Kranthi Kumar SIngamaneni

@gitam.edu

Assistant Professor , Computer Science and Engineering
Gandhi Institute of Technology and Management, formerly GITAM University



                    

https://researchid.co/ksingama

RESEARCH INTERESTS

cloud security, cyber security, applied cryptography, data science

28

Scopus Publications

412

Scholar Citations

10

Scholar h-index

12

Scholar i10-index

Scopus Publications

  • A Novel Hybrid Quantum-Crypto Standard to Enhance Security and Resilience in 6G enabled IoT Networks
    Kranthi Kumar Singamaneni, Anil Kumar Budati, Shayla Islam, Raenu Kolandaisamy, and Ghulam Muhammad

    Institute of Electrical and Electronics Engineers (IEEE)


  • A Novel Multi-Qubit Quantum Key Distribution Ciphertext-Policy Attribute-Based Encryption Model to Improve Cloud Security for Consumers
    Kranthi Kumar Singamaneni, Ghulam Muhammad, and Zulfiqar Ali

    Institute of Electrical and Electronics Engineers (IEEE)


  • Decoding the future: exploring and comparing ABE standards for cloud, IoT, blockchain security applications
    Kranthi Kumar Singamaneni, Kusum Yadav, Arwa N. Aledaily, Wattana Viriyasitavat, Gaurav Dhiman, and Amandeep Kaur

    Springer Science and Business Media LLC

  • An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy
    Kranthi Kumar Singamaneni, Anil Kumar Budati, and Thulasi Bikku

    Springer Science and Business Media LLC

  • A Novel Quantum Hash-Based Attribute-Based Encryption Approach for Secure Data Integrity and Access Control in Mobile Edge Computing-Enabled Customer Behavior Analysis
    Kranthi Kumar Singamaneni, Ghulam Muhammad, and Zulfiqar Ali

    Institute of Electrical and Electronics Engineers (IEEE)
    The domain of Mobile Edge Computing (MEC) has seen rapid growth, making consumer behavior research an essential element in many applications. Nevertheless, in MEC systems that are decentralized and have limited resources, challenges arise in ensuring both data integrity and access control. This paper introduces a new technique called Quantum Hash-Based Attribute-Based Encryption (QH-ABE) to address these issues. Previously, there were several methods available to guarantee data integrity and access control in MEC. However, these systems had limits in managing large and intricate datasets, lacked a standardized protocol for revocation, and incurred significant computational costs. We were prompted by these restrictions to suggest a more efficient technique, which included using the QH-ABE method in our study. The suggested solution integrates hash functions with quantum computing concepts to enhance security and control access in MEC-enabled consumer behavior research. The suggested technique provides several benefits compared to traditional hash algorithms by using hash functions. In this technique, we introduce a Recursive Non-Linear Polynomial graph-centered Integrity Algorithm (RNLPIA). RNLPIA enhances security by thwarting covert alterations to data and guaranteeing tamper-evident measures via the generation of unique hash values derived from the content of the data. The suggested method’s efficacy and efficiency are proved by a comprehensive experimental assessment, highlighting its capability to fulfill the data integrity and access control needs of MEC situations. The performance of our technology showcases its potential and paves the way for using quantum computing technologies for accessing control and data security. This work contributes to the progress of privacy-preserving, secure consumer behavior analysis in the dynamic MEC environment.

  • Binary Image Classification on Fashion-MNIST Using TensorFlow-Quantum and CIRQ


  • Intelligent Agribusiness System-An Echo Friendly IOT based Approach
    Venkateswarlu Gundu, Kranthi Kumar Singamaneni, Ramesh G., Prabhakar Kandukuri, Deepti Sharma, and Madhavi Karanam

