TONY THOMAS
April 20, 2024 2026-03-10 11:56TONY THOMAS
Cyber Security, Multimedia Security, Cryptography, Biometrics, AR/VR, Quantum Computing, AI and Machine Learning
Associate Professor and ChairSchool of Computer Science and EngineeringKerala University of Digital Sciences, Innovation and Technology (KUDSIT) (Formerly Indian Institute of Information Technology and Management, Kerala, India)
Phone : +91- 4712788048 (Office), +91-9496986375/9074141028 (Mobile)
Email : tony.thomas@duk.ac.in, tony.thomas@iiitmk.ac.in, tonykallivayalil@gmail.com
Public Profiles : https://duk.ac.in/personnel/dr-tony-thomas/
https://www.researchgate.net/profile/Tony-Thomas-Kallivayalil
https://scholar.google.co.in/citations?user=HQPhkogAAAAJ&hl=en
https://www.linkedin.com/in/tony-thomas-kallivayalil-b049802/
Degree | Institution | Year | Result/Rank |
Ph.D. in Mathematics | Indian Institute of Technology Kanpur (IIT Kanpur), India | 2006 | CPI: 9.0 |
M.Sc. in Mathematics | Indian Institute of Technology Kanpur (IIT Kanpur), India | 1998 | CPI: 8.3, First Rank |
B.Sc. in Mathematics | Mahatma Gandhi University, India | 1995 | Marks: 99.20%, First Rank |
Position / Role | Organization / Institution | Duration |
Associate Professor | Kerala University of Digital Sciences, Innovation and Technology (KUDSIT) (Digital University Kerala), Thiruvananthapuram (formerly IIITM-K, India) | Nov 2018 – Present |
Assistant Professor | Indian Institute of Information Technology and Management, Kerala, India | May 2011 – Nov 2018 |
Research Fellow | School of Computer Engineering, Nanyang Technological University (NTU), Singapore | Oct 2008 – Mar 2011 |
Researcher | General Motors Corporation, GM R&D Lab, Bangalore, India | Oct 2007 – Sept 2008 |
Postdoctoral Researcher | Department of Mathematics, Korea Advanced Institute of Science and Technology (KAIST), Korea | Aug 2006 – Jul 2007 |
Adjunct Professor | School of Mathematics, Indian Institute of Science Education and Research (IISER), Thiruvananthapuram (Govt. of India) | Jul 2013 – Dec 2017 |
International Journal Publications
- Thomas, R. Prakash, and S. Pal, “Intrusion Detection in Internet of Medical Things Using Digital Twins—A Review,” Computers, Materials & Continua, vol. 84, no. 3, pp. 4055–4075, 2025.
- S. John and T. Thomas, “ARM: Adaptive Rank-Based Mutation for Android Malware Detection under Adversarial Attacks,” Journal of Cyber Security Technology, pp. 1–26, Aug. 2025.
- S. Roopak, T. Thomas, and M. M. Uddin, “Optimizing Malware Detection with Redundant Sample Filtering for Efficient Retraining,” Journal of Cyber Security Technology, Taylor & Francis, pp. 1–22, Dec. 2024.
- S. John, T. Thomas, and S. Emmanuel, “Detection of Evasive Android Malware Using EigenGCN,” Journal of Information Security and Applications, vol. 86, Nov. 2024.
- Roopak, M. M. Uddin, T. Thomas, and G. Pradeep, “Android Malware Detection Based on Informative Syscall Subsequences,” IEEE Access, Apr. 2024.
- P. Ragendhu, T. Thomas, and S. Emmanuel, “Cancelable Biometric Template Generation Using Random Feature Vector Transformations,” IEEE Access, Feb. 2024.
- Krishnan and T. Thomas, “Finger Vein Recognition Based on Anatomical Features of Vein Patterns,” IEEE Access, Mar. 7, 2023.
- R. Nayar and T. Thomas, “Partial Palm Vein Based Biometric Authentication,” Journal of Information Security and Applications, vol. 72, Feb. 2023.
- P. Ragendhu and T. Thomas, “Cancelable Biometric Scheme Based on Dynamic Salting of Random Patches,” Multimedia Tools and Applications, Springer, vol. 82, no. 10, pp. 14337–14366, Apr. 2023.
- Roopak and T. Thomas, “Detection of Malware Applications from Centrality Measures of Syscall Graph,” Concurrency and Computation: Practice and Experience, Wiley, 2022.
- Krishnan, T. Thomas, and D. Mishra, “Finger Vein Pulsation Based Biometric Recognition,” IEEE Transactions on Information Forensics and Security, Oct. 2021, doi: 10.1109/TIFS.2021.3122073.
- R. Nayar and T. Thomas, “Graph Based Secure Cancelable Palm Vein Biometrics,” Journal of Information Security and Applications, Elsevier, vol. 62, Nov. 2021.
- Surendran, T. Thomas, and S. Emmanuel, “On Existence of Common Malicious System Call Codes in Android Malware Families,” IEEE Transactions on Reliability, Apr. 16, 2020.
- Surendran, T. Thomas, and S. Emmanuel, “GSDroid: A Graph Signal Based Compact Feature Representation for Android Malware Detection,” Expert Systems with Applications, Elsevier, May 29, 2020.
- Surendran, T. Thomas, and S. Emmanuel, “A TAN Based Hybrid Model for Android Malware Detection,” Journal of Information Security and Applications, Elsevier, vol. 54, Oct. 2020.
- S. Roopak, T. Thomas, and S. Emmanuel, “Android Malware Detection Mechanism Based on Bayesian Model Averaging,” Advances in Intelligent Systems and Computing (AISC), vol. 707, pp. 87–96, Springer, 2019.
- Zhang, T. Thomas, T. Zhuo, et al., “Object Coding Based Video Authentication for Privacy Protection in Immersive Communication,” Journal of Ambient Intelligence and Humanized Computing, Springer, pp. 1–14, 2016.
- Krishnan and T. Thomas, “A Survey of Mathematical Techniques in Finger Vein Biometrics,” Journal of Theoretical and Computational Mathematics, vol. 1, no. 1, 2015.
- Zhang, Y. Zhang, T. Thomas, and S. Emmanuel, “Moving People Tracking with Detection by Latent Semantic Analysis for Visual Surveillance Applications,” Multimedia Tools and Applications, Springer, vol. 68, no. 3, pp. 991–1021, 2014.
- Das, D. Roychoudhury, D. Bhattacharya, S. Rajavelu, R. Shorey, and T. Thomas, “Authentication Schemes for VANETs: A Survey,” International Journal of Vehicle Information and Communication Systems (IJVICS), Inderscience, vol. 3, no. 1, pp. 1–27, 2013.
- S. Gayathri, T. Thomas, and J. Jayasudha, “Security Issues of Media Sharing in Social Cloud,” Procedia Engineering, Elsevier, vol. 38, pp. 3806–3815, 2012.
- G. Shini, T. Thomas, and K. Chitharanjan, “Cloud Based Medical Image Exchange – Security Challenges,” Procedia Engineering, Elsevier, vol. 38, pp. 3454–3461, 2012.
- K. Smitha, T. Thomas, and K. Chitharanjan, “Cloud Based E-Governance System: A Survey,” Procedia Engineering, Elsevier, vol. 38, pp. 3816–3823, 2012.
- L. Win, T. Thomas, and S. Emmanuel, “Privacy Enabled Digital Rights Management without Trusted Third Party Assumption,” IEEE Transactions on Multimedia, vol. 14, no. 3, pp. 823–833, Jun. 2012.
- Zhang, T. Thomas, and S. Emmanuel, “Privacy Enabled Video Surveillance Using a Two State Markov Tracking Algorithm,” Multimedia Systems Journal, Springer, vol. 18, no. 2, pp. 175–199, Mar. 2012.
- L. Win, T. Thomas, and S. Emmanuel, “Secure Interoperable Content Distribution Mechanisms Using a Multi-Domain Architecture,” Multimedia Tools and Applications, Springer, vol. 60, no. 1, pp. 97–128, 2012.
