v a r s h i n i . r e d d y

AI & reinforcement learning

Trying and learning, just like them!

Sustainable Computation

Saving the world is not just my hobby, especially since the current trend shows destroying it is.

Graph Theory & Social Networks

Working to demystify mathematics in an unconventional, fun and practical way

Information Security

A right or not, privacy and security is an absolute necessity and I believe to fight for it.

About Me

I am a data science enthusiast eagerly looking for opportunities to apply knowledge to solve practical problems. This page is a brief introduction of what I like to do and where my interests lie. Always open to trying new things out.



EDUCATION

2012


10th Grade


CGPA : 10/10
Kendriya Vidyalaya

2014


12th Grade


Science (Computers)
92%
Kendriya Vidyalaya

2018


Bachelor of Engineering


Computer Science
CGPA : 9.72/10
National Institute of Engineering

2021


Master of Science


Data Science
Expected Graduation: Dec'22
Harvard University



PROJECTS


Research Projects

> Uncertainty Quantification for feature selection using Multi-Armed Bandits Feature selection for datasets with large predictors but few data points using multi armed bandits. Applying this approach to healthcare data to quantify the difference in uncertainty with this approach


> Scheduling of neural network parameters Scheduling of learning rate, batch size and other hyperparameters of neural networks for solving differential equations using reinforcement learning


> Reduction of cost of information in analysis of variable phenomena Applying reinforcement learning to classify and prioritise variable objects in order to take informed decisions regarding allocation of limited spectroscopic resources among other resources.


> Intrusion Detection System using Sensor Fusion Networks To capitalise on the large ubiquitous computing power, multiple IDSs are deployed in the same network. A neural network learns the IDSs weights for preferential attack detection. A connected sensor fusion unit makes an appropriate decision.


> Smart glasses for the blind Glasses detect all objects around it along with their distance and speed. Based on this, it actively navigates the blind, thus obviating the use of a walking stick. For a better experience it describe everything around them.


> Malware Classification as an application of social network analytics and community detection Community detection is applied to system call graphs and features are then extracted from the communities using social network properties such as the centrality measures (degree, betweenness, eigenvector, etc.)


> Comparison of Machine Learning techniques for malware detection and classification A comparison of different machine learning techniques for the detection and classification of malware variants of known malware families by correlating the static features from executables and exploiting the bloom filter data structure


> Hybrid Behavioural Features for Chrun Prediction in Mobile Telecomm Networks with Data Constriants Features based on social influence and changes in both - call usage patterns and social groups - are extracted to predict churn by underlining the importance of as social ties to better understand the behaviour of customers


> Botnet Prediction The aim is to predict which system in a network of user systems could be part of a botnet/botmaster target using predictive functions and community detection on network traffic between interconnected systems.


> Quantum Machine Learning to mitigate machine learning adoption barriers A research survey of quantum machine learning algorithms (theory & implmentational working) along with their applications to overcome issues like large data processing, training overhead. The mathematics governing quantum annealing, quantum topological algorithms and quantum NN classification throughly studied.


> Analysis of Similarity Measures for Collaborative Filtering Recommendation Implemented a user-based Collaborative Filtering (CF) mechanism to determine which similarity index (such as Manhattan distance, Pearson Correlation, etc) is ideal for data of the different forms.


> Forensic analysis of security attacks A comprehensive survey of the types of security attacks, mode of occurrence and efficient methods to analyze them. Put forward an efficient and scalable algorithm to prevent a Denial of Service Attack


> Security Analysis of AES algorithm This project involved the analysis of the design implementation of the asymmetric encryption algorithm & key security features with its complexity. Also, verified the randomness & entropy to check for the redundancy in the key generation.




Other Projects

> Geographic topology extrapolation using Generative Adversarial Networks Generative Adversarial Network is used to find probable topological hot-spots in urban cities for new lakes to be dugout to increase groundwater & reduce the chance of flooding of low-lying areas


> Certification Authority Management System A software project funded by Ministry of Electronics and Information Technology, Govt. of India that aids certification authorities in the validation & certification of vendor’s cryptographic modules and their underlying cryptographic algorithms. All NIST approved algorithms and modules in FIPS 104-2 are incorporated.


> Lane detection and switching in self driving cars Simulation of cars that can drive in a diverse set of virtual environment without a human operator using Convolutional Neural Networks. It is based on lane detection & mapping of steering angle with the surrounding environment.


