Research & Consultancy
Department of Computer Science & Engineering
Sr no | Name of the faculty member | Research Specialization to be displayed on the R&C website | Any specific interesting research problems that the faculty member is working or intends to work upon |
---|---|---|---|
1. | Prof Devesh C Jinwala |
Information Security & Privacy Information Security & Privacy in Resource Constrained Environments Machine Learning for Information Security and Privacy Requirements Specifications and Analysis |
Mitigation of Denial of Service Attacks in Wireless Sensor Networks and IoT Protocols Key Aggregate Searchable Encryption with various properties Decentralized Context-aware Access Control mechanisms for IoT systems Privacy issues in Cyber Physical Systems Applications of Generative Adversarial Networks in Cyber Physical Systems Static Analysis of Source code for Security Vulnerabilities Use of Wireless Sensor Networks in Secure Cyber Physical Systems Applications of Atlas, Alloy Analyzer, and Z language in Software modeling and analysis |
2. | Prof Mukesh A Zaveri |
Computer Vision Multimedia Processing (Image Processing, Audio and Speech Processing) Internet of Things Wireless Sensor Network Natural Language Processing Machine Learning |
Humor identification Skin cancer detection Target detection and tracking Video analytics: Surveillance, Summarization Machine translation Speech recognition Deep learning based multimedia processing Biometric multi-modality based recognition Internet of Things based resource optimization 3D scene creation and image restoration |
3. | Shri Rakesh P Gohil |
Image and Video Processing Machine Learning Internet of Things System Programming and Embedded Systems |
Machine learning techniques for Image and Video Optimization Video tracking Video Captioning Video Stabilization Human act detection using image/video processing Analytics of video for monitoring traffic Recognition of Human activity through neural network Content based sampling Image and video Captioning IoT based smart agriculture, emergency health monitoring system, home automation Development of web server using SOC Smart lighting solutions for smart cities IoT based multi-parameter patient monitoring system |
4. | Dr Rupa G Mehta |
Big data analytics Social media data analysis Document analysis and recommendation |
Expert system for legal document analysis and recommendation Social media data analysis for identifying influencing persons/events Sentiment analysis of societal domains based on social media data ML-based efficient garbage collecting system for Smart city Impact study of parameters on scholarly rank from platforms like Research Gate |
5. | Dr Krupa N Jariwala |
Human-Computer Interaction Cognitive Computing AI Machine Learning Image understanding |
Gaze-based task detection using low-grade video cameras Accessibility and usability study for autonomous vehicles Reinforcement Learning for generating trading signals in financial analysis Time Series forecasting & modeling for stock price prediction Automated question generation and grading system Forgery detection techniques in images and videos Content-based image retrieval of building floor plan images Text recognition from multimodal documents |
6. | Dr Dipti P Rana |
Data Mining Machine Learning Soft Computing Big Data Analytics Pattern Recognition Natural Language Processing Database Management System Web Application Computer Organization |
Development of novel machine learning algorithms for big data Development of data preprocessing and machine learning algorithms for imbalanced data Analysis of big data structure, storage, access, and retrieval Discovery of semantic and pragmatic information using NLP High-performance solutions for big data applications Novel solutions for Social media platforms, News, Scholarly platforms, etc. Recommendations systems for professions like Health, Legal, e-commerce, government departments Design of IoT-based software solutions for Agriculture, Disease, etc. Innovation with temporal and geospatial big data Design of innovative visual web applications |
7. | Dr Udai Pratap Rao |
Information Security & Privacy Privacy in Location Based Service Big Data Privacy Security and Trust management in Online Social Networks (OSNs) Security and Privacy in Internet of Things (IoT) and Cyber Physical Systems (CPSs) Blockchain Distributed Computing |
Privacy Enhancing Technologies for Edge-Envisioned Environment (Smart Cities & Smart home) Provable privacy solutions for vehicular edge environment Privacy-preserving trajectory publishing Secure multi-party computation for spatial privacy Homomorphic encryption for enhanced location privacy preservation Defending Topology Inconsistency Attacks in Low Power and Lossy Networks (LLNs) Sybil Attack Detection and Mitigation in IoT Designing Methods of Secure and Reliable Communication in IoT Networks Designing White Box Encryption Schemes for Constraint IoT Devices Designing Lightweight Authentication Techniques for CPSs Decentralization in IoT using Blockchain Technology Defense Mechanism against Profile Cloning Attack on OSNs Scalable anonymization techniques for privacy-preserving Big Data Analytics Container security |
