Valli Kumari Vatsavayi

Valli Kumari Vatsavayi
  • Professor
  • Professor at Andhra University

About

185
Publications
30,663
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,007
Citations
Introduction
Dr Valli Kumari Vatsavayi, a Professor at Andhra University with over 26 years of experience in teaching and research, holds a PhD degree with Gold medal for best research. An MTech in Computer Science and Technology and a BE in ECE she researches on Block Chain, Computer Vision, Data Analytics, Security, Privacy, Forensics and Threat Intelligence. She is the Principal Co- Investigator of the Cyber Security and Data Analytics Centre sponsored by ISEA Project, MEITY, GOI.
Current institution
Andhra University
Current position
  • Professor
Additional affiliations
October 2006 - present
Andhra University
Position
  • Professor (Full)

Publications

Publications (185)
Chapter
In today’s digital world, cutting-edge technologies in machine learning, cybersecurity, data science, and blockchain are emerging rapidly. Every day billions of devices are connected together through internet for data exchange. Due to the existence of some vulnerabilities present in the device, attackers perform malicious activities through such de...
Article
As technology is growing rapidly, new malware variants are evolving. Attackers are generating new malware patterns using code obfuscation and mutation techniques to escape from anti-malware engines and traditional models. Models built over historical malware data cannot perform well in detecting or classifying dynamic or real-time malware data. The...
Article
Full-text available
Rice is an essential food crop that is cultivated in many countries. Rice leaf diseases can cause significant damage to crop cultivation, leading to reduced yields and economic losses. Traditional disease detection approaches are often time-consuming, labor-intensive, and require expertise. Automatic leaf disease detection approaches help farmers d...
Conference Paper
Federated Learning (FL) is a machine learning approach that allows knowledge sharing with privacy maintenance and cost reduction. FL has the potential to revolutionize the smart agriculture sector by enabling farmers to train and deploy machine learning models on their own devices, without the need to share their data with a central server. In this...
Chapter
This chapter delves into fundamental concepts of privacy preservation and federated learning (FL) in healthcare. Emphasizing the importance of privacy in healthcare data, it explores ethical and regulatory considerations surrounding sensitive patient information. The history and significance of FL, distinct from traditional centralized machine lear...
Chapter
Artificial intelligence (AI) is rapidly transforming academic research, accelerating discovery, improving efficiency, and opening up new avenues across various disciplines. This chapter introduces AI and discusses its broad range of applications, both within and outside of academia. The chapter then presents the applications of AI in academic resea...
Chapter
Cloud analytics is the process of using cloud computing resources and technologies to analyze and gain insights from large and complex data. Cloud analytics has become increasingly popular in recent years due to its scalability, cost-efficiency, and accessibility. It enables organizations to process large datasets, perform complex analytics, and ma...
Chapter
Malware attacks impact organizations resulting in password theft, encrypting the files, denial of service, etc. Every malware file has its own malicious intent, which either matches the known malware family or is detected as a new kind of malware. Analysts perform static and dynamic analysis on malware files to extract the behavior. Identifying the...
Preprint
Full-text available
Explainable artificial intelligence (XAI) techniques help researchers make the decision-making process transparent by visualizing the features a model considers when making decisions, which in turn helps identify models that are accurate and reliable. We developed a MATLAB toolbox to generate Gradient-weighted Class Activation Mapping (Grad-CAM) an...
Chapter
Inverse Synthetic Aperture Radar (ISAR) is one of the promising imaging radar technology used in military applications mostly. ISAR picture productions are extremely good at predicting common radar targets such as aircraft, missiles, military vehicles, battleships, and space objects. Even though extensive research work is going on the classificatio...
Chapter
Investment analysis is a systematic process of evaluating various investment opportunities and choosing the best solutions. It involves the analysis of financial metrics such as past performance, earnings, cash flows, and market trends to make informed decisions. Analytical tools such as financial ratios, time value of money calculations, capital b...
Chapter
Lightweight deep learning is a subfield of artificial intelligence and machine learning that prioritises efficiency and compactness while developing deep learning models. It is ideal for low-powered mobile phones, embedded systems, and internet-of-things devices due to their speed and low latency. To make lightweight deep learning models, pruning a...
Chapter
The use of convolutional neural networks (CNNs) to classify hyperspectral images (HSIs) is being done in contemporary research works. HSI data poses a challenge to the current technique for data analysis because of its extensive spectrum information. It has been noted that conventional CNN primarily grabs the spatial characteristics of HSI while ig...
