Skip to main content
Contact Info
Er. Surinder Singh Khurana
9878737711
Room No. 213, Academic Block
Er. Surinder Singh Khurana
Qualification
  • M.E. in Computer Science & Engg. from PEC University of Technology, Chandigarh, with 9.5 CGPA. (2007-09)  
  • B-Tech in Computer Science & Engg. from Punjab Technical University-Jalandhar with an aggregate of 78.8%. (2004-07)
  • Diploma in Computer Engineering with Honors from Punjab Board of Technical Education & Industrial Training – Chandigarh. With an aggregate of 76.13%.(2001-04)
Experience
Teaching Experience
  • Presently working as Assistant Professor in Centre for Computer Science & Technology, Central University of Punjab, Bathinda.
  • 17 months as an Assistant Professor in C.S.E. Department, Panjab University SSG Regional Centre, Hoshiarpur.
  • 12 Months as a Lecturer in C.S.E. Department, PEC University of Technology (formerly Punjab Engineering College), Chandigarh.
  • 8 Months as Lecturer [Contractual] in C.S.E. Department, CCET, Sec 26, Chandigarh
  • 5 Months as Lecturer [Contractual] in C.S.E. Department, S.L.I.E.T. Longowal (Sangrur)
 
Research Area

Cyber Security/Machine Learning/Algorithm Design and Analysis

Research Interests

Cyber Security/Machine Learning/Algorithm Design and Analysis

Publications

Papers Published in Journals

  1. Khurana, S. S, & Kaur N.(2014),  SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter,  International Journal of Distributed and Cloud Computing, Volume 2 Issue 2.

 

  1. Chahal, P. S., & Khurana, S. S. (2016). TempR: application of stricture dependent intelligent classifier for fast flux domain detection. International Journal of Computer Network and Information Security, 8(10), 37-44.

 

  1. Saini, R., & Khurana, S. S. (2016). Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the-Middle Attack in WLAN. International Journal of Information Technology and Computer Science, 8(10), 37-44.

 

  1. Bhan, A., & Khurana, S. S. (2016). Gray Hole Attack on Hybrid 5G Network. International Journal of Advanced Research in Computer Science, 8(7), 346-350.

 

  1. Sharma, U., & Khurana, S. S. (2016). SHED: Spam Ham Email Dataset. International Journal of Advanced Research in Computer Science, 5(6), 1078-1082.

 

  1. Mahato, S., Jindal, S.K., Vicky, K., Khurana, S.S., Kulharia, M., (2019), Identifying Novel Graph Properties and Solving Graph Isomorphism for Hard Instances of Symmetrical Graphs, International Journal of Engineering Sciences Paradigms and Researches, Vol. 48, Issue 02, pp12-27.

 

  1. Parray, I.R., Khurana, S.S., Kumar, M. et al. (2020), Time series data analysis of stock price movement using machine learning techniques. Soft Comput 24, 16509–16517. [SCI Indexed, Imapct Factor: 3.643 ]

 

  1. Mushtaq, F., Misgar, M.M., Kumar, M., Khurana, S.S., (2021),  UrduDeepNet: offline handwritten Urdu character recognition using deep neural network. Neural Computing & Applications 33, 15229–15252. [SCI Indexed, Imapct Factor:  5.6]

 

  1. Koul S, Kumar M, Khurana SS, Mushtaq F, Kumar K (2022). An efficient approach for copy-move image forgery detection using convolution neural network. Multimedia Tools and Applications. 81(8):11259-77. [SCI Indexed, Imapct Factor: 2.757]

 

  1. Jan, T.G., Khurana, S.S. and Kumar, M., 2022. Semi-supervised labeling: a proposed methodology for labeling the twitter datasets. Multimedia Tools and Applications, 81(6), pp.7669-7683. [SCI Indexed, Imapct Factor: 2.757]

 

 

Papers Published in Conferences

1. Garg, T., & Khurana, S. S. (2014, May). Comparison of classification techniques for intrusion detection dataset using WEKA. In proceedings of International Conference on Recent Advances and Innovations in Engineering (ICRAIE), 2014 (pp. 1-5). IEEE.

 

2. Saini, S., & Khurana, S. S. (2014, December). Segregated receive and relay scheme for communication in wireless sensor networks. In proceedings of International Conference on Parallel, Distributed and Grid Computing (PDGC), 2014 International Conference on (pp. 72-75). IEEE.

