Jagan Mohan Reddy D
Cited by
Cited by
A statistical–topological feature combination for recognition of handwritten numerals
N Das, JM Reddy, R Sarkar, S Basu, M Kundu, M Nasipuri, DK Basu
Applied Soft Computing 12 (8), 2486-2495, 2012
Feature selection for detection of peer-to-peer botnet traffic
P Narang, JM Reddy, C Hota
Proceedings of the 6th ACM India computing convention, 1-9, 2013
Attack Identification Framework for IoT Devices
JMR Danda, C Hota
Information Systems Design and Intelligent Applications 434, 505-513, 2016
P2p traffic classification using ensemble learning
JM Reddy, C Hota
Proceedings of the 5th IBM collaborative academia research exchange workshop …, 2013
Heuristic-based real-time P2P traffic identification
JM Reddy, C Hota
2015 International Conference on Emerging Information Technology and …, 2015
Recognition of Handwritten Characters using Deep Convolutional Neural Network
JM Reddy, AV Reddy
International Journal of Innovative Technology and Exploring Engineering 8 …, 2019
Recruitment prediction using machine learning
DJM Reddy, S Regella, SR Seelam
2020 5th International Conference on Computing, Communication and Security …, 2020
Identification of Indian Currency Denomination Using Deep Learning
JM Reddy, KV Rao
Journal of critical reviews 7 (18), 378-384, 2020
An Approach for Detecting Phishing Attacks Using Machine Learning Techniques
JM Reddy, KV Rao, GLV Prasad
Journal of critical reviews 7 (18), 321-324, 2020
Regression Based Price Prediction of Staple Food Materials Using Multivariate Models
K Venkateswara Rao, D Srilatha, D Jagan Mohan Reddy, ...
Scientific Programming 2022, 2022
A Review on Challenges and Threats to Unmanned Aerial Vehicles (UAVs)
SJ Basha, JMR Danda
Unmanned Aerial Vehicles for Internet of Things (IoT) Concepts, Techniques …, 2021
Analysis of Infant Mortality Rate in India Using Time Series Analytics
DJM Reddy, SJ Basha
Recent Trends in Communication and Intelligent Systems: Proceedings of …, 2021
Unwanted Traffic Identification in Large-Scale University Networks: A Case Study
C Hota, P Narang, JM Reddy
Big Data Analytics, 163-187, 2016
Behavior-based P2P traffic identification using fuzzy approach
JM Reddy, C Hota, M Rajarajan
2015 International Conference on Applied and Theoretical Computing and …, 2015
P2P Traffic classification for Intrusion Detection Systems
JMR Danda, P Narang, C Hota
The system can't perform the operation now. Try again later.
Articles 1–15