Shubham Pampattiwar

San Francisco Bay Area Contact Info
1K followers 500+ connections

Join to view profile

About

- Senior Software Engineer at Red Hat, currently enabling Backup and Restore on Red Hat…

Activity

Join now to see all activity

Experience & Education

  • Red Hat

View Shubham’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Publications

  • Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques

    International Journal of Science and Research

    In today's world, data security has become a major issue of concern to be addressed. Information Exposure or Leakage is
    one of the prominent way through which data security is compromised. The data exposure may occur accidentally or intentionally. So a
    model is required to prevent such kind of scenario. Existing methodologies work on specific phrases or are statistical based techniques.
    Keyword-based methods are not accurate as they do not take context into consideration, and…

    In today's world, data security has become a major issue of concern to be addressed. Information Exposure or Leakage is
    one of the prominent way through which data security is compromised. The data exposure may occur accidentally or intentionally. So a
    model is required to prevent such kind of scenario. Existing methodologies work on specific phrases or are statistical based techniques.
    Keyword-based methods are not accurate as they do not take context into consideration, and statistical methods ignore the analysis of
    the text. Thus a new context based approach is introduced to prevent data leakage. This approach anchors the advantages of both the
    statistical approach as well as keyword based approach. This approach is basically divided into two phases-Drilling stage and
    Identification stage. The first one deal with the clustering of documents and the latter phase determines the confidentiality. As this
    approach offers the best of both worlds, it appears that this model is the superior one

    See publication

Courses

  • Automated Learning and Data Analysis

    CSC 522

  • Computer Networks

    CSC 570

  • Data Structures and Problem Solving

    -

  • Data mining

    -

  • Database Management Systems

    CSC 540

  • Design and Analysis of Algorithms

    CSC 505

  • DevOps

    CSC 519

  • High Performance Computing

    -

  • Human Computer Interaction

    CSC 554

  • Internet Protocols

    CSC 573

  • Object Oriented Design and Development

    CSC 517

  • Operating Systems

    -

  • Principles of Concurrent and Distributed Programming

    -

  • Software Engineering

    CSC 510

  • Web Technology

    -

Projects

  • CI/CD Pipeline

    -

    Accomplished creation of a CI/CD pipeline from scratch consisting of build, test and deploy stages. Carried out static code analysis for detecting code smells in pipeline’s test stage. Ran test suite analysis to perform test prioritization through mutation testing using fuzzing. Applied blue-green deployment strategy & performed canary analysis to deploy changes though the pipeline.

  • Servo

    -

    Contributed to Mozilla’s open source servo project, a browser engine in Rust to improve safety and concurrency. Added support for asynchronous compilation of web assembly by writing wrappers for Mozilla SpiderMonkey JavaScript Engine.

  • Google drive bot

    -

    Designed and implemented a file bot in Node.js for Mattermost to reduce overhead in creating and sharing files across channels and team members using Google Drive APIs to manage file access, fetch comments and track changes done to the shared files.

  • Library Management System

    -

    Developed a Library Management System using Ruby on Rails for users (students/librarians) providing housekeeping functionalities like book tracking (checkouts/hold requests), calculation of overdue fines and management of user profiles.

  • ISIM Custom Adapter for Federated Identity Operations

    -

    Developed a web service for ISIM to eliminate overheads associated with the federated identity operations by automating the synchronization of add, delete, reconcile and modify user account operations with the database.

  • Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques

    -

    In today's world data security has become a major issue of concern to be addressed. Data leakage is one of the prominent way through which data security is compromised. The data leakage may occur accidentally or intentionally. So a model is required to prevent such kind of data leakage. Existing methodologies work on specific phrases or by using various statistical methodologies. Keyword-based methods are not accurate as they take context into consideration , and statistical methods ignore the…

    In today's world data security has become a major issue of concern to be addressed. Data leakage is one of the prominent way through which data security is compromised. The data leakage may occur accidentally or intentionally. So a model is required to prevent such kind of data leakage. Existing methodologies work on specific phrases or by using various statistical methodologies. Keyword-based methods are not accurate as they take context into consideration , and statistical methods ignore the analysis of the text. Thus a new context based approach is introduced to prevent data leakage. This approach anchors the advantages of both the statistical approach as well as keyword based approach. This approach is basically divided into two phases-Training phase and detection phase. The first one deals with the clustering of documents and graphical representation of the content and the latter phase determines the confidentiality. As this approach offers the best of both worlds, it appears that this model is the superior one.

  • Impetus and Concepts (INC) website

    -

    INC is a national level event based at PICT Pune. This website showcased this event at the world stage via the Internet's lens.

  • College Notification Application

    -

    A college notification application based on the popular Android platform which comes very handy in handling the various college clubs and their corresponding club members
    in a very secure and portable manner.

More activity by Shubham

View Shubham’s full profile

  • See who you know in common
  • Get introduced
  • Contact Shubham directly
Join to view full profile

People also viewed

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Shubham Pampattiwar

Add new skills with these courses