       3. Mantoo, B. A., & Khurana, S. S. (2020). Static, dynamic and intrinsic features based android malware detection using machine learning. In Proceedings of ICRIC 2019 (pp. 31-45). Springer, Cham.

Book Chapters

1. Khurana,S.S., Singh, M.,(2017). Vampire Attacks in Wireless Ad-hoc Networks, In Handbook of Research on Wireless Sensor Network Trends, Technologies and Applications. IGI- Global

 

2. Aimen, A., Hamid, S., Ahmad, S., Chisti, M. A., Khurana, S. S. and Kaur, A.  (2019), "Handover between Wi-Fi and WiMAX technologies using GRE tunnel," in Progress in Advanced Computing and Intelligent Engineering, ed: Springer, pp. 473-484.

 

3. Sidhu, S. and Khurana, S.S., 2020. Method to Rank Academic Institutes by the Sentiment Analysis of Their Online Reviews. In Handbook of Research on Emerging Trends and Applications of Machine Learning (pp. 1-26). IGI Global.

Research Guidance

M.Tech Dissertations: 50

Conference/ Workshops/Seminars Attended

1.Orientation Programme,  Organized by Academic Staff College, Guru Jambeshwar University of Science &   Technology,  Hisar.

2.Special Summer School, Organized by Human Resource Development Centre, Guru Nanak Dev University, Amritsar. ()

3. NKN Workshop held at IIT Guwahati on 22 august 2016

4. FDP on Machine Learning using Python from 24-07-2018 to 28-07-2018. Held at NITTTR Chandigarh.

5. National Workshop on Curriculum Design and Development (from 28-1-19 to 6-2-19.), Organized by CUPB, Bathinda under PMMMNMTT(MHRD) scheme.

6. One-week Short term course in Python Programming by NITTTR, Chandigarh organized in the Department of Computer Science & Technology from 22-07-2019 to 26-07-2019. 

7. One week ATAL Workshop on Data Sciences for Researchers organized in the Department of Computer Science & Technology from 16-12-2019 to 20-12-2019.

 

Conference/ Workshops/Seminars Organised
 

 

Invited Talks/ Resource Person
1. On topic entitled “Social Engineering and issues related to it”, Cyber Security Seminar on Dec. 23, 2014. Held at Army Cant., Bathinda.
2. On topic entitled “Role of Open Source Software Tools in Education”, International conference of the Learning Community on “Trends & Innovative Practices in Education: Future & Implications” on Mar. 03-04, 2015 at Ramgarhia College of Education Phagwara, Punjab.
3. On topic entitled “Cyber Security”, Cyber Security Seminar on Dec. 12, 2017. Held at Army Cant., Bathinda.
4. On topic entitled “Web Server Application Security”, Training Programme held at Army Cant., Bathinda (2019).
5. On topic entitled “Sql Injection”, Training Programme held at Army Cant., Bathinda on (2019).
6. In One Week AICTE- ATAL approved Faculty Development Program on “ARTIFICIAL INTELLIGENCE” organized at Central University of Punjab in 2019 on topic “Regression Techniques (Logistics & Linear)”.
7. In One Week AICTE- ATAL approved Faculty Development Program on “ARTIFICIAL INTELLIGENCE” organized at Central University of Punjab in 2019 on topic “Regression Techniques using Python”.
8. In One Week AICTE- ATAL approved Faculty Development Program on “ARTIFICIAL INTELLIGENCE” organized at Central University of Punjab in 2019 on topic “Supervised and Unsupervised Learning using Python”.
9. On topic entitled “Social Engineering”, in Information Warfare Awareness Week on 11-02-2021. Held at Air Force Station.
10. lecture in One Week AICTE- ATAL approved Faculty Development Program on “Quantum Information processing and applications. Title of talk: “Practical Training on Qiskit” CUPB Bathinda & AICTE 24 Aug 2021.
11. lecture in One Week National level workshop on ”Data Science Using Python”. Title of talk “Unsupervised Machine Learning Algorithms using Python” BFGI Bathinda 13-17 Sept. 2021.
12. lecture in One Week National level workshop on ”Data Science Using Python”. Title of talk “Supervised Machine Learning Algorithms using Python” BFGI Bathinda 13-17 Sept. 2021.
13. lecture in One Week National level workshop on ”Data Science Using Python”. Title of talk “Python Fundamentals” BFGI Bathinda 13-17 Sept. 2021.
Patent Filed/ Published
PATENT PUBLISHED

1. METHOD AND SYSTEM FOR IDENTIFICATION OF ISOMORