Ongoing Research

Research Interests

🔐

Cryptography & Security Protocols

Advancing cryptographic primitives and security protocols to ensure robust protection in modern communication systems, with particular focus on post-compromise security and forward secrecy.

Specific Topics

  • Tweakable Block Ciphers: Designing self-healing mechanisms for messaging protocols that recover from key compromise
  • Post-Compromise Security: Ratcheting protocols that ensure forward and backward secrecy in encrypted communications
  • Symmetric Cryptography: Developing efficient cryptographic constructions for resource-constrained environments
  • Secure Messaging: End-to-end encryption protocols with enhanced security guarantees
🌐

Network Security & VoIP Systems

Securing modern network infrastructures and voice-over-IP communications against emerging threats, with emphasis on real-time defense mechanisms and adversarial robustness.

Specific Topics

  • Caller ID Spoofing Defense: Hybrid approaches integrating human feedback for real-time VoIP security
  • Microservices Security: Stackelberg game-theoretic models for cloud-native architectures using graph neural networks
  • Network Protocol Analysis: TCP/IP, routing protocols (OSPF/RIP), and QoS optimization
  • Intrusion Detection: Machine learning-based anomaly detection in network traffic
🤖

AI & Machine Learning for Security

Leveraging artificial intelligence and machine learning to enhance security mechanisms, detect threats, and build intelligent defense systems with interpretability and robustness.

Specific Topics

  • Medical Image Analysis: Deep learning for MRI, CT, and X-ray diagnosis with clinical accuracy
  • Multimodal Learning: Zero-shot learning and failure analysis in large multimodal models
  • Speech Emotion Recognition: Cross-modal fusion with contrastive learning and gender-invariant modeling
  • Adversarial ML: Building robust models resistant to adversarial attacks
🛡️

Privacy-Preserving Technologies

Developing techniques that protect sensitive data while enabling useful computation and analysis, with applications in digital watermarking and homomorphic encryption.

Specific Topics

  • Homomorphic Encryption: Fully homomorphic encryption for secure computation on encrypted data
  • Digital Watermarking: Multi-domain image watermarking with content-adaptive embedding
  • Privacy in Healthcare: Ensuring data privacy and ethical compliance in AI-driven medical systems
  • Secure Multi-Party Computation: Protocols for privacy-preserving collaborative analysis

Research Methodology

1

Problem Identification

Extensive literature review and gap analysis to identify critical challenges in security, privacy, and AI applications. Focus on real-world problems with significant societal impact.

2

Theoretical Development

Rigorous mathematical modeling and algorithm design. Development of novel cryptographic constructions, security protocols, and machine learning architectures grounded in theory.

3

Implementation & Experimentation

Prototype development using Python, TensorFlow, PyTorch, and other frameworks. Extensive experimentation on benchmark datasets with careful statistical analysis.

4

Validation & Evaluation

Comprehensive security analysis, performance evaluation, and comparison with state-of-the-art methods. Peer review through publications in top-tier venues.

5

Collaboration & Dissemination

Working with domain experts, clinicians, and industry partners. Publishing findings in journals and conferences, contributing to open science.

6

Real-World Application

Translating research into practical systems with ethical considerations. Focus on deployable solutions that address societal needs and improve lives.

Research Tools & Expertise

Leveraging cutting-edge tools and frameworks to conduct rigorous research and develop innovative solutions across security, privacy, and AI domains.

Programming & Development

Python C/C++ JavaScript HTML/CSS

AI & Machine Learning

TensorFlow PyTorch Scikit-learn Keras Pandas NumPy

Network & Security

Wireshark ns-3 Cisco Packet Tracer OpenSSL Penetration Testing Tools

Development Environments

Jupyter Notebooks VS Code PyCharm Anaconda Git/GitHub

Databases & Cloud

MySQL AWS Azure

Data Analysis & Visualization

MATLAB Excel Statistical Modeling Data Visualization Libraries

Research Collaboration

I believe in the power of collaborative research to drive innovation and create meaningful impact. I am currently supervised by Dr. Sweta Mahajan at NIT Jalandhar and work closely with fellow researchers on interdisciplinary projects.

Open to Collaboration On

  • Advanced cryptographic protocols and security mechanisms
  • AI-driven healthcare solutions and medical image analysis
  • Network security and VoIP systems research
  • Privacy-preserving machine learning techniques
  • Interdisciplinary projects combining AI, security, and healthcare

Interested in collaboration? Let's discuss how we can work together.

Get in Touch