    EDP Sciences
    Internet of Things (IoT) innovation is one of the fastest growing fields in various regions or aspects which include irrigation. IoT works on the character of our lives by way of bringing and cultivating modifications in many fields of exercises to motive them to come to be convenient, savvy and enriched with the aid of adequate guy-made recognition. As a result of this innovation, smart cultivating frameworks recognize a social trade towards current agri-business that is more useful, consumes less water, and is extraordinarily less luxurious. The primary goal of this paper is to make use of IoT within the agribusiness subject to accumulate facts right away (soil Moister, temperature), with a purpose to help one with staring at a few climate situations distantly, effectively and improve massively the creation and thus the pay of ranchers. The modern version is created utilizing NodeMCU innovation, which contains express sensors, and a Wifi module that assists with amassing moment records on the internet. It is worth concentrating on the testing of this model created, profoundly precise data in light of the fact that any herbal changes were outstanding in a flash and taking into consideration to decide. This paper speculating about integrating the IoT with different other technologies.

  • Paddy Leaf Disease Identification on Infrared Images based on CNN with Auto Encoders
    Prabhakar Kandukuri, B. Sameer Sowrab, G. Ramesh, and Kranthi Kumar Singamaneni

    IEEE
    The main food that people in India consume on a daily basis is paddy. According to data, the stress caused by rice illnesses, which reduce yields by 70%, was felt by the paddy farmers. If not controlled within a certain time frame, these plant diseases, which are typically brought on by pests, insects, and pathogens, have a significant negative impact on productivity. This research proposed auto encoders rooting convolutional neural network model to control these paddy diseases, and it has been implemented with various per-trained models like Vgg16, Resnet50, and inceptionV6. This model accurately determines whether a paddy plant is healthy or has one of four different types of paddy diseases. These models were developed, tested using auto encoders and a dataset of thermal pictures that was made available to the public, and they achieved the maximum model accuracy of 90.6%. A 84.8% was attained in the prior iteration without the use of auto encoders. With the use of this model, people can quickly detect paddy illness and assist farmers in raising productivity and yield.

  • An Efficient Hybrid QHCP-ABE Model to Improve Cloud Data Integrity and Confidentiality
    Kranthi Kumar Singamaneni, Ali Nauman, Sapna Juneja, Gaurav Dhiman, Wattana Viriyasitavat, Yasir Hamid, and Joseph Henry Anajemba

    MDPI AG
    Cloud computational service is one of the renowned services utilized by employees, employers, and organizations collaboratively. It is accountable for data management and processing through virtual machines and is independent of end users’ system configurations. The usage of cloud systems is very simple and easy to organize. They can easily be integrated into various storages of the cloud and incorporated into almost all available software tools such as Hadoop, Informatica, DataStage, and OBIEE for the purpose of Extraction-Transform-Load (ETL), data processing, data reporting, and other related computations. Because of this low-cost-based cloud computational service model, cloud users can utilize the software and services, the implementation environment, storage, and other on-demand resources with a pay-per-use model. Cloud contributors across this world move all these cloud-based apps, software, and large volumes of data in the form of files and databases into enormous data centers. However, the main challenge is that cloud users cannot have direct control over the data stored at these data centers. They do not even know the integrity, confidentiality, level of security, and privacy of their sensitive data. This exceptional cloud property creates several different security disputes and challenges. To address these security challenges, we propose a novel Quantum Hash-centric Cipher Policy-Attribute-based Encipherment (QH-CPABE) framework to improve the security and privacy of the cloud user’s sensitive data. In our proposed model, we used both structured and unstructured big cloud clinical data as input so that the simulated experimental results conclude that the proposal has precise, resulting in approximately 92% correctness of bit hash change and approximately 96% correctness of chaotic dynamic key production, enciphered and deciphered time as compared with conventional standards from the literature.

