Pre-loader

Malay Kule

About


Malay Kule has been on the faculty of the Indian Institute of Engineering Science and Technology (IIEST), Shibpur, India since 2013, where currently, he is an assistant professor (Grade II) of Computer Science and Technology. Previously he served as an assistant professor in the department of Computer Science and Engineering of St. Thomas’ College of Engineering and Technology, Kolkata, India from 2006 to 2013. He received the B. Sc. degree in physics honours, the B. Tech. and M. Tech. degrees in Computer Science and Engineering, all from the University of Calcutta, India. He received the PhD degree in Engineering from the Indian Institute of Engineering Science and Technology, Shibpur, India. His research interest includes defect tolerance of nanoscale crossbar circuits, cryptology, hardware security, and Social Network Security.

Academic Qualifications


    Ph. D., Engineering, Indian Institute of Engineering Science and Technology, Shibpur

    M. Tech., Computer Science and Engineering, University of Calcutta

    B. Tech., Computer Science and Engineering, University of Calcutta

    B. Sc., Physics Honours, University of Calcutta

Research Statement


  • Defect Tolerance of Nanoscale Crossbar Circuits
  • Cryptology
  • Hardware Security

Latest Publications


  • 1 S Dutta, S Chakraborty, M Kule, A Novel Two-Phase Social Network-Based Consensus Mechanism: Opinion Dynamics for Large-Scale Group Decision-Making, (Accepted), IEEE Region 10 Conference (TENCON), 2024
  • 2 S K Mitra, S Chakraborty, M Kule, An Enhanced Network Density based Centrality for Influential Node Detection in Complex Networks, (Accepted), IEEE Region 10 Conference (TENCON), 2024
  • 3 S Sikdar, M Kule, A Machine Learning and Nature Inspired Algorithm Based Hybrid Approach for Detection of IOT Attacks, (Accepted), International Conference on Computer, Communication, Control & Information Technology, 2024
  • 4 P Halder, S Sikdar, M Kule, An Improved Cryptanalysis Of Knapsack Cryptosystem Using Dingo Optimizer, (Accepted and Presented), International Conference on Data Electronics and Computing, 2024
  • 5 R Das, S Basu, M Kule, A New Technique of Cellular-Automata-Based PUF Design in Nanoscale Crossbar Circuits, (Accepted and Presented), International Conference on Computational Intelligence in Pattern Recognition, 2024
  • 6 S Basu, R Ghoshal, M Kule, Detection of Hardware Trojan in Nanocrossbar-Based Cryptographic Circuit, (Accepted and Presented), International Conference on Computational Intelligence in Pattern Recognition, 2024
  • 7 S Sikdar, M Kule, Intelligent Identification of Cryptographic Ciphers using Machine Learning Techniques, (Accepted), International Journal of Intelligent Systems and Applications, 2024
  • 8 S Sikdar, J Biswas, M Kule, Cryptanalysis of Markle-Hellman Knapsack Cipher using Nature Inspired Algorithms, (Accepted), International Journal of Applied Cryptography, 2024
  • 9 T Adhikari, A K Khan, M Kule, ProDetect: A Proactive Detection Approach of the TCP SYN Flooding Attack in the SDN Controller, 1–12., IETE Journal of Education, 2024
  • 10 T Adhikari, A K Khan and M Kule, Design of An Application Authentication Framework to Secure Controller Access via Northbound Interface in SDN, (Accepted and Presented), International Conference on Computational Technologies and Electronics (ICCTE), 2023
  • View More

    Research Areas


    • Defect Tolerance of Nanoscale Crossbar Circuits
    • Cryptology
    • Hardware Security
    • Security Issues in Social Networking

