Durvasula V. L. N. Somayajulu

According to our database1, Durvasula V. L. N. Somayajulu authored at least 48 papers between 1998 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Greedy cooperative cache placement for mobile edge networks with user preferences prediction and adaptive clustering.
Ad Hoc Networks, 2023

2022
GssMILP for anomaly classification in surveillance videos.
Expert Syst. Appl., 2022

Cooperative cache update using multi-agent recurrent deep reinforcement learning for mobile edge networks.
Comput. Networks, 2022

2021
Deadline-aware caching using echo state network integrated fuzzy logic for mobile edge networks.
Wirel. Networks, 2021

Particle Swarm Optimization on Deep Reinforcement Learning for Detecting Social Spam Bots and Spam-Influential Users in Twitter Network.
IEEE Syst. J., 2021

Impact of data correlation on privacy budget allocation in continuous publication of location statistics.
Peer-to-Peer Netw. Appl., 2021

Contact duration-aware cooperative cache placement using genetic algorithm for mobile edge networks.
Comput. Networks, 2021

Memory-based approaches for eliminating premature convergence in particle swarm optimization.
Appl. Intell., 2021

2020
Detection of Malicious Social Bots Using Learning Automata With URL Features in Twitter Network.
IEEE Trans. Comput. Soc. Syst., 2020

Improving Code-mixed POS Tagging Using Code-mixed Embeddings.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2020

A Novel Approach for Mining Time and Space Proximity-based Frequent Sequential Patterns from Trajectory Data.
J. Inf. Knowl. Manag., 2020

Fuzzy logic-based emergency vehicle routing: An IoT system development for smart city applications.
Comput. Electr. Eng., 2020

Social Botnet Community Detection: A Novel Approach based on Behavioral Similarity in Twitter Network using Deep Learning.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
MSP: Multiple Sub-graph Query Processing using Structure-based Graph Partitioning Strategy and Map-Reduce.
J. King Saud Univ. Comput. Inf. Sci., 2019

Adaptive deep Q-learning model for detecting social bots and influential users in online social networks.
Appl. Intell., 2019

Convex vs Convex-Concave Objective for Rare Label Classification.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2019

Deep Q-Learning and Particle Swarm Optimization for Bot Detection in Online Social Networks.
Proceedings of the 10th International Conference on Computing, 2019

An Efficient Cloud-Based Framework for Digital Media Knowledge Extraction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Learning automata-based trust model for user recommendations in online social networks.
Comput. Electr. Eng., 2018

Detection of Social Botnet using a Trust Model based on Spam Content in Twitter Network.
Proceedings of the 13th IEEE International Conference on Industrial and Information Systems, 2018

idrbt-team-a@IECSIL-FIRE-2018 : Relation Categorization for Social Media News Text.
Proceedings of the Working Notes of FIRE 2018, 2018

idrbt-team-a@IECSIL-FIRE-2018 Named Entity Recognition of Indian Languages using bi-LSTM.
Proceedings of the Working Notes of FIRE 2018, 2018

A PSO Based Community Detection in Social Networks with Node Attributes.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2017
Event Extraction from Social Media text using Conditional Random Fields.
Proceedings of the Working notes of FIRE 2017, 2017

2015
A Novel Approach for Classification of E-Commerce Data.
Proceedings of the 8th Annual ACM India Conference, Ghaziabad, India, October 29-31, 2015, 2015

A community driven social recommendation system.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Data transformation techniques for preserving privacy in distance-based mining algorithms.
Int. J. Data Min. Model. Manag., 2014

A Scalable Algorithm for Discovering Topologies in Social Networks.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Finding acronym expansion using semi-Markov conditional random fields.
Proceedings of the 7th ACM India Computing Conference, 2014

SE-CDA: A scalable and efficient community detection algorithm.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
Mining Closed Sequential Patterns in Progressive Databases.
J. Inf. Knowl. Manag., 2013

Paired feature constraints for latent dirichlet topic models.
Proceedings of the 2013 International Conference on Soft Computing and Pattern Recognition, 2013

A Roadmap on Improved Performance-centric Cloud Storage Estimation Approach for Database System Deployment in Cloud Environment.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

Context Dependent Bag of words generation.
Proceedings of the International Conference on Advances in Computing, 2013

Topic dependent cross-word Spelling Corrections for Web Sentiment Analysis.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Index Tuning through Query Evaluation Mechanism Based on Indirect Domain Knowledge.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

Modified correlation based technique in micro array data analysis for searching differentially expressed genes.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2010
A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining
CoRR, 2010

Privacy Preserving Technique for Euclidean Distance Based Mining Algorithms Using a Wavelet Related Transform.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2010

Sentiment Classification of text reviews using novel feature selection with reduced over-fitting.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Privacy Preserving Outlier Detection Using Hierarchical Clustering Methods.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
High Speed Data Perturbation Methods for Privacy Preserving Data Mining.
Proceedings of The 2009 International Conference on Data Mining, 2009

2008
A Data Perturbation Method by Field Rotation and Binning by Averages Strategy for Privacy Preservation.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2008

An Improved Distortion Technique for Privacy Preserving Frequent Itemset Mining.
Proceedings of The 2008 International Conference on Data Mining, 2008

2006
Ontology Matching and Schema Integration Using Node Ranking.
Proceedings of the 2006 International Conference on Semantic Web & Web Services, 2006

An Efficient Slicing Approach for Test Case Generation.
Proceedings of the International Conference on Software Engineering Research and Practice & Conference on Programming Languages and Compilers, 2006

2003
Genetic Database Index Tuning Tool for SQL Server 2000.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003

1998
Scalable Classifier with Dynamic Pruning.
Proceedings of the Ninth International Workshop on Database and Expert Systems Applications, 1998


  Loading...