8. | Dr Sankita J Patel |
Information Security and Privacy Secure Computation Privacy Preserving Data Publishing Security and Privacy Issues in Online Social Networks Security and Privacy Protocols for Internet of Things Security and Privacy Issues in Cyber Physical Systems Biometric Cryptosystem Blockchain Technology Software Requirement Specification and Analysis |
Secure Authentication Protocols for Distributed Internet of Things Prevention of Privacy Attacks for Online Social Network Data Publishing Machine Learning Approaches for Detection and Prevention of Distributed Denial of Service Attack Methods for Securing Fingerprint Templates for Biometric Authentication in Cloud Environment Template Protection and Key Generation Techniques for Multimodal Biometric Systems Secure Authentication Protocols for Low Power Wide Area Networks of Cyber Physical Systems Protocols for Device Authentication in 5G Cellular Networks Leveraging Blockchain technology for various application domains Secure Multiparty Computation protocols for Private Computation at cloud servers |
9. | Dr Bhavesh N Gohil | Security and Performance issues in distributed/cloud/edge/fog computing |
Intrusion detection/prevention in cloud/edge computing Load balancing in cloud/edge computing Energy-efficient task and VM allocation/scheduling in cloud/edge/fog computing VM migration in cloud/edge computing |
10. | Dr Balu Parne |
Security in Mobile Communication Networks Authentication and Key Agreement in M2M Communication / Internet of Things Information Security and Privacy Security in IoT based Applications Blockchain Technology Security in E-commerce and Social Networking |
Authentication and Key Agreement Protocols for 5G Communication Networks Lightweight Secure and Privacy Preserving Authentication Protocols for IoT based Applications Group-based Authentication Protocols for IoT based Applications Machine Learning-based Approach for Security in Social Networking and E-commerce Secure Key Establishment in Smart Grid Technology Data Security and Privacy in Smart Grid Technology Secure Authentication and Key Agreement Protocols for Low Power Wide Area Network (LPWAN) Blockchain enabled Public Key Infrastructure based Solutions for IoT |
11. | Dr Keyur J Parmar |
Information and network Security and Privacy Cyber Security Encrypted data processing in Wireless Sensor Networks/Internet of Things Security protocols for key distribution in WSNs/IoT Cryptography Blockchain Technology Security and Privacy Issues in Blockchain Technology Security and privacy issues in Web/Android applications |
Design and analysis of security algorithms and protocols in resource-constrained Wireless Sensor Networks (WSN) and Internet of Things (IoT) Applications of cryptography in Security, blockchain technology, WSNs, etc. Encrypted data processing in WSNs/IoT Key distribution protocols for resource-constrained Wireless Sensor Networks (WSN) and Internet of Things (IoT) Design, analysis, and development of novel applications of Blockchain Technology and Smart Contracts Security and privacy issues in Blockchain technology and smart contracts Security and privacy issues in Web/Android applications |
12. | Dr Alok Kumar |
Wireless Sensor Networks IoT Information/Network Security Blockchain |
Secure and Reliable Multicasting Protocol of IoT devices Distributed Attribute Based Encryption Combinatorial design based key pre-distribution schemes |
13. | Dr Dhiren R Patel |
Blockchain Technology Cyber Security AI Sustainable Technologies |
CBDC, Bitcoin Inscriptions, Oracle Data Streams Defensive and Offensive Security Framework FATE framework Precision Farming and Food Supply Chains |
14. | Dr Abhilasha Chaudhuri |
Machine Learning Dimensionality Reduction Techniques Meta-heuristic Optimization Algorithms High-dimensional data classification |
Brain Computer Interface Cognitive workload assessment Gene selection approaches |
15. | Dr Naveen Kumar |
Named Data Networking Software Defined Networking Network Security Artificial Intelligence and Machine Learning Natural Language Processing Meta-heuristics |
Detection and Mitigation of Interest Flooding Attack in Named Data Networking (NDN) Detection and Mitigation of Cache Privacy Attack in NDN Detection and Mitigation of Cache Pollution Attack in NDN Integration of NDN with IoT Energy-aware workflow scheduling in Cloud Environment Real-time Fake News Detection DDoS Protection and Prevention using Software Defined Networking Enforcing Data Privacy of Health Related Public Data Fog and Edge Based Applications for Smart City Blockchain based solutions for Supply Chain Management, Health care, Voting Improving NDN for bulk data transfer Genome Data Compression |