Jagan Mohan Reddy D
Jagan Mohan Reddy D
BITS-Pilani Hyderabad Campus
Verified email at hyderabad.bits-pilani.ac.in - Homepage
Cited by
Cited by
A statistical–topological feature combination for recognition of handwritten numerals
N Das, JM Reddy, R Sarkar, S Basu, M Kundu, M Nasipuri, DK Basu
Applied Soft Computing 12 (8), 2486-2495, 2012
Feature selection for detection of peer-to-peer botnet traffic
P Narang, JM Reddy, C Hota
Proceedings of the 6th ACM India computing convention, 1-9, 2013
Information systems design and intelligent applications
SC Satapathy, JK Mandal, SK Udgata, V Bhateja
Advances in intelligent System and Computing 2 (1), 219-223, 2016
P2p traffic classification using ensemble learning
JM Reddy, C Hota
Proceedings of the 5th IBM Collaborative Academia Research Exchange Workshop …, 2013
Attack Identification Framework for IoT Devices
JMR Danda, C Hota
Information Systems Design and Intelligent Applications 434, 505-513, 2016
Heuristic-based real-time p2p traffic identification
JM Reddy, C Hota
2015 International Conference on Emerging Information Technology and …, 2015
An Approach for Detecting Phishing Attacks Using Machine Learning Techniques
GLVP Jagan Mohan Reddy D, K.Venkateswara Rao
Journal of critical reviews 7 (18), 321-324, 2020
Identification of Indian Currency Denomination Using Deep Learning
SFS Jagan Mohan Reddy D, K.Venkateswara Rao
Journal of critical reviews 7 (8), 378-384, 2020
Recognition of Handwritten Characters using Deep Convolutional Neural Network
JM Reddy D, AV Reddy
International Journal of Innovative Technology and Exploring Engineering 8 …, 2019
Unwanted Traffic Identification in Large-Scale University Networks: A Case Study
C Hota, P Narang, JM Reddy
Big Data Analytics, 163-187, 2016
Behavior-based P2P traffic identification using fuzzy approach
JM Reddy, C Hota, M Rajarajan
2015 International Conference on Applied and Theoretical Computing and …, 2015
P2P Traffic classification for Intrusion Detection Systems
JMR Danda, P Narang, C Hota
The system can't perform the operation now. Try again later.
Articles 1–12