- S. Gayathri, T. Thomas, and J. S. Jayasudha, “Prevention of Copyright Issues of Media in Social Network,” International Journal of Computer Applications (IJCA), Special Issue on Advanced Computing and Communication Technologies for HPC Applications, pp. 43–48, Jul. 2012.
- Thomas, S. Emmanuel, A. V. Subramanyam, and M. S. Kankanhalli, “Joint Watermarking Scheme for Multiparty Multilevel DRM Architecture,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 4, pp. 758–767, Dec. 2009.
- Thomas, “Secure Two-Party Protocols for the Point Inclusion Problem,” International Journal of Network Security, vol. 9, no. 1, pp. 1–7, Jul. 2009.
- Thomas and A. K. Lal, “A Zero-Knowledge Undeniable Signature Scheme in Non-Abelian Group Setting,” International Journal of Network Security, vol. 6, no. 3, pp. 265–269, May 2008.
- H. Ko, J. W. Lee, and T. Thomas, “Towards Generating Secure Keys for Braid Cryptography,” Designs, Codes and Cryptography, Springer, vol. 45, no. 3, pp. 317–333, Dec. 2007.
Conference Publications
- Ganesh R. Nair, Tony Thomas, Message-Agnostic Quantum Digital Signatures with Delayed Verification, SPARC International Symposium on Quantum Computing and Applications (SPARCQC 2026), Feb 2026.
- Valsalam and T. Thomas, BHQR: Qubit-Efficient Block-Wise Hybrid Quantum–Classical Image Representation for NISQ Hardware, 8th International Conference on Data Analytics and Cyber Security (DACS 2025), Dec 2025
- Niman S., Tony Thomas,Overcoming Black-Box Limitations in IoT Malware Detection with Kolmogorov-Arnold Networks, 8th International Conference on Data Analytics and Cyber Security (DACS 2025), Dec 2025
- Valsalam and T. Thomas, “CNN with NEQR Encoding for Quantum-Classical Hybrid Image Compression,” in Proc. Int. Conf. ICT Innovations and Systems (ICTIS), Thailand, 2025.
- Prakash and T. Thomas, “Towards Secure AI-Driven Industrial Metaverse with NFT Digital Twins,” in Proc. 17th Int. Conf. COMmunication Systems &NETworkS (COMSNETS), 2025.
- Prakash, G. R. Nayar, and T. Thomas, Security Risk Assessment of Metaverse Based Healthcare Systems Based on Common Vulnerabilities and Exposures (CVE),” in Proc. IEEE Int. Conf. Recent Advances in Systems Science and Engineering (RASSE), 2023.
- M. Uddin, R. S. Roopak, G. G. Rema, and T. Thomas, “A Data Flow-Based Approach for Classification and Risk Estimation of Android Apps,” in Proc. IEEE Int. Conf. Recent Advances in Systems Science and Engineering (RASSE), 2023.
- Roopak and T. Thomas, “Graph Centrality Measures and Mobile Malware Detection,” in Proc. Int. Conf. Linear Algebra and its Applications (ICLAA), Dec. 2021.
- S. John and T. Thomas, “Evading Static and Dynamic Android Malware Detection Mechanisms,” in Proc. 8th Int. Symp. Security in Computing and Communications (SSCC), 2020.
- M. Ipe and T. Thomas, “Periocular Recognition Under Unconstrained Image Capture Distances,” in Proc. 6th Int. Symp. Signal Processing and Intelligent Recognition Systems (SIRS)*, 2020.
- P. Ragendhu and T. Thomas, “Secure Multimodal Biometric Recognition in Principal Component Subspace,” in Proc. Int. Conf. Applied Soft Computing and Communication Networks (ACN)*, 2020.
- Krishnan, G. R. Nayar, T. Thomas, and A. Nystrom, “FEBA – An Anatomy Based Finger Vein Classification,” in Proc. Int. Joint Conf. Biometrics (IJCB), Sep.–Oct. 2020.
- Vij, V. Balachandran, T. Thomas, and R. Surendran, “GRAMAC: A Graph Based Android Malware Classification Mechanism,” in Proc. 10th ACM Conf. Data and Application Security and Privacy (CODASPY), pp. 156–158, 2020.