  • A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks
    Kranthi Kumar Singamaneni, Gaurav Dhiman, Sapna Juneja, Ghulam Muhammad, Salman A. AlQahtani, and John Zaki

    MDPI AG
    The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend their capabilities for production amenities, security, and efficacy. IIoT establishes an enterprise-to-enterprise setup that means industries have several factories and manufacturing units that are dependent on other sectors for their services and products. In this context, individual industries need to share their information with other external sectors in a shared environment which may not be secure. The capability to examine and inspect such large-scale information and perform analytical protection over the large volumes of personal and organizational information demands authentication and confidentiality so that the total data are not endangered after illegal access by hackers and other unauthorized persons. In parallel, these large volumes of confidential industrial data need to be processed within reasonable time for effective deliverables. Currently, there are many mathematical-based symmetric and asymmetric key cryptographic approaches and identity- and attribute-based public key cryptographic approaches that exist to address the abovementioned concerns and limitations such as computational overheads and taking more time for crucial generation as part of the encipherment and decipherment process for large-scale data privacy and security. In addition, the required key for the encipherment and decipherment process may be generated by a third party which may be compromised and lead to man-in-the-middle attacks, brute force attacks, etc. In parallel, there are some other quantum key distribution approaches available to produce keys for the encipherment and decipherment process without the need for a third party. However, there are still some attacks such as photon number splitting attacks and faked state attacks that may be possible with these existing QKD approaches. The primary motivation of our work is to address and avoid such abovementioned existing problems with better and optimal computational overhead for key generation, encipherment, and the decipherment process compared to the existing conventional models. To overcome the existing problems, we proposed a novel dynamic quantum key distribution (QKD) algorithm for critical public infrastructure, which will secure all cyber–physical systems as part of IIoT. In this paper, we used novel multi-state qubit representation to support enhanced dynamic, chaotic quantum key generation with high efficiency and low computational overhead. Our proposed QKD algorithm can create a chaotic set of qubits that act as a part of session-wise dynamic keys used to encipher the IIoT-based large scales of information for secure communication and distribution of sensitive information.

  • An Enhanced Dynamic Nonlinear Polynomial Integrity-Based QHCP-ABE Framework for Big Data Privacy and Security
    Kranthi Kumar Singamaneni, Abhinav Juneja, Mohammed Abd-Elnaby, Kamal Gulati, Ketan Kotecha, and A. P. Senthil Kumar

    Hindawi Limited
    Topics such as computational sources and cloud-based transmission and security of big data have turned out to be a major new domain of exploration due to the exponential evolution of cloud-based data and grid facilities. Various categories of cloud services have been utilized more and more widely across a variety of fields like military, army systems, medical databases, and more, in order to manage data storage and resource calculations. Attribute-based encipherment (ABE) is one of the more efficient algorithms that leads to better consignment and safety of information located within such cloud-based storage amenities. Many outmoded ABE practices are useful for smaller datasets to produce fixed-size cryptograms with restricted computational properties, in which their characteristics are measured as evidence and stagnant standards used to generate the key, encipherment, and decipherment means alike. To surmount the existing problems with such limited methods, in this work, a dynamic nonlinear poly randomized quantum hash system is applied to enhance the safety of cloud-based information. In the proposed work, users’ attributes are guaranteed with the help of a dynamic nonlinear poly randomized equation to initialize the chaotic key, encipherment, and decipherment. In this standard, structured and unstructured big data from clinical datasets are utilized as inputs. Real-time simulated outcomes demonstrate that the stated standard has superior exactness, achieving over 90% accuracy with respect to bit change and over 95% accuracy with respect to dynamic key generation, encipherment time, and decipherment time compared to existing models from the field and literature. Experimental results are demonstrated that the proposed cloud security standard has a good efficiency in terms of key generation, encoding, and decoding process than the conventional methods in a cloud computing environment.

  • An efficient quantum hash-based CP-ABE framework on cloud storage data
    Kranthi Kumar Singamaneni and P. Sanyasi Naidu

    Inderscience Publishers

  • Automated speech based evaluation of mild cognitive impairment and Alzheimer’s disease detection using with deep belief network model
    Chiai AI-Atroshi, J. Rene Beulah, Kranthi Kumar Singamaneni, C. Pretty Diana Cyril, S. Neelakandan, and S. Velmurugan

    Informa UK Limited

  • The Performance Analysis and Security Aspects of MANET
    Kranthi Singamaneni, Abdullah Shawan Alotaibi, Sri Vijaya K, and Purnendu Shekhar Pandey