Chapter
Malware detection and identification is important to protect an organization’s data and enable end-to-end monitoring of resources accessible by multiple users through Internet. Malicious users and Intruders usually try various methods to gain unauthorized access to data from remote locations. This paper proposes a model that helps in finding the ma...
Article
Full-text available
In recent decades, wild animal classification from the video sequence is considered the trending research domain. Existing techniques utilize image processing for wild animal classification; however, the video-based classification is not much concentrated on any other previous research. So, in this research, we have concentrated on the wild animal...
Article
The textual information is abundantly increasing in the internet through different types of social media platforms. Knowing the type of information is one challenging task to different information retrieval systems and researchers. Text classification is one research domain used to categorize the textual information into different classes. Most of...
Article
Full-text available
In MANET, the multicast routing is considered as a non-deterministic polynomial (NP) complexity, it contains assorted objectives and restrictions. In the multicast issue of MANET, the Quality of services (QoS) based upon cost, delay, jitter, bandwidth, these are constantly deemed as multi-objective for intending multiple cast routing protocols. Con...
Article
Minimization of network downtime is the biggest challenge for service providers and one of its prime causes is equipment failure. On-time prediction and rectification of faults can reduce downtimes. Dynamic and very adaptive algorithms are required for processing huge torrents of data and the generation of predictions based on patterns and trends i...
Chapter
There is an enormous shortage of freshwater due to fast growth in industries, urbanization, and increased agricultural production. There arises a planned and optimal utilization of water resources due to increased water demands. An appropriate strategy based on the cohesive nature of surface and subsurface water resources is required to improve wat...
Conference Paper
Distributed Denial of Service (DDoS) attacks pose a considerable threat to Cloud Computing, Internet of Things (IoT) and other services offered on the Internet. The victim server receives terabytes of data per second during the DDoS attack. It may take hours to examine them to detect a potential threat, leading to denial of service to legitimate us...
Chapter
The Tor Browser bundle is said to maintain user privacy. With many users depending on it, the research interest has grown up in investigating the Tor Browser behavior. This paper researches on the aspects of whether the user privacy is really maintained completely. The experiments conducted reveal that digital traces are left behind which can be la...
Conference Paper
t In this paper, we proposed a new shape matrix representation mechanism for the automatic classification of targets from ISAR imagery. The proposed shape matrix representation method overcomes the undesirable side effects associated with the existing methods, such as the quantization of superfluous inner and outer shape details. The proposed mecha...
Chapter
The TOR browser is the most popular browser for surfing the Internet while being anonymous. This paper studies the digital artifacts left behind by TOR browser over the network and within the host. These artifacts give the most crucial forensic evidence for digital investigators to prove any unauthorized or unlawful activities. The paper also prese...
Article
Text classification is a technique of assigning the known class label to the unknown textual documents. This technique assign single label or multiple labels to a specific document based on the content in the document. These techniques are used in various applications such as sentiment analysis, authorship analysis, fake news detection and spam ema...
Article
Full-text available
The luminous value is high for many natural scenes, which causes loss of information and occurs in dark images. The High Dynamic Range (HDR) technique captures the same objects or scene for multiple times in different exposure and produces the images with proper illumination. This technique is used in the various applications such as medical imagin...
Article
Full-text available
Every user of the internet has high aspirations on its reliability, efficiency, productivity and in many other aspects of the same. Providing an uninterrupted service is of prime importance .The amount of data along with enormous number of residual traces is increasing rapidly and significantly. As a result, analysis of log data has profoundly infl...
Article
Full-text available
The guidelines offered in this document are a first draft to provide a holistic system of characteristics and parameters important for delivering active and engaging learning through digital solutions. We hope that these will be further elaborated with the active engagement of a broader group of specialists and researchers in the different fields o...
Article
Spectral clustering is a popular graph-based clustering technique. There is difficulty in similarity graph construction and curse of dimensionality is complex to deal with general spectral clustering algorithm consists of three steps, i) similarity graph construction, ii) Eigenvectors and Eigenvalues evaluation and iii) clustering with k means. Thi...
Article
In recent years the social networks are widely used the way of connecting people, interact with each other and share the information. The social network data is rich in content and the data are published for third party users such as researchers. The social interaction between individuals changes rapidly as time changes so there is a need of privac...
