RESEARCH
April 20, 2024 2026-03-13 2:43RESEARCH
Cluster 1: Intelligent Computing
This cluster focuses on the design of intelligent algorithms and scalable data-centric systems that power next-generation applications.
Core Areas:
- Machine Learning, Deep Learning, Reinforcement Learning
- Federated Learning
- Generative & Agentic AI
- Natural Language Processing
- Computer Vision and Image/Video Processing
- AI-driven Healthcare and Security Applications
- Data Engineering and Data Analytics
- Information Retrieval
- Optimization Techniques
- Object-Oriented Design Patterns
Focus:
Development of explainable, scalable, and distributed intelligent systems for real-world problem solving.
Cluster 2: Secure, Trustworthy & Decentralized Computing
This cluster addresses resilience, privacy, and trust in digital ecosystems across cloud, distributed, and federated environments.
Core Areas:
- Cryptography
- Cloud Computing Security
- Information Security Metrics
- Security Policies and Modeling
- Cognitive Security
- Endpoint Security
- Federated Security Frameworks
- Blockchain Technologies
Focus:
Design of secure architectures, privacy-preserving computation, decentralized systems, and next-generation trust frameworks.
Cluster 3: Smart Systems & Frontier Technologies
This cluster explores intelligent integration of computation with physical, immersive, and quantum environments.
Core Areas:
- Internet of Things (IoT)
- Smart Cyber-Physical Systems
- Secure Cloud-Edge Architectures
- Quantum Computing
- AR/VR Technologies
- Decentralized Intelligent Digital Ecosystems
Focus:
Advancing intelligent, immersive, and quantum-enabled infrastructures for future digital societies.
Latest Publications |
Journal Publications |
Ghosh, D.Ditale, M. Albanese, P. Mukherjee, “Optimizing IDS Rule Placement via Set Covering with Capacity Constraints.” Computers & Security, Volume 161, 104748, February 2026. |
Semantic Text Kernels: A hybrid interpretable framework for deep semantic analysis in textual data, Engineering Applications of Artificial Intelligence, Elsevier, 2026 |
Attention-enhanced residual U-Net with histogram equalization for automated classification of gastrointestinal bleeding disorders, Biomedical Signal Processing and Control, Vol.111, ,108371, Elsevier.2026. |
Adversarial Attack Detection in Federated Learning Using Quantum Recurrent Neural Network, Applied Computational Intelligence and Soft Computing, 2026, 1176614,19 pages, Wiley.2026. |
Teenu S. John and Tony Thomas, “ARM: Adaptive Rank-Based Mutation for Android Malware Detection under Adversarial Attacks,” Journal of Cyber Security Technology, pp. 1–26, Aug. 2025 (Q1 Journal) |
Tony Thomas, R. Prakash, and S. Pal, “Intrusion Detection in Internet of Medical Things Using Digital Twins—A Review,” Computers, Materials & Continua, vol. 84, no. 3, pp. 4055–4075, 2025. |
Miguel A Solis; S. S. Thomas; Christian A Choque-Surco; Edgar A Taya-Acosta; Francisca Coiro G, “ Bayesian Optimization for the Synthesis of Generalized State-Feedback Controllers in Underactuated Systems,” in Mathematics, vol. 13, no. 19, 2025. |
Balasubramaniam S, Attention-enhanced residual U-Net with histogram equalization for automated classification of gastrointestinal bleeding disorders, Biomedical Signal Processing and Control, Vol.111, (2026),108371, Elsevier. IF:4.9 (Q1 Journal) |
Balasubramaniam S, Optimization Enabled Online Tiger‐Claw Fuzzy Region with Clustering Based Neovascularization Segmentation and Classification Using YOLO‐V5 From Retinal Fundus Images. International Journal of Intelligent Systems, 2025(1), 6119924. IF:3.7 (Q1 Journal). |
Balasubramaniam S,Bio inspired optimization techniques for disease detection in deep learning systems. Scientific Reports, 15(1), 18202, (2025), Springer Nature, IF:3.9 (Q1 Journal). |
Balasubramaniam S ,Diabetic retinopathy detection based on mobile maxout network and weber local descriptor feature selection using retinal fundus image. Scientific Reports, 15(1), 13858, (2025), Springer Nature, IF:3.9 (Q1 Journal). |
Balasubramaniam S, Restricted Boltzmann machine with Sobel filter dense adversarial noise secured layer framework for flower species recognition. Scientific Reports, 15(1), 1-30, (2025), Springer Nature, IF:3.9 (Q1 Journal). |