    Publications


  • 1 S Sikdar, M Kule, Intelligent Identification of Cryptographic Ciphers using Machine Learning Techniques, (Accepted), International Journal of Intelligent Systems and Applications, 2024
  • 2 S Sikdar, J Biswas, M Kule, Cryptanalysis of Markle-Hellman Knapsack Cipher using Nature Inspired Algorithms, (Accepted), International Journal of Applied Cryptography, 2024
  • 3 T Adhikari, A K Khan, M Kule, ProDetect: A Proactive Detection Approach of the TCP SYN Flooding Attack in the SDN Controller, 1–12., IETE Journal of Education, 2024
  • 4 T Adhikari, A K Khan, M Kule, S Das, An Efficient Approach for Detection of Compromised SDN Switches and Restoration of Network Flow, (Accepted), International Journal of Computer Network and Information Security, 2023
  • 5 M Kule, H Rahaman, H Rahaman, B B Bhattacharya, Bio-Inspired Methods for Defect-Tolerant Function-Mapping in Nano-Crossbar Arrays, 70(2), 1861–1870, IETE Journal of Research, 2022 6 S Basu, M Kule, H Rahaman, Implementation of Symmetric Functions Using Memristive Nanocrossbar Arrays and their Application in Cryptography, 30(12), 2150223, Journal of Circuits, Systems, and Computers, 2021 7 R Kamal, M Bag, M Kule, On The Cryptanalysis of S-DES using Nature Inspired Optimization Algorithms, 14, 163-173, Evolutionary Intelligence(2020), Springer, 2021 8 M Kule, H Rahaman, BB Bhattacharya, Function-Mapping on Defective Nano-Crossbar with Enhanced Reliability, 19(2), 555-564, Journal of Computational Electronics, Springer, 2020 9 M Kule, H Rahaman, BB Bhattacharya, Maximal Defect-Free Component in Nanoscale Crossbar Circuits Amidst Stuck-Open and Stuck-Closed Faults, 28(11), 1950180:1 – 1950180:22, Journal of Circuits, Systems, and Computers, 2019
  • 10 T Mandal, M Kule, An Improved Cryptanalysis Technique Based on Tabu Search for Knapsack Cryptosystem, 9(16), 8295-8302, International Journal of Control Theory and Applications, 2016
  • 1 S Dutta, S Chakraborty, M Kule, A Novel Two-Phase Social Network-Based Consensus Mechanism: Opinion Dynamics for Large-Scale Group Decision-Making, (Accepted), IEEE Region 10 Conference (TENCON), 2024
  • 2 S K Mitra, S Chakraborty, M Kule, An Enhanced Network Density based Centrality for Influential Node Detection in Complex Networks, (Accepted), IEEE Region 10 Conference (TENCON), 2024
  • 3 S Sikdar, M Kule, A Machine Learning and Nature Inspired Algorithm Based Hybrid Approach for Detection of IOT Attacks, (Accepted), International Conference on Computer, Communication, Control & Information Technology, 2024
  • 4 P Halder, S Sikdar, M Kule, An Improved Cryptanalysis Of Knapsack Cryptosystem Using Dingo Optimizer, (Accepted and Presented), International Conference on Data Electronics and Computing, 2024
  • 5 R Das, S Basu, M Kule, A New Technique of Cellular-Automata-Based PUF Design in Nanoscale Crossbar Circuits, (Accepted and Presented), International Conference on Computational Intelligence in Pattern Recognition, 2024
  • 6 S Basu, R Ghoshal, M Kule, Detection of Hardware Trojan in Nanocrossbar-Based Cryptographic Circuit, (Accepted and Presented), International Conference on Computational Intelligence in Pattern Recognition, 2024
  • 7 T Adhikari, A K Khan and M Kule, Design of An Application Authentication Framework to Secure Controller Access via Northbound Interface in SDN, (Accepted and Presented), International Conference on Computational Technologies and Electronics (ICCTE), 2023
  • 8 S Sikdar, P Basu, M Kule, Honeypot Deception: A Clever Approach of Web Intrusion Detection and Prevention, 4th International Conference on Frontiers in Computing and Systems (COMSYS 2023), 2023 9 P. Halder, M. Kule, Security Attacks on Social Networking: A Review, 01-04, International Symposium on Devices, Circuits and Systems (ISDCS), Hiroshima, Japan, 2023 10 S. Sikdar, M. Kule, A New Technique of Cipher Type Identification Using Convolutional Neural Networks, 725, 1-16, Computational Intelligence in Pattern Recognition, 2022 11 P. Halder, A. Mallick, S. Debnath, M. Kule, Machine Learning-Based Phishing Detection in Heterogeneous Information Network, 725, 221-234, Computational Intelligence in Pattern Recognition, 2022 12 A. Mukherjee, A. Sen, K. Bera, R. Ghosh, S. Mondal, S. Chakravarty, S. Sikdar, M. Kule, Detection of Cipher Types Using Machine Learning Techniques, 725, 297-307, Computational Intelligence in Pattern Recognition, 2022 13 S. Sikdar, M. Kule, Recent Trends in Cryptanalysis Techniques: A Review, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 14 S. Sikdar, J. Biswas, M. Kule, Cryptanalysis of Markle Hellman Knapsack Cipher Using Cuckoo Search Algorithm, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 15 S. Basu, M. Kule, On Detection of Hardware Trojan in Memristive Nanocrossbar-Based Circuits, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 16 P. K. Pal, M. Kule, A New Approach to Pharmaceutical Product Verification Using Barcode and QR Code, 690, International Conference on Frontiers in Computing and Systems (COMSYS), 2022 17 G Das, M Kule, A New Error Correction Technique in Quantum Cryptography using Artificial Neural Networks, 1-5, IEEE 19th India Council International Conference (INDICON), Kochi, India, 2022
