Dr ADDAPALLI V N KRISHNA
BE, ME, MTech, PhD
PROFESSOR
Articles in Journals
Sl.No. Title Name of Journal / Vol. No. / Issue No. / Page Nos ISSN No. Date Published
1 A node deployment mechanism for energy efficient routing in heterogeneous wireless sensor networks. Journal of Theoretical and applied Information technology / 93 / No.1 / 17 - 23 1992-8645 15-Nov-2016
2 A Novel Approach with Matrix based Public Key crypto systems Journal of Discrete Mathematical Sciences and Cryptography / 20 / 2 / 407 - 412 0972-0529 09-Mar-2017
3 Fully Homomorphic Encryption with Matrix based Digital Signature Standard Journal of Discrete Mathematical Sciences and Cryptography / 20 / 2 / 439 - 444 0972-0529 09-Mar-2017
4 Cubic Spline Curve Public Key Cryptography Journal of Discrete Mathematical Sciences and Cryptography / 20 / 2 / 453 - 461 0972-0529 09-Mar-2017
5 Provably Secure Quantum Key distribution by applying Quantum gate International journal of Network Security / 20 / 1 / 88 - 94 1816-353X 03-Jan-2018
6 Significance of Key Distribution Using Quantum Cryptography International Journal of Innovative Computing, Information and Control / 13 / 5 / 1 - 7 1349-4198 07-Jul-2017
7 Performance Evaluation of Diesel Engine using Genetic Algorithm International Journal of Engineering and Advanced Technology (IJEAT) / 8 / 2 / 155 - 158 2249-8958 31-Dec-2018
8 Predictive analysis using resilient and traditional backpropaga-tion algorithm International Journal of Engineering & Technology / 7 / 4 / 4411 - 4414 2227-524X 20-Jan-2019
9 A Novel Congestion-Aware Approach for ECC based Secured WSN Multicasting Journal of Adv Research in Dynamical & Control Systems / 10 / 10 / 83 - 91 1943-023X 19-Dec-2018
10 A Machine Learning Model for Population Analysis among Different States in India which Influences the Socio, Demographic and Economic Needs of Society International Journal of Engineering and Advanced Technology (IJEAT) / 9 / 1 / 123 - 126 2249-8958 30-Oct-2019
11 A Secured and Scalable Battle-Field Surveillance using WSN Multicasting International Journal of Engineering and Advanced Technology / 9 / 2 / 2445 - 2449 2249-8958 31-Dec-2019
12 Statistical Tests For Key Strength Identification In Cryptography International Journal Of Scientific & Technology Research / 9 / 2 / 4243 - 4245 2277-8616 15-Feb-2020
13 A New Algorithm With Its Randomness And Effectiveness Against Statistical Tests In Data Encryption International Journal of Scientific & Technology Research / 9 / 2 / 6185 - 6187 2277-8616 15-Feb-2020
14 A Study On Prediction Of Health Care Data Using Machine Learning International Journal of Scientific & Technology Research / 9 / 04 / 616 - 620 2277-8616 01-Apr-2020
15 Analyzing the Total Household data of different states in India based on Census and evaluating their relative performance using Machine Learning Solid State Technology / 63 / I4 / 1469 - 1474 0038-111X 25-Sep-2020
16 A Study on the effect of canny edge detection on Downscaled images Pattern Recognition and Image Analysis / 30 / 3 / 372 - 381 1054-6618 16-Sep-2020
17 Portrait Segmentation Using Ensemble of Heterogeneous Deep-Learning Models Entropy / 23 / 197 / 1 - 20 1099-4300 05-Feb-2021
18 An Energy Efficient Node Scheduling based Congestion Control Scheme for WSN Multicasting EAI Endorsed Transactions on Energy Web / 7 / 30 / 1 - 6 2032-944X 29-Apr-2020
19 A Study On Prediction Of Health Care Data Using Machine Learning International Journal Of Scientific & Technology Research / 9 / 4 / 616 - 620 2277-8616 10-Apr-2020
20 Crime Analysis and Forecasting on Spatio Temporal News Feed Data?An Indian Context Studies in Bigdata / 90 / / 307 - 327 2197-6503 01-May-2021
21 An efficient Non linear Access Policy Based on Quadratic Residue for Ciphertext Policy Attribute Based Encryption Journal of Theoretical and Applied Information Technology / 99 / 21 / 5050 - 5057 1992-8645 15-Nov-2021
22 Selfi segmentation in Video using N frame ensemble IEEE Access / 9 / 1 / 163348 - 163362 2169-3536 06-Dec-2021
23 An Efficient Access Policy with Multi linear Secret haring scheme in Cipher text policy Attribute based encryption Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 1817-3195 15-Mar-2022
24 Impulse noise recuperation from grayscale and medical images using supervised curve fitting linear regression and mean filter? Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) / 28 / 2 / 777 - 786 2502-4752 01-Nov-2022
25 Securing Grayscale Image Using Improved Arnold Transform and ElGamal Encryption Journal of Electronic Imaging / 31 / 6 / - 1017-9909 01-Nov-2022
26 Revocable and Secure Multi-Authority Attribute-Encryption Scheme International Journal ofINTELLIGENT SYSTEMS AND APPLICATIONS IN ENGINEERING / 11 / 6 / 52 - 58 2147-67992 17-May-2023
27 An Efficient Nonlinear Access Policy Based On Quadratic Residue For Ciphertext Policy Attribute Based Encryption Journal of Theoretical and Applied Information Technology / 99 / 21 / 5050 - 5057 1992-8645 15-Nov-2021
28 An Efficient Access Policy With Multi-Linear Secret-Sharing Scheme In Ciphertext-Policy Attribute-Based Encryption Journal of Theoretical and Applied Information Technology / 100 / 5 / 1404 - 1411 1992-8645 15-Mar-2022
29 Probabilistic (multiple cipher) based ECC mechanism Journal of Discrete Mathematical Sciences and CryptographyVolume 15, Issue 6, Pages 323 - 3382012 / 15 / 6 / 323 - 338 0972-0529 08-Feb-2012
30 An Improvised ECC Mechanism with Probabilistic Approach Information Security JournalVolume 21, Issue 1, Pages 28 - 35January 2012 / 21 / 1 / 28 - 35 1939-3547 10-Jan-2012
31 A new non linear model based encryption mechanism with time stand and acknowledgement support International Journal of Network Securit / 14 / 1 / 27 - 32 1816-3548 10-Jan-2012
32 A new model based encryption mechanism with time stamp and acknowledgement support International Journal of Network Security / 11 / 3 / 172 - 176 1816-3548 10-Mar-2010
33 A generalized scheme for data encryption technique using a randomized matrix key Journal of Discrete Mathematical Sciences and Cryptography / 10 / 1 / 73 - 81 0972-0529 09-Jan-2007
34 A new algorithm for network security in e-learning environment Journal of Scientific and Industrial Research / 64 / 10 / 791 - 793 0022-4456 12-Oct-2005
35 A novel image compression method using wavelet coefficients and Huffman coding Journal of Engineering research / 11 / 3 / 1 - 10 2307-1877 23-Aug-2023
36 Security Analysis for a Revocable Multi-Authority ABE- Attribute-Based Mechanism SSRG International Journal of Electronics and Communication Engineering (IJECE) / 11 / 3 / 24 - 30 2348-8549 02-Apr-2024