Balasubramaniam S, Min–Max Filtering and Exponential Fossa Optimization Algorithm–Based Parallel Convolutional Neural Network for Springer Nature. Heart Disease Detection. International Journal of Intelligent Systems, Wiley, (2025), IF:3.7 (Q1 Journal). |
Balasubramaniam S, Medical Image Fusion Using Unified Image Fusion Convolutional Neural Network. International Journal of Intelligent Systems, Wiley, (2025), IF:3.7 (Q1 Journal). |
Nikhil V Chandran, VS Anoop, S Asharaf, Semantic Text Kernels: A hybrid interpretable framework for deep semantic analysis in textual data, Engineering Applications of Artificial Intelligence, Elsevier, 2026 (Q1) |
Nikhil V Chandran, VS Anoop, S Asharaf, Topic Weighted Kernels: Text Kernels Integrating Topic Weights and Deep Word Embeddings for Semantic Text Analytics, IEEE Access, 2025 (Q1) |
Caroline Mary, HS Jennath, S Asharaf, Explainable Optimal Random Forest model with conversational interface, Engineering Applications of Artificial Intelligence, Elsevier, 2025 (Q1) |
Judy George, Elizabeth Sherly, Modeling Human Attention: Analyzing Scanpaths and Visual Features in Fixation Prediction with Transformer-Based Deep Learning, Neural Computing and Applications (Q1), 2015 |
Kavya Manohar, Leena G Pillai, Elizabeth Sherly, Multistage Fine-tuning Strategies for Automatic Speech Recognition in Low-resource Languages, ACM transactions on Asian and low resource languages (Q1), 2025 |
G Malu, N Uday, E Sherly, A Abraham, NK Bodhey CirMNet: A Shape-based Hybrid Feature Extraction Technique using CNN and CMSMD for Alzheimer’s MRI Classification,IEEE Access 12, 80491-80504, (Q1) |
Malu, G., Amrutha, Raj V, “Engesto: an ensemble learning approach for classification of hand gestures.” IEEE Access 12 (2024): 85709-85723, (Q1). |
Amrutha Raj, V., and G. Malu. “GAMNet: A deep learning approach for precise gesture identification.” Journal of Intelligent & Fuzzy Systems (2024): JIFS-219395. |
Aiswarya S. Nair, Sabu M. Thampi and Jithu Vijay V. P, SoCoMNNet: A SocioCognitive and Memristive Neural Network-Based Context-Aware GPS Spoofing Detection and Mitigation in the Internet of Drones, Elsevier Vehicular Communications, ISSN 2214-2096, Volume 56, December 2025, 100980, https://doi.org/10.1016/j.vehcom.2025.100980. |
Indu V and Sabu M Thampi, Intelligent nudging for truth: Mitigating rumor and misinformation in social networks with behavioral strategies, Elsevier Online Social Networks and Media, Volume 49, October 2025, 100333, https://doi.org/10.1016/j.osnem.2025.100333 |
Ghosh, A., Ditale, D., Albanese, M., & Mukherjee, P., Optimizing IDS Rule Placement via Set Covering with Capacity Constraints, Computers & Security, Volume 161, February 2026, 104748. https://doi.org/10.1016/j.cose.2025.104748 |
Ghosh, D.Ditale, M. Albanese, P. Mukherjee, “Optimizing IDS Rule Placement via Set Covering with Capacity Constraints.” Computers & Security, Volume 161, 104748, February 2026. |
Teenu S. John and Tony Thomas, “ARM: Adaptive Rank-Based Mutation for Android Malware Detection under Adversarial Attacks,” Journal of Cyber Security Technology, pp. 1–26, Aug. 2025 (Q1 Journal) |
Tony Thomas, R. Prakash, and S. Pal, “Intrusion Detection in Internet of Medical Things Using Digital Twins—A Review,” Computers, Materials & Continua, vol. 84, no. 3, pp. 4055–4075, 2025. |
Miguel A Solis; S. S. Thomas; Christian A Choque-Surco; Edgar A Taya-Acosta; Francisca Coiro G, “ Bayesian Optimization for the Synthesis of Generalized State-Feedback Controllers in Underactuated Systems,” in Mathematics, vol. 13, no. 19, 2025. |
Balasubramaniam S, Attention-enhanced residual U-Net with histogram equalization for automated classification of gastrointestinal bleeding disorders, Biomedical Signal Processing and Control, Vol.111, (2026),108371, Elsevier. IF:4.9 (Q1 Journal) |
Balasubramaniam S, Optimization Enabled Online Tiger‐Claw Fuzzy Region with Clustering Based Neovascularization Segmentation and Classification Using YOLO‐V5 From Retinal Fundus Images. International Journal of Intelligent Systems, 2025(1), 6119924. IF:3.7 (Q1 Journal). |
Balasubramaniam S,Bio inspired optimization techniques for disease detection in deep learning systems. Scientific Reports, 15(1), 18202, (2025), Springer Nature, IF:3.9 (Q1 Journal). |
Balasubramaniam S ,Diabetic retinopathy detection based on mobile maxout network and weber local descriptor feature selection using retinal fundus image. Scientific Reports, 15(1), 13858, (2025), Springer Nature, IF:3.9 (Q1 Journal). |
Balasubramaniam S, Restricted Boltzmann machine with Sobel filter dense adversarial noise secured layer framework for flower species recognition. Scientific Reports, 15(1), 1-30, (2025), Springer Nature, IF:3.9 (Q1 Journal). |
Balasubramaniam S, Min–Max Filtering and Exponential Fossa Optimization Algorithm–Based Parallel Convolutional Neural Network for Springer Nature. Heart Disease Detection. International Journal of Intelligent Systems, Wiley, (2025), IF:3.7 (Q1 Journal). |
Balasubramaniam S, Medical Image Fusion Using Unified Image Fusion Convolutional Neural Network. International Journal of Intelligent Systems, Wiley, (2025), IF:3.7 (Q1 Journal). |
Nikhil V Chandran, VS Anoop, S Asharaf, Semantic Text Kernels: A hybrid interpretable framework for deep semantic analysis in textual data, Engineering Applications of Artificial Intelligence, Elsevier, 2026 (Q1) |
Nikhil V Chandran, VS Anoop, S Asharaf, Topic Weighted Kernels: Text Kernels Integrating Topic Weights and Deep Word Embeddings for Semantic Text Analytics, IEEE Access, 2025 (Q1) |
Caroline Mary, HS Jennath, S Asharaf, Explainable Optimal Random Forest model with conversational interface, Engineering Applications of Artificial Intelligence, Elsevier, 2025 (Q1) |
Judy George, Elizabeth Sherly, Modeling Human Attention: Analyzing Scanpaths and Visual Features in Fixation Prediction with Transformer-Based Deep Learning, Neural Computing and Applications (Q1), 2015 |
Kavya Manohar, Leena G Pillai, Elizabeth Sherly, Multistage Fine-tuning Strategies for Automatic Speech Recognition in Low-resource Languages, ACM transactions on Asian and low resource languages (Q1), 2025 |
G Malu, N Uday, E Sherly, A Abraham, NK Bodhey CirMNet: A Shape-based Hybrid Feature Extraction Technique using CNN and CMSMD for Alzheimer’s MRI Classification,IEEE Access 12, 80491-80504, (Q1) |
Malu, G., Amrutha, Raj V, “Engesto: an ensemble learning approach for classification of hand gestures.” IEEE Access 12 (2024): 85709-85723, (Q1). |
Amrutha Raj, V., and G. Malu. “GAMNet: A deep learning approach for precise gesture identification.” Journal of Intelligent & Fuzzy Systems (2024): JIFS-219395. |
Aiswarya S. Nair, Sabu M. Thampi and Jithu Vijay V. P, SoCoMNNet: A SocioCognitive and Memristive Neural Network-Based Context-Aware GPS Spoofing Detection and Mitigation in the Internet of Drones, Elsevier Vehicular Communications, ISSN 2214-2096, Volume 56, December 2025, 100980, https://doi.org/10.1016/j.vehcom.2025.100980. |
Indu V and Sabu M Thampi, Intelligent nudging for truth: Mitigating rumor and misinformation in social networks with behavioral strategies, Elsevier Online Social Networks and Media, Volume 49, October 2025, 100333, https://doi.org/10.1016/j.osnem.2025.100333 |
Ghosh, A., Ditale, D., Albanese, M., & Mukherjee, P., Optimizing IDS Rule Placement via Set Covering with Capacity Constraints, Computers & Security, Volume 161, February 2026, 104748. https://doi.org/10.1016/j.cose.2025.104748 |
E. F. Arruda, R. e. A. Alexandre, M. D. Fragoso, J. B. R. do Val, and S. S. Thomas, “A novel queue-based stochastic epidemic model with adaptive stabilising control,” ISA Transactions, vol. 140, pp. 121-133, 2023. |
N. V. Chandran, V. S. Anoop, and S. Asharaf, “TopicStriKer: A topic kernels-powered approach for text classification,” Results in Engineering, vol. 17, pp. 100949, 2023. |
M. Ekstedt, Z. Afzal, P. Mukherjee, S. Hacks, and L. Robert, “Yet another cybersecurity risk assessment framework,” International Journal of Information Security, vol. 22, pp. 1-17, 2023. |
V. K. Gurram, J. Sanil, V. S. Anoop, and S. Asharaf, “String kernel-based techniques for native language identification,” Human-Centric Intelligent Systems, vol. 3, no. 3, pp. 402-415, 2023. |
A. Krishnan, and T. Thomas, “Finger vein recognition based on anatomical features of vein patterns,” IEEE Access, vol. 11, pp. 39373-39384, 2023. |
A. S. Nair, and S. M. Thampi, “A location‐aware physical unclonable function and Chebyshev map‐based mutual authentication mechanism for internet of surveillance drones,” Concurrency and Computation: Practice and Experience, pp. e7564, 2023. |
