Tony Thomas

Dr. Tony Thomas

Associate Dean Academic, Associate Professor

Areas of Specialization: Cyber Security, AR/VR, Quantum Computing, AI/ML

Academic Record

  • Ph.D, Mathematics (Cryptography), Indian Institute of Technology Kanpur, 2006.
  • M.Sc, Mathematics, Indian Institute of Technology Kanpur , 1998, First Rank.
  • B.Sc, Mathematics, Mahatma Gandhi University, Kerala, 1995, First Rank

Research and Teaching Experience

  • Research Fellow Oct 2008—Mar 2011 School of Computer Engineering, Nanyang Technological University (NTU), Singapore.
  • Research Associate Oct 2007—-Sept. 2008 GM R&D Lab, Bangalore, India General Motors Corporation
  • Postdoctoral Researcher Aug 2006 — July 2007 Department of Mathematics, Korea Advanced Institute of Science and Technology (KAIST), Korea
  • Tutor July 2003 —-May 2006 Department of Mathematics Indian Institute of Technology Kanpur (IIT Kanpur)

Recent Publications List (Last 5 years)

  • JOHN (T), THOMAS (T), EMMANUEL (S), Graph Convolutional Networks for Android Malware Detection with System Call Graphs, ISEA-ISAP 2020, Third ISEA International Conference on Security and Privacy 2020
  • VIJ (D), BALACHANDRAN (V), THOMAS (T), SURENDRAN (R), GRAMAC: A Graph Based Android Malware Classification Mechanism, 10th ACM Conference on Data and Application Security and Privacy, Mar 2020
  • MARY IPE (V), THOMAS (T), CNN Based Periocular Recognition Using Multispectral Images, Fifth International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’19), Dec 2019
  • MARY IPE (V), THOMAS (T), Periocular Recognition Under Unconstrained Conditions Using CNN Based Super-Resolution, International Conference on Applied Soft computing and Communication Networks (ACN’19), Dec 2019
  • ROOPAK (S), THOMAS (T), EMMANUEL (S), Android Malware Detection Mechanism Based on Bayesian Model Averaging, Advances in Intelligent Systems and Computing (AISC), Springer 707: 87-96; 2019
  • SURENDRAN (R), VIJAYARAGHAVAN (A),THOMAS (T), On Effectiveness of Source Code and SSL Based Features for Phishing Website Detection, International Conference on Advanced Technologies in Intelligent Control, Environment, Computing and Communication Engineering (ICATIECE-2019), March 2019
  • KRISHNAN (A), THOMAS (T), NAYAR (GR), MOHAN (SS), Liveness Detection in Finger Vein Imaging Device Using Plethysmographic Signals, International Conference on Intelligent Human Computer Interaction, Springer 11268; 251-260; Dec 2018
  • RAGENDHU (SP), THOMAS (T), Fast and Accurate Fingerprint Recognition in Principal Component Subspace, International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA, Springer 882; 301-315; July 2018
  • JOHN (TS), THOMAS (T), UDDIN (MM), A Multifamily Android Malware Detection Using Deep Autoencoder Based Feature Extraction, International Conference on Advanced Computing Dec 2017
  • ROOPAK (S), THOMAS (T), EMMANUEL (S), Android Malware Detection Mechanism Based on Bayesian Model Averaging, International Conference on Advanced Computing, Networking, and Informatics, Springer 707; 87-96; June 2017
  • ZHANG (P), THOMAS (T), ZHUO (T), Object coding based video authentication for privacy protection in immersive communication, Journal of Ambient Intelligence and Humanized Computing, Springer 8; 1-14; 2016
  • ZHANG (P), THOMAS (T), ZHUO (T), An object-based video authentication mechanism for smart-living surveillance, International Conference on Orange Technologies (ICOT) IEEE; 173-176, Dec 2015
  • KRISHNAN (A), THOMAS (T), A survey of mathematical techniques in finger vein biometrics, Journal of Theoretical and Computational Mathematics1; 66-73; 2015
  • ZHANG (P), THOMAS (T), ZHUO (T), An Object-based Video Authentication Mechanism for Smart-Living Surveillance, International Conference on Orange Technologies (ICOT2015) IEEE 173-176; Dec 2015


  • THOMAS (T), EMMANUEL (S), VIJAYARAGHAVAN (AP), Machine Learning Approaches in Cyber Security Analytics, Springer 2020
  • GAYATHRI (KS), THOMAS (T), Intrusion Detection Systems for Internet of Things, Handbook of Research on Intrusion Detection Systems, IGI Global; Chapter 8; 2020
  • OHN (TS), THOMAS (T), Adversarial Attacks and Defenses in Malware Detection Classifiers, Advanced Research on Cloud Computing, Big Data, and the IoT, IGI Global; 127-150; 2019
  • SURENDRAN (R), THOMAS (T), EMMANUEL (S), Detection of Malware Applications in Android Smartphones World Scientific, Reference on Innovation, Volume 4: Innovation in Information Security, World Scientific Publishing, 211-234; 2018
  • DEVI (VS), ROOPAK (S), THOMAS (T), MERAJUDDIN (MD), Multi-Pattern Matching Based Dynamic Malware Detection in Smart Phones, Energy Efficient Computing & Electronics: Devices to Systems, CRC Press 421; 2018