37 Security Analysis for a Revocable Multi-Authority ABE- Attribute-Based Mechanism SSRG International Journal of Electronics and Communication Engineering / 11 / 3 / - 2430 2348-8549 02-Apr-2024
38 Cost Effective and Energy Efficient Drip Irrigation System for IoT Enabled Smart Agriculture Lecture Notes in Networks and Systems / / / 199 - 210 2367-3370 18-Jun-2024
39 Design of a new curve based cipher Journal of Discrete Mathematical Sciences and Cryptography / 27 / 8 / 2425 - 2431 0972-0529 18-Jan-2023
40 High-speed portrait video segmentation using the hybrid combination of deep-learning models and boundary movement adjustment Engineering Applications of Artificial Intelligence / 155 / 1 / 1 - 8 1873-6769 01-Sep-2025
Books/ Book Chapter/Case Study
Sl.No. Title Author Names(s) ISBN No. Month Year
1 Handbook of Research on Intelligent Data Processing and Information Security Systems ADDAPALLI V N KRISHNA,RAGHAV SARDA, SHRIANSH PANDEY, STEPAN MYKOLAYOVYCH BILAN (STATE UNIVERSITY OF INF 9781799812906 /
2 2020 Fifth International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN) CHINTHAKUNTA MANJUNATH,ADDAPALLI V N KRISHNA, BALAMURUGAN M,AYUSHI TOMAR, BIKRAMADITYA GHOSH, G TAROON 978-1-7281-8819-5 /
3 Smart Computing CHINTHAKUNTA MANJUNATH,ADDAPALLI V N KRISHNA, BALAMURUGAN M,BIKRAMADITYA GHOSH, MOHAMMAD AYOUB KHAN, SANJAY GAIROLA, BHOLA JHA, PUSHKAR PRAVEEN 9781003167488 /
4 International Conference on Data Science and Communication, IconDSC 2019 CHINTHAKUNTA MANJUNATH,ADDAPALLI V N KRISHNA, BALAMURUGAN M,CHRIST 978-1-5386-9319-3 /
5 Advances in Distributed Computing and Machine Learning MANU ELAPPILA,ADDAPALLI V N KRISHNA, SHAMANTH N, VANDANA REDDY,ASIS KUMAR TRIPATHY, JYOTI PRAKASH SAHOO, KUAN-CHING LI, MAHASWETA SARKAR, MUHAMMED FUHAD, SACHIN MALAYATH JOSE, STENIN K. GEORGE, UMAKANTA NANDA 978-981-97-1841-2 /
6 2024 IEEE International Conference on Contemporary Computing and Communications (InC4) MANU ELAPPILA,ADDAPALLI V N KRISHNA, ATHULYA S, JYOTHI MANDALA, SANDEEP KUMAR, SUJATHA A K 979-8-3503-8365-2 /
7 2024 IEEE International Conference on Contemporary Computing and Communications (InC4) MANU ELAPPILA,ADDAPALLI V N KRISHNA, SANDEEP KUMAR 979-8-3503-8365-2 /
8 2024 IEEE International Conference on Contemporary Computing and Communications (InC4) MANU ELAPPILA,ADDAPALLI V N KRISHNA, DEEPA YOGISH, SANDEEP KUMAR,BHAVIKA RAJORA 979-8-3503-8365-2 /
9 2024 IEEE International Conference on Contemporary Computing and Communications (InC4) MANU ELAPPILA,ADDAPALLI V N KRISHNA, DEEPA YOGISH, SANDEEP KUMAR,SHALEEN MISHRA 979-8-3503-8365-2 /
10 Leveraging VANETs and Blockchain Technology for Urban Mobility ADDAPALLI V N KRISHNA,KARAN S, SIVARAM PONNUSAMY, IGI GLOBAL 9798337302652 /
11 Attacks on Artificial Intelligence: The New Facets of Cyber Ecospace ADDAPALLI V N KRISHNA,SATHISH P K,SATHISH PK 9781774916223 /
Participation in Seminars/Conferences/Symposium
Sl.No. Name of the Conference /Seminar /Symposium Type of Program Title of the Article Role Venue/Place Date
1 SYMPOSIUM Temporal Data Mining in estimation of Empirical formula for House Hold data analysis PRESENTER) IIIT,Hyderabad 16/09/2016
2 International conference International conference PARTICIPANT) SRM University 16/09/2016
3 International Seminar on Computational Science: An Innovation Tool for R&D in Science & Technology SEMINARS A Study on Computational Models in Identification of Suitable Material in Rocket Nozle Throat PRESENTER) Christ University, Bangaluru 06/09/2016
