Vinayakumar R


   Ph.D. Student (Cyber Security) & Cognitive Security Practitioner [Resume]

    Computational Engineering and Networking, Amrita Vishwa Vidyapeetham                                                                

    Contact: vinayakumarr77[at]gmail.com, r_vinayakumar[at]cb.amrita.edu, 91-9487951055                                        [Github] [Updated Cite]  I am on the job market!!                          

I am a third-year Ph.D. student at Computational Engineering and Networking (CEN) department at Amrita Vishwa Vidyapeetham. I am working in the area of Artificial intelligence, Machine learning, Data mining and Deep learning for Cyber Security. I spent the first two years of my Ph.D. working on machine learning for use-cases of Cyber Security and now I am working on deep learning for network traffic analysis. I am particularly interested in improving the malicious detection rate through the use of Artificial Intelligence (AI), including machine learning, data mining, deep learning and natural language processing.

>News
  • Our book chapter "Scalable Framework for Cyber Threat Situational Awareness based on Domain Name Systems Data Analysis" got accepted and appear in Big data in Engineering Applications.
  • Our paper titled "Evaluation of Recurrent Neural Network and its variants for Intrusion Detection System (IDS)" has accepted in Special Issue On Big Data Searching, Mining, Optimization & Securing (BSMOS) Peer to Peer Cloud Based Networks in IJISMD.
  • Registered for IWSPA-AP Shared Task at IWSPA 2018.

>Research Experience
  • Aug 2015 - Sep 2017 Research Associate, Supervisor: Prof Soman KP 
               Data mining, Machine learning, Deep learning, Cyber Security, Natural language processing
  • Jun 2014 - Jul 2015   Research Assistant, Supervisor: Prof Soman KP  
               Block-based programming development for Indian K-12 Schools

>Education
  • Aug 2015 - Present Pursuing Ph.D. at Center for Computational Engineering and Networking (CEN), Amrita Vishwa Vidyapeetham, Coimbatore. 
                  -Domain: Data Mining, Machine Learning and Deep Learning with Cyber Security and Natural Language Processing for Self-learning Cyber intelligence system.
  • Aug 2011 - May 2014 Master of Computer Application (M.C.A) at Amrita Vishwa Vidyapeetham, Mysore.
  • Aug 2008 - May 2011 Bachelor of Computer Application (B.C.A) at JSS College Mysore.
>Research

