Research Profile
My research focuses on the development of intelligent systems at the intersection of artificial intelligence and cybersecurity. I work on machine learning approaches for threat detection, intrusion detection systems, predictive analytics, and biometric recognition technologies. I have published 28 papers in refereed conferences and journals, and hold 5 patents in AI-based security systems and intelligent computing.
Below you will find links to my academic profiles and a complete list of publications and patents.
Academic Profiles
| SL.NO. | NAME | LINK |
| 1 | ORCID | CLICK HERE |
| 2 | Web of science | CLICK HERE |
| 3 | Scopus | CLICK HERE |
| 4 | IEEE | CLICK HERE |
| 5 | Research Gate | CLICK HERE |
| 6 | Google Scholar | CLICK HERE |
| 7 | Vidwan | CLICK HERE |
| 8 | GitHub | CLICK HERE |
| 9 | Linkedln | CLICK HERE |
| 10 | Huggingface | CLICK HERE |
Publications:
[28] R. Dhumpati et al., “A Literature Survey on Deep Learning and Explainable AI Approaches for Crop Disease Prediction,” Proc. Int. Conf. on Sustainable Communication Networks, 2025.
[27] R. Dhumpati et al., “Blockchain-Enabled Oracle-Based Transparent Insurance Model with Automated Payouts,” Proc. World Skills Conf. on Universal Data Analytics and Sciences, 2025.
[26] R. Veeramani et al., “An Interpretable Stacking Ensemble Model AB-CBLC for High-Accuracy Lung Cancer Detection Using Clinical and Behavioral Data,” Proc. 8th Int. Conf. on Computing Methodologies, 2025.
[25] R. Dhumpati et al., “Secure Routing and Attack Detection in MANETs Using Depthwise Separable Convolutional Neural Networks,” Proc. 6th Int. Conf. on Data Intelligence and Cognitive Systems, 2025.
[24] R. Dhumpati et al., “Enhancing Sarcasm Detection in Sentiment Analysis for Cyberspace Safety Using Advanced Deep Learning Techniques,” Scientific Reports, vol. 15, no. 1, p. 22681, 2025.
[23] A. C. Nawalagatti et al., “Low-Latency Communication Protocol for 6G Systems Using Intelligent Edge-Enabled Routing and Traffic Forecasting,” Proc. 3rd Int. Conf. on Data Science and Information Systems, 2025.
[22] R. Dhumpati et al., “Enhanced GAN-Assisted Intrusion Detection Model for Addressing Data Imbalance Issues,” Proc. 4th Int. Conf. on Distributed Computing and Electrical Systems, 2025.
[21] V. U. Krishnan et al., “Employing Generative Adversarial Networks for Secure and Reliable Synthetic Data Generation in Cyber Security Applications,” Proc. 4th Int. Conf. on Distributed Computing and Electrical Systems, 2025.
[20] N. Gurrapu et al., “Effective Summarization Techniques for Legal Document Analysis,” Proc. 4th Int. Conf. on Sentiment Analysis and Deep Learning (ICSADL), 2025.
[19] B. Kiranmayee et al., “Developing a Robust Intrusion Detection System Using SMOTE and Hybrid SVNN Model,” Proc. 4th Int. Conf. on Sentiment Analysis and Deep Learning (ICSADL), 2025.
[18] M. Bhonsle et al., “Enhancing Security in Wireless Mesh Networks: A Deep Learning Approach to Black Hole Attack Detection,” Advance Sustainable Science Engineering and Technology, vol. 7, no. 1, 2025.
[17] R. Dhumpati et al., “Enhancing Edge Computing with Machine Learning for Low-Latency Applications,” Proc. IEEE Int. Conf. on Advances in Computing Research, 2025.
[16] P. V. A. Raghu Dhumpati et al., “Analyzing the Vulnerability of Consumer IoT Devices to Sophisticated Phishing Attacks and Ransomware Threats in Home Automation Systems,” Journal of Intelligent Systems and Internet of Things, vol. 15, no. 1, pp. 53–63, 2025.
[15] F. Mohamad et al., “Attention-Guided CNN with LSTM for Temporal Gastrointestinal Disease Progression Prediction in Endoscopic Video Sequences,” Proc. 4th Int. Conf. on Mobile Networks and Wireless, 2024.
[14] R. Dhumpati et al., “BowNetCrypt: Sleek Vaulted Messenger Secured by Bowerbird-Driven Finite Neural Messaging with Dual Elliptic Protection,” Proc. 5th Int. Conf. on Data Intelligence and Cognitive Computing, 2024.