- S. John, T. Thomas, and S. Emmanuel, “Graph Convolutional Networks for Android Malware Detection with System Call Graphs,” in Proc. 3rd ISEA Conf. Security and Privacy (ISEA-ISAP), 2020.
- M. Ipe and T. Thomas, “Periocular Recognition Under Unconstrained Conditions Using CNN Based Super-Resolution,” in Proc. Int. Conf. Applied Soft Computing and Communication Networks (ACN), LNNS 125, Springer, Dec. 2019.
- M. Ipe and T. Thomas, “CNN Based Periocular Recognition Using Multispectral Images,” in Proc. 5th Int. Symp. Signal Processing and Intelligent Recognition Systems (SIRS), CCIS 1209, Springer, Dec. 2019.
- Surendran, A. Vijayaraghavan, and T. Thomas, “On Effectiveness of Source Code and SSL Based Features for Phishing Website Detection,” in Proc. 1st Int. Conf. Advanced Technologies in Intelligent Control, Environment, Computing and Communication Engineering (ICATIECE), IEEE, Bangalore, India, Mar. 2019.
- Krishnan, T. Thomas, G. R. Nayar, and S. S. M., “Liveness Detection in Finger Vein Imaging Device Using Plethysmographic Signals,” in Proc. 10th Int. Conf. Intelligent Human Computer Interaction (IHCI), LNCS 11276, Springer, Dec. 2018, pp. 251–260.
- P. Ragendhu and T. Thomas, “Fast and Accurate Fingerprint Recognition in Principal Component Subspace,” in Proc. Int. Conf. Emerging Research in Computing, Information, Communication and Applications (ERCICA), AISC, Springer, Jul. 2018.
- S. John, T. Thomas, and M. M. Uddin, “A Multifamily Android Malware Detection Using Deep Autoencoder Based Feature Extraction,” in Proc. 9th IEEE Int. Conf. Advanced Computing (ICoAC), Dec. 2017.
- S. Roopak, T. Thomas, and S. Emmanuel, “Android Malware Detection Mechanism Based on Bayesian Model Averaging,” in Proc. 5th Int. Conf. Advanced Computing, Networking, and Informatics (ICACNI), Goa, Jun. 2017.
- Zhang, T. Thomas, and T. Zhuo, “An Object-Based Video Authentication Mechanism for Smart-Living Surveillance,” in Proc. Int. Conf. Orange Technologies (ICOT), Hong Kong, Dec. 2015.
- Vijayan and T. Thomas, “Unlinkability and Unobservability in Mobile Ad hoc Networks,” in Proc. IEEE Int. Conf. Communications and Signal Processing (ICCSP), Apr. 2014.
- Surendran and T. Thomas, “A Novel Phishing Page Detection Mechanism Using HTML Source Code Comparison and Cosine Similarity,” in Proc. 4th Int. Conf. Advances in Computing and Communications (ICACC), Kochi, Aug. 2014.
- Prabhakar and T. Thomas, “A Review on Finger Vein Identification Systems,” in Proc. NCPAAI: Nat. Conf. Pattern Analysis and Applied Intelligence, 2013.
- Prabhakar and T. Thomas, “Finger Vein Identification Based on Minutiae Feature Extraction with Spurious Minutiae Removal,” in Proc. ICACC, 2013.
- S. Gayathri, T. Thomas, and J. Jayasudha, “Security Issues of Media Sharing in Social Cloud,” in Proc. Int. Conf. Modelling, Optimization and Computing (ICMOC), 2012.
- G. Shini, T. Thomas, and K. Chitharanjan, “Cloud Based Medical Image Exchange – Security Challenges,” in Proc. ICMOC*, 2012.
- K. Smitha, T. Thomas, and K. Chitharanjan, “Cloud Based E-Governance System: A Survey,” in Proc. ICMOC, 2012.
- S. Gayathri and T. Thomas, “Copyright Infringement of Media in Social Network,” in Proc. ICRTCSE, 2012.
- L. Win, T. Thomas, and S. Emmanuel, “A Privacy Preserving Content Distribution Mechanism for DRM without Trusted Third Parties,” in Proc. IEEE Int. Conf. Multimedia and Expo (ICME), Barcelona, Spain, 2011.
