Pre-loader

Malay Kule

About


Malay Kule has been on the faculty of the Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India since 2013, where currently, he is an assistant professor (Grade II) of Computer Science and Technology. Previously he served as an assistant professor in the department of Computer Science and Engineering of St. Thomas’ College of Engineering and Technology, Kolkata, India from 2006 to 2013. He received the B. Sc. degree in physics honours, the B. Tech. and M. Tech. degrees in Computer Science and Engineering, all from the University of Calcutta, India. He received the PhD degree in Engineering from the Indian Institute of Engineering Science and Technology, Shibpur, India. His research interest includes defect tolerance of nanoscale crossbar circuits, cryptology, hardware security, and Social Network Security.

Academic Qualifications


    Ph. D., Engineering, Indian Institute of Engineering Science and Technology, Shibpur

    M. Tech., Computer Science and Engineering, University of Calcutta

    B. Tech., Computer Science and Engineering, University of Calcutta

    B. Sc., Physics Honours, University of Calcutta

Research Statement


  • Defect Tolerance of Nanoscale Crossbar Circuits
  • Cryptology
  • Hardware Security

Latest Publications


  • 1 T Adhikari, A Khan, M Kule, S Das, An Efficient Approach for Detection of Compromised SDN Switches and Restoration of Network Flow, (Accepted), International Journal of Computer Network and Information Security, 2023
  • 2 P. Halder, M. Kule, Security Attacks on Social Networking: A Review, 01-04, International Symposium on Devices, Circuits and Systems (ISDCS), Hiroshima, Japan, 2023
  • 3 S. Sikdar, M. Kule, A New Technique of Cipher Type Identification Using Convolutional Neural Networks, 725, 1-16, Computational Intelligence in Pattern Recognition, 2022
  • 4 P. Halder, A. Mallick, S. Debnath, M. Kule, Machine Learning-Based Phishing Detection in Heterogeneous Information Network, 725, 221-234, Computational Intelligence in Pattern Recognition, 2022
  • 5 A. Mukherjee, A. Sen, K. Bera, R. Ghosh, S. Mondal, S. Chakravarty, S. Sikdar, M. Kule, Detection of Cipher Types Using Machine Learning Techniques, 725, 297-307, Computational Intelligence in Pattern Recognition, 2022
  • 6 S. Sikdar, M. Kule, Recent Trends in Cryptanalysis Techniques: A Review, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022
  • 7 S. Sikdar, J. Biswas, M. Kule, Cryptanalysis of Markle Hellman Knapsack Cipher Using Cuckoo Search Algorithm, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022
  • 8 S. Basu, M. Kule, On Detection of Hardware Trojan in Memristive Nanocrossbar-Based Circuits, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022
  • 9 P. K. Pal, M. Kule, A New Approach to Pharmaceutical Product Verification Using Barcode and QR Code, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022
  • 10 G Das, M Kule, A New Error Correction Technique in Quantum Cryptography using Artificial Neural Networks, 1-5, IEEE 19th India Council International Conference (INDICON), Kochi, India, 2022
  • View More

    Research Areas


    • Defect Tolerance of Nanoscale Crossbar Circuits
    • Cryptology
    • Hardware Security
    • Security Issues in Social Networking

    Publications


    1 P. Halder, M. Kule, Security Attacks on Social Networking: A Review, 01-04, International Symposium on Devices, Circuits and Systems (ISDCS), Hiroshima, Japan, 2023 2 S. Sikdar, M. Kule, A New Technique of Cipher Type Identification Using Convolutional Neural Networks, 725, 1-16, Computational Intelligence in Pattern Recognition, 2022 3 P. Halder, A. Mallick, S. Debnath, M. Kule, Machine Learning-Based Phishing Detection in Heterogeneous Information Network, 725, 221-234, Computational Intelligence in Pattern Recognition, 2022 4 A. Mukherjee, A. Sen, K. Bera, R. Ghosh, S. Mondal, S. Chakravarty, S. Sikdar, M. Kule, Detection of Cipher Types Using Machine Learning Techniques, 725, 297-307, Computational Intelligence in Pattern Recognition, 2022 5 S. Sikdar, M. Kule, Recent Trends in Cryptanalysis Techniques: A Review, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 6 S. Sikdar, J. Biswas, M. Kule, Cryptanalysis of Markle Hellman Knapsack Cipher Using Cuckoo Search Algorithm, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 7 S. Basu, M. Kule, On Detection of Hardware Trojan in Memristive Nanocrossbar-Based Circuits, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 8 P. K. Pal, M. Kule, A New Approach to Pharmaceutical Product Verification Using Barcode and QR Code, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 9 G Das, M Kule, A New Error Correction Technique in Quantum Cryptography using Artificial Neural Networks, 1-5, IEEE 19th India Council International Conference (INDICON), Kochi, India, 2022
  • 10 T Adhikai, M Kule, A K Khan, An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface, ICCNT, 2022
  • 11 A Mallick, S Mondal, S Debnath, S Majumder, Harsh, A Pal, A Verma, M Kule, Security Aspects of Social Media Applications, 404, 455-465, International Conference on Frontiers in Computing and Systems (COMSYS), 2021 12 T. Chaku, A. Ray, M. Kule, D. K. Kole, Swift Sort: A New Divide and Conquer Approach Based Sorting Algorithm, 404, 529-537, International Conference on Frontiers in Computing and Systems (COMSYS), 2021
  • 13 S Basu, M Kule, H Rahaman, Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits, 1-4, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021
  • 14 T Chaku, A Rakshit, I Sarkar and M Kule, On Defect Tolerance of Nanocrossbar Arrays using Divide and Conquer Technique, 1-4, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021
  • 15 K Dey, M Kule, H Rahaman, PUF Based Hardware Security: A Review, 1-6, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021
  • 16 S Basu, M Kule, H Rahaman, Symmetric Function Based Memristive Polimino PUF with Enhanced Security, 154-157, 6th IEEE International Symposium on Smart Electronic Systems (iSES), 2020
  • 17 S Basu, M Kule, Detection Of Hardware Trojan In Memristive Ternary CAM Circuits, 1-5, International Symposium on Devices, Circuits and Systems, 2020
  • 18 D Dhara, M Kule, A Microcontroller-Based Design of Chopper Circuit for DC Motor Control, 1-7, 2020 International Conference on Computer, Electrical & Communication Engineering (ICCECE), 2020
  • 19 T Chaku, M Kundu, D Dhara, M Kule, A New Function Mapping Approach in Defective Nanocrossbar Array using Unique Number Sequence, 805-813, International Conference on Frontiers in Computing and Systems (COMSYS-2020), 2020
  • 20 S Mitra, S Das, M Kule, Prevention of The Man-In-The-Middle Attack on Diffie-Hellman Key Exchange Algorithm: A Review, 625-635, International Conference on Frontiers in Computing and Systems (COMSYS-2020), 2020
  • 21 R Kamal, M Bag, M Kule, On the Cryptanalysis of S-DES Using Binary Cuckoo Search Algorithm, 23-32, Computational Intelligence in Pattern Recognition, 2020
  • 22 S Basu, M Kule, On the Synthesis of Unate Symmetric Function Using Memristor-Based Nano-Crossbar Circuit, 1-8, Computational Intelligence in Pattern Recognition, 2020
  • 23 B Jana, M Chakraborty, T Mandal, M Kule, An Overview on Security Issues in Modern Cryptographic Techniques, 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), India, 2018
  • 24 M. Chakraborty, B. Jana, T. Mandal, M. Kule, An Performance Analysis of RAS Scheme Using Artificial Neural Network, 1-5, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), India, 2018
  • 25 H. Rahaman, M. Kule, Defect Tolerant Approaches for Function Mapping in Nano-Crossbar Circuits, 48-53, IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 2018
  • 26 A. B. Majumdar, S. Chakraborty, M. Kule, A High-Yield Function Mapping Technique for Defective Nano-Crossbar Circuits, 5-9, National Conference on Recent Trends in Information Technology and Management (RTITM 2017), ISBN : 978-93-80813-59-2, 2017
  • 27 B Jana, J Poray, T Mandal, M Kule, A multilevel encryption technique in cloud security, 220-224, " 7th IEEE International Conference on Communication Systems and Network Technologies (CSNT), 2017
  • 28 M. Kule, H. Rahaman, Defect Tolerant Approach For Function Mapping in Nano Crossbar Using Evolutionary Algorithms, International Conference on Microelectronics, Circuits and Systems, 2016, 2016
  • 29 M Kule, A Dutta, H Rahaman, B B Bhattacharya, High-speed decoder design using memristor-based nano-crossbar architecture, 77-81, Sixth IEEE International Symposium on Embedded Computing and System Design (ISED), India, 2016
  • 30 M Kule, H Rahaman, B B Bhattacharya, Reliable logic design with defective nano-crossbar architecture, 47-52, IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), 2016
  • 31 M Kule, H Rahaman, B B Bhattacharya, On finding a defect-free component in nanoscale crossbar circuits, 70, 421-427, Procedia Computer Science, 2015
  • 32 S. N. Sinha, S. Palit, M. A. Molla, A. Khanra, M. Kule, A Cryptanalytic Attack on Knapsack Cipher Using Differential Evolution Algorithm, 317-320, IEEE Recent Advances in Intelligent Computational Systems (RAICS), 2011
  • 33 S Palit, SN Sinha, MA Molla, A Khanra, M Kule, A cryptanalytic attack on the knapsack cryptosystem using binary firefly algorithm, 428-432, 2nd IEEE International conference on computer and communication technology (ICCCT-2011), 2011
  • 34 M. Kule, S. Sen, A. Salman, H. Rahaman, Simulation of Symmetric Functions with optimal Solution through Defective Nanoscale crossbar Circuits using Greedy Method,, E-102 – E-106, ICCET, 2010
  • Patents