4 NCCOCE'17 CONFERENCES Survey on Vehicle Route Optimization Using Genetic Algorithm PRESENTER) Christ University, Bangaluru 17/02/2017
5 NCCOCE'17 CONFERENCES Secure Node Disjoint Multi Path Routing Protocol For Reliable Data Transmission in Wireless Sensor Networks PRESENTER) Christ University, Bengaluru 17/02/2017
6 NCCOCE'17 CONFERENCES MODERATOR) Christ University, Bengaluru 17/02/2017
7 IEEE WiSPNET 2017 conference CONFERENCES ) Chennai 22/03/2017
8 National Conference on Computational Sciences and Safe Computing CONFERENCES ) Jawaharlal Nehru National College of EngineeringShivamogga 14/12/2017
9 3 International Conference on Computational Intelligence and Informatics, Springer CONFERENCES ) JNTUH, College of Engineering, HyderabadJNTUH, Hyderabad 28/12/2018
10 IconDSC 19 CONFERENCES MODERATOR) Bengaluru 01/03/2019
11 IconDSC 19 CONFERENCES ) Bengaluru 01/03/2019
12 International Conference on Advances and Applications in Mathematics, Statistics and Computer Science CONFERENCES Improvising the Performance of Rocket Nozzle Throat Using Genetic Algorithm PRESENTER) Andhra Loyola College, VijayawadaVijayawada, A.P 01/11/2019
13 International Conference on Adances in Computational Intelligence and Informatics CONFERENCES MODERATOR) Anurag Group of InstitutionsHyderabad 20/12/2019
14 10th International Conference On ? Recent Engineering And Technology? 2020? CONFERENCES Predicting And Improvising The Performance Of Rocket Nozzle Throat Using Machine Learning Algorithms PRESENTER) Organization of Science and Innovative Engineering & TechnologyBengaluru 21/06/2020
15 10th International Conference On ?Recent Engineering And Technology ? 2020? CONFERENCES Scalar Multiplication Based Matrix Public Key Cryptography PRESENTER) ORGANAIZATION OF SCIENCE AND INNOVATIVE ENGINEERING & TECHNOLOGY (OSIET)Bengaluru 21/06/2020
16 2020 International semonar on Machine Intelligence SEMINARS MODERATOR) Bengaluru 05/12/2020
17 International conference on Advances in Mathematics and Computer science 2021 CONFERENCES Window method in ECC Model PRESENTER) IMRFVijayawada Andgra Pradesh 16/04/2021
18 International conference on Advances in Mathematics and computer science CONFERENCES A study on Advanced areas of cryptographic study PRESENTER) IMRFVijayawada 16/04/2021
19 2 nd Congress on Intelligent systems CONFERENCES MODERATOR) Bengaluru ( Online) 04/09/2021
20 2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS) CONFERENCES ?A two-pass hybrid mean and median framework for eliminating impulse noise from a grayscale image? ( PRESENTER) Adi Shankara Institute of Engineering and TechnologyIEEE Kerala Section 02/09/2021
21 International conference on Nonlinear Dynamics and Applications CONFERENCES Research directions in Advanced Cryptography KEYNOTE_SPEAKER) Sikkim Manipal UniversitySikkim 09/03/2022
22 CIS 2022 CONFERENCES MODERATOR) online 05/09/2022
23 Congress on Intelligent systems CIS 2022 CONFERENCES Machine learning techniques for resourse constrained devices with CP-ABE Scheme PRESENTER) Online 05/09/2022
24 IEEE International Conference on Trends in Quantum Computing and Emerging Business Technologies (TQCEBT-22) CONFERENCES A CNN model to predict and segment cancerous regions from brain images using UNet and morphological operations PRESENTER) Online ( Lavasa Campus) 13/10/2022
