The document contains Rishabh Dubey's resume, including his educational qualifications from Daisy Dales School and IIT Guwahati, work experience as a software development intern, projects involving compiler design, network systems, computer vision, and Android applications, technical skills in programming languages, databases and operating systems, and extracurricular activities involving sports and technology events.
Geo-fencing for mobile applications,for tracking the employees,loved once,assets etc...In this presentation,Geo-fencing methodology,how its work how can create fence rea etc..
Geo-fencing for mobile applications,for tracking the employees,loved once,assets etc...In this presentation,Geo-fencing methodology,how its work how can create fence rea etc..
It has all details related to cyber security information hiding.It mainly focuses on steganography and its major details.The ppt also shows is applications.
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
Data Security Using Audio SteganographyRajan Yadav
Steganography is the art and science of writing hidden messages in such a way that no
one, apart from the sender and intended recipient, suspects the existence of the message,
a form of security through obscurity. Steganography works by replacing bits of useless or
unused data in regular computer files (such as graphics, sound, text, HTML, or even
floppy disks ) with bits of different, invisible information. This hidden information can
be plain text, cipher text, or even images.
In a computer-based audio Steganography system, secret messages are embedded in
digital sound. The secret message is embedded by slightly altering the binary sequence of
a sound file. Existing audio Steganography software can embed messages in WAV, AU,
and even MP3 sound files. Embedding secret messages in digital sound is usually a more
difficult process than embedding messages in other media, such as digital images. These
methods range from rather simple algorithms that insert information in the form of signal
noise to more powerful methods that exploit sophisticated signal processing techniques
to hide information.
GANs are the new hottest topic in the ML arena; however, they present a challenge for the researchers and the engineers alike. Their design, and most importantly, the code implementation has been causing headaches to the ML practitioners, especially when moving to production.
Starting from the very basic of what a GAN is, passing trough Tensorflow implementation, using the most cutting-edge APIs available in the framework, and finally, production-ready serving at scale using Google Cloud ML Engine.
Slides for the talk: https://www.pycon.it/conference/talks/deep-diving-into-gans-form-theory-to-production
Github repo: https://github.com/zurutech/gans-from-theory-to-production
Slide presentasi ini dibawakan oleh Imron Zuhri dalam acara Seminar & Workshop Pengenalan & Potensi Big Data & Machine Learning yang diselenggarakan oleh KUDO pada tanggal 14 Mei 2016.
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
A sharing talk in Hsinchu Coders.
The materials (i.e. images) are from their respective owners:
https://research.googleblog.com/2017/04/federated-learning-collaborative.html
For the full video of this presentation, please visit:
http://www.embedded-vision.com/platinum-members/embedded-vision-alliance/embedded-vision-training/videos/pages/sept-2016-member-meeting-checkvideo
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Nik Gagvani, President and General Manager of CheckVideo, delivers the presentation "Intelligent Video Surveillance: Are We There Yet?" at the September 2016 Embedded Vision Alliance Member Meeting. Gagvani provides an insider's perspective on vision-enabled video surveillance applications.
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
Generative AI offers great opportunities for innovation in various industries. Hence, by adopting ISO/IEC 27032, you can enhance your cybersecurity resilience and efficiently address the risks associated with generative AI.
Amongst others, the webinar covers:
• AI & Privacy
• Generative AI, Models & Cybersecurity
• AI & ISO/IEC 27032
Presenters:
Christian Grafenauer
Anonymization expert, privacy engineer, data protection officer, LegalTech researcher (GDPR, Blockchain, AI) Christian Grafenauer is an accomplished privacy engineer, anonymization expert, and computer science specialist, currently serving as the project lead for anonymity assessments at techgdpr. With an extensive background as a senior architect in Blockchain for IBM and years of research in the field since 2013, Christian co-founded privacy by Blockchain design to explore the potential of Blockchain technology in revolutionizing privacy and internet infrastructure. As a dedicated advocate for integrating legal and computer science disciplines, Christian’s expertise in anonymization and GDPR compliance enables innovative AI applications, ensuring a seamless fusion of technology and governance, particularly in the realm of smart contracts. In his role at techgdpr, he supports technical compliance, Blockchain, and AI initiatives, along with anonymity assessments. Christian also represents consumer interests as a member of the national Blockchain and DTL standardization committee at din (German standardization institute) in ISO/TC 307.