S. S, M. G, E. Sherly, and R. Mathew, “M-Net: An encoder-decoder architecture for medical image analysis using ensemble learning”, Results in Engineering, vol. 17, pp. 100927, 2023. |
S. S. Thomas, G. Lamine, J. Palandri, M. Lakehal-ayat, P. Chakravarty, F. Wolf-Monheim, and M. B. Blaschko, “Mitigating bias in bayesian optimized data while designing MacPherson suspension architecture”, IEEE Transactions on Artificial Intelligence, pp. 1-12, 2023. |
S. S. Thomas, J. Palandri, M. Lakehal-Ayat, P. Chakravarty, F. Wolf-Monheim, and M. B. Blaschko, “Kinematics design of a MacPherson suspension architecture based on bayesian optimization”, IEEE Transactions on Cybernetics, vol. 53, no. 4, pp. 2261-2274, 2023. |
G. R. Nayar, and T. Thomas, “Partial palm vein based biometric authentication,” Journal of Information Security and Applications, vol. 72, no. C, pp. 14, 2023. |
R. S. P, and T. Thomas, “Cancelable biometric scheme based on dynamic salting of random patches,” Multimedia Tools and Applications, vol. 82, no. 10, pp. 14337–14366, 2023. |
Conference Publications |
Sumitha Valsalam and Tony Thomas, BHQR: Qubit-Efficient Block-Wise Hybrid Quantum–Classical Image Representation for NISQ Hardware, 8th International Conference on Data Analytics and Cyber Security (DACS 2025), Dec 2025 |
Niman S., Tony Thomas, Overcoming Black-Box Limitations in IoT Malware Detection with Kolmogorov-Arnold Networks, 8th International Conference on Data Analytics and Cyber Security (DACS 2025), Dec 2025 |
Sumitha Valsalam and T. Thomas, “CNN with NEQR Encoding for Quantum-Classical Hybrid Image Compression,” in Proc. Int. Conf. ICT Innovations and Systems (ICTIS), Thailand, 2025. |
Ravi Prakash and Tony Thomas, “Towards Secure AI-Driven Industrial Metaverse with NFT Digital Twins,” in Proc. 17th Int. Conf. COMmunication Systems & NETworkS (COMSNETS), 2025. |
Roopa Malieckal, Asharaf S, An empirical study of the impact of proxy attributes on the fairness of machine learning systems, ICRAI, December 2024. |
B Baiju, K Manohar, LG Pillai, E Sherly, Romanized to native Malayalam script transliteration using an encoder-decoder framework, Proceedings of the First Workshop on Natural Language Processing for Indo and Dravidian Languages, 2025 |
Judy George, Elizabeth Sherly, Fixation-Guided Recognition and Categorization of Handwritten Characters, Springer Lecture Notes in Networks and Systems, 2025 |
Leena G P, Mubarak, Sherly E, Tracking Articulatory Dynamics in Speech with a Fixed-Weight BiLSTM-CNN Architecture, arXiv preprint arXiv:2504.18099, 2025 |
Kavya Manohar, Leena Pillai, Elizabeth Sherly ,Exploring Pitfalls in Multilingual ASR Model Evaluations, EMNLP, Florida, The Association of Computational Linguistics (ACL), 2024 |
Sabitha Rani, Elizabeth Sherly, EEG-Based Imagined Speech Recognition Using Multi-Feature Extraction with DNN-CapsNet, 3rd Int Conf. on Modelling, Simulation &Intellig. Computing (MoSICom 2024), BITS,Pilani,Dubai |
N. Raji, B. S. Sabitha Rani, M. Harishankar and E. Sherly, Braille tactile representations in the brain: An EEG Investigation, International Conference on Modeling, Simulation & Intelligent Computing (MoSICom 2024), Dubai |
Raji Gopinathan, Elizabeth Sherly, Deciphering Braille: EEG Based Deep Learning for Character Recognition, Intl. Conference on Brain Computer Interface & Healthcare Technologies (iCon-BCIHT), CDAC, Thiruvananthapuram, India, 2024 |
Jithu Vijay V. P and Sabu M. Thampi, An ML-Driven Adaptive Risk-Based Access Control for the Internet of Drones (IoD), In proc. 21st International Conference on Information Systems Security (ICISS 2025), 16–20 December 2025, Indore, India, Lecture Notes in Computer Science, vol 16380. Springer, Cham. https://doi.org/10.1007/978-3-032-13714-2_1 |
Rani B.S., S., Mukherjee, P., & Ekstedt, M., Modular Analysis of Attack Graphs for Smart Grid Security, In Proceedings of the 21st International Conference on Information Systems Security, 2025, Indore, India. https://link.springer.com/chapter/10.1007/978-3-032-13714-2_29 |
Nair, L. R., Anil, A., Mukherjee, P., & Aggarwal, M., Security-Centric NWDAF Module for Threat Detection and Mitigation in 5G Core Networks, In Proceedings of the 21st International Conference on Information Systems Security, 2025, Indore, India. https://link.springer.com/chapter/10.1007/978-3-032-13714-2_23 |