Article
Organization, Government and Individual (OGI) have popularized the use of Digital Social Networks (DSN) that reduces the processing time of social-aware tasks. To accomplish a community-based communication, each social-aware task should identify its community group. The identified group uses a task to avail all the DSN benefits to their customers /...
Article
Purpose Multimedia applications such as digital audio and video have stringent quality of service (QoS) requirement in mobile ad hoc network. To support wide range of QoS, complex routing protocols with multiple QoS constraints are necessary. In QoS routing, the basic problem is to find a path that satisfies multiple QoS constraints. Moreover, mob...
Article
Full-text available
The Personalized Privacy has drawn a lot of attention from diverse magnitudes of the public and various functional units like bureau of statistics, and hospitals. A large number of data publishing models and methods have been proposed and most of them focused on single sensitive attribute. A few research papers marked the need for preserving privac...
Chapter
In this chapter, Inverse Synthetic Aperture Radar, a special type of active microwave synthetic aperture radar is introduced and its applications in military surveillance are presented. Then, the basic principles involved in data acquisition and image generation are explained. The issues and challenges involved in processing the ISAR images for aut...
Article
A need to unveil health information for several reasons such as for health services, payment in case of insurances, health care operations, research and so on is on high demand. Personal information is to be disseminated without revealing the individual's identity in all these circumstances. Tremendous work has been carried out to provide privacy f...
Article
Full-text available
Computer Vision is applied in agriculture field for food grading, disease identification of the plants and agro-farms security. Huge crop damage is caused by the wild animal attacks on the agriculture farms. Here are some traditional techniques followed by the local farmers, but which are not effective. This problem can be solved using computer vis...
Article
Full-text available
Cloud computing delivers computing services over the Internet based on pay as you use financial model. Cloud service providers publish service advertisements in different formats on the Internet. Thus, cloud consumers should explore all provider websites using available search engines to find the appropriate cloud service. Unfortunately, existi...
Article
Full-text available
Cloud computing is a pattern for delivering ubiquitous and on demand computing resources based on pay-as-you-use financial model. Typically, cloud providers advertise cloud service descriptions in various formats on the Internet. On the other hand, cloud consumers use available search engines (Google and Yahoo) to explore cloud service descriptions...
Article
Mobile ad-hoc network face a serious issue of frequent change of network topology which leads to the stability and reliability problems of routing. Many routing schemes such as multi-path routing and backup path routing are developed to increase the link reliability in the literature. Accordingly, we propose to design a backup route establishment f...
Article
Full-text available
Inverse Synthetic Aperture Radar (ISAR) images are used (i) for detecting the high scatter parts or areas in the target (hot-spots) and (ii) for the identification of targets. Automatic Target Recognition (ATR) systems reduce the burden of the human operators by identifying the targets in ISAR images automatically and aid the operators in executing...
Article
Growing database demands more technological developments and computing paradigms, as Grid and Cloud computing, unleashed new developments in the database technology sector. Query Optimization is essentially a complex search task to obtain the best possible plan from the enormously increasing databases. Heterogeneous Distributed database management...
Article
loud computing delivers services over the internet based on pay as you use financial model. Cloud providers publish service advertisements in different format (text, files, table and images) on the Internet. On the other hand, cloud consumers spend a lot of time and effort to find the appropriate cloud service using public search engines. Nowa...
Article
Recommender systems support users in the overwhelmingta sk of examining through large quantities of data in order to select appropriate information or items. Unfortunately such systems may be matter to attack by spam users who want to operate the system's recommendatiom to outfit their needs: to encourage their own itemslsenrices or to originate tr...
Article
With the expansion of content sources on web 2.0, is an important issue of content-based filtering where the framework abilities to take user ratings from user’s activities in regards to one content source and utilize them over the other content types. When the service is restricted to recommend the content of an indistinguishable case, for the use...
Article
Intrusion Detection System (IDS) is one of the most important component of network defense mechanism. In an attempt to detect network attacks, network traffic features need to be identified and both attack and normal data need to be profiled. This paper proposes a set of network traffic features that can be extracted for Real-Time Intrusion Detecti...
Article
Full-text available
A firewall is the most essential component of network perimeter security. Due to human error and the involvement of multiple administrators in configuring firewall rules, there exist common anomalies in firewall rulesets such as Shadowing, Generalization, Correlation, and Redundancy. There is a need for research on efficient ways of resolving such...
Article
Full-text available
Achieving data privacy before publishing has been becoming an extreme concern of researchers, individuals and service providers. A novel methodology, Cooperative Privacy Game (CoPG), has been proposed to achieve data privacy in which Cooperative Game Theory is used to achieve the privacy and is named as Cooperative Privacy (CoP). The core idea of C...
Chapter
Full-text available
Wireless communications have become invaluable in the modern world. The market is going through a revolutionary transformation as new technologies and standards endeavor to keep up with demand for integrated and low-cost mobile and wireless devices. Due to their ubiquity, there is also a need for a simplification of the design of wireless systems a...
Article
Full-text available
As the actual links in mobile ad hoc networks (MANETs) are dynamic, the feasible path generated may not exist during the transmission of multimedia data. There is a need for generating multiple paths for guaranteed transmission. The multi-path finding can be achieved through a genetic-based algorithm that faces the major challenge in quality-of-ser...
Conference Paper
In recent years, social networks are widely used for representing the relationship between individuals and published for various research purposes. As time changes the relationship between individuals also changes so there exist a privacy breach of individuals in dynamic networks. In this paper we discuss about identity disclosure in sequential pub...
Article
Full-text available
In this paper an efficient ISAR image classification method is proposed based on Minimum Enclosed Circle based Shape Matrix (MECSM) representation of the targets. Initially, discordant ISAR images are processed to remove the noise and outliers. Next, an orientation alignment method is used to align the targets vertically to achieve rotation invaria...
Chapter
Information technology (IT) is creating huge data (big data) everyday. Future business intelligence (BI) can be estimated from the past data. Storing, organizing, and processing big data is the current trend. NoSQL (Moniruzzaman and Hossain, Int J Database Theory Appl 6(4), 2013) [1] and MapReduce (Dean and Ghemawat, MapReduce: simplified data proc...
Article
Nowadays, Content Based Image Retrieval (CBIR) plays a significant role in the image processing field. Images relevant to a given query image are retrieved by the CBIR system utilizing either low level features (such as shape, color etc.,) or high level features (human perception). Image-based math retrieval is a new area of research which has gain...
Article
Full-text available
Cloud computing is a paradigm for delivering ubiquitous, convenient, on-demand resources based on pay-as-you-go financial model. The Cloud Service Providers (CSPs) typically publish service descriptions, pricing policies and Service Level Agreement (SLA) rules on websites in various formats. With enormous growth of the cloud services and number of...
Article
Full-text available
Cloud computing is a paradigm for delivering ubiquitous, convenient, on-demand resources based on pay-as-you-go financial model. The Cloud Service Providers (CSPs) typically publish service descriptions, pricing policies and Service Level Agreement (SLA) rules on websites in various formats. With enormous growth of the cloud services and number of...
Article
Any service offered by a load balanced cluster is deployed on every member of the cluster. The Sliding window based Self-Learning and Adaptive Load Balancer (SSAL) is an observation based load balancer that optimizes throughput. It gives single point entry to access any service hosted on the cluster. This paper proposes a QoS-aware and Self-correct...
Article
We live in a world increasingly driven by data with more information about individuals, companies and governments available than ever before. Now, every business is powered by Information Technology and generating Big data. Future Business Intelligence can be extracted from the big data. NoSQL [1] and Map-Reduce [2] technologies find an efficient w...
Chapter
Human recognition techniques are used in many areas such as video surveillance, human action recognition, automobile industry for pedestrian detection, etc. The research on human recognition is widely going on and is open due to typical challenges in human detection. Histogram-based human detection methods are popular because of its better detectio...
Article
Privacy preserving data publication is a major concern for both the owners of data and the data publishers. Principles like K-anonymity, l-diversity were proposed to reduce privacy violations. On the other side, no studies were found on verification on the anonymized data in terms of adversarial breach and anonymity levels. However, the anonymized...
Article
Full-text available
Companies, organizations and policy makers shake out with flood flowing volume of transactional data, accumulating trillions of bytes of information about their customers, suppliers and operations. The advanced networked sensors are being implanted in devices such as mobile phones, smart energy meters, automobiles and industrial machines that sense...
Article
A load balancer distributes load among individual resources to minimize the response time, maximize the throughput and efficiently utilize the resources. Static load balancers distribute requests based on pre-known server capability ratios. Dynamic load balancers either observe or collect the performance indicating attributes of the servers, and di...