Akin Johnson
Akin J. Johnson is a renowned Cybersecurity Expert, known for his expertise in protecting digital systems from potential threats. With over a decade of experience in the field, Akin has developed a deep understanding of the ever-evolving cyber landscape.
Akin is an advocate for cybersecurity awareness and frequently shares his knowledge through speaking engagements, workshops, and publications. He firmly believes in the importance of educating individuals and organizations on the best practices for safeguarding their digital assets.
Lucas Falivene
Lucas is a highly experienced cybersecurity professional with a solid base in business, information systems, information security, and cybersecurity policy-making. A former Fulbright scholar with a Master of Science degree in Information Security Policy and Management at Carnegie Mellon University (Highest distinction) and a Master's degree in Information Security at the University of Buenos Aires (Class rank 1st). Lucas has participated in several trainings conducted by the FBI, INTERPOL, OAS, and SEI/CERT as well as in the development of 4 cyber ISO national standards.
Date: July 26, 2023
YouTube Link: https://youtu.be/QPDcROniUcc
Steganography (US Listeni/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, UK /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing"
It has all details related to cyber security information hiding.It mainly focuses on steganography and its major details.The ppt also shows is applications.
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
Data Security Using Audio SteganographyRajan Yadav
Steganography is the art and science of writing hidden messages in such a way that no
one, apart from the sender and intended recipient, suspects the existence of the message,
a form of security through obscurity. Steganography works by replacing bits of useless or
unused data in regular computer files (such as graphics, sound, text, HTML, or even
floppy disks ) with bits of different, invisible information. This hidden information can
be plain text, cipher text, or even images.
In a computer-based audio Steganography system, secret messages are embedded in
digital sound. The secret message is embedded by slightly altering the binary sequence of
a sound file. Existing audio Steganography software can embed messages in WAV, AU,
and even MP3 sound files. Embedding secret messages in digital sound is usually a more
difficult process than embedding messages in other media, such as digital images. These
methods range from rather simple algorithms that insert information in the form of signal
noise to more powerful methods that exploit sophisticated signal processing techniques
to hide information.
GANs are the new hottest topic in the ML arena; however, they present a challenge for the researchers and the engineers alike. Their design, and most importantly, the code implementation has been causing headaches to the ML practitioners, especially when moving to production.
Starting from the very basic of what a GAN is, passing trough Tensorflow implementation, using the most cutting-edge APIs available in the framework, and finally, production-ready serving at scale using Google Cloud ML Engine.
Slides for the talk: https://www.pycon.it/conference/talks/deep-diving-into-gans-form-theory-to-production
Github repo: https://github.com/zurutech/gans-from-theory-to-production
Slide presentasi ini dibawakan oleh Imron Zuhri dalam acara Seminar & Workshop Pengenalan & Potensi Big Data & Machine Learning yang diselenggarakan oleh KUDO pada tanggal 14 Mei 2016.
While transferring a file from one point to another through Intranet and Internet we need more file secure concepts. Ordinary, file Encryption-Decryption Concepts, which are readily available in java examples are easily captured by middle way itself. So we need more security combination. This project helps to send a file from one place to another in a secured manner. Firstly the target file is encrypted and it is embedded into an audio or video or any media file. The resultant file will be protected by a password. This resultant media file is not changed in its original format and it can be run in the player, we can’t find any encrypted data inside it. This format will be sent through net. In the destination point it will be retrieved only by our software and giving the relevant password. So it is highly secured.