A. Ramesh, R. Haris, and S. Arora, “ML based D3 R: Detecting DDoS using random forest”, IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing Workshops, May 2023 , pp. 141-146. |
R. Badarinath, B. K. Raju, A. K. Mohammed, V. Prabhu, and S. S. Thomas, “Real-time vision sensor for volumetric flowrate estimation in robotic fused filament fabrication”, IFAC-PapersOnLine, vol. 56, no. 2, 2023 pp. 6569-6575. |
J. K. George and E. Sherly, “Human eye fixations prediction for visual attention using CNN-A Survey”, 2023, Springer, pp. 293-309. |
S. Jickson, V. S. Anoop, and S. Asharaf, “Machine learning approaches for detecting signs of depression from social media”, International Conference on Information Technology and Applications, 2023, Springer Nature Singapore, pp. 201-214. |
R. John, V. S. Anoop, and S. Asharaf, “Health mention classification from user-generated reviews using machine learning techniques”, 2023, Springer, pp. 175-188. |
P. Mukherjee, S. M. Thampi, N. Rohith, B. K. Poddar, and I. Sen, “Detection and hardening strategies to secure an enterprise network”, Information Systems Security, 2023, Springer Nature Switzerland, pp. 91-108. |
R. Prakash, G. R Nayar, and T. Thomas, “Security risk assessment of metaverse based healthcare systems based on Common Vulnerabilities and Exposures (CVE)”, IEEE International Conference on Recent Advances in Systems Science and Engineering, 2023, pp. 1-10. |
P. V. Rahulraj, J. Sanil, V. S. Anoop, and S. Asharaf, “Monetize the dual: A data analytic approach for native language and prequel movies popularity analysis”, International Conference on Data Analytics and Insights, 2023, Springer Nature Singapore, pp. 183-196. |
M. M. Uddin, R. Surendran, G. R. Gokul, and T. Thomas, “A data flow-based approach for classification and risk estimation of android apps”, IEEE International Conference on Recent Advances in Systems Science and Engineering, 2023, pp. 1-6. |
S. Rani and E. Sherly, “EEG-based imagined word recognition using CNN-BiGRU”, IEEE International Conference on Robotics, Automation, and Artificial Intelligence, Singapore, 14-16 December, 2023. |
B. K. Raju, L. G. Pillai, K. Manohar and E. Sherly. “Automatic speech recognition system for malasar language using multilingual transfer learning”, International Conference on Natural Language Processing, Goa, 14-17 December, 2023. |
L. G. Pillai, D. M. N. Mubarak, and E. Sherly, “BiLSTM-CNN with fixed weight approach for tracking speech articulatory features”, International Symposium on Intelligent Systems Technologies and Applications, Bengaluru, India, 18-20 December, 2023. |
Bharathi R., Ruba Pi, Anand K,, Sajeetha T and E Sherly, “DavidianLangTech: Sentiment analysis of tamil and tulu”, Workshop on Speech and Language Technologies for Dravidian Languages, Bulgaria, 2023. |
A. Jimmington, A. Hakeem, P. Mukherjee, and S. M Thampi, “A novel approach for bridging the gap between SDN and MITRE for agile incident response”, CoCoNet, Bangalore,2023. |
| List of Books |
1. | Thomas, R. Prakash, and A. Kaushik, Augmented and Virtual Reality: Theory and Practice. Wiley, Nov. 2025. |
2. | M. Thampi, T. Thomas, and P. Mukherjee, Eds., Securing the Connected World: Exploring Emerging Threats and Innovative Solutions. Springer, 2025. |
3. | Balasubramaniam S, Applying Metaverse Technologies to Human-Computer Interaction for Healthcare, CRC Press, Taylor & Francis, USA,2025. |
4. | Balasubramaniam S, Networked Sensing Systems for Sustainable Society, Scrivener Publishing, Wiley, USA, |
5. | Balasubramaniam S,Bio-Inspired Algorithms in Machine Learning and Deep Learning for Disease Detection, CRC Press, Taylor & Francis, USA, 2025. |
6. | Balasubramaniam S, AI-Powered Digital Twins for Predictive Healthcare: Creating Virtual Replicas of Humans, IGI Global, 2025. |
7. | Balasubramaniam S,Generative AI for Software Development: Code Generation, Error Detection, Software testing, Degruyter, |
8. | Balasubramaniam S,Applications of Federated Learning in Technological Advancements: Case Studies and Insights, CRC Press, Taylor & Francis, USA, |
9. | Balasubramaniam S, Democratized Generative AI: Principles, Challenges and Applications”, NOVA Publishers ,2025. |
10.
