About
Activity
-
This isn’t a goal of ours because we have plenty of money in the bank but quite excited to see that Hugging Face is profitable these days, with 220…
This isn’t a goal of ours because we have plenty of money in the bank but quite excited to see that Hugging Face is profitable these days, with 220…
Liked by Shubham Pampattiwar
-
🎉 Exciting News! 🎉 I am delighted to share that I have been accepted and selected as a Data on Kubernetes (DoK) Community Ambassador! 🌟 This role…
🎉 Exciting News! 🎉 I am delighted to share that I have been accepted and selected as a Data on Kubernetes (DoK) Community Ambassador! 🌟 This role…
Shared by Shubham Pampattiwar
Experience & Education
Licenses & Certifications
Publications
-
Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques
International Journal of Science and Research
In today's world, data security has become a major issue of concern to be addressed. Information Exposure or Leakage is
one of the prominent way through which data security is compromised. The data exposure may occur accidentally or intentionally. So a
model is required to prevent such kind of scenario. Existing methodologies work on specific phrases or are statistical based techniques.
Keyword-based methods are not accurate as they do not take context into consideration, and…In today's world, data security has become a major issue of concern to be addressed. Information Exposure or Leakage is
one of the prominent way through which data security is compromised. The data exposure may occur accidentally or intentionally. So a
model is required to prevent such kind of scenario. Existing methodologies work on specific phrases or are statistical based techniques.
Keyword-based methods are not accurate as they do not take context into consideration, and statistical methods ignore the analysis of
the text. Thus a new context based approach is introduced to prevent data leakage. This approach anchors the advantages of both the
statistical approach as well as keyword based approach. This approach is basically divided into two phases-Drilling stage and
Identification stage. The first one deal with the clustering of documents and the latter phase determines the confidentiality. As this
approach offers the best of both worlds, it appears that this model is the superior one
Courses
-
Automated Learning and Data Analysis
CSC 522
-
Computer Networks
CSC 570
-
Data Structures and Problem Solving
-
-
Data mining
-
-
Database Management Systems
CSC 540
-
Design and Analysis of Algorithms
CSC 505
-
DevOps
CSC 519
-
High Performance Computing
-
-
Human Computer Interaction
CSC 554
-
Internet Protocols
CSC 573
-
Object Oriented Design and Development
CSC 517
-
Operating Systems
-
-
Principles of Concurrent and Distributed Programming
-
-
Software Engineering
CSC 510
-
Web Technology
-
Projects
-
CI/CD Pipeline
-
Accomplished creation of a CI/CD pipeline from scratch consisting of build, test and deploy stages. Carried out static code analysis for detecting code smells in pipeline’s test stage. Ran test suite analysis to perform test prioritization through mutation testing using fuzzing. Applied blue-green deployment strategy & performed canary analysis to deploy changes though the pipeline.
-
Servo
-
Contributed to Mozilla’s open source servo project, a browser engine in Rust to improve safety and concurrency. Added support for asynchronous compilation of web assembly by writing wrappers for Mozilla SpiderMonkey JavaScript Engine.
-
Google drive bot
-
Designed and implemented a file bot in Node.js for Mattermost to reduce overhead in creating and sharing files across channels and team members using Google Drive APIs to manage file access, fetch comments and track changes done to the shared files.
-
Library Management System
-
Developed a Library Management System using Ruby on Rails for users (students/librarians) providing housekeeping functionalities like book tracking (checkouts/hold requests), calculation of overdue fines and management of user profiles.
-
ISIM Custom Adapter for Federated Identity Operations
-
Developed a web service for ISIM to eliminate overheads associated with the federated identity operations by automating the synchronization of add, delete, reconcile and modify user account operations with the database.
-
Prevention and Detection of Sensitive Information Exposure by Advanced Context Based Data Mining Techniques
-
In today's world data security has become a major issue of concern to be addressed. Data leakage is one of the prominent way through which data security is compromised. The data leakage may occur accidentally or intentionally. So a model is required to prevent such kind of data leakage. Existing methodologies work on specific phrases or by using various statistical methodologies. Keyword-based methods are not accurate as they take context into consideration , and statistical methods ignore the…
In today's world data security has become a major issue of concern to be addressed. Data leakage is one of the prominent way through which data security is compromised. The data leakage may occur accidentally or intentionally. So a model is required to prevent such kind of data leakage. Existing methodologies work on specific phrases or by using various statistical methodologies. Keyword-based methods are not accurate as they take context into consideration , and statistical methods ignore the analysis of the text. Thus a new context based approach is introduced to prevent data leakage. This approach anchors the advantages of both the statistical approach as well as keyword based approach. This approach is basically divided into two phases-Training phase and detection phase. The first one deals with the clustering of documents and graphical representation of the content and the latter phase determines the confidentiality. As this approach offers the best of both worlds, it appears that this model is the superior one.
-
Impetus and Concepts (INC) website
-
INC is a national level event based at PICT Pune. This website showcased this event at the world stage via the Internet's lens.
-
College Notification Application
-
A college notification application based on the popular Android platform which comes very handy in handling the various college clubs and their corresponding club members
in a very secure and portable manner.
More activity by Shubham
-
This week's OpenShift Dad joke has landed. #weeklyopenshiftjoke This installment is really bad as I am traveling and couldn't think of a funnier…
This week's OpenShift Dad joke has landed. #weeklyopenshiftjoke This installment is really bad as I am traveling and couldn't think of a funnier…
Liked by Shubham Pampattiwar
-
Hello connections! I’m exhilarated to announce that I have joined Druva as a Senior Staff Software Engineer! I will be working with the Realize team,…
Hello connections! I’m exhilarated to announce that I have joined Druva as a Senior Staff Software Engineer! I will be working with the Realize team,…
Liked by Shubham Pampattiwar
-
This weeks OpenShift Dad joke has landed. #weeklyopenshiftjoke
This weeks OpenShift Dad joke has landed. #weeklyopenshiftjoke
Liked by Shubham Pampattiwar
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Shubham Pampattiwar
2 others named Shubham Pampattiwar are on LinkedIn
See others named Shubham Pampattiwar