A sharing talk in Hsinchu Coders.
The materials (i.e. images) are from their respective owners:
https://research.googleblog.com/2017/04/federated-learning-collaborative.html
For the full video of this presentation, please visit:
http://www.embedded-vision.com/platinum-members/embedded-vision-alliance/embedded-vision-training/videos/pages/sept-2016-member-meeting-checkvideo
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Nik Gagvani, President and General Manager of CheckVideo, delivers the presentation "Intelligent Video Surveillance: Are We There Yet?" at the September 2016 Embedded Vision Alliance Member Meeting. Gagvani provides an insider's perspective on vision-enabled video surveillance applications.
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
Generative AI offers great opportunities for innovation in various industries. Hence, by adopting ISO/IEC 27032, you can enhance your cybersecurity resilience and efficiently address the risks associated with generative AI.
Amongst others, the webinar covers:
• AI & Privacy
• Generative AI, Models & Cybersecurity
• AI & ISO/IEC 27032
Presenters:
Christian Grafenauer
Anonymization expert, privacy engineer, data protection officer, LegalTech researcher (GDPR, Blockchain, AI) Christian Grafenauer is an accomplished privacy engineer, anonymization expert, and computer science specialist, currently serving as the project lead for anonymity assessments at techgdpr. With an extensive background as a senior architect in Blockchain for IBM and years of research in the field since 2013, Christian co-founded privacy by Blockchain design to explore the potential of Blockchain technology in revolutionizing privacy and internet infrastructure. As a dedicated advocate for integrating legal and computer science disciplines, Christian’s expertise in anonymization and GDPR compliance enables innovative AI applications, ensuring a seamless fusion of technology and governance, particularly in the realm of smart contracts. In his role at techgdpr, he supports technical compliance, Blockchain, and AI initiatives, along with anonymity assessments. Christian also represents consumer interests as a member of the national Blockchain and DTL standardization committee at din (German standardization institute) in ISO/TC 307.
Akin Johnson
Akin J. Johnson is a renowned Cybersecurity Expert, known for his expertise in protecting digital systems from potential threats. With over a decade of experience in the field, Akin has developed a deep understanding of the ever-evolving cyber landscape.
Akin is an advocate for cybersecurity awareness and frequently shares his knowledge through speaking engagements, workshops, and publications. He firmly believes in the importance of educating individuals and organizations on the best practices for safeguarding their digital assets.
Lucas Falivene
Lucas is a highly experienced cybersecurity professional with a solid base in business, information systems, information security, and cybersecurity policy-making. A former Fulbright scholar with a Master of Science degree in Information Security Policy and Management at Carnegie Mellon University (Highest distinction) and a Master's degree in Information Security at the University of Buenos Aires (Class rank 1st). Lucas has participated in several trainings conducted by the FBI, INTERPOL, OAS, and SEI/CERT as well as in the development of 4 cyber ISO national standards.
Date: July 26, 2023
YouTube Link: https://youtu.be/QPDcROniUcc
Steganography (US Listeni/ˌstɛ.ɡʌnˈɔː.ɡrʌ.fi/, UK /ˌstɛɡ.ənˈɒɡ.rə.fi/) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography combines the Greek words steganos (στεγανός), meaning "covered, concealed, or protected", and graphein (γράφειν) meaning "writing"
1. May 2016 - July 2016
April 2016
March 2016
Ongoing
November 2015
March 2015
Education
Degree/Certificate Institute/Board CGPA/Percentage Year
B.Tech Indian Institute of Technology Guwahati 7.08 2013 - Present
Senior secondary Daisy Dales School, Indore (CBSE Board) 81.0% 2012
Secondary Daisy Dales School, Indore (CBSE Board) 8.0 2010
Experience
Software Development Engineering Intern, Cubical Lab. Pvt. Ltd. , Delhi
Information-processing API for Remote Television Control
- Designed and developed a REST-based API on Flask for use by mobile applications (Android and iOS)
for remote television control. API was deployed on gevent server.
- Compiled TV show data (title, genre, category, timing, channel ID, show ID, etc.) from internet to JSON
objects. Used ElasticSearch to provide extensive and efficient search functionality.
Projects
C-to-MIPS Compiler Design and Implementation
Dr. Arnab Sarkar, Assistant Professor, Dept. of CSE, IIT Guwahati
- Defined a set of rules and syntax for a C-style programming language and generated lexical analyzer
using flex. Used bison for syntactic and semantic analyzer generation.
- Implemented MIPS code generation by constructing annotated parse tree. Finished compiler supports
conditional statements, loops, procedure calls, scoping (local & global).
Proof-of-Concept Implementation of Proxy and DNS Servers
Dr. T. Venkatesh, Associate Professor, Dept. of CSE, IIT Guwahati
- Implemented three networked systems communicating via TCP sockets - a Client Program, a Proxy
Server and a DNS Server.
- Client sends request to proxy server for name resolution. Proxy server checks for the domain in its
cached data. If it exists, it returns the corresponding IP mapping; otherwise, it requests the DNS server
and caches fetched result (according to FIFO policy) and returns this IP to the client.
Ethnicity-based Face Classification using CNNs
Dr. Arijit Sur, Associate Professor, Dept. of CSE, IIT Guwahati
- Built a face classifier for classifiying Indian faces by ethnicity (Indo-Aryans, Dravidians, Tibetans, etc.)
- Performed classification using Convolutional Neural Network (CNNs) on preprocessed images obtained
through web crawling and annotated manually.
Arduino-based GPS Guidance System
Dr. Shivshankar B. Nair, Professor, Dept. of CSE, IIT Guwahati
- Implemented GPS guidance system incorporating Google Maps API (as part of Computer Peripherals
and Interfacing Lab) which guides the user in real time.
- Data fetched from Google API is cached in the system (no data connectivity is required thereafter) and
the user is guided to his/her destination with proper directions.
IITG CSE Library Portal
Dr. Pradip K. Das, Professor, Dept. of CSE, IIT Guwahati
- Developed an Android application for management of Departmental Library books.
- Features included multiple stakeholders (regular users and administrative staff), book issue and return
management.
Rishabh Dubey
Roll Number : 130101065
B.Tech - Computer Science and Engineering
Indian Institute of Technology Guwahati
+91-8011033543
rishabh.dubey@iitg.ac.in
dubeyrishabh235@gmail.com
www.linkedin.com/in/rishabhdubey
2. Technical skills
Programming languages : C,C++, Python
Web technologies : HTML, CSS, JavaScript
Database management : MySQL, ElasticSearch
Operating system : Windows, Linux(rudimentary)
Key courses taken
Positions of Responsibility
Organizer – Technothlon’14, Team Techniche
- Involved in setting the Technothlon-2014 Question Paper and in organizing the final on-site event,
as a part of Techniche (IIT Guwahati’s premier techno-management festival).
City Representative Technothlon’14
- Indore city representative for Technothlon, the international school championship conducted by
Techniche. Successful in bringing 1200 students.
Achievements
Joint Entrance Examination Advance 2013 : Secured All India Rank 1073 among 1 million
candidates appeared for the test.
Joint Entrance Examination Mains 2013 : Amongst the top 0.01% candidates appeared for the test.
Extracurriculars
Hobbies: Cricket, Football, Lawn Tennis, Music, Movies.
Member of Cricket team (National Sports Organization) of IIT Guwahati.
Captain of hostel cricket team taking part in Inter Hostel sports event SPARDHA.
Operating System
Compilers (Course and Lab)
Data Structure (Course and Lab)
Computer Vision and Machine Learning
Algorithmic Game Theory
Database Management System
Networks (Course and Lab)
Algorithm
Computer Graphics
Probability