Research Profile
| SL.NO. | NAME | LINK |
| 1 | ORCID | CLICK HERE |
| 2 | WEB OF SCIENCE | CLICK HERE |
| 3 | SCOPUS | 1. CLICK HERE, 2. CLICK HERE |
| 4 | IEEE | CLICK HERE |
| 5 | GOOGLE SCHOLAR | 1. CLICK HERE, 2. CLICK HERE |
| 6 | VIDWAN | CLICK HERE |
Publications:
[29] R. Dhumpati et al., “4th International Conference on Sentiment Analysis and Deep Learning (ICSADL 2025),” Development, vol. 26, no. 6, 2025.
[28] R. Dhumpati et al., “Blockchain-Enabled Oracle-Based Transparent Insurance Model with Automated Payouts,” in Proc. World Skills Conf. on Universal Data Analytics and Sciences, 2025.
[27] R. Dhumpati et al., “A Literature Survey on Deep Learning and Explainable AI Approaches for Crop Disease Prediction,” in Proc. Int. Conf. on Sustainable Communication Networks, 2025.
[26] R. Veeramani et al., “An Interpretable Stacking Ensemble Model AB-CBLC for High-Accuracy Lung Cancer Detection Using Clinical and Behavioral Data,” in Proc. 8th Int. Conf. on Computing Methodologies, 2025.
[25] R. Dhumpati et al., “Enhancing Edge Computing with Machine Learning for Low-Latency Applications,” in Proc. IEEE Int. Conf. on Advances in Computing Research, 2025.
[24] A. C. Nawalagatti et al., “Low-Latency Communication Protocol for 6G Systems Using Intelligent Edge-Enabled Routing and Traffic Forecasting,” in Proc. 3rd Int. Conf. on Data Science and Information Systems, 2025.
[23] R. Dhumpati et al., “Secure Routing and Attack Detection in MANETs Using Depthwise Separable Convolutional Neural Networks,” in Proc. 6th Int. Conf. on Data Intelligence and Cognitive Systems, 2025.
[22] V. U. Krishnan et al., “Employing Generative Adversarial Networks for Secure and Reliable Synthetic Data Generation in Cyber Security Applications,” in Proc. 4th Int. Conf. on Distributed Computing and Electrical Systems, 2025.
[21] R. Dhumpati et al., “Enhanced GAN-Assisted Intrusion Detection Model for Addressing Data Imbalance Issues,” in Proc. 4th Int. Conf. on Distributed Computing and Electrical Systems, 2025.
[20] B. Kiranmayee et al., “Developing a Robust Intrusion Detection System Using SMOTE and Hybrid SVNN Model,” in Proc. 4th Int. Conf. on Sentiment Analysis and Deep Learning (ICSADL), 2025.
[19] N. Gurrapu et al., “Effective Summarization Techniques for Legal Document Analysis,” in Proc. 4th Int. Conf. on Sentiment Analysis and Deep Learning (ICSADL), 2025.
[18] M. Bhonsle et al., “Enhancing Security in Wireless Mesh Networks: A Deep Learning Approach to Black Hole Attack Detection,” Advance Sustainable Science Engineering and Technology, vol. 7, no. 1, 2025.
[17] P. V. A. Raghu Dhumpati et al., “Analyzing the Vulnerability of Consumer IoT Devices to Sophisticated Phishing Attacks and Ransomware Threats in Home Automation Systems,” Journal of Intelligent Systems and Internet of Things, vol. 15, no. 1, pp. 53–63, 2025.
[16] R. Dhumpati et al., “Enhancing Sarcasm Detection in Sentiment Analysis for Cyberspace Safety Using Advanced Deep Learning Techniques,” Scientific Reports, vol. 15, no. 1, p. 22681, 2025.
[15] K. K. M. Bhonsle et al., “MED-LeafNet: Medicinal Leaf Classification and Identification Using CNN-LSTM Hybrid Approach,” African Journal of Biological Sciences, vol. 6, no. 5, pp. 9712–9732, 2024.
[14] R. Dhumpati et al., “A Fuzzy Logic Approach for Efficient Control of BLDC Motors for Low-Cost Electric Two-Wheelers,” Nanotechnology Perceptions, vol. 20, no. 5, pp. 191–202, 2024.
