Network Security, Web technologies,Computer networks, Machine learning
RECENT SCHOLAR PUBLICATIONS
Secured image encryption by elliptic curve cryptographic techniqueK Sujatha, LP Kumar, A Rao, NV ReddyAIP Conference Proceedings 2512 (1) 2024
Speech Recognition With Deep LearningN Viswanadha Reddy, A Yerninti, D Rapeti, Y Sahukar, CVV KrishnaJournal of Pharmaceutical Negative Results, 9144-9147 2022
Detection of Unauthorized Access Points Based on Machine Learning TechniquesC Narasimham, V Manasa, S Karimisetty, N Viswanadha Reddy, ...Cyber Technologies and Emerging Sciences: ICCTES 2021, 405-410 2022
Deniable Attribute-based Encryption using Audit-Free Cloud StorageNVR R.V.L.S.N Sastry1 , Dr.B. Giridhar2INTERNATIONAL JOURNAL FOR RESEARCH & DEVELOPMENT IN TECHNOLOGY 7 (Issue-4 2017
“CLINICAL PROGRAMMING SYSTEM WITH SPEECH PROCESSORS”N VISWANADHAREDDYNational conference 2007
Facial Expression Based Emotion RecognitionGA Rao, NV Reddy, K Sujatha