25 International Conference IMCISMRSS 2024 CONFERENCES A Modified Extended Euclid"s Algorithm PRESENTER) AJK college of Arts and Science 13/03/2024
26 International Conference INC4 CONFERENCES MODERATOR) Bengaluru 15/03/2024
27 2024 IEEE International conference on Contemporary computing and communications INC4 CONFERENCES MODERATOR) Bengaluru 15/03/2024
28 International conference ICA5NT 2024 CONFERENCES Design of a New Access Policy Based Permissioned Blockchain Model PRESENTER) Velammal Institute of TechnologyChennai 21/03/2024
29 International Seminar on applications of Mathematics in Sc. and Tech. SEMINARS An efficient curvilinear access policy for Ciphertext Policy Attribute Based Encryption in Improving the Blockchain Security Protocol PRESENTER) Guru Ghasidas Viswavidhyalaya - Central UniversityBilaspur, Chattisgarh 19/12/2024
30 International conference on Business, IT & Enterprise Architecture ICBIT 2025 CONFERENCES End to End Encryption with RSA & Homomorphic Encryption PRESENTER) MDI, MurshidabadMURSHIDABAD-online 30/01/2025
31 ICTEST 2025 CONFERENCES A high capacity reversible data hiding on grey scale images using threshold based clustering PRESENTER) Govt model Engineering college, TrikkakaraTrikkakara, Kochi 03/04/2025
32 1 st Multi Disciplinary International conference on Advances in Information Technology (ICAIT 2025) CONFERENCES Proxy Re – Encrypted Key For AES Encryption Model PRESENTER) Shri Vile Parle Kelavani Mandal’s INSTITUTE OF TECSVKM’s Institute of Technology Dhule 01/08/2025
33 6th International Multidisciplinary Conference on Information Science, Management Research & Social Science (IMCISMRSS-2025) CONFERENCES Designing a self-learning and secured intrusion detection system (IDS) for a distributed IoT-based smart home environment using federated learning and sensor data analytics PRESENTER) AJK College of Arts and Science, Coimbatore, IndiCoimbatore, India, 06/10/2025
34 23 OITS International Conference on Information Technology CONFERENCES A Reverse firewall & a Re-Encryption supported PEKS Model for security in Health based Applications PRESENTER) School of Computer Applications, KIIT UniversityIEEE Bhubaneswar Section 18/12/2025
35 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT & MACHINE INTELLIGENCE ICIMMI 2025 CONFERENCES A Secure and Intelligent Healthcare Data Sharing Using Blockchain, AI & A new Conditional Re-Encryption Model CO_PRESENTER) Poornima Institute of Engineering and technology Sitapura Jaipur, Rajasthan 15/12/2025
Invited Talks
Sl.No. Titel of the Program Name of the Program Date Name of the Institution
1 Network security concepts with emphasis on Probabilistic encryption and time stamp Guest talk 05/02/2013 DIAT,Pune
2 Role of Security Mechanisms in Communication systems Workshop on ?Information Security Technologies 07/08/2010 GuruNanak Institutions, Hyderabad
3 Modeling and simulation & Research directions in Network Security Invited talk 19/02/2018 Defence Institute of Advanced TechnolOgy(DIAT)
MPhil/PhD Guided/Adjudicated
Sl.No. Title Name of Student Institution Role Status Month Year
1 IMCC Security mechanism in heterogeneous wireless networks for high quality data transfer K.Anil Kumar SUPERVISOR Awarded July 2017