[13] R. Dhumpati et al., “BowNetCrypt: Sleek Vaulted Messenger Secured by Bowerbird-Driven Finite Neural Messaging with Dual Elliptic Protection,” in Proc. 5th Int. Conf. on Data Intelligence and Cognitive Computing, 2024.
[12] F. Mohamad et al., “Attention-Guided CNN with LSTM for Temporal Gastrointestinal Disease Progression Prediction in Endoscopic Video Sequences,” in Proc. 4th Int. Conf. on Mobile Networks and Wireless, 2024.
[11] V. S. Raja et al., “Automated Heart Disease Diagnosis and Monitoring System Using Similarity-Navigated Graph Neural Networks with Leopard Seal Optimization in IoT Healthcare Applications,” in Proc. 4th Int. Conf. on Sustainable Expert Systems (ICSES), 2024.
[10] R. Dhumpati et al., “Efficient Detection of Multiple Lung Diseases from Chest CT Scans and Cough Sound Using a Simplicial Attention-Based Sparse Graph Convolutional Network,” in Proc. 8th Int. Conf. on I-SMAC, 2024.
[9] D. Raghu, H. K. Tripathy, and R. Borreo, “A Novel Graph Convolutional Neural Networks (GCNNs)-Based Framework to Enhance the Detection of COVID-19 from X-Ray and CT Scan Images,” International Journal of Advanced Computer Science & Applications, vol. 15, no. 4, 2024.
[8] D. Raghu and H. K. Tripathy, “Medical Image Analysis Using Deep Learning Algorithm Convolutional Neural Networks,” in Computer Networks, Big Data and IoT, Lecture Notes on Data Engineering and Communications Technologies, vol. 117, Springer, Singapore, 2022.
[7] R. D. H. K. Tripathy, “CNN-GRU-Based Hybrid Approach for COVID-19 Detection Through Chest X-Ray Images,” Journal of Theoretical and Applied Information Technology, vol. 100, no. 14, pp. 5281–5291, 2022.
[6] G. A. D. D. Raghu, “Chain Algorithm to Protect Datasets from Hackers,” International Journal of Computer Theory and Applications, vol. 10, no. 9, pp. 437–449, 2017.
[5] R. D. and N. Prameela, “RDCT Software Experts for Healthy Software Products,” International Journal of Recent Advances in Engineering & Technology, vol. 3, no. 1, 2015.
[4] G. P. S. V. Dumpati Raghu and P. Ratna Kumar, “3-Phase Parallel Model With Testing for MIS,” International Journal of Computer Science and Technology, vol. 4, no. 4, pp. 66–69, 2013.
[3] G. P. S. V. Ch. Suresh Kumar, D. Raghu, and P. Ratna Kumar, “Addiction of Computer is Sabotage to Human Life,” International Journal on Advanced Computer Theory and Engineering, vol. 1, no. 1, pp. 121–128, 2012.
[2] A. M. P. Ratna Kumar, R. D., and U. D., “Chronological Test Generation for Software Project SLoC,” International Journal of Computer Science & Technology (IJCST), vol. 2, no. SP 1, pp. 117–121, Dec. 2011.
[1] R. A. D. Raghu et al., “Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks,” International Journal of Computer Science & Technology, vol. 2, no. 1, p. 38, 2011.
Patents:
Total No. of Patents : 05
| Sl.No. | Title | Application No. | Publication No. | Country |
| 5 | AI-Powered Multi-Layer Cybersecurity Monitoring Console | 6420420 | 28/2025 | UK |
| 4 | Android-Based Design and Implementation of Voice-Controlled Autonomous Robotic Vehicle | 202441058249 | 08/2024 | India |
| 3 | AI based cyber security detecting device | 420377-001 | 08/2024 | India |
| 2 | Neural Network-Driven Real-Time Emotion Recognition and Response System for Virtual Assistants | 202441078191 | 10/2024 | India |
| 1 | IoT and Artificial Intelligence based perdition of food contamination using data mining techniques | 202241015283 | 12/2022 | India |
Books:
| Book Title | ISBN | Link for Purchase |
| Fundamentals of Medical Image Processing | 978-93-5762-368-1 | Amazon link |
| The Complete Ethical Hacking | 978-93-6674-256-4 | Amazon link |
| Cyber Security for beginners | 978-93-6132-931-9 | Amazon link |
| Generative AI: ChatGPT tool | 978-93-6132-593-9 | Amazon link |