  • 18 T Adhikai, M Kule, A K Khan, An ECDH and AES Based Encryption Approach for Prevention of MiTM in SDN Southbound Communication Interface, ICCNT, 2022
  • 19 A Mallick, S Mondal, S Debnath, S Majumder, Harsh, A Pal, A Verma, M Kule, Security Aspects of Social Media Applications, 404, 455-465, International Conference on Frontiers in Computing and Systems (COMSYS), 2021 20 T. Chaku, A. Ray, M. Kule, D. K. Kole, Swift Sort: A New Divide and Conquer Approach Based Sorting Algorithm, 404, 529-537, International Conference on Frontiers in Computing and Systems (COMSYS), 2021
  • 21 S Basu, M Kule, H Rahaman, Detection of Hardware Trojan in Presence of Sneak Path in Memristive Nanocrossbar Circuits, 1-4, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021
  • 22 T Chaku, A Rakshit, I Sarkar and M Kule, On Defect Tolerance of Nanocrossbar Arrays using Divide and Conquer Technique, 1-4, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021
  • 23 K Dey, M Kule, H Rahaman, PUF Based Hardware Security: A Review, 1-6, 2021 International Symposium on Devices, Circuits and Systems (ISDCS), 2021
  • 24 S Basu, M Kule, H Rahaman, Symmetric Function Based Memristive Polimino PUF with Enhanced Security, 154-157, 6th IEEE International Symposium on Smart Electronic Systems (iSES), 2020
  • 25 S Basu, M Kule, Detection Of Hardware Trojan In Memristive Ternary CAM Circuits, 1-5, International Symposium on Devices, Circuits and Systems, 2020
  • 26 D Dhara, M Kule, A Microcontroller-Based Design of Chopper Circuit for DC Motor Control, 1-7, 2020 International Conference on Computer, Electrical & Communication Engineering (ICCECE), 2020
  • 27 T Chaku, M Kundu, D Dhara, M Kule, A New Function Mapping Approach in Defective Nanocrossbar Array using Unique Number Sequence, 805-813, International Conference on Frontiers in Computing and Systems (COMSYS-2020), 2020
  • 28 S Mitra, S Das, M Kule, Prevention of The Man-In-The-Middle Attack on Diffie-Hellman Key Exchange Algorithm: A Review, 625-635, International Conference on Frontiers in Computing and Systems (COMSYS-2020), 2020
  • 29 R Kamal, M Bag, M Kule, On the Cryptanalysis of S-DES Using Binary Cuckoo Search Algorithm, 23-32, Computational Intelligence in Pattern Recognition, 2020
  • 30 S Basu, M Kule, On the Synthesis of Unate Symmetric Function Using Memristor-Based Nano-Crossbar Circuit, 1-8, Computational Intelligence in Pattern Recognition, 2020
  • 31 B Jana, M Chakraborty, T Mandal, M Kule, An Overview on Security Issues in Modern Cryptographic Techniques, 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), India, 2018
  • 32 M. Chakraborty, B. Jana, T. Mandal, M. Kule, An Performance Analysis of RAS Scheme Using Artificial Neural Network, 1-5, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), India, 2018
  • 33 H. Rahaman, M. Kule, Defect Tolerant Approaches for Function Mapping in Nano-Crossbar Circuits, 48-53, IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), 2018
  • 34 A. B. Majumdar, S. Chakraborty, M. Kule, A High-Yield Function Mapping Technique for Defective Nano-Crossbar Circuits, 5-9, National Conference on Recent Trends in Information Technology and Management (RTITM 2017), ISBN : 978-93-80813-59-2, 2017
  • 35 B Jana, J Poray, T Mandal, M Kule, A multilevel encryption technique in cloud security, 220-224, " 7th IEEE International Conference on Communication Systems and Network Technologies (CSNT), 2017
  • 36 M. Kule, H. Rahaman, Defect Tolerant Approach For Function Mapping in Nano Crossbar Using Evolutionary Algorithms, International Conference on Microelectronics, Circuits and Systems, 2016, 2016
  • 37 M Kule, A Dutta, H Rahaman, B B Bhattacharya, High-speed decoder design using memristor-based nano-crossbar architecture, 77-81, Sixth IEEE International Symposium on Embedded Computing and System Design (ISED), India, 2016
  • 38 M Kule, H Rahaman, B B Bhattacharya, Reliable logic design with defective nano-crossbar architecture, 47-52, IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER), 2016
  • 39 M Kule, H Rahaman, B B Bhattacharya, On finding a defect-free component in nanoscale crossbar circuits, 70, 421-427, Procedia Computer Science, 2015
  • 40 S. N. Sinha, S. Palit, M. A. Molla, A. Khanra, M. Kule, A Cryptanalytic Attack on Knapsack Cipher Using Differential Evolution Algorithm, 317-320, IEEE Recent Advances in Intelligent Computational Systems (RAICS), 2011
  • 41 S Palit, SN Sinha, MA Molla, A Khanra, M Kule, A cryptanalytic attack on the knapsack cryptosystem using binary firefly algorithm, 428-432, 2nd IEEE International conference on computer and communication technology (ICCCT-2011), 2011
  • 42 M. Kule, S. Sen, A. Salman, H. Rahaman, Simulation of Symmetric Functions with optimal Solution through Defective Nanoscale crossbar Circuits using Greedy Method,, E-102 – E-106, ICCET, 2010
  • 1 T Adhikari, A K Khan and M Kule, An Indirect Trust Establishment Framework for Network Applications in Software Defined Network (SDN), Emerging Artificial IoT Technologies: Security and Communication in Industrial Applications, Wiley Publishers(Accepted), , 2024
  • Patents