    # Patents Year

    Responsibilities


    Mentor, Academic Society of Computer Engineers, Dept. of Computer Science and Technology

    Convener, Network Infrastructure and Services Cell, IIEST, Shibpur

    AISHE Nodal Statistical Officer, IIEST, Shibpur

    Nodal Officer, Non-NSP Scholarships, IIEST, Shibpur

    Awards


    • Best Paper Award for the paper entitled "On Detection of Hardware Trojan in Memristive Nanocrossbar-Based Circuits", 3rd International Conference on Frontiers in Computing and Systems (COMSYS-2022), Year: 2022

    Research Groups


    Subinoy Sikdar
    Ph. D.
    2021csp002.subinoy@students.iiests.ac.in

    Research:
    Studies in Cryptanalysis Techniques

    Tinku Adhikari
    Ph. D.
    mzu2103577@mzu.edu.in

    Research:
    Security Aspects in Software Defined Networking

    Subhashree Basu
    Ph. D.
    basusubhashree1984@gmail.com

    Research:
    Detection and Prevention of Hardware Trojan

    Priti Halder
    Ph. D.
    2023csp005.priti@students.iiests.ac.in

    Research:
    Studies in Cryptanalysis using Soft Computing Techniques

    Gobinda Das
    Ph. D.
    gobindabwn@gmail.com

    Research:
    Defect Tolerant Design of Nanoscale Crossbar Circuits

    Kazi Md. Arfin
    Ph. D.
    arfin.iiest@gmail.com

    Research:
    Detection and Prevention of Cyberthreats

    Sangita Dutta
    Ph. D.
    2020cspr030.sangita@students.iiests.ac.in

    Research:
    Social Network Analysis

    Citations


    Google Scholar
    CITATION H-INDEX I-10 INDEX
    132 5 3
    Research Gate
    PUBLICATIONS CITATION H-INDEX
    6 12 2
    Scopus
    DOCUMENTS CITATION H-INDEX
    13 81 4

    Created: 23 November 2019