    The Electrochemical Society
    Mobile Ad hoc NETwork (MANET) is a type of network that is built by connecting a number of mobile devices together in a temporary manner through impermanent connections. Through broadcasting, the information should be distributed to all nodes in the network. A MANET is a network of self-configurable mobile nodes that are connected wirelessly. The security aspect of MANET is a major challenge, and there is a great deal of research being done in this area. The availability of energy is a critical criterion for a decentralised network. The protocol for AODV and DSR routing, as well as the security of the black hole node, are all investigated in this study. Protocols that are used during the route discovery process are particularly vulnerable to attack by the black hole. The goal of this survey, as a result, is to thoroughly investigate black hole attacks while also evaluating the performance of AODV and DSR during black hole attack scenarios. With Network Simulator 3, the work is completed by simulating both protocols under normal operation as well as under a black hole attack. The work is completed with Network Simulator 3 by simulating both protocols under a black hole attack (NS-3). AODV is more vulnerable to a black hole attack than the DSR, according to the results of simulations, and this vulnerability is greater under normal operating conditions. It has been discovered that MANET attacks are carried out with the assistance of a "black hole," according to simulation results.

  • Stock Price Prediction Using Optimal Network Based Twitter Sentiment Analysis
    Singamaneni Kranthi Kumar, Alhassan Alolo Abdul-Rasheed Akeji, Tiruvedula Mithun, M. Ambika, L. Jabasheela, Ranjan Walia, and U. Sakthi

    Computers, Materials and Continua (Tech Science Press)

  • Big data analytics with oenn based clinical decision support system
    Thejovathi Murari, L. Prathiba, Kranthi Kumar Singamaneni, D. Venu, Vinay Kumar Nassa, Rachna Kohar, and Satyajit Sidheshwar Uparkar

    Computers, Materials and Continua (Tech Science Press)

  • A Novel Implementation of Linux Based Android Platform for Client and Server
    M. Kiran Kumar, S. Kranthi Kumar, Ella Kalpana, Donapati Srikanth, and K. Saikumar

    Springer International Publishing

  • A novel blockchain and bi‐linear polynomial‐based qcp‐abe framework for privacy and security over the complex cloud data
    Kranthi Kumar Singamaneni, Kadiyala Ramana, Gaurav Dhiman, Saurabh Singh, and Byungun Yoon

    MDPI AG
    As a result of the limited resources available in IoT local devices, the large scale cloud consumer’s data that are produced by IoT related machines are contracted out to the cloud. Cloud computing is unreliable, using it can compromise user privacy, and data may be leaked. Because cloud-data and grid infrastructure are both growing exponentially, there is an urgent need to explore computational sources and cloud large-data protection. Numerous cloud service categories are assimilated into numerous fields, such as defense systems and pharmaceutical databases, to compute information space and allocation of resources. Attribute Based Encryption (ABE) is a sophisticated approach which can permit employees to specify a higher level of security for data stored in cloud storage facilities. Numerous obsolete ABE techniques are practical when applied to small data sets to generate cryptograms with restricted computational properties; their properties are used to generate the key, encrypt it, and decrypt it. To address the current concerns, a dynamic non-linear polynomial chaotic quantum hash technique on top of secure block chain model can be used for enhancing cloud data security while maintaining user privacy. In the proposed method, customer attributes are guaranteed by using a dynamic non- polynomial chaotic map function for the key initialization, encryption, and decryption. In the proposed model, both organized and unorganized massive clinical data are considered to be inputs for reliable corroboration and encoding. Compared to existing models, the real-time simulation results demonstrate that the stated standard is more precise than 90% in terms of bit change and more precise than 95% in terms of dynamic key generation, encipherment, and decipherment time.