| Balasubramaniam S,Advancements in Deep Generative Models for Healthcare and Medical Applications, CRC Press,2025. |
11. | Asharaf S, Sivdas Neelima, Sumi Mariam, Adarsh S, Advanced Blockchain Technologies : A Comprehensive Textbook on Ethereum Smart Contracts to Decentralised Applications, Wiley India, 2025 |
12. | Elizabeth Sherly, Leena G. Pillai, Kavya Manohar, ASR Models from Conventional Statistical Models to Transformers and Transfer Learning, Wiley Scrivener, 2024 |
13. | Elizabeth Sherly, Leena G. Pillai, Kavya Manohar, John McCrae, Machine Translation: Best Practices using Deep Learning and Generative AI, CRC Press, Taylor & Francis, 2025 (In Press) |
| List of Book Chapters |
1. | Valsalam and T. Thomas, “Quantum Machine Learning: Current Trends and Applications,” in Quantum Machine Learning: Current Trends and Applications, Morgan Kaufmann, pp. 201–220, 2025. |
2. | Surendran and T. Thomas, “Malware in the Connected World: Advanced Detection Techniques Using System Calls and Graph Analysis,” in Securing the Connected World: Exploring Emerging Threats and Innovative Solutions, Springer, 2025. |
3. | Balasubramaniam S (2025), “A Deep Dive into Generative Model Types beyond Imagination” in Advances in Deep Generative Models for Medical and Healthcare Application, CRC Press. |
4. | Balasubramaniam S (2025), “A New Wave of Generative Flow Networks in Streaming Healthcare with Artificial Intelligence” in Advances in Deep Generative Models for Medical and Healthcare Application, CRC Press. |
5. | Balasubramaniam S (2025), “The Precision Edge of Deep Generative Models for Enhanced Differential Diagnosis” in Advances in Deep Generative Models for Medical and Healthcare Application, CRC Press. |
6. | Balasubramaniam S (2025). Breaking Barriers Through Generative AI: Charting a Global Empowered Future in Democratized Generative AI: Principles, Challenges and Applications(pp.303-326), Nova Publishers. |
7. | Balasubramaniam S (2025). Unleashing the Power of Democratized Machine Learning Models in Democratized Generative AI: Principles, Challenges and Applications pp.155-180), Nova Publishers. |
8. | Balasubramaniam S (2025). The Democratic Route to Generative AI: Balancing Ethics and Innovation in Democratized Generative AI: Principles, Challenges and Applications(pp.69-92), Nova Publishers. |
9. | Balasubramaniam S (2025). Navigating Challenges and Opportunities of Generative AI in Software Development in Generative AI for Software Development, 293, Degruyter. |
10. | Balasubramaniam S (2025). Real-World Software Solutions Through Generative AI in Transforming Code and Beyond in Generative AI for Software Development, 263, De Gruyter, |
11. | Balasubramaniam S (2025). Future Frontiers of Software Testing Beyond Debugging and Accuracy Automation Driven by Generative AI in Generative AI for Software Development, 97, De Gruyter, |
12. | Balasubramaniam S (2025). The New Frontier of Digital Twins in Next-Gen Wearables for Personalized Health Tracking. In AI-Powered Digital Twins for Predictive Healthcare: Creating Virtual Replicas of Humans (pp. 107-138). IGI Global Scientific Publishing. |
13. | Balasubramaniam S (2025). The Virtual Revolution of Digital Twins in Chronic Healthcare Management. In AI-Powered Digital Twins for Predictive Healthcare: Creating Virtual Replicas of Humans (pp. 169-200). IGI Global Scientific Publishing. |
14. | Balasubramaniam S (2025), “Algorithmic Heartbeat with Bio-Inspired Algorithms in Cardiac Health Monitoring” in Bio-inspired Algorithms in Machine Learning and Deep Learning for Disease Detection (pp.89-106), CRC Press. |
15. | Balasubramaniam S (2025), “Bio-Inspired Intelligence in Early Cancer Detection: A Machine Learning Approach” in Bio-inspired Algorithms in Machine Learning and Deep Learning for Disease Detection (pp.122-140), CRC Press. |
16. | Balasubramaniam S (2025), “Bio-inspired Algorithms in Machine Learning and Deep Learning for Diabetes Diagnosis” in Machine Learning and Deep Learning for Disease Detection(pp.141-157), CRC Press. |
17. | Balasubramaniam S (2025), “Bio-Inspired Algorithms Using Machine Learning and Deep Learning for Social Phobia Treatment” in Machine Learning and Deep Learning for Disease Detection(pp.183-202), CRC Press |