Participation in NLP and Cyber Security Shared Tasks
  • Named Entity rEcognition and Linking (#Micropost2015 NEEL): Named Entity Recognition and Linking.
  • International Cybersecurity Data Mining Competition CDMC 2016.
  • VarDial 2017 - Fourth Workshop on NLP for Similar Languages, Varieties, and Dialects.
  • Stance and Gender Detection in Tweets on Catalan Independence@Ibereval 2017.
  • WASSA-2017 Emotion Intensity Task.
  • DEFT 2017 Text Search @ TALN / RECITAL 2017 Opinion analysis and figurative language in tweets in French.
  • International Cybersecurity Data Mining Competition CDMC 2017.
  • 2nd Social Media Mining for Health Applications Shared Task at AMIA 2017.
Book Chapter
  • Vinayakumar R, Prabaharan Poornachandran and Soman KP, "Scalable Framework for Cyber Threat Situational Awareness based on Domain Name Systems Data Analysis." Big data in Engineering Applications, Springer. [under print]
Journal Papers
  • Vinayakumar R, Soman KP, Prabaharan Poornachandran and Sachin Kumar S, "Detecting Android Malware using Long Short-term Memory-LSTM." Journal of Intelligent and Fuzzy Systems - IOS Press. [under print]
  • Vinayakumar R, Soman KP, Prabaharan Poornachandran and Sachin Kumar S, "Evaluating Deep Learning Approaches to Characterize and Classify the DGAs at Scale." Journal of Intelligent and Fuzzy Systems - IOS Press. [under print]
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Evaluating Deep learning Approaches to Characterize, Signalize and Classify malicious URLs." Journal of Intelligent and Fuzzy Systems - IOS Press. [under print]
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Detecting Malicious Domain Names using Deep Learning Approaches at Scale." Journal of Intelligent and Fuzzy Systems - IOS Press. [under print]
Conference Papers
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Evaluating Shallow and Deep Networks for Secure Shell (SSH)Traffic Analysis." IEEE Xplore [paper | slides]
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Evaluating Effectiveness of Shallow and Deep Networks to Intrusion Detection System." IEEE Xplore [paper | slides]
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Deep Android Malware Detection and Classification." IEEE Xplore  [paper | slides]
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Long Short-Term Memory based Operation Log Anomaly Detection." IEEE Xplore [paper | slides]
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Deep Encrypted Text Categorization." IEEE Xplore  [paper | slides]
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Applying Convolutional Neural Network for Network Intrusion Detection." IEEE Xplore [paper | slides]
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Secure Shell (SSH) Traffic Analysis with Flow based Features Using Shallow and Deep networks." IEEE Xplore  [paper | slides]
  • Vinayakumar R, Soman KP and Prabaharan Poornachandran, "Applying Deep Learning Approaches for Network Traffic Prediction." IEEE Xplore  [paper | slides]
  • Vinayakumar R, Soman KP, K.K.Senthil Velan and Shaunak Ganorkar, "Evaluating Shallow and Deep Networks for Ransomware Detection and Classification." IEEE Xplore  [paper | slides]
  • Rahul K. Pathinarupothi, Vinaykumar R., Ekanath Rangan, Gopalakrishnan E., and Soman K. P., "Instantaneous Heart Rate as a Robust Feature for Sleep Apnea Severity Detection using Deep Learning." IEEE Xplore [paper]
  • Rahul K. Pathinarupothi, Dhara Prathap J., Ekanath Rangan, Gopalakrishnan E., Vinaykumar R., and Soman K. P., "Single Sensor Techniques for Sleep Apnea Diagnosis using Deep Learning." IEEE Xplore [paper | poster]
  • Sujadevi VG., Soman KP., and Vinayakumar R. "Real-time Detection of Atrial Fibrillation from Short time single lead ECG traces using Recurrent neural networks.", Intelligent Systems Technologies and Applications (ISTA'17), Springer [paper]
  • Sujadevi VG., Soman KP., Vinayakumar R. and Prem Sankar AU. "Anomaly detection in Phonocardiogram employing Deep learning.", 4th International Conference on Computational Intelligence in Data Mining (ICCIDM-2017), Springer [paper]
  • Sujadevi VG., Soman KP., Vinayakumar R. and Prem Sankar AU. "Deep models for Phonocardiography (PCG) classification." IEEE Xplore [paper]
  • Sreelekshmy Selvin., Vinayakumar R., Gopalakrishnan E., Vijay Krishna Menon., Soman K.P., "Stock Price Prediction Using LSTM, RNN And CNN-Sliding Window Model.", 6th International Conference on Advances in Computing, Communications and Informatics (ICACCI2017), IEEE Xplore [paper].
  • Shriya Se, Vinayakumar, R., Anand Kumar M., and Soman K.P., “AMRITA-CEN@SAIL2015: Sentiment analysis in Indian languages.”, MIKE 2015 Proceedings of the Third International Conference on Mining Intelligence and Knowledge Exploration, Springer [paper].
  • Shriya Se, Vinayakumar, R., Anand Kumar M., and Soman K.P., “Predicting the Sentimental Reviews in Tamil Movie using Machine Learning Algorithms.”, Indian Journal of Science and Technology (IJST) [paper].
  • Neethu Mohan, Soman K.P, and Vinayakumar R "Deep Power: Deep Learning Architectures for Power Quality Disturbances Classification.", TAP Energy 2017. [under print]
Shared Task Working Notes
  • Vinayakumar R., Sachin Kumar S., Premjith B., Prabaharan P., and Soman K P. "DEFT 2017 - Texts Search @ TALN / RECITAL 2017: Deep Analysis of Opinion and Figurative language on Tweets in French." Opinion analysis and figurative language in tweets in French, Orléans. [paper]
  • Vinayakumar R., Sachin Kumar S., Premjith B., Prabaharan P., and Soman K P. "Deep Stance and Gender Detection in Tweets on Catalan Independence@Ibereval 2017." 2nd Workshop on the Evaluation of Human Language Technologies for Iberian languages, at SEPLN 2017 at University of Murcia, Murcia, Spain.[paper]
  • Vinayakumar R., Premjith B., Sachin Kumar S., Soman K P. and Prabaharan P. "deepCybErNet at EmoInt-2017: Deep Emotion Intensities in Tweets." 8th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis (WASSA-2017), at EMNLP 2017. [paper]
  • Barathi Ganesh HB, Abinaya N, Anand Kumar M, Vinayakumar R and Soman KP. "Amrita-CEN@NEEL : Identification and Linking of Twitter Entities."  #Microposts2015 Making Sense of Microposts: Big things come in small packages. Florence, Italy. [paper]
  • Barathi Ganesh HB, Vinayakumar R, Anand Kumar M, Soman KP. "Health Care Text Classification through Class Embedding." 2nd Social Media Mining for Health Applications Shared Task at AMIA 2017. [paper]
  • Vinayakumar R, Barathi Ganesh HB, Anand Kumar M, Soman KP. "Deep Health Care Text Classification." [paper]
Co-organized the following events in the department of Computational Engineering and Networking, Amrita Vishwa Vidyapeetham
  • Saturday, October 28, 2017 - AISec 2017: Modern Artificial Intelligence (AI) and Natural Language Processing (NLP) Techniques for Cyber Security
  • Saturday, December 16, 2017 - Blockchain 2017: Blockchain and Machine Learning
  • Saturday, November 11, 2017 - DeepSci 2017: Deep Learning for Healthcare and Financial Data Analytics
  • December 22-24, 2017 - DeepChem 2017: Deep Learning & NLP for Computational Chemistry, Biology & Nano-materials
Technical Skills
  • Languages: C, C++, Java, Scala, Python, Introduction to R, Introduction to Julia, Weka, Matlab.
  • Web development: Html, CSS, JavaScript, JSON, JQuery, Php, Bootstrap, XML, Jsp.
  • Educational Platforms: MIT Scratch, Snap Berkley, BYOB, Scribble, Beetle Blocks.
  • Machine Learning: Spark Mllib, Apache Mahout, XG-boost, Scikit-learn, Dato, Hpelm, Gurls, LibSVM.
  • Big data Platforms: Hadoop, Apache Spark.
  • Database: MySQL, Introduction to Oracle, Apache Cassandra.
  • Deep Learning platforms: TensorFlow, Theano, Keras, Deeplearning4j, Torch, Basics of Caffe, DeepChem and DragoNN
  • Comfortable with Windows and Linux OS.
  • Documentation Tool: LibreOffice, Microsoft Office, and Latex.
>Ph.D. Coursework
  • MA607 - Linear Algebra
  • CN613 - Computational optimization theory- linear and non-linear methods
  • CY603 - Pattern Recognition and Machine Learning
  • CN624 - Scientific Computing
  • CN703 - Computational Methods for Cryptography
  • CN733 - Neural network & Deep learning
  • CY800 - Research Methodology
  • Foundation Mathematics
  • Computational Thinking
>Invited Talks
  • Demo on LSTM based Android Malware classification in TEQIP II sponsored research workshop on deep learning, PSG Tech, Coimbatore. [Tutorial]
  • Title: Deep learning for Cyber Security In Deep learning Workshop organized by Amrita University, Coimbatore. [Tutorial]
  • Title: Deep Learning for Cyber Security use cases in AISec 2017 Workshop: Modern Artificial Intelligence (AI) and Natural Language Processing (NLP) Techniques for Cyber Security, Conducted by the Department of Computational Engineering and Networking, Amrita Vishwa Vidyapeetham, Saturday, October 28, 2017. [Tutorial]
  • Title: Deep Learning for Blockchain in Blockchain 2017 Workshop: Blockchain and Machine Learning, Conducted by the Department of Computational Engineering and Networking, Amrita Vishwa Vidyapeetham, Saturday, December 16, 2017. [Tutorial]
  • Title: Deep learning for Healthcare and financial data analytics in DeepSci 2017 Workshop: Deep Learning for Healthcare and Financial Data Analytics, Conducted by the Department of Computational Engineering and Networking, Amrita Vishwa Vidyapeetham, Saturday, December 16, 2017. [Tutorial]
  • Title: Deep Learning for Chemistry in DeepChem 2017: Deep Learning & NLP for Computational Chemistry, Biology & Nano-materials, Conducted by the Department of Computational Engineering and Networking, Amrita Vishwa Vidyapeetham, December 22-24, 2017.[Tutorial]
  • Title: Deep Learning for Cyber Security use cases in Bharathiar University at the University conference hall on 21/11/17. [Tutorial]
  • Title: Deep Learning for Bio-medical Applications in TEQUIP sponsored Faculty Development Program (FDP) at TKM College of Engineering, Kollam, 14 December 2017. [Tutorial]
  • Title: Deep Learning for Bio-medical Applications in ICMR sponsored Faculty Development Program (FDP) at Mepco Schlenk Engineering College, Sivakasi, Wednesday, 17 January 2018. [Tutorial]
>Certifications