  • Executing CNN-LSTM algorithm for recognizable proof of cervical spondylosis infection on spinal cord MRI image: Machine learning image
    Sasank V. V. S., Kranthi Kumar Singamaneni, A. Sampath Dakshina Murthy, and S. K. Hasane Ahammad

    IGI Global
    Various estimating mechanisms are present for evaluating the regional agony, neck torment, neurologic deficiencies of the sphincters at the stage midlevel of cervical spondylosis. It is necessary for the cervical spondylosis that the survey necessitates wide range of learning skills about the systemized life, experience, and ability of the expertise for learning the capability, life system, and experience. Doctors check the analysis of situation through MRI and CT scan, but additional interesting facts have been discovered in the physical test. For this, a programming approach is not available. The authors thereby propose a novel framework that accordingly inspects and investigates the cervical spondylosis employing computation of CNN-LSTM. Machine learning methods such as long short-term memory (LSTM) in fusion with convolution neural networks (CNNs), a kind of neural network (NN), are applied to this strategy to evaluate for making the systematization in various applications.

  • Exploration of convolutional neural network with node-centred intrusion detection structure plan for green cloud


  • A novel integrated approach to predict bitcoin price using LSTM of RNN, GBDT and gated recurrent unit architecture



  • Image transformation technique using steganography methods using LWT technique
    Singamaneni Kumar, Pallela Reddy, Gajula Ramesh, and Venkata Maddumala

    International Information and Engineering Technology Association
    Received: 7 March 2019 Accepted: 26 May 2019 Digital image watermarking is a technique adopted to get rid of the increasing piracies in digital images. Computerized information can be effectively duplicated, altered and falsifications be made by anybody having a PC. Most inclined to such vindictive assaults are the watermarked pictures distributed in the Internet. Advanced Watermarking can be utilized as a device for finding unapproved information reuse and furthermore for copyright security. In the existing method, texturization dependant image watermarking methodology is performed which involves the embedding and extraction of a logo image to and from an original image respectively. After finding out the texture regions of host image, the logo image is embedded into the identified texture regions by Discrete Wavelet Transform. Before embedding, according to the textual characteristics of the host image analyzed, texturization of a logo is done by using Arnold transform and a rotation. It is effective for attaining a similar texture for both logo image and host image. Later the logo image is extracted back. Discrete Wavelet Transform results in degradation of quality and robustness of watermarked image. Also it is not a difficult task for an attacker to compromise the Arnold transform and rotation performed. In this work, Lifting Wavelet Transform technique is used instead of the Discrete Wavelet Transform as it overcome the above mentioned drawback. In addition, Arnold transform and rotation is replaced with circular shift method for enhancing security.

RECENT SCHOLAR PUBLICATIONS

  • Quantum Computing Models for Cybersecurity and Wireless Communications
    BA Kumar, SK Kumar, L Xingwang
    John Wiley & Sons 2025

  • A Novel Hybrid Quantum-Crypto Standard to Enhance Security and Resilience in 6G Enabled IoT Networks
    KK Singamaneni, AK Budati, S Islam, R Kolandaisamy, G Muhammad
    IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025

  • A novel integrated quantum-resistant cryptography for secure scientific data exchange in ad hoc networks
    KK Singamaneni, G Muhammad
    Ad Hoc Networks 164, 103607 2024

  • A novel QoS-based IoT network security approach with lightweight lattice-based quantum attribute-based encryption
    A Ramakrishna, KK Singamaneni, GJ Reddy, KR Madhavi, ...
    Tsinghua Science and Technology 2024

  • Unleashing the Power of a Novel Lightweight Lattice-based CP-ABE for Robust IoT Data Transmission.
    KK SINGAMANENI, E MOHAN
    Adhoc & Sensor Wireless Networks 59 2024

  • Decoding the future: exploring and comparing ABE standards for cloud, IoT, blockchain security applications
    KK Singamaneni, K Yadav, AN Aledaily, W Viriyasitavat, G Dhiman, ...
    Multimedia Tools and Applications, 1-29 2024

  • An efficient Q-KPABE framework to enhance cloud-based IoT security and privacy
    KK Singamaneni, AK Budati, T Bikku
    Wireless Personal Communications, 1-29 2024