> Electoral Database Efficient database with interactive UI and automated text summarization that tracks electoral campaigns, polling information along with candidate comparison and authentication service with double layer encryption.


> Sign Language recognition A system using which one can easily communicate with deaf people by converting American Sign Language (ASL) into text by creating a vision-based system to identify and classify fingerspelled letters of the ASL.


> Fake news detection using LSTMs A corpus of labelled news articles is used to build a Long Short-term Memory model that generates new sentences that mimic the style of the writers. This renders class imbalance is inconsequential.


> Vulnerability assessment and penetration testing tool hybrid model


> Captcha Reader





PUBLICATIONS

>Malware detection and classification using community detection and social network analysis
Journal of Computer Virology and Hacking Techniques, DOI: 10.1007/s11416-021-00387-x
Link

>Hybrid Behavioural Features for Churn Prediction in Mobile Telecomm Networks with Data Constraints
Proceedings of the Second International Conference on Security and Privacy, ISEA-ISAP 2018, DOI : 10.1007/978-981-13-7561-3
Link

>Simulation of Lane-switching in Self-Driving Automobiles
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018, DOI : 10.32628/CSEIT184634
Link

>Analysis of Similarity Measures for Collaborative Filtering
Proceedings of the International Symposium on Cloud Computing & Data Analytics 2017
Link

>Comparison of Machine Learning techniques for Malware Detection and Classification
Under Peer Review






TECHNICAL SKILLS

Languages                                                        Platforms                                                           Tools & Software Packages

Python

60% Complete

HTML, Javascript, CSS

85% Complete

C++, R

80% Complete

Swift

80% Complete

MongoDB, SQL

70% Complete

Java

65% Complete

Mac OS

95% Complete

Ubuntu, CentOS

90% Complete

Kali Linux

80% Complete

Windows

60% Complete

Matlab

95% Complete

Weka

95% Complete

Octave

90% Complete

Path Analyser

80% Complete

Wireshark

70% Complete




AWARDS

> Best Technical Paper Award for the paper titled: - Analysis of Similarity Measures for Collaborative Filtering at the International Symposium on Cloud Computing & Data Analytics 2017

> Best Technical Paper Award for the paper titled: Simulation of Lane-switching in Self-Driving Automobiles" at the National Conference on Engineering Innovations and Solutions'18

> Runner-up Best Technical Poster Award at the Second International Conference on Security and Privacy, ISEA-ISAP 2018

> Winner KBITS & NAIN Most Promising Project Award & seed funding for Electoral Database project

> Winner Grace Hopper India 2016 Award and Scholarship

> Winner Intel India AI Hackathon 2016

> Winner National level lawn tennis 2009 championship

> Winner The Hindu National Level Debate competition




RESEARCH AND TEACHING EXPERIENCE

>Research Fellow StellarDNN - Harvard Lab

>Content Developer and Teaching Assistant Univ.Ai - Edtech startup

>Teaching Assistant - College Remedial Students Enhancement program

>Conducted 2-month weekend Classes on Data Structures and Algorithms in college

>Principal Investigator - Univ.Ai Research Program

>Research Associate - Supercomputer Education & Research Center, Indian Institute of Science

>Research Intern - Supercomputer Education & Research Center Indian Institute of Science

>Undergraduate Consultant - Department of Computer Science & Engg. National Institute of Engineering



VOLUNTEERING

> Fundraising and Curriculum development - Smile Foundation

> Mentor for first-year students – College Student Mentorship program

> Teaching English and Basic Computers course - Divya Deepa, a school for the underprivileged

> College Ambassador - NPTEL

> Online volunteer to spread awareness - UN Volunteers India Environment

> Teaching, Curriculum development - Sneha Kiran Mysore Spastic Society, for children living with cerebral palsy

> Technical Volunteer - Lake Revivers Association, Bangalore






Projects In-Detail

Following are some of the aforementioned projects in detail.
Through each page you can find the codes, inspiration and presentations related to the work

View Full Project

Lane switching in self-driving cars

using CNN

View Full Project

Churn Prediction

using hyrbid behavioural features

View Full Project

American Sign Language

using Deep Learning

View Full Project

Malware Detection & Classification

using community detection and Bloom filter

View Full Project

Similarity Measures for Recommender Systems

using user-based Collaborative Filtering

View Full Project

Fake News Detection

using LSTMs

get in touch

EMAIL

varshinibogolu@fas.harvard.edu ● varshinibogolu@g.harvard.edu ● varshinir310@gmail.com

PHONE

+1 857 316 7225