[13] V. S. Raja et al., “Automated Heart Disease Diagnosis and Monitoring System Using Similarity-Navigated Graph Neural Networks with Leopard Seal Optimization in IoT Healthcare Applications,” Proc. 4th Int. Conf. on Sustainable Expert Systems (ICSES), 2024.
[12] R. Dhumpati et al., “Efficient Detection of Multiple Lung Diseases from Chest CT Scans and Cough Sound Using a Simplicial Attention-Based Sparse Graph Convolutional Network,” Proc. 8th Int. Conf. on I-SMAC, 2024.
Publications:[11] R. Dhumpati et al., “A Fuzzy Logic Approach for Efficient Control of BLDC Motors for Low-Cost Electric Two-Wheelers,” Nanotechnology Perceptions, vol. 20, no. 5, pp. 191–202, 2024.
[10] D. Raghu, H. K. Tripathy, and R. Borreo, “A Novel Graph Convolutional Neural Networks (GCNNs)-Based Framework to Enhance the Detection of COVID-19 from X-Ray and CT Scan Images,” International Journal of Advanced Computer Science & Applications, vol. 15, no. 4, 2024.
[9] K. K. M. Bhonsle et al., “MED-LeafNet: Medicinal Leaf Classification and Identification Using CNN-LSTM Hybrid Approach,” African Journal of Biological Sciences, vol. 6, no. 5, pp. 9712–9732, 2024.
[8] R. D. H. K. Tripathy, “CNN-GRU-Based Hybrid Approach for COVID-19 Detection Through Chest X-Ray Images,” Journal of Theoretical and Applied Information Technology, vol. 100, no. 14, pp. 5281–5291, 2022.
[7] D. Raghu and H. K. Tripathy, “Medical Image Analysis Using Deep Learning Algorithm Convolutional Neural Networks,” in Computer Networks, Big Data and IoT, LNDECT, vol. 117, Springer, 2022.
[6] G. A. D. D. Raghu, “Chain Algorithm to Protect Datasets from Hackers,” International Journal of Computer Theory and Applications, vol. 10, no. 9, pp. 437–449, 2017.
[5] R. D. and N. Prameela, “RDCT Software Experts for Healthy Software Products,” International Journal of Recent Advances in Engineering & Technology, vol. 3, no. 1, 2015.
[4] G. P. S. V. Dumpati Raghu and P. Ratna Kumar, “3-Phase Parallel Model With Testing for MIS,” International Journal of Computer Science and Technology, vol. 4, no. 4, pp. 66–69, 2013.
[3] G. P. S. V. Ch. Suresh Kumar, D. Raghu, and P. Ratna Kumar, “Addiction of Computer is Sabotage to Human Life,” International Journal on Advanced Computer Theory and Engineering, vol. 1, no. 1, pp. 121–128, 2012.
[2] R. A. D. Raghu et al., “Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks,” International Journal of Computer Science & Technology, vol. 2, no. 1, p. 38, 2011.
[1] A. M. P. Ratna Kumar, R. D., and U. D., “Chronological Test Generation for Software Project SLoC,” International Journal of Computer Science & Technology, vol. 2, no. SP 1, pp. 117–121, 2011.
Patents:
Total No. of Patents : 05
| Sl.No. | Title | Application No. | Publication No. | Country |
| 5 | AI-Powered Multi-Layer Cybersecurity Monitoring Console | 6420420 | 28/2025 | UK |
| 4 | Android-Based Design and Implementation of Voice-Controlled Autonomous Robotic Vehicle | 202441058249 | 08/2024 | India |
| 3 | AI based cyber security detecting device | 420377-001 | 08/2024 | India |
| 2 | Neural Network-Driven Real-Time Emotion Recognition and Response System for Virtual Assistants | 202441078191 | 10/2024 | India |
| 1 | IoT and Artificial Intelligence based perdition of food contamination using data mining techniques | 202241015283 | 12/2022 | India |
Books:
| Book Title | ISBN | Link for Purchase |
| Fundamentals of Medical Image Processing | 978-93-5762-368-1 | Amazon link |
| The Complete Ethical Hacking | 978-93-6674-256-4 | Amazon link |
| Cyber Security for beginners | 978-93-6132-931-9 | Amazon link |
| Generative AI: ChatGPT tool | 978-93-6132-593-9 | Amazon link |
