Dr. Raghu Dhumpati

Where there is a God's will there is a way

Research Profile

SL.NO.NAMELINK
1ORCIDCLICK HERE
2WEB OF SCIENCECLICK HERE
3SCOPUS1. CLICK HERE, 2. CLICK HERE
4IEEECLICK HERE
5GOOGLE SCHOLAR1. CLICK HERE, 2. CLICK HERE
6VIDWANCLICK HERE

Publications:

[29] R. Dhumpati et al., “4th International Conference on Sentiment Analysis and Deep Learning (ICSADL 2025),” Development, vol. 26, no. 6, 2025.

[28] R. Dhumpati et al., “Blockchain-Enabled Oracle-Based Transparent Insurance Model with Automated Payouts,” in Proc. World Skills Conf. on Universal Data Analytics and Sciences, 2025.

[27] R. Dhumpati et al., “A Literature Survey on Deep Learning and Explainable AI Approaches for Crop Disease Prediction,” in Proc. Int. Conf. on Sustainable Communication Networks, 2025.

[26] R. Veeramani et al., “An Interpretable Stacking Ensemble Model AB-CBLC for High-Accuracy Lung Cancer Detection Using Clinical and Behavioral Data,” in Proc. 8th Int. Conf. on Computing Methodologies, 2025.

[25] R. Dhumpati et al., “Enhancing Edge Computing with Machine Learning for Low-Latency Applications,” in Proc. IEEE Int. Conf. on Advances in Computing Research, 2025.

[24] A. C. Nawalagatti et al., “Low-Latency Communication Protocol for 6G Systems Using Intelligent Edge-Enabled Routing and Traffic Forecasting,” in Proc. 3rd Int. Conf. on Data Science and Information Systems, 2025.

[23] R. Dhumpati et al., “Secure Routing and Attack Detection in MANETs Using Depthwise Separable Convolutional Neural Networks,” in Proc. 6th Int. Conf. on Data Intelligence and Cognitive Systems, 2025.

[22] V. U. Krishnan et al., “Employing Generative Adversarial Networks for Secure and Reliable Synthetic Data Generation in Cyber Security Applications,” in Proc. 4th Int. Conf. on Distributed Computing and Electrical Systems, 2025.

[21] R. Dhumpati et al., “Enhanced GAN-Assisted Intrusion Detection Model for Addressing Data Imbalance Issues,” in Proc. 4th Int. Conf. on Distributed Computing and Electrical Systems, 2025.

[20] B. Kiranmayee et al., “Developing a Robust Intrusion Detection System Using SMOTE and Hybrid SVNN Model,” in Proc. 4th Int. Conf. on Sentiment Analysis and Deep Learning (ICSADL), 2025.

[19] N. Gurrapu et al., “Effective Summarization Techniques for Legal Document Analysis,” in Proc. 4th Int. Conf. on Sentiment Analysis and Deep Learning (ICSADL), 2025.

[18] M. Bhonsle et al., “Enhancing Security in Wireless Mesh Networks: A Deep Learning Approach to Black Hole Attack Detection,” Advance Sustainable Science Engineering and Technology, vol. 7, no. 1, 2025.

[17] P. V. A. Raghu Dhumpati et al., “Analyzing the Vulnerability of Consumer IoT Devices to Sophisticated Phishing Attacks and Ransomware Threats in Home Automation Systems,” Journal of Intelligent Systems and Internet of Things, vol. 15, no. 1, pp. 53–63, 2025.

[16] R. Dhumpati et al., “Enhancing Sarcasm Detection in Sentiment Analysis for Cyberspace Safety Using Advanced Deep Learning Techniques,” Scientific Reports, vol. 15, no. 1, p. 22681, 2025.

[15] K. K. M. Bhonsle et al., “MED-LeafNet: Medicinal Leaf Classification and Identification Using CNN-LSTM Hybrid Approach,” African Journal of Biological Sciences, vol. 6, no. 5, pp. 9712–9732, 2024.

[14] R. Dhumpati et al., “A Fuzzy Logic Approach for Efficient Control of BLDC Motors for Low-Cost Electric Two-Wheelers,” Nanotechnology Perceptions, vol. 20, no. 5, pp. 191–202, 2024.