  • A novel quantum hash-based attribute-based encryption approach for secure data integrity and access control in mobile edge computing-enabled customer behavior analysis
    KK Singamaneni, G Muhammad, Z Ali
    IEEE Access 2024

  • A novel multi-qubit quantum key distribution ciphertext-policy attribute-based encryption model to improve cloud security for consumers
    KK Singamaneni, G Muhammad, Z Ali
    IEEE Transactions on Consumer Electronics 70 (1), 1092-1101 2023

  • Paddy leaf disease identification on infrared images based on cnn with auto encoders
    P Kandukuri, BS Sowrab, G Ramesh, KK Singamaneni
    2023 Second International Conference on Augmented Intelligence and 2023

  • Intelligent Agribusiness System-An Echo Friendly IOT based Approach
    V Gundu, KK Singamaneni, G Ramesh, P Kandukuri, D Sharma, ...
    E3S Web of Conferences 430, 01069 2023

  • An efficient hybrid QHCP-ABE model to improve cloud data integrity and confidentiality
    KK Singamaneni, A Nauman, S Juneja, G Dhiman, W Viriyasitavat, ...
    Electronics 11 (21), 3510 2022

  • A novel QKD approach to enhance IIOT privacy and computational knacks
    KK Singamaneni, G Dhiman, S Juneja, G Muhammad, SA AlQahtani, ...
    Sensors 22 (18), 6741 2022

  • The performance analysis and security aspects of manet
    K Singamaneni, AS Alotaibi, PS Pandey
    ECS Transactions 107 (1), 10945 2022

  • Automated speech based evaluation of mild cognitive impairment and Alzheimer’s disease detection using with deep belief network model
    C AI-Atroshi, J Rene Beulah, KK Singamaneni, C Pretty Diana Cyril, ...
    International Journal of Healthcare Management, 1-11 2022

  • Stock price prediction using optimal network based twitter sentiment analysis
    SK Kumar, A Akeji, T Mithun, M Ambika, L Jabasheela, R Walia, U Sakthi
    Intelligent Automation and Soft Computing 33 (2), 1217-1227 2022

  • An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and Security
    KK Singamaneni, A Juneja, M Abd-Elnaby, K Gulati, K Kotecha, ...
    Security and Communication Networks 2022 (1), 4206000 2022

  • An efficient quantum hash-based CP-ABE framework on cloud storage data
    KK Singamaneni, PS Naidu
    International Journal of Advanced Intelligence Paradigms 22 (3-4), 336-347 2022

  • Big data analytics with OENN based clinical decision support system
    T Murari, L Prathiba, KK Singamaneni, D Venu, VK Nassa, R Kohar, ...
    Intelligent Automation & Soft Computing 31 (2), 1241-1256 2022

  • SYSTEM FOR DETECTING QUALITY OF FOOD IN REAL-TIME
    KK Singamaneni
    IN Patent App. 202,041,023,578 2022

MOST CITED SCHOLAR PUBLICATIONS

  • A novel QKD approach to enhance IIOT privacy and computational knacks
    KK Singamaneni, G Dhiman, S Juneja, G Muhammad, SA AlQahtani, ...
    Sensors 22 (18), 6741 2022
    Citations: 51

  • Image Transformation Technique Using Steganography Methods Using LWT Technique
    SK Kumar, PDK Reddy, G Ramesh, VR Maddumala
    Traitement du Signal 36 (3), 233-237 2019
    Citations: 51

  • A novel implementation of Linux based android platform for client and server
    M Kiran Kumar, S Kranthi Kumar, E Kalpana, D Srikanth, K Saikumar
    A Fusion of Artificial Intelligence and Internet of Things for Emerging 2022
    Citations: 50

  • Automated speech based evaluation of mild cognitive impairment and Alzheimer’s disease detection using with deep belief network model
    C AI-Atroshi, J Rene Beulah, KK Singamaneni, C Pretty Diana Cyril, ...
    International Journal of Healthcare Management, 1-11 2022
    Citations: 31