2 SIGNIFICANCE OF KEY DISTRIBUTION USING QUANTUM CRYPTOGRAPHY V.Padmavathi SUPERVISOR Ongoing September 2011
3 Vaiable Initial Energy and Unequal Clustering based Multicasting in WSN G Raja Vikram SUPERVISOR Ongoing October 2012
4 A new quantum cryptography based Key distribution and encryption algorithm V Padmavathi SUPERVISOR Awarded June 2020
5 Design and implementation of secured key distribution and congestion free protocol in multi cast communication G Raja Vikram SUPERVISOR Awarded April 2021
6 DESIGNING A NEW ENCRYPTION-THEN-COMPRESSION SYSTEM FOR GRAYSCALE IMAGES UTILIZING ENTROPY ENCRYPTION SHIJU THOMAS M.Y Christ University SUPERVISOR Awarded September 2024
7 A Study on High-Performance Portrait Segmentation Using the Ensemble of Deep-Learning Models and Hybrid Model: Accuracy and Speed Perspective YONG WOON KIM Christ University SUPERVISOR Awarded May 2023
8 A REVOCABLE MULTI-AUTHORITY ATTRIBUTE BASED ENCRYPTION SCHEME BASED ON NONLINEAR ACCESS POLICY ANCY P R Christ University SUPERVISOR Awarded December 2024
9 FUZZY RULE-BASED MULTIMODAL HEALTH MONITORING SYSTEM LEVERAGING MACHINE LEARNING TECHNIQUES USING EEG DATASETS FOR HUMAN EMOTION AND PSYCHOLOGICAL DISORDERS SABA TAHSEEN Christ University SUPERVISOR Awarded November 2024
10 RECONSTRUCTION OF 3D FACES USING GENERATIVE ADVERSARIAL NETWORK AND ENSEMBLE ARCHITECTURE FOR FORENSIC IMAGE ANALYSIS SINCY JOHN Christ University SUPERVISOR Awarded July 2025
Patents
Sl.No. Title of Invention Inventor(s) Filing Date
1 A SECURE AUTHENTICATION PROCESS THROUGH QUANTUM DIGITAL CERTIFICATE BY APPLYING QUANTUM GATES ADDAPALLI V N KRISHNA 02-Aug-2017
2 Reliable Transmission of Information through Quantum Encryption and Decryption Process by applying Quantum Gate ADDAPALLI V N KRISHNA 23-Nov-2017
Workshop/FDP/Training programme
Sl.No. Name of the Workshop/FDP/Training programme Name of Organiser Level Role Date
1 Faculty Dev program -1 2021 CHRIST,  Institutional Participant 16/06/2021
2 ECOSYSTEM RESTORATION Department of Civil Engineering, School of Engineering and Technology, CHRIST,  Institutional Participant 05/06/2021
3 Hybrid Teaching Staff Development College, CHRIST,  Participant 02/03/2021
4 Primer to Digital forensics K-Tech & Govt of karnataka,  National Participant 10/02/2021
5 National Level Five Day FDP Sreenidhi Institute of Science & Engineering , Hyderabad, Sreenidhi Institute of Science & Engineering , Hyd National Presenter 24/08/2020
6 Cyber Privacy and Security Engineering BMS-Govt. of Karnataka-KSCST, BMS Institute of Technology and Management National Participant 12/10/2019
7 Sustainable waste Management CSE CHRIST,  Institutional Participant 30/08/2019
8 BRIDGE 18, Fostering India for Industry 4.0 ICT Academy, Industry Academic Conclave National Participant 26/09/2018
9 Author Workshop Springer Nature & CHRIST,  Institutional Participant 12/06/2018
10 Research Tools and Mega Trends CU-Academic Staff College,  Participant 21/05/2018
11 Packet Structures in Networking AXONE Technology Sevices, AXONE Technology Services National Participant 17/01/2018
12 Teaching, Learning and Evaluation Process CU-Academic Staff College,  Participant 22/05/2017
13 Researc Tools, Trends & Process CU-Academic Staff College,  Participant & Presenter 24/09/2016
14 IOT & Research CU-Academic Staff College,  Participant & Presenter 24/05/2016