About Me

  • Phone:
    (+91)4712784100 (+91)4712700777

Subject: Mathematics, Statistics, Cryptography, Cyber Security

Areas of Specialization: Cryptography, Biometrics,  Digital Forensics, Digital Watermarking, Multimedia Security, Visual Surveillance, Number theoretic, Algebraic and Statistical Methods in Cryptology .

Courses Teaching: Cryptography, Information Security, Network Security, Number Theory and Algebra, Statistical Methods, Discrete Mathematics

Visiting Position: School of Mathematics, IISER Thiruvanathapuram

  • Ph.D, Mathematics (Cryptography), Indian Institute of Technology Kanpur, 2006.
  • M.Sc, Mathematics, Indian Institute of Technology Kanpur , 1998, First Rank.
  • B.Sc, Mathematics, Mahatma Gandhi University, Kerala, 1995, First Rank

 

  • Research Fellow            Oct 2008—Mar 2011

School of Computer Engineering,
Nanyang Technological University (NTU), Singapore.

  • Research Associate       Oct 2007—-Sept. 2008

GM R&D Lab, Bangalore, India
General Motors Corporation

  • Postdoctoral Researcher   Aug 2006 — July 2007

Department of Mathematics,
Korea Advanced Institute of Science and Technology (KAIST), Korea

  • Tutor    July 2003 —-May 2006

Department of Mathematics
Indian Institute of Technology Kanpur (IIT Kanpur)

  • JOHN (T), THOMAS (T), EMMANUEL (S), Graph Convolutional Networks for Android Malware Detection with System Call Graphs, ISEA-ISAP 2020, Third ISEA International Conference on Security and Privacy 2020
  • VIJ (D), BALACHANDRAN (V), THOMAS (T), SURENDRAN (R), GRAMAC: A Graph Based Android Malware Classification Mechanism, 10th ACM Conference on Data and Application Security and Privacy, Mar 2020
  • MARY IPE (V), THOMAS (T), CNN Based Periocular Recognition Using Multispectral Images, Fifth International Symposium on Signal Processing and Intelligent Recognition Systems (SIRS’19), Dec 2019
  • MARY IPE (V), THOMAS (T), Periocular Recognition Under Unconstrained Conditions Using CNN Based Super-Resolution, International Conference on Applied Soft computing and Communication Networks (ACN’19), Dec 2019
  • ROOPAK (S), THOMAS (T), EMMANUEL (S), Android Malware Detection Mechanism Based on Bayesian Model Averaging, Advances in Intelligent Systems and Computing (AISC), Springer 707: 87-96; 2019
  • SURENDRAN (R), VIJAYARAGHAVAN (A),THOMAS (T), On Effectiveness of Source Code and SSL Based Features for Phishing Website Detection, International Conference on Advanced Technologies in Intelligent Control, Environment, Computing and Communication Engineering (ICATIECE-2019), March 2019
  • KRISHNAN (A), THOMAS (T), NAYAR (GR), MOHAN (SS), Liveness Detection in Finger Vein Imaging Device Using Plethysmographic Signals, International Conference on Intelligent Human Computer Interaction, Springer 11268; 251-260; Dec 2018
  • RAGENDHU (SP), THOMAS (T), Fast and Accurate Fingerprint Recognition in Principal Component Subspace, International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA, Springer 882; 301-315; July 2018
  • JOHN (TS), THOMAS (T), UDDIN (MM), A Multifamily Android Malware Detection Using Deep Autoencoder Based Feature Extraction, International Conference on Advanced Computing Dec 2017
  • ROOPAK (S), THOMAS (T), EMMANUEL (S), Android Malware Detection Mechanism Based on Bayesian Model Averaging, International Conference on Advanced Computing, Networking, and Informatics, Springer 707; 87-96; June 2017
  • ZHANG (P), THOMAS (T), ZHUO (T), Object coding based video authentication for privacy protection in immersive communication, Journal of Ambient Intelligence and Humanized Computing, Springer 8; 1-14; 2016
  • ZHANG (P), THOMAS (T), ZHUO (T), An object-based video authentication mechanism for smart-living surveillance, International Conference on Orange Technologies (ICOT) IEEE; 173-176, Dec 2015
  • KRISHNAN (A), THOMAS (T), A survey of mathematical techniques in finger vein biometrics, Journal of Theoretical and Computational Mathematics1; 66-73; 2015
  • ZHANG (P), THOMAS (T), ZHUO (T), An Object-based Video Authentication Mechanism for Smart-Living Surveillance, International Conference on Orange Technologies (ICOT2015) IEEE 173-176; Dec 2015
  • THOMAS (T), EMMANUEL (S), VIJAYARAGHAVAN (AP), Machine Learning Approaches in Cyber Security Analytics, Springer 2020
  • GAYATHRI (KS), THOMAS (T), Intrusion Detection Systems for Internet of Things, Handbook of Research on Intrusion Detection Systems, IGI Global; Chapter 8; 2020
  • JOHN (TS), THOMAS (T), Adversarial Attacks and Defenses in Malware Detection Classifiers, Advanced Research on Cloud Computing, Big Data, and the IoT, IGI Global; 127-150; 2019
  • SURENDRAN (R), THOMAS (T), EMMANUEL (S), Detection of Malware Applications in Android Smartphones World Scientific, Reference on Innovation, Volume 4: Innovation in Information Security, World Scientific Publishing, 211-234; 2018
  • DEVI (VS), ROOPAK (S), THOMAS (T), MERAJUDDIN (MD), Multi-Pattern Matching Based Dynamic Malware Detection in Smart Phones, Energy Efficient Computing & Electronics: Devices to Systems, CRC Press 421; 2018

Courses