Conference Paper
Content-Based Image Retrieval is commonly utilized in most of the systems. Based on image content, CBIR extracts images that are relevant to the given query image from large image databases. Most of the CBIR systems available in the literature extract only concise feature sets that limit the retrieval efficiency. In this paper, extensive feature su...
Article
Indoleamine 2,3-dioxygenase (IDO) is emerging as an important new therapeutic drug target for the treatment of cancer characterized by pathological immune suppression. IDO catalyzes the rate-limiting step of tryptophan degradation along the kynurenine pathway. Reduction in local tryptophan concentration and the production of immunomodulatory trypto...
Article
The dynamic nature of social network and the influence it has on the provision of immediate solutions to a simple task made their usage prominent and dependable. Whether it is a task of getting a solution to a trivial problem or buying a gadget online or any other task that involves collaborative effort, interacting with people across the globe, th...
Article
The binding energy is the significant factor which elucidates the efficiency of docking between protein-ligand and protein-protein. To perform the Docking process, Genetic algorithm with its standard parameters is been used very often which will furnish the docking conformations, binding energies, interactions etc. In this proposed work, the parame...
Article
The data in dental health domain is rich as it is collected from different sources like public survey records, electronic health records, genomic data and behavioral data and so on. In addition, the insight of this data is complex, noise, heterogeneous, longitudinal, high volume and incremental in nature. As a result, effective handle and make infe...
Article
Rough Sets (RS), the most promising and proven approach for data reduction, has the ability to retain the essence of the data and it does not expect any domain inputs from an expert. RS based reduction however can attain only local minima, so to elaborate the search space it is wise to employ well known and proven artificial intelligence techniques...
Article
In wireless sensor network (WSNs), the coverage strategy for achieving higher performance in intruder detection probability near irregular geographical obstacles inside a military terrain, is studied in this paper. The real life problem of the of intruder detection near irregular geographical obstacles has not been focused so far, in which coverage...
Article
Full-text available
Explosive growth of information in the Internet has raised threats for individual privacy. k-Anonymity and l-diversity are two known techniques proposed to address the threats. They use concept hierarchy tree (CHT)-based generalization/suppression. For a given attribute several CHTs can be constructed. An appropriate CHT is to be chosen for attribu...
Article
For the treatment of cancer, Indoleamine 2,3-dioxygenase (IDO) is emerging as an important new therapeutic drug target characterized by pathological immune suppression. On the other hand, Withaferin A (WA) - active constituent of Withania somnifera ayurvedic herb has shown to be having a wide range of targeted anti cancer properties. Previously, we...
Article
A majority of the existing symmetric block encryption algorithms are deterministic in nature, i.e. for a given message and key combination, the encryption always results the same cipher text. An adversary can exploit this deterministic nature of symmetric block encryption algorithms by performing linear and differential cryptanalysis. Various block...
Article
Full-text available
Data Cleaning helps in reducing redundancy by determining whether two or more records defined differently in database represent the same real world object. If they represent the same, then the values of the records are nested generating a new n-wMVD database. The limitation with this approach is that addition or deletion of data is not done dynamic...
Article
Full-text available
Data Cleaning helps in reducing redundancy by determining whether two or more records defined differently in database represent the same real world object. If they represent the same, then the values of the records are nested generating a new n-wMVD database. The limitation with this approach is that addition or deletion of data is not done dynamic...
Article
k-anonymity is one of the most popular conventional techniques for protecting the privacy of an individual. In this process, the following limitations are observed: 1) The anonymisation is done based on an assumed value of k; 2) the information loss can be found only after the anonymisation is done; 3) if the information loss is found to be more th...
Article
The increased usage of World Wide Web (WWW) becomes a vast data repository related to the users’ interaction with the websites which is unstructured, unlabeled, high redundant and less reliable recorded in weblog. In addition, the existence of non linearity, incompleteness, heterogeneous and transient nature of data makes the weblog further complex...
Article
a given end user query, a personalized search engine returns an enormous set of related results. The results pertinent to a user are not regularly put on the top. The most fretting issue for the user would be to quickly find the related information in the first few. An efficient personalized search engine should be able to rank the search results a...
Article
Metasearch engines provide a uniform query interface for Internet users to search for information. Depending on users need, they select relevant sources and map user queries into the target search engines, subsequently merging the results. In this paper, we have proposed a metasearch engine, which have two unique steps (1) searching through surface...

Network

Cited By