- Zhang, T. Thomas, S. Emmanuel, and M. S. Kankanhalli, “Privacy Preserving Video Surveillance Using a Pedestrian Tracking Mechanism,” in Proc. ACM Multimedia Workshop MiFor, Firenze, Italy, Oct. 2010.
- Thomas, S. Emmanuel, P. Zhang, and M. S. Kankanhalli, “An Authentication Mechanism Using Chinese Remainder Theorem for Efficient Surveillance Video Transmission,” in Proc. 7th IEEE Int. Conf. Advanced Video and Signal-Based Surveillance (AVSS), Boston, USA, Aug.–Sep. 2010.
- Thomas, S. Emmanuel, A. Das, and M. S. Kankanhalli, “Secure Multimedia Content Delivery with Multiparty Multilevel DRM Architecture,” in Proc. 19th Int. Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Virginia, USA, 2009.
- Thomas, S. Emmanuel, A. Das, and M. S. Kankanhalli, “A CRT Based Watermark for Multiparty Multilevel DRM Architecture,” in Proc. IEEE Int. Conf. Multimedia and Expo (ICME), New York, USA, 2009.
- L. Win, T. Thomas, S. Emmanuel, and M. S. Kankanhalli, “Secure Domain Architecture for Interoperable Content Distribution,” in Proc. IEEE Pacific-Rim Conf. Multimedia (PCM), Bangkok, Thailand, 2009.
Books
- Thomas, R. Prakash, and A. Kaushik, Augmented and Virtual Reality: Theory and Practice. Wiley, Nov. 2025.
- M. Thampi, T. Thomas, and P. Mukherjee, Eds., Securing the Connected World: Exploring Emerging Threats and Innovative Solutions. Springer, 2025.
- Thomas, R. Surendran, T. S. John, and M. Alazab, Intelligent Mobile Malware Detection. CRC Press, Taylor & Francis, Jan. 2023.
- Thomas, S. Emmanuel, and A. P. Vijayaraghavan, Machine Learning Approaches in Cyber Security Analytics. Springer Nature, Mar. 2020.
- M. Thampi, A. Y. Zomaya, T. Strufe, J. M. A. Calero, and T. Thomas, Eds., Recent Trends in Computer Networks and Distributed Systems Security: Proc. Int. Conf. SNDS 2012, Trivandrum, India, Oct. 11–12, 2012. Communications in Computer and Information Science, vol. 335, Springer, 2012.
Book Chapters
- Valsalam and T. Thomas, “Quantum Machine Learning: Current Trends and Applications,” in Quantum Machine Learning: Current Trends and Applications, Morgan Kaufmann, pp. 201–220, 2025.
- Surendran and T. Thomas, “Malware in the Connected World: Advanced Detection Techniques Using System Calls and Graph Analysis,” in Securing the Connected World: Exploring Emerging Threats and Innovative Solutions, Springer, 2025.
- S. Gayathri and T. Thomas, “Intrusion Detection Systems for Internet of Things,” in Handbook of Research on Intrusion Detection Systems, IGI Global, 2020.
- S. John and T. Thomas, “Adversarial Attacks and Defenses in Malware Detection Classifiers,” in Advanced Research on Cloud Computing, Big Data, and the IoT, IGI Global, 2019.
- S. Devi, R. Surendran, T. Thomas, and M. M. Uddin, “Multi-Pattern Matching Based Dynamic Malware Detection in Smart Phones,” in Energy Efficient Computing: Devices, Circuits and Systems, CRC Press, 2018.
- Surendran, T. Thomas, and S. Emmanuel, “Detection of Malware Applications in Android Smart Phones,” in World Scientific Reference on Innovation, Vol. 4: Innovation in Information Security, World Scientific Publishing, 2018.
- Thomas, “VLSI Implementations of Cryptographic Algorithms,” in Emerging VLSI Circuits, CRC Press, 2014.
- Thomas, “Trust in Digital Rights Management Systems,” in Managing Trust in Cyberspace, Chapman and Hall/CRC Press, Nov. 2013.
