default search action
Sateesh Kumar Peddoju
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Animesh Kuity, Sateesh Kumar Peddoju:
pHPCe: a hybrid power conservation approach for containerized HPC environment. Clust. Comput. 27(3): 2611-2634 (2024) - [j20]Ajay Chaudhary, Sateesh Kumar Peddoju:
ADA2-IoT : An adaptive data aggregation algorithm for IoT infrastructure. Internet Things 27: 101299 (2024) - [j19]Surabhi Sharma, Sateesh Kumar Peddoju:
Efficient Multi-Broker Load Balancing in Event Driven Pub-Sub Networks. IEEE Trans. Netw. Serv. Manag. 21(4): 3861-3873 (2024) - [c23]Shikha Arya, Sateesh Kumar Peddoju:
(POSTER) Federated Learning Assisted Model for Android Malware Detection using Gannet Optimization Algorithm. DCOSS-IoT 2024: 777-779 - 2023
- [j18]Ajay Chaudhary, Sateesh Kumar Peddoju, Vikas Chouhan:
Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration. J. Grid Comput. 21(3): 35 (2023) - [j17]Animesh Kuity, Sateesh Kumar Peddoju:
Investigating performance metrics for container-based HPC environments using x86 and OpenPOWER systems. J. Cloud Comput. 12(1): 178 (2023) - [c22]Animesh Kuity, Sateesh Kumar Peddoju:
cHPCe: Data Locality and Memory Bandwidth Contention-aware Containerized HPC. ICDCN 2023: 160-166 - 2022
- [j16]Vikas Chouhan, Sateesh Kumar Peddoju, Rajkumar Buyya:
dualDup: A secure and reliable cloud storage framework to deduplicate the encrypted data and key. J. Inf. Secur. Appl. 69: 103265 (2022) - [c21]Surabhi Sharma, Sateesh Kumar Peddoju:
IoT-Cache: Caching Transient Data at the IoT Edge. LCN 2022: 307-310 - 2021
- [j15]Aayush Vishnoi, Preeti Mishra, Charu Negi, Sateesh Kumar Peddoju:
Android Malware Detection Techniques in Traditional and Cloud Computing Platforms: A State-of-the-Art Survey. Int. J. Cloud Appl. Comput. 11(4): 113-135 (2021) - [j14]Vikas Chouhan, Sateesh Kumar Peddoju:
Reliable verification of distributed encoded data fragments in the cloud. J. Ambient Intell. Humaniz. Comput. 12(10): 9127-9143 (2021) - [c20]Ajay Chaudhary, Sateesh Kumar Peddoju:
Impact of Clustering Algorithms and Energy Harvesting Scheme on IoT/WSN Infrastructures. MASS 2021: 603-608 - 2020
- [j13]Vikas Chouhan, Sateesh Kumar Peddoju:
Investigation of Optimal Data Encoding Parameters Based on User Preference for Cloud Storage. IEEE Access 8: 75105-75118 (2020) - [j12]Anshul Arora, Sateesh Kumar Peddoju, Mauro Conti:
PermPair: Android Malware Detection Using Permission Pairs. IEEE Trans. Inf. Forensics Secur. 15: 1968-1982 (2020)
2010 – 2019
- 2018
- [j11]Kartik Bhanot, Sateesh Kumar Peddoju, Tushar Bhardwaj:
A model to find optimal percentage of training and testing data for efficient ECG analysis using neural network. Int. J. Syst. Assur. Eng. Manag. 9(1): 12-17 (2018) - [j10]Prachi Deshpande, S. C. Sharma, Sateesh Kumar Peddoju, Ajith Abraham:
Security and service assurance issues in Cloud environment. Int. J. Syst. Assur. Eng. Manag. 9(1): 194-207 (2018) - [j9]Prachi Deshpande, Subhash Chander Sharma, Sateesh Kumar Peddoju, S. Junaid:
HIDS: A host based intrusion detection system for cloud computing environment. Int. J. Syst. Assur. Eng. Manag. 9(3): 567-576 (2018) - [c19]Anuradha Ravi, Sateesh Kumar Peddoju:
Mobile Computation Bursting: An application partitioning and offloading decision engine. ICDCN 2018: 46:1-46:10 - [c18]Anshul Arora, Sateesh Kumar Peddoju, Vikas Chouhan, Ajay Chaudhary:
Poster: Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning. MobiCom 2018: 798-800 - [c17]Anshul Arora, Sateesh Kumar Peddoju:
NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions. TrustCom/BigDataSE 2018: 808-813 - 2017
- [j8]Shree Garg, Sateesh Kumar Peddoju, Anil Kumar Sarje:
Network-based detection of Android malicious apps. Int. J. Inf. Sec. 16(4): 385-400 (2017) - [j7]Shitala Prasad, Sateesh Kumar Peddoju, Debashis Ghosh:
An efficient low vision plant leaf shape identification system for smart phones. Multim. Tools Appl. 76(5): 6915-6939 (2017) - [j6]Shitala Prasad, Sateesh Kumar Peddoju, Debashis Ghosh:
An adaptive plant leaf mobile informatics using RSSC. Multim. Tools Appl. 76(20): 21339-21363 (2017) - [c16]Anshul Arora, Sateesh Kumar Peddoju:
Minimizing Network Traffic Features for Android Mobile Malware Detection. ICDCN 2017: 32 - [c15]Anuradha Ravi, Sateesh Kumar Peddoju:
Energy - Service Trade-Off Model for Mobile Cloud Computing. MASS 2017: 616-621 - [c14]Ajay Chaudhary, Sateesh Kumar Peddoju, Kavitha Kadarla:
Study of Internet-of-Things Messaging Protocols Used for Exchanging Data with External Sources. MASS 2017: 666-671 - [c13]Animesh Kuity, Sateesh Kumar Peddoju:
Performance Evaluation of Container-Based High Performance Computing Ecosystem Using OpenPOWER. ISC Workshops 2017: 290-308 - 2016
- [j5]Shree Garg, Sateesh Kumar Peddoju, Anil Kumar Sarje:
Scalable P2P bot detection system based on network data stream. Peer-to-Peer Netw. Appl. 9(6): 1209-1225 (2016) - [j4]Shitala Prasad, Sateesh Kumar Peddoju, Debashis Ghosh:
Multi-resolution mobile vision system for plant leaf disease diagnosis. Signal Image Video Process. 10(2): 379-388 (2016) - 2015
- [j3]Sugam Sharma, Udoyara Sunday Tim, Shashi K. Gadia, Johnny S. Wong, Ritu Shandilya, Sateesh Kumar Peddoju:
Classification and comparison of NoSQL big data models. Int. J. Big Data Intell. 2(3): 201-221 (2015) - [j2]Prachi Deshpande, S. C. Sharma, Sateesh Kumar Peddoju, Ajith Abraham:
Efficient Multimedia Data Storage in Cloud Environment. Informatica (Slovenia) 39(4) (2015) - [j1]Anuradha Ravi, Sateesh Kumar Peddoju:
Handoff Strategy for Improving Energy Efficiency and Cloud Service Availability for Mobile Devices. Wirel. Pers. Commun. 81(1): 101-132 (2015) - [c12]Prachi Deshpande, S. C. Sharma, Sateesh Kumar Peddoju:
Data Storage Security in Cloud Paradigm. SocProS (1) 2015: 247-259 - 2014
- [c11]Gaurav Garkoti, Sateesh Kumar Peddoju, Raman Balasubramanian:
Detection of Insider Attacks in Cloud Based e-Healthcare Environment. ICIT 2014: 195-200 - [c10]Anshul Arora, Shree Garg, Sateesh Kumar Peddoju:
Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices. NGMAST 2014: 66-71 - [c9]Shitala Prasad, Sateesh Kumar Peddoju, Debashis Ghosh:
Mobile Mixed Reality Based Damage Level Estimation of Diseased Plant Leaf. NGMAST 2014: 72-77 - [c8]Shree Garg, Anil Kumar Sarje, Sateesh Kumar Peddoju:
Improved Detection of P2P Botnets through Network Behavior Analysis. SNDS 2014: 334-345 - [c7]Shitala Prasad, Sateesh Kumar Peddoju, Debashis Ghosh:
Energy efficient mobile vision system for plant leaf disease identification. WCNC 2014: 3314-3319 - 2013
- [c6]Shitala Prasad, Sateesh Kumar Peddoju, Debashis Ghosh:
Mobile augmented reality based interactive teaching & learning system with low computation approach. CICA 2013: 97-103 - [c5]Prachi Deshpande, S. C. Sharma, Sateesh Kumar Peddoju:
Implementation of a Private Cloud: A Case Study. SocProS (2) 2013: 635-647 - [c4]Anuradha Ravi, Sateesh Kumar Peddoju:
Energy Efficient Seamless Service Provisioning in Mobile Cloud Computing. SOSE 2013: 463-471 - [c3]Tarun Sen, Sateesh Kumar Peddoju:
Hierarchal Identity Based Socket for Datacenters. SERE (Companion) 2013: 63-67 - 2012
- [c2]Harish Verma, Durga Toshniwal, Sateesh Kumar Peddoju:
Distributed frequent itemset mining framework for incremental data using MPI-style WSRF services. ICACCI 2012: 74-81 - [c1]Shitala Prasad, Abhay Prakash, Sateesh Kumar Peddoju, Debashis Ghosh:
Control of computer process using image processing and computer vision for low-processing devices. ICACCI 2012: 1169-1174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint