Research
My research focuses on secure, verifiable, and deployable systems for blockchain-IoT and federated learning. I build practical frameworks that combine applied cryptography, ML-driven defense, and system-level evaluation.
Hardware-Rooted Blockchain-IoT Security
Device identity and authentication anchored in PUFs and zero-knowledge proofs, integrated with permissioned blockchain environments.
PUFZIN explainer · IEEE LCN 2024
Adaptive Cyber Deception for IoT
Dynamic honeypot conversion driven by ML-based threat scoring and game-theoretic decision models for resource-efficient defense.
Post-Quantum Secure Federated Learning
Quantum-resistant signatures and blockchain verification for FL updates, with benchmarks on MNIST, SVHN, and HAR.
Research Explainers
Accessible explanations of my research on blockchain, IoT security, and applied cryptography.
MEV in DeFi: A Game-Theoretic View of Attacks and Mitigations
February 11, 2026 · Data Security
The 20-Second Summary
LEO IoT Reliability: The 6-Hour TLE Ageing Cliff
February 11, 2026 · Network Security
The 20-Second Summary
FedSkipTwin: Digital-Twin-Guided Client Skipping for Communication-Efficient FL
February 11, 2026 · Data Security
The 20-Second Summary
ZKP-FedEval: Verifiable, Privacy-Preserving Federated Evaluation
February 10, 2026 · Data Security
The 20-Second Summary
Post-Quantum Cryptography for Consumer Electronics: Performance and Deployment
February 10, 2026 · Device Security
The 20-Second Summary
Securing Health Data on the Blockchain with DP and Federated Learning
February 10, 2026 · Data Security
The 20-Second Summary
FedGraph-VASP: Privacy-Preserving Federated Graph Learning for AML
February 10, 2026 · Data Security
The 20-Second Summary
EGAN: Evolutional GAN for Ransomware Evasion
February 10, 2026 · Network Security
The 20-Second Summary
A Bayesian Incentive Mechanism for Poison-Resilient Federated Learning
February 10, 2026 · Data Security
The 20-Second Summary
PUFZIN: Device Authentication with PUFs and Zero-Knowledge Proofs
February 02, 2026 · Device Security
The 20-Second Summary
PQS-BFL: Post-Quantum Secure Federated Learning for Healthcare
February 02, 2026 · Data Security
The 20-Second Summary
BHICS: Dynamic Honeypots That Adapt to Attackers
February 02, 2026 · Network Security
The 20-Second Summary