- Method for End-to-End Information-Theoretically Secure Key Distribution in QKD Networks, Patent Application no. 202541111410 dated 14/11/2025, Indian Patent Office
- Method for Message-Agnostic Quantum Digital Signatures with Delayed Verification, Patent Application no. 202641004854 dated 18/01/2026, Indian Patent Office
- Digital Twin-based Intrusion Detection System Using Federated Learning for IoMT, funded by C3iHub, IIT Kanpur. Amount: ₹3,729,000. Role: Principal Investigator. (March 2024 – February 2027)
- Design and Development of Next Generation Automated Security Operations and Response Tool (ASPER), funded by the Ministry of Electronics and Information Technology (MeitY). Amount: ₹25,209,000. Role: Co-Investigator. (December 2024 – November 2027)
- Information Security Education and Awareness Project (ISEA), funded by the Ministry of Electronics and Information Technology (MeitY). Role: Co-Investigator. (Completed)
- CRICTR, funded by Kerala State Planning Board. Role: Co-Investigator. (Completed)
- CEPIA, funded by Kerala State Planning Board. Role: Co-Investigator. (Completed)
- Consultancy Services to Develop Online Courses on Cyber Security Awareness for the Employees of Government of Kerala, funded by Kerala State IT Mission. Role: Co-Investigator. (Completed)
- Development of Early Warning Systems, funded by Kerala State Planning Board. Role: Investigator.
Academic Services
Chair, School of Computer Science and Engineering | Kerala University of Digital Sciences, Innovation and Technology (KUDSIT) | Dec 2025- |
Associate Dean (Academic) | Kerala University of Digital Sciences, Innovation and Technology (KUDSIT) | Jun 2022 – Nov 2025 |
Chair, School of Computer Science and Engineering | Kerala University of Digital Sciences, Innovation and Technology (KUDSIT) | Apr 2023 – Sept 2023 |
Academic Convener | Indian Institute of Information Technology and Management, Kerala | Jul 2020 – Present |
Ph.D & M.Tech THESIS EXAMINATION
- M Tech (Res) Thesis Evaluation, NIT Suratkal, July 2021
- D Thesis evaluation, Antonius Cahya Prihandoko, Rights protection of digital content in the DRM environment, James Cook University, Australia, December 2014.
- Doctoral Committee Member, Kerala Technological University (KTU)
- External thesis examiner for M.Tech Computer Science, KTU, 2017.
- External thesis examiner for M.Tech Computer Science with Specialization in Cyber Forensics and Information Security, Cochin university of Science and Technology 2014-15.
REVIEW WORKS FOR EXTERNAL FUNDING AGENCIES
- The Netherlands Organisation for Scientific Research domain Applied and Engineering Sciences, NWO AES, the Dutch funding agency for academic research.
MEMBER OF BOARD OF STUDIES
- Member of board of studies of MCA, Cochin University of Science and Technology (CUSAT), Kerala, 2022-24
- Member of board of studies of BCA, M.Sc Computer Science, S B College Changanacherry, 2025-
- Member of board of studies of Integrated MCA programme, Saintgits College of Engineering, Kerala, 2021-23
- Member of board of studies of M.Sc Mathematics, Mar Evanios College, Kerala, 2021-24
- Member of board of studies of B.Tech (IT), M.E (Computer Science and Information Security, Thiagarajar College of Engineering, Madurai, 2014-2015.
CONFERENCE ORGANIZATION
- Technical Program Committee Member of 3rd International Conference on Innovative Trends In Information Technology (ICITIIT 2022, IIIT Kottayam, 12 to 13 February, 2022
- Scientific Committee Member of 4th International Conference DPSC 2021, Digital Privacy and Security Conference 2021, 20-21 Jan 2021, Porto, Portugal
- Technical Program Committee Member of ICDT 2021: The Sixteenth International Conference on Digital Telecommunications, April 18 – 22, 2021, in Porto, Portugal
- Technical Program Committee Member of ICCIS 2020, 2nd International Conference on Communication and Intelligent Systems, December 26-27, 2020, India
- Technical Program Committee Member of ICDT 2020: The Fifteenth International Conference on Digital Telecommunications, February 23 – 27, 2020 in Lisbon, Portugal
- Organizer of Special Session on Deep learning for Computer Vision, Biometrics and Privacy, IEEE Tencon 2019, 17-20 October 2019, Kochi, India.
