(Conference Proceedings)
Ayush Kumar and Vrizlynn LL Thing, "A Survey of Transaction Tracing Techniques for Blockchain Systems", Under Review.
Ayush Kumar and Vrizlynn LL Thing, "Evaluating The Explainability of Deep Learning-based Network Intrusion Detection Systems", Accepted in the Proceedings of the SECAI workshop at 30th European Symposium on Research in Computer Security (ESORICS 2025) (pdf).
Ayush Kumar, Kar Wai Fok and Vrizlynn LL Thing, "ExpIDS: A Drift-adaptable Network Intrusion Detection System With Improved Explainability", Accepted in the Proceedings of the IEEE International Telecommunication Networks And Applications Conference (ITNAC 2024) (link)
Ayush Kumar and Vrizlynn LL Thing, "Malicious Lateral Movement in 5G Core With Network Slicing And Its Detection", Accepted in the Proceedings of the IEEE International Telecommunication Networks And Applications Conference (ITNAC 2023) (link) (pdf).
Ayush Kumar and Vrizlynn LL Thing, "A Public Key Infrastructure for 5G Service-Based Architecture". Accepted in the Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2023) (link) (pdf).
Ayush Kumar and Vrizlynn LL Thing, "RAPTOR: Advanced Persistent Threat Detection in Industrial IoT via Attack Stage Correlation". Accepted in the Proceedings of the Annual International Conference on Privacy, Security & Trust (PST 2023) (link) (pdf).
Ayush Kumar, Mrinalini Sridhar, Sahithya Swaminathan and Teng Joon Lim, "ML-Based Early Detection of IoT Botnets", Short paper, In the Proceedings of Security and Privacy in Communication Networks (SecureComm) 2020 (link).
Ayush Kumar and Teng Joon Lim, "EDIMA: Early Detection of IoT Malware Network Activity Using Machine Learning Techniques", In the Proceedings of IEEE World Forum on Internet of Things (WF-IoT) 2019 (link) (pdf).
Ayush Kumar and Teng Joon Lim, "A Secure Contained Testbed for Analyzing IoT Botnets", In the Proceedings of Testbeds and Research Infrastructures for the Development of Networks and Communications (TRIDENTCOM) 2018 (link) (pdf).
Ayush Kumar and Teng Joon Lim, "Early Detection of Mirai-Like IoT Bots in Large-Scale Networks through Sub-sampled Packet Traffic Analysis", In the Proceedings of Future of Information and Communication (FICC) 2019 (link) (pdf).
(Journal)
Ayush Kumar, Mrinalini Sridhar, Sahithya Swaminathan and Teng Joon Lim, "Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic", Accepted for publication in the Elsevier Computers & Security journal (link) (pdf). ***COSE is ranked 4th among the top global publications in Computer Security & Cryptography by h5-index (Google Scholar )
Samuel Chng Chong Wei, Lu Han Yu, Ayush Kumar and David K. Yau, "Hackers types, motivation and strategies: A comprehensive framework'', Published in Elsevier Computer in Human Behavior Reports (link ).
Ayush Kumar, Saumya Dwivedi and Aditya K. Jagannatham, “GLRT based Spectrum Sensing for MIMO SC-FDMA Cognitive Radio Systems in the Presence of Synchronization Impairments”, Published in IEEE Wireless Communications Letters (link).
Ayush Kumar, Saumya Dwivedi and Aditya K. Jagannatham, “GLRT based Spectrum Sensing for MIMO SC-FDMA Cognitive Radio Networks”, Published in IEEE Wireless Communications Letters (link) (Selected among ten WCL papers published in 2015-16 for presentation at IEEE ICC '16).
(Poster)
Ayush Kumar, "Early Detection Of IoT Bots Through Sub-Sampled Packet Traffic Analysis", Presented at the 3rd Singapore International Cyber Week '18, Suntec Singapore Convention and Exhibition Centre (link)
Ayush Kumar and Nguyen Quoc Binh, "Privacy Concerns of IoT in Untrusted Cloud", Presented at the 9th School of Computing Term Project Showcase (STePS) '16, National University of Singapore (link) (Best Project Award)
Ayush Kumar, "GLRT based Spectrum Sensing for MIMO SC-FDMA Cognitive Radio Networks", Presented at the Poster session in IEEE International Conference on Communications (ICC) 2016, Kuala Lumpur, Malaysia (link)
(Pre-print)
Ayush Kumar and David K. Yau, "A Testbed To Study Adversarial Cyber-Attack Strategies in Enterprise Networks'' (pdf).
Ayush Kumar, "Joint Resource Allocation for OFDMA based Overlay Cognitive Radio Networks under Stochastic Rate Constraint", arXiv e-print (pdf)