Projects

SSH Key Management System

Designed and implemented a secure SSH Key Management backend using FastAPI, Docker, and MariaDB, tailored for multi-user server environments. The system exposes a REST API for uploading, listing, deleting, and categorizing SSH keys, with dynamic category-based activation and automated updates to authorized_keys files. Integrated OAuth2 token-based authentication ensures secure access to all endpoints. The entire service is containerized via Docker for portability and scalability, with MariaDB providing reliable key storage. This solution enhances centralized SSH key control, simplifies key rotation, and boosts security for teams managing remote infrastructure.

Model Stealing Attack on B4B-Protected Encoder

Implemented a model stealing attack targeting a B4B (Bucket-for-Bucket noise protected) encoder API. Queried a proprietary model in 1000-image batches to extract 1024-dimensional embeddings and replicated its behavior with a modified ResNet18 encoder using a hybrid Cosine + L2 loss. Training incorporated data augmentation and ran for 40 epochs using Adam and learning rate scheduling. The model was exported to ONNX and achieved a L2 distance of 6.19 from victim outputs, indicating high fidelity. This project highlights advanced black-box querying, representation learning, and robust training in security-critical scenarios.

Membership Inference Attack Using Ensemble Models

Developed a Membership Inference Attack pipeline to detect whether a given image was part of a ResNet18 model's training set, using only its outputs. Built an out-of-fold stacked ensemble using XGBoost, LightGBM, and CatBoost (tuned with Optuna), leveraging features like loss, confidence, entropy, gradient norm, and conv5 activations. A logistic regression meta-model aggregated predictions, fine-tuned to optimize TPR at low FPR. Using SelectKBest, the top 50 features were selected, achieving AUC = 0.7421 and TPR@FPR=0.05 = 0.1023 . Entire pipeline executed on Google Colab GPU in ~20 minutes, demonstrating strong feature engineering and ensemble modeling in adversarial ML.

Sentiment Analysis of #WorldCup2022 Tweets

Conducted sentiment analysis on 22,524 English tweets tagged with #WorldCup2022 to explore public opinion during the global sports event. Leveraged Natural Language Processing techniques including VADER sentiment analysis and Word Cloud visualization to extract and classify sentiments. The results revealed a mix of excitement for the games and concern over human and migrant rights in the host country. The study demonstrated how NLP can effectively detect emotional trends in social media, reinforcing the role of platforms like Twitter in gauging public sentiment in real-time.

AI-Enabled 6G Mobile Communication Systems

This research project examined how Artificial Intelligence (AI) will shape the future of 6G mobile communication systems. We surveyed and analyzed cutting-edge proposals that leverage AI to optimize aspects of the 6G ecosystem, including network management, signal processing, and resource allocation. The goal was to identify how AI can be used to build a more intelligent, adaptive, and efficient communication infrastructure for the next-generation internet. The study highlighted the potential of AI-driven 6G to surpass the limitations of current 5G technologies, paving the way for smarter connectivity and real-time decision-making in ubiquitous wireless environments.

Explainable Phishing Email Detection using LIME and SHAP

This project developed a phishing email classifier using Random Forest on a dataset of 18,650 emails, achieving an accuracy of 96.59% using TF-IDF features. The preprocessing pipeline involved contractions correction, emoji and HTML tag removal, lemmatization, and stopword filtering. Explainability was a core focus: LIME was used to interpret individual predictions by identifying influential words like “click” and “offer,” while SHAP explained global feature importance using Shapley values derived from game theory. The model achieved high precision and recall in detecting phishing content, and visual explanations helped expose common phishing patterns. This solution highlights the role of interpretable machine learning in real-world cybersecurity.