18. | Balasubramaniam S (2025), “Exploring Technologies Needed for Metaverse” in Applying Metaverse Technologies to Human-Computer Interaction for Healthcare (pp.20-37), CRC Press. |
19. | Balasubramaniam S (2025), “MetaHealth: Transforming Healthcare through AI Integration” in Applying Metaverse Technologies to Human-Computer Interaction for Healthcare (pp.121-140), CRC Press. |
20. | Balasubramaniam S (2025) , “MultiSense Diagnosis: Navigating Disease Diagnosis with Metaverse Multimodal Interaction” in Applying Metaverse Technologies to Human-Computer Interaction for Healthcare(pp.235-253), CRC Press |
21. | Balasubramaniam S (2025),” Remote and Urban Environmental Area Sensing, Connectivity Issues, and Solutions Based on Emerging Technologies” in Networked Sensing Systems (pp.31-61), Scrivener Publishing, Wiley, |
22. | Balasubramaniam S (2025), “Interconnected Healthcare 5.0 Ecosystems: Enhancing Patient Care Using Sensor Networks” in Networked Sensing Systems (pp.225-246), Scrivener Publishing, Wiley, |
23. | Balasubramaniam S (2025), “Trends, Advances, and Applications of Network Sensing Systems” in Networked Sensing Systems(pp.351-373), Scrivener Publishing, Wiley, |
24. | Balasubramaniam S (2025). Challenges in Integrating Cloud and IoT in Healthcare Systems. In Revolutionizing Healthcare Systems Through Cloud Computing and IoT (pp. 47-76). IGI Global. |
25. | Balasubramaniam S (2025). A Comprehensive Introduction to Cloud Computing Revolution. In Revolutionizing Healthcare Systems Through Cloud Computing and IoT (pp. 1-26). IGI Global. |
26. | Sabitha Rani, Elizabeth Sherly, EEG-Based Imagined Speech Classification – A Systematic Review by Exploring the Effective Hierarchical Deep Learning Approaches, Neuromorphic Computing for Brain-Computer Interfaces: Elsevier, 2025 – -In press. |
27. | Govind, M. B., Humaid, A. S., and Malu G. “Revolutionizing Student Engagement: Real-Time Emotion Detection and Interest Identification in Live Video Streams.” Edited by S. M. Thampi, V. Chaudhary, A. S. K. Pathan, K. Ching Li, and D. Krishnaswamy, vol. 1221, Lecture Notes in Electrical Engineering, Springer, 2025, Singapore. DOI: 10.1007/978-981-97-4711-5_29. |
28. | Aruljothi, Satchithananthi, and Malu. “Computational Models and Neural Insights in Music Neuroscience.” Fifth International Conference on Computing and Network Communications, edited by Sabu M. Thampi, Vipin Chaudhary, Al-Sakib Khan Pathan, Kuan Ching Li, and Dilip Krishnaswamy, Lecture Notes in Electrical Engineering, vol. 1221, Springer Nature Singapore, 2025, pp. 129–146. DOI: 10.1007/978-981-97-4711-5_10. |
29. | Sanoufar Azeez, Sumedha Arora, Comprehensive Framework for Control and Coordination of UAV Swarms in Wildfire Management, chapter, Applications of Machine Learning in UAV Networks, IGI Global, 2024. |
1 | Balasubramaniam S, A Nutmeg Decorticator with sorter-grader based on Machine Learning, Patent Type: Innovation Patent, Status: Granted, Date: 23.03.2022, Patent Number: 2021103691. |
2 | Balasubramaniam S, A Device for Online Video meetings and Inbuilt emotion-based Attendance Report, Status: Published, Date: 08.07.2022, Patent Application Number: 202231034509, Current Status: Granted, Date: 20.06.2024, Patent Number: 542428. |
3 | Balasubramaniam S, An Adaptive Controller-based flexible home theatre integrated with Smart TV & Air purification system, Status: Published, Date: 22.07.2022, Patent Application Number: 202231036763, Status: Granted. Date:14.06.2023. Patent Number :434543 |
4 | Balasubramaniam S, The Secure Payment Method in Health Care using Computer Deep Learning and Cloud Monitoring, Status: Published, Date: 17.06.2022, Patent Application Number: 202241027497. |
5 | Balasubramaniam S, A smart device for data collection of agriculture system, filing date: 09/09/2022, Published date: 16.09.2022, Patent Application Number: 202241051651. |
6 | Sabu M Thampi, PUF Embedded Quantum-Resistant Cross-Domain Drone Authentication, Indian Patent Filed. |
7 | Sabu M Thampi,Veracity Check: Cognitive AI Framework to Detect and Mitigate Misinformation in Social Networks, Indian Patent Filed. |
8 | Sabu M Thampi, DeepVisNet: Visual Attention-based Deep Localized Crowd Anomaly Detection Framework for Smart Surveillance, Indian Patent Filed. |
