![]() |
Name | : | Dr Urvashi |
Designation | : | Assistant Professor (Grade-I) |
Department | : | Computer Science & Engg. |
Qualification | : |
PhD CSE (NIT Jalandhar) MTech CSE (NIT Jaipur) BTech CSE (Kurukshetra University) |
Address | : |
Department of Computer Science & Engineering IT Building, NIT, Jalandhar (Punjab) - 144027 |
Phone | : | 0181-5037605 |
Email ID | : | urvashi@nitj.ac.in |
Fax | : |
Personal Web Link | : |
NITJ Website link |
Google Scholar Link | : |
Urvashi Garg Profile Page |
Research Interests | : |
Security - Application Security, Cyber Warfare, Vulnerability Analysis and Management, Ransomware attacks - detection and mitigation. Artificial Intelligence - Adversarial ML, Explainable AI. |
Brief Research Profile: | : |
Type | Title | Publisher | Authors | ISBN/ISSN No. | Year |
---|---|---|---|---|---|
Book chapter | Fog computing: Challenges and solution in security and privacy | Springer | Urvashi, L. K. A., & Sikka, G. (2020). Behavior-Based Approach for Fog Data Analytics: An Approach Toward Security and Privacy. Fog Data Analytics for IoT Applications: Next Generation Process Model with State of the Art Technologies, 76, 341. | 2020 | |
Chapter | A Systematic Review of Attack Graph Generation and Analysis Techniques; Computer and Cyber Security: Principles, Algorithm, Applications, and Perspectives | Taylor & Francis | Urvashi Garg, Geeta Sikka, Lalit K Awasthi | 2018 | |
Chapter | User authentication using keystroke recognition; Proceedings of international conference on advances in computing | Springer | Urvashi Garg, Yogesh Kumar Meena | 2013 |
Role | Project Type | Title | Funding Agency | From | To | Amount | Status | Co-Investigator |
---|---|---|---|---|---|---|---|---|
Co-PI | Research and Development | An intelligent network analyzer cum patcher for advanced security hardening | DST | 15-03-21 | 15-06-24 | 73 Lakhs approx | Accepted for funding | Prof. Lalit K. Awasthi, Prof. Harsh Verma, Dr. Geeta Sikka |
Category | Type | Title | Venue | From | To | Designation |
---|---|---|---|---|---|---|
STC | International | Identify the weakest link: An online STC on recent attacking and defensive strategies | Dr B R Ambedkar National Institute of Technology | 10-08-20 | 14-08-20 | Coordinator |
STC | National | Exploring Potential: STC on 2020 research advances towards generating leading investigator | Dr B R Ambedkar National Institute of Technology | 24-08-20 | 28-08-20 | Coordinator |
Workshop | National | Design of Experiments | NIT Jalandhar | 21-04-22 | 22-04-22 | Co-coordinator |
STC | National | The AI Frontier: Balancing Security and Explainability | Online | 18-03-23 | 19-03-23 | Coordinator |
Designation | Organization |
---|
Scholar Name | Research Topic | Status | Year | Co-Supervisor |
---|---|---|---|---|
Guneet Kaur (JRF) | Security | Pursuing | 2022 | - |
Jyoti (JRF) | Security | Pursuing | 2022 | Dr. Geeta Sikka |
Pratiksha Singh | Water quality assessment | Ongoing | 2022 | |
Kritika | Internal fraud detection and analysis | Ongoing | 2022 | |
Lovi Dua | Adversarial Machine Learning | on going | 2020 | |
Chinu Verma | Explainable Artificial intelligence | on going | 2020 | |
Nisha Gautam | e-learning | Pursuing | 2020 |
Student Name | Dissertation Title | Status | Year | Co-Supervisor |
---|---|---|---|---|
Shivansh | Security | Ongoing | 2022 | |
Rajnish | Image based fraud detection | Ongoing | 2022 | |
Jhanvi | Traffic rules automation | Ongoing | 2022 | |
Amitoj Bir Singh | Adversarial ML | Completed | 2022 | Prof. L. K. Awasthi |
Abhinav | Hybrid authentication system | Completed | 2022 | Dr. Geeta Sikka |
Tejas | Yolo V5 | Completed | 2022 | |
Aniket | Cryptography | Completed | 2022 | |
Ekta | Machine Learning | Completed | 2020 | |
Dilip | Machine Learning | Completed | 2020 | |
Shyam Kumar Mishra | Machine Learning | Completed | 2020 |
Name | Reg./Ref. No. | Date of Award/Filling | Organization | Status |
---|---|---|---|---|
Program for attack graph generation, optimization and prioritization | SW-9615/2017 | 08-11-2017 | Copyright Office India | Granted |
User identification using unique typing characteristics in key based systems | SW-12475/2019 | 30-05-2019 | Copyright Office India | Granted |
Mathematical Topological Calculator | SW-7661/2014 | 19-03-2014 | Copyright Office India | Granted |
Automatic scheduler cum time table Generator | SW-4522/2020 | 10-09-20 | Copyright Office India | Published |
Gait based gender and age estimator | SW-9916/2020 | 15-09-20 | Copyright Office India | Published |
A novel device for Edible and non edible sanitization using Artificial Intelligence | TEMP/E- 1/61668/2020- DEL | 21-12-2020 | Indian Patent | Filed |
Quizzie – A smart quiz making platform | SW-14782/2021 | July 2021 | Copyright office India | Awarded |
Software for simulating MIPS behaviour | SW-14806/2021 | August 2021 | Copyright office India | Awarded |
Advanced Query Engine cum validator for Databases | SW-15161/2022 | 2022 | Copyright office India | Awarded |
Advanced query optimizer for proposing optimized solution for query execution | SW-15160/2022 | 2022 | Copyright office India | Awarded |
A novel wearable authentication device involving EEG and IRIS pattern analysis, system and method thereof | 202211021836 | 12-04-22 | Indian Patent | Filed |
Position Held | Organization | From | To |
---|---|---|---|
Coordinator (CSI Membership) | Dr B R Ambedkar National Institute of Technology Jalandhar | 25-02-20 | Till date |
Educator | committee constituted for AWS academy curriculum course at Dr B R Ambedkar National Institute of Technology Jalandhar | 12-12-19 | Till date |
PG coordinator (Academics) | NIT Jalandhar | June 2021 | till date |
Member - Artificial Intelligence Center | NIT Jalandhar | September 2021 | till date |
Creativity and Web Designing Club (Coordinator) | Student Welfare | 21-06-22 | till date |
Coordinator | Student Grievance Cell | 11-05-22 | Till date |
Coordinator | Virtual Lab | 16-09-20 | Till date |
Title | Activity | Given by | Year |
---|