  • An Effective Parkinson's Disease Prediction Using Logistic Decision Regression and Machine Learning with Big Data
    DSD K. Singamaneni, Dr. G. Puthilibai, D. Saravanan, Sagaya Aurelia, P. Krishna
    Turkish Journal of Physiotherapy and Rehabilitation 32 (3), 778-786 2021
    Citations: 31

  • An efficient hybrid QHCP-ABE model to improve cloud data integrity and confidentiality
    KK Singamaneni, A Nauman, S Juneja, G Dhiman, W Viriyasitavat, ...
    Electronics 11 (21), 3510 2022
    Citations: 26

  • A novel blockchain and Bi-linear polynomial-based QCP-ABE framework for privacy and security over the complex cloud data
    KK Singamaneni, K Ramana, G Dhiman, S Singh, B Yoon
    Sensors 21 (21), 7300 2021
    Citations: 25

  • An efficient Q-KPABE framework to enhance cloud-based IoT security and privacy
    KK Singamaneni, AK Budati, T Bikku
    Wireless Personal Communications, 1-29 2024
    Citations: 14

  • Publicly verifiable and efficiency/security-adjustable outsourcing scheme for solving large-scale modular system of linear equations
    P Meng, C Tian, X Cheng
    Journal of Cloud Computing 8 (1), 24 2019
    Citations: 12

  • Handbook of research on innovations and applications of AI, IoT, and cognitive technologies
    J Zhao, VV Kumar
    IGI Global 2021
    Citations: 11

  • A novel multi-qubit quantum key distribution ciphertext-policy attribute-based encryption model to improve cloud security for consumers
    KK Singamaneni, G Muhammad, Z Ali
    IEEE Transactions on Consumer Electronics 70 (1), 1092-1101 2023
    Citations: 10

  • Efficient quantum cryptography technique for key distribution
    KK Singamaneni, PS Naidu, PVS Kumar
    J. Eur. Des Syst. Autom 51, 283 2018
    Citations: 10

  • Stock price prediction using optimal network based twitter sentiment analysis
    SK Kumar, A Akeji, T Mithun, M Ambika, L Jabasheela, R Walia, U Sakthi
    Intelligent Automation and Soft Computing 33 (2), 1217-1227 2022
    Citations: 9

  • An improved dynamic polynomial integrity based QCP-ABE framework on large cloud data security
    KK Singamaneni, SN Pasala
    International journal of knowledge-based and intelligent engineering systems 2020
    Citations: 9

  • IBLIND Quantum Computing and HASBE for Secure Cloud Data Storage and Accessing.
    KK Singamaneni, PS Naidu
    Rev. d'Intelligence Artif. 33 (1), 33-37 2019
    Citations: 9

  • An Enhanced Dynamic Nonlinear Polynomial Integrity‐Based QHCP‐ABE Framework for Big Data Privacy and Security
    KK Singamaneni, A Juneja, M Abd-Elnaby, K Gulati, K Kotecha, ...
    Security and Communication Networks 2022 (1), 4206000 2022
    Citations: 8

  • An efficient quantum hash-based CP-ABE framework on cloud storage data
    KK Singamaneni, PS Naidu
    International Journal of Advanced Intelligence Paradigms 22 (3-4), 336-347 2022
    Citations: 8

  • Secure key management in cloud environment using quantum cryptography.
    KK Singamaneni, P Naidu
    Ingnierie des Systmes d'Information 23 (5) 2018
    Citations: 8

  • Dr. P, Sagaya Aurelia, P Gopala Krishna, Dr. D. Stalindavid,” An Effective Parkinson's Disease Prediction Using Logistic Decision Regression and Machine Learning with Big Data “
    KK Singamaneni, DG Puthilibai, D Saravanan
    Turkish Journal of Physiotherapy and Rehabilitation 32 (3), 778-786
    Citations: 8

  • Exploration of convolutional neural network with node-centred intrusion detection structure plan for green cloud
    K Singamaneni, KN Reddy, N Yamsani, K Sarada, K Saikumar
    Journal of Green Engineering 2020
    Citations: 5