9 | Malu G, E Sherly, An Automated Lesion Detection System for DCE-MRI Images Using Circular Mesh-Based Shape and Margin Descriptor |
10 | Tony Thomas, Method for End-to-End Information-Theoretically Secure Key Distribution in QKD Networks, Patent Application no. 202541111410 dated 14/11/2025, Indian Patent Office |
11 | Tony Thomas, Method for Message-Agnostic Quantum Digital Signatures with Delayed Verification, Patent Application no. 202641004854 dated 18/01/2026, Indian Patent Office |
12 | Tony Thomas, Filed, Method for End-to-End Information-Theoretically Secure Key Distribution in QKD Networks |
| 13 | Preetam Mukherjee, Filed, L. R. Nair and P. Mukherjee, “Dynamic Zone Adaptation for Security-Aware Network Slicing in 5G System,”Application No: 202541074263, Publication Date – 22 August 2025. |
Sl No | Faculty Name | Project Title | Funding Agency | Amount (₹) |
|
|
|
|
|
1 | Preetam Mukherjee | Design and Development of Next Generation Automated Security Operations and Response Tool (ASPER) | MeitY | 2,52,09,000 |
2 | Malu G | Transliteration of Palm Leaf Manuscripts | Department of Archives | 52,46,280 |
3 | Malu G | Digital Arts School Kerala (Centre of Excellence – CDTC) | Department of Culture | 2,00,00,000 |
4 | Malu G | Digital Museum Kerala (Centre of Excellence – CDTC) | Department of Culture | 3,00,00,000 |
5 | Tony Thomas | Digital Twin-based Intrusion Detection System Using Federated Learning for IoMT | C3iHub, IIT Kanpur | 37,29,000 |
6 | Elizabeth Sherly | VRCLC, WISE, CEPIA, CEBC, CDTC | Kerala State Planning Board | 10,00,0000 |
7 | Asharaf S | Seven live projects in AI and Blockchain technologies | BEL, Kerala PSc, KUHAS, Digitaru, IT Mission |
|
8 | Sinnu Susan Thomas | Deep Learning for Computer Vision | DST SERB Accelerate Vigyan Scheme – ABHYAAS (Vritika) | Rs. 1,50,000 |
9 | Sinnu Susan Thomas | Developing Policy Inputs for Faster Economic Recovery while Promoting Disaster Preparedness via Artificial Intelligence | British Council Going Global Partnerships Exploratory Grants | 15000 pounds |
10 | Sinnu Susan Thomas | Causal Optimal Transport for Summarizing the Unpaired Videos | DST SERB Start-up Research Grant | 19,861,00 |
Sl No | Faculty Name | Project Title | Funding Agency | Amount (₹) |
|
|
|
|
|
1 | Elizabeth Sherly | AICTE – Translation and Review of Technical Books I,II Semester UG & Diploma | AICTE | Prorated |
2 | Elizabeth Sherly | AICTE – Translation and Review of Technical Books III,IV Semester UG | AICTE | Prorated |
3 | Asharaf S | Optimization in LLMs | TCS/Intel | $50 USD/Hour |
Achievements and Recognitions
Faculty Name | Awards, recognitions, and fellowships |
Malu G. | Best Presenter Award at the Yuga Yugeen Museum Conclave, held from 1st to 3rd August 2024, organized by the Department of Culture, Government of India (GoI). |
Malu G. | Secure A+ grade in the Faculty Induction Programme organized by UGC-MMTC & DUK from 13th January to 8th February 2025 |
Balasubramaniam S | IEEE/EAI Senior Member Editor , Scientific Reports , Springer Nature, Associate Editor, Frontiers in Medicine |
Malu G | Reviewer IEEE Access, Springer Nature, Signal, Image and Video Processing etc. |
Sinnu Susan Thomas | Elevated as IEEE Senior Member |
Tony Thomas | Selected to the Editorial Board of the Journal of Information Security and Applications (JISA), a Q1 journal published by Elsevier, Associate Editor, IEEE Access, a Q1 journal |
Academic Governance and Quality Assurance
Faculty Name | Awards, recognitions, and fellowships |
Malu G. | Best Presenter Award at the Yuga Yugeen Museum Conclave, held from 1st to 3rd August 2024, organized by the Department of Culture, Government of India (GoI). |
Malu G. | Secure A+ grade in the Faculty Induction Programme organized by UGC-MMTC & DUK from 13th January to 8th February 2025 |
Balasubramaniam S | IEEE/EAI Senior Member Editor , Scientific Reports , Springer Nature, Associate Editor, Frontiers in Medicine |
Malu G | Reviewer IEEE Access, Springer Nature, Signal, Image and Video Processing etc. |
Sinnu Susan Thomas | Elevated as IEEE Senior Member |
Tony Thomas | Selected to the Editorial Board of the Journal of Information Security and Applications (JISA), a Q1 journal published by Elsevier, Associate Editor, IEEE Access, a Q1 journal |