- Technical Program Committee Member of 8th International Conference on Pattern Recognition and Machine Intelligence 2019 (PReMI 2019), 17-20 Dec. 2019, Tezpur, India
- Technical Program Committee Member of SECURWARE 2019, The Thirteenth International Conference on Emerging Security Information, Systems and Technologies, October 27 – 31, 2019 – Nice, France
- Technical Program Committee Member of ICDT 2019: The Fourteenth International Conference on Digital Telecommunications, March 24 – 28, 2019 – Valencia, Spain
- Technical Program Committee Member of ICDT 2018: The Thirteenth International Conference on Digital Telecommunications, April 22, 2018 to April 26, 2018 – Athens, Greece
- Technical Program Committee Member of ICDT 2017: The Twelfth International Conference on Digital Telecommunications Sept 10-14, 2017, Rome, Italy.
- Technical Program Committee Member of AWTEM International Conference on Advanced Water Technologies and Energy Management, Venue: Cambridge, United Kingdom, 2017
- Technical Program Committee Member of ACM International Conference on Pervasive Computing Advances & Applications (PerCAA-2017), 15-17, December 2017.
- Organizer and Program Chair, International Workshop on Cyber Threat Resilience, organized jointly by Stevens Institute of Technology, NJ, USA and IIITM-K, Kerala, India, on October 13, 2015, Thiruvananthapuram, India
- Technical Program Committee Member of ICDT 2016: The Eleventh International Conference on Digital Telecommunications (ICDT 2016), February 21 – 25, 2016 – Lisbon, Portugal.
- Technical Program Committee Member of SECURWARE 2015: The Ninth International Conference on Emerging Security Information, Systems and Technologies, August 23 – 28, 2015 – Venice, Italy.
- Technical Program Committee Member of ICDT 2015: The Tenth International Conference on Digital Telecommunications (ICDT 2015), April 19 – 23, 2015 – Barcelona, Spain.
- Technical Program Committee Member of Annual International Conference on Security: Information, System and Network (SISN 2014), 26th – 27th January 2015, Singapore.
- Technical Program Committee Member of MM 2014: ACM Multimedia 2014, Nov 3-7, 2014, Orlando, Florida, USA.
- Technical Program Committee Member of International Conference on Contemporary Computing and Informatics (IC3I), Nov 27-29, 2014, Mysore, India.
- Technical Program Committee Member of CISIS 2014: The Eighth International Conference on Complex, Intelligent, and Software Intensive Systems, July 2nd – July 4th, 2014, Birmingham City University, Birmingham, UK.
- Technical Program Committee Member of ICDT 2014: The Ninth International Conference on Digital Telecommunications (ICDT 2014), February 23 – 27, 2014 – Nice.
- Technical Program Committee Member of SECURWARE 2014: The Eighth International Conference on Emerging Security Information, Systems and Technologies, November 16-20, 2014, Lisbon, Portugal.
- Technical Program Committee Member of ICACCI 2014,3rd International Conference on Advances in Computing, Communications and Informatics 2nd International Conference on Telecommunication Systems and Networks, 24-27 September 2014, Delhi, India.
- Technical Program Committee Member of MIC-Telecom 2014, 2nd International Conference on Telecommunication Systems and Networks, 19-21 December 2014, Bhopal, India.
- Publication Chair, Second International Conference on Advances in Computing, Communications and Informatics (ICACCI-2013), August 22-25, 2013, Mysore, India.
- Technical Program Committee Member of ICDT 2013: The Eight International Conference on Digital Telecommunications (ICDT 2013), April 21-26, 2013, Venice, Italy.
- Technical Program Committee Member of SECURWARE 2013: The Seventh International Conference on Emerging Security Information, Systems and Technologies, August 25 – 31, 2013, Barcelona, Spain.
- Member of Advisory Committee of NCRASEM-2K13: Second National Conference on Recent Advances in Science, Engineering and Management, April 05, 2013, Hyderabad, India.
- Workshops and Special Sessions Chair, International Conference on Security in Computer Networks and Distributed Systems (SNDS-2012), Trivandrum, India, October 11-12, 2012.
- Technical Program Committee Member of SECURWARE 2012 : The Sixth International Conference on Emerging Security Information, Systems and Technologies, August 19 – 24, 2012, Rome, Italy.
- Technical Program Committee Member of WebTech 2012: 2nd Annual International Conference on Web Technologies & Internet Applications, May 07 – 08, 2012, Bali, Indonesia.
- Technical Program Committee Member of ICDT 2012: The Seventh International Conference on Digital Telecommunications, Chamonix / Mont Blanc, France
- Academic Organizing Committee Member, International Workshop on Cyber Security 2K11 (IWCS 2K11), Dec, 2011, India
- Technical Program Committee Member of 2nd International Workshop on Multimedia Systems for Surveillance, Klagenfurt, Austria
- Technical Program Committee Member of International Workshop on Content Protection & Forensics (CPAF 2011) in the 2011 IEEE International Conference on Multimedia and Expo (ICME 2011), Barcelona, Spain.
- Technical Program Committee Member of The Sixth International Conference on Digital Telecommunications, ICDT 2011, April 17-22, 2011 – Budapest, Hungary.
- Technical Program Committee Member of 7th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2010, Boston, USA.
- Technical Program Committee Member of 2009 IEEE Region 10 Conference, IEEE Tencon 2009, Singapore.
EDITORIAL BOARD MEMBER
- Associate Editor, IEEE Access.
- Regional Editor (Asia-Pacific) of International Journal of Trust Management in Computing and Communications (IJTMCC), Inder Science, UK.
- Editor of Journal of Theoretical and computational Mathematics
- Editor of International Journal on Advances in Telecommunications, International Academy, Research and Industry Association (IARIA).
- Editor of International Journal on Advances in Security, International Academy, Research and Industry Association (IARIA).
REVIEWVER
- Reviewer of ACM Transactions on Multimedia Computing, Communications and Applications.
- Reviewer of IEEE Transactions on Reliability.
- Reviewer of Expert Systems with Applications, Elsevier
- Reviewer of IEEE Access
- Reviewer of Journal of Information Security and Applications, Elsevier
- Reviewer of British Journal of Mathematics & Computer Science
- Reviewer of Special issue (January-March 2012) on Forensics, Security, and Intelligence for the IEEE Multimedia.
- Reviewer of Springer Transactions on Data Hiding and Multimedia Security.
- Reviewer of Springer Multimedia Systems.
- Reviewer of Wiley Inter Science, Concurrency and Computation: Practice and Experience
- Reviewer of Elsevier, Journal of Information Security and Applications
- Reviewer of Elsevier, Information Fusion
- Reviewer of Elsevier, Information Processing Letters
- Reviewer of Elsevier, Computers and Electrical Engineering
- Reviewer of Journal of Multimedia.
- Reviewer of Advances in Multimedia, Hindawi Publishing Corp.
- Reviewer of Communication and Computer Security.
- Reviewer of International Journal of Network Security.
- Reviewer of International Journal on Advances in Security, IARIA.
- Reviewer of EURASIP Journal on Advances in Signal Processing.
- Reviewer of ETRI (Electronics and Telecommunications Research Institute) Journal.
- Reviewer of 2012 2nd International Conference on Electronic & Mechanical Engineering and Information Technology (EMEIT 2012), Shenyang Liaoning, China
- Reviewer of 2012 IEEE International Symposium on Circuits & Systems, Seoul, Korea.
- Reviewer of 2010 International Conference on CYBERWORLDS, Singapore.
- Reviewer of IEEE International Conference on Multimedia & Expo (ICME 2010).
- Reviewer of ACM Multimedia 2010 Workshop -Multimedia in Forensics, Security and Intelligence.
PROFESSIONAL ACTIVITIES AND SERVICES
- Mentor, K-DISC, Govt. of Kerala
Member of Business Advisory Committee (BAC) , Kerala Academy for Skills Excellence (KASE) , Govt. of Kerala