[13] R. Dhumpati et al., “BowNetCrypt: Sleek Vaulted Messenger Secured by Bowerbird-Driven Finite Neural Messaging with Dual Elliptic Protection,” in Proc. 5th Int. Conf. on Data Intelligence and Cognitive Computing, 2024.

[12] F. Mohamad et al., “Attention-Guided CNN with LSTM for Temporal Gastrointestinal Disease Progression Prediction in Endoscopic Video Sequences,” in Proc. 4th Int. Conf. on Mobile Networks and Wireless, 2024.

[11] V. S. Raja et al., “Automated Heart Disease Diagnosis and Monitoring System Using Similarity-Navigated Graph Neural Networks with Leopard Seal Optimization in IoT Healthcare Applications,” in Proc. 4th Int. Conf. on Sustainable Expert Systems (ICSES), 2024.

[10] R. Dhumpati et al., “Efficient Detection of Multiple Lung Diseases from Chest CT Scans and Cough Sound Using a Simplicial Attention-Based Sparse Graph Convolutional Network,” in Proc. 8th Int. Conf. on I-SMAC, 2024.

[9] D. Raghu, H. K. Tripathy, and R. Borreo, “A Novel Graph Convolutional Neural Networks (GCNNs)-Based Framework to Enhance the Detection of COVID-19 from X-Ray and CT Scan Images,” International Journal of Advanced Computer Science & Applications, vol. 15, no. 4, 2024.

[8] D. Raghu and H. K. Tripathy, “Medical Image Analysis Using Deep Learning Algorithm Convolutional Neural Networks,” in Computer Networks, Big Data and IoT, Lecture Notes on Data Engineering and Communications Technologies, vol. 117, Springer, Singapore, 2022.

[7] R. D. H. K. Tripathy, “CNN-GRU-Based Hybrid Approach for COVID-19 Detection Through Chest X-Ray Images,” Journal of Theoretical and Applied Information Technology, vol. 100, no. 14, pp. 5281–5291, 2022.

[6] G. A. D. D. Raghu, “Chain Algorithm to Protect Datasets from Hackers,” International Journal of Computer Theory and Applications, vol. 10, no. 9, pp. 437–449, 2017.

[5] R. D. and N. Prameela, “RDCT Software Experts for Healthy Software Products,” International Journal of Recent Advances in Engineering & Technology, vol. 3, no. 1, 2015.

[4] G. P. S. V. Dumpati Raghu and P. Ratna Kumar, “3-Phase Parallel Model With Testing for MIS,” International Journal of Computer Science and Technology, vol. 4, no. 4, pp. 66–69, 2013.

[3] G. P. S. V. Ch. Suresh Kumar, D. Raghu, and P. Ratna Kumar, “Addiction of Computer is Sabotage to Human Life,” International Journal on Advanced Computer Theory and Engineering, vol. 1, no. 1, pp. 121–128, 2012.

[2] A. M. P. Ratna Kumar, R. D., and U. D., “Chronological Test Generation for Software Project SLoC,” International Journal of Computer Science & Technology (IJCST), vol. 2, no. SP 1, pp. 117–121, Dec. 2011.

[1] R. A. D. Raghu et al., “Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks,” International Journal of Computer Science & Technology, vol. 2, no. 1, p. 38, 2011.

Patents:

Total No. of Patents : 05

Sl.No.TitleApplication No.Publication No.Country
5AI-Powered Multi-Layer Cybersecurity Monitoring Console642042028/2025UK
4Android-Based Design and Implementation of Voice-Controlled Autonomous Robotic Vehicle20244105824908/2024India
3AI based cyber security detecting device420377-001     08/2024India
2Neural Network-Driven Real-Time Emotion Recognition and Response System for Virtual Assistants20244107819110/2024India
1IoT and Artificial Intelligence based perdition of food contamination using data mining techniques20224101528312/2022India

Books:

Book TitleISBNLink for Purchase
Fundamentals of Medical Image Processing978-93-5762-368-1Amazon link
The Complete Ethical Hacking978-93-6674-256-4Amazon link
Cyber Security for beginners 978-93-6132-931-9Amazon link
Generative AI: ChatGPT tool978-93-6132-593-9Amazon link