Online Coursework
  • Neural Networks and Deep Learning, Coursera, Aug. 2017 [certificate]
  • Deep Learning with Tensorflow, Big Data University, Dec. 2016 [certificate]
  • Deep Learning Prerequisites: The Numpy Stack in Python [certificate]
  • Big Data, Big Data University, Jul. 2016 [certificate]
  • Functional Programming Principles in Scala, Coursera,  Jul. 2016 [certificate]
  • Spark Fundamentals, Big Data University, Jul. 2016 [certificate]
Certificates acquired from paper presentation in conference
  • Detecting Android Malware using Long Short-term Memory-LSTM
  • Evaluating Deep Learning Approaches to Characterize and Classify the DGAs at Scale
  • Evaluating Deep learning Approaches to Characterize, Signalize and Classify malicious URLs
  • Detecting Malicious Domain Names using Deep Learning Approaches at Scale
  • Evaluating Shallow and Deep networks for SSH Traffic Analysis using Flow-based mechanisms
  • Evaluating Effectiveness of Shallow and Deep Networks to Intrusion Detection System
  • Deep Android Malware Detection and Classification
  • Long Short-Term Memory based Operation Log Anomaly Detection
  • Deep Encrypted Text Categorization
  • Applying Convolutional Neural Network for Network Intrusion Detection
  • Secure Shell (SSH) Traffic Analysis with Flow-based Features Using Shallow and Deep networks
  • Applying Deep Learning Approaches for Network Traffic Prediction
  • Evaluating Shallow and Deep Networks for Ransomware Detection and Classification
  • Real-time Detection of Atrial Fibrillation from Short time single lead ECG traces using Recurrent neural networks
Certificates acquired from participating in workshops
  • Web Application And Mobile Data Security
  • Data mining for Healthcare
  • Software Testing