences using hybrid deep residual convolutional neural network.
Multim. Tools Appl., 2022

Fault Prediction for Network Devices Using Service Outage Prediction Model.
J. Commun., 2022

2021
Model for High Dynamic Range Imaging System Using Hybrid Feature Based Exposure Fusion.
J. Intell. Syst., 2021

2019
High dynamic range image tone mapping technique based on the improved bitonic filter.
Int. J. Knowl. Based Intell. Eng. Syst., 2019

2018
Efficient ISAR image classification using MECSM representation.
J. King Saud Univ. Comput. Inf. Sci., 2018

Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust.
Int. J. Netw. Secur., 2018

2017
Exponential Genetic Algorithm-Based Stable and Load-Aware QoS Routing Protocol for MANET.
J. Intell. Syst., 2017

2016
A QoS-aware self-correcting observation based load balancer.
J. Syst. Softw., 2016

Cooperative privacy game: a novel strategy for preserving privacy in data publishing.
Hum. centric Comput. Inf. Sci., 2016

Verification in Privacy Preserving Data Publishing.
Comput. Informatics, 2016

Analysis of a Network IO Bottleneck in Big Data Environments Based on Docker Containers.
Big Data Res., 2016

Privacy Preserving in Dynamic Social Networks.
Proceedings of the International Conference on Informatics and Analytics, 2016

2015
A sliding window based Self-Learning and Adaptive Load Balancer.
J. Netw. Comput. Appl., 2015

A novel rough set attribute reduction based on ant colony optimisation.
Int. J. Intell. Syst. Technol. Appl., 2015

Analysis of Network IO Performance in Hadoop Cluster Environments Based on Docker Containers.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

Weighted CoHOG (W-CoHOG) Feature Extraction for Human Detection.
Proceedings of Fifth International Conference on Soft Computing for Problem Solving, 2015

2014
A model view controller based Self-Adjusting Clustering Framework.
J. Syst. Softw., 2014

Trail Coverage : A Coverage Model for Efficient Intruder Detection near Geographical Obstacles in WSNs.
J. Networks, 2014

Cost Effective Dynamic Concept Hierarchy Generation for Preserving Privacy.
J. Inf. Knowl. Manag., 2014

Privacy preserving data publishing: a coalitional game theory perspective.
Int. J. Comput. Intell. Stud., 2014

2013
Formal Verification of IEEE 802.11 Authentication Protocols.
J. Networks, 2013

An Efficient and Dynamic Concept Hierarchy Generation for Data Anonymization.
Proceedings of the Distributed Computing and Internet Technology, 2013

Primal-dual parallel algorithm for continuous aggregate query dissemination.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Randomized symmetric block encryption.
Proceedings of the First International Conference on Security of Internet of Things, 2012

An Approach to Identify n-wMVD for Eliminating Data Redundancy.
Proceedings of the Intelligent Informatics, 2012

Anonymity and Security in Mobile Ad Hoc Networks.
Proceedings of the Distributed Computing and Internet Technology, 2012

SenSim: sentence similarity based on the concept of relevance.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Parameter-lite clustering algorithm based on MST and fuzzy similarity merging.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Detecting dependencies in an anonymized dataset.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

An efficient approach to identify n-wMVD for eliminating data redundancy.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

2011
Trust Based Participant Driven Privacy Control in Participatory Sensing
CoRR, 2011

Minimum Spanning Tree Based k-Anonymity.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

BM (Break-Merge): An Elegant Approach for Privacy Preserving Data Publishing.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Checking Anonymity Levels for Anonymized Data.
Proceedings of the Distributed Computing and Internet Technology, 2011

A Modified Ontology Based Personalized Search Engine Using Bond Energy Algorithm.
Proceedings of the Advances in Computing and Communications, 2011

Attribute Based Anonymity for Preserving Privacy.
Proceedings of the Advances in Computing and Communications, 2011

2010
A Novel Lattice Based Research Frame Work for Identifying Web User's Behavior with Web Usage Mining.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Formal Verification of IEEE802.16m PKMv3 Protocol Using CasperFDR.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Distribution of Continuous Queries over Data Aggregators in Dynamic Data Dissemination Networks.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Efficient Conference Key Distribution for Dynamic Groups.
Proceedings of the 2010 International Conference on Signal Acquisition and Processing, 2010

s-Tuple Inclusion - A New Method for Privacy Preserving Publication of Datasets.
Proceedings of The 2010 International Conference on Data Mining, 2010

Scalable rekeying for dynamic groups using key path compression.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

TRING: A New Framework for Efficient Group Key Distribution for Dynamic Groups.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Study of Visitor Behavior by Web Usage Mining.
Proceedings of the Information Processing and Management, 2010

Efficient Group Key Distribution Mechanism for Dynamic Groups Using Public Key Broadcast Ring.
Proceedings of the Information Processing and Management, 2010

2009
An Effective Calculation of Reputation in P2P Networks.
J. Networks, 2009

Privacy Preserving Sharing of Data.
Proceedings of The 2009 International Conference on Data Mining, 2009

2008
Credibility Based Reputation Calculation in P2P Networks.
Proceedings of the Distributed Computing and Internet Technology, 2008

A Novel Approach for Privacy Preserving Publication of Data.
Proceedings of The 2008 International Conference on Data Mining, 2008

2007
Policy Based Controlled Migration of Mobile Agents to Untrusted Hosts.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Privacy Preserving in Clustering by Categorizing Attributes Using Privacy and Non Privacy Disclosure Sets.
Proceedings of the 2007 International Conference on Data Mining, 2007

Enhanced User Privacy on Trusted Processors.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Fair and secure m-cash.
Proceedings of the 2006 IEEE International Conference on Granular Computing, 2006

2004
MobiCoin: Digital Cash for M-Commerce.
Proceedings of the Distributed Computing and Internet Technology, 2004


  Loading...