    # Patents Year

    Responsibilities


    Mentor, Academic Society of Computer Engineers, Dept. of Computer Science and Technology

    Convener, Network Infrastructure and Services Cell, IIEST, Shibpur

    AISHE Nodal Statistical Officer, IIEST, Shibpur

    Nodal Officer, Non-NSP Scholarships, IIEST, Shibpur

    Awards


    • Best Paper Award for the paper entitled "On Detection of Hardware Trojan in Memristive Nanocrossbar-Based Circuits", 3rd International Conference on Frontiers in Computing and Systems (COMSYS-2022), Year: 2022

    Research Groups


    Subinoy Sikdar
    Ph. D.
    2021csp002.subinoy@students.iiests.ac.in

    Research:
    Studies in Cryptanalysis Techniques

    Tinku Adhikari
    Ph. D.
    mzu2103577@mzu.edu.in

    Research:
    Security Aspects in Software Defined Networking

    Subhashree Basu
    Ph. D.
    basusubhashree1984@gmail.com

    Research:
    Detection and Prevention of Hardware Trojan

    Priti Halder
    Ph. D.
    2023csp005.priti@students.iiests.ac.in

    Research:
    Studies in Cryptanalysis using Soft Computing Techniques

    Gobinda Das
    Ph. D.
    gobindabwn@gmail.com

    Research:
    Defect Tolerant Design of Nanoscale Crossbar Circuits

    Kazi Md. Arfin
    Ph. D.
    arfin.iiest@gmail.com

    Research:
    Detection and Prevention of Cyberthreats

    Sangita Dutta
    Ph. D.
    2020cspr030.sangita@students.iiests.ac.in

    Research:
    Social Network Analysis

    Sourav Kumar Mitra
    Ph. D.
    2021cspr003.sourav@students.iiests.ac.in

    Research:
    Complex Network Analysis

    Citations


    Google Scholar
    CITATION H-INDEX I-10 INDEX
    132 5 3
    Research Gate
    PUBLICATIONS CITATION H-INDEX
    6 12 2
    Scopus
    DOCUMENTS CITATION H-INDEX
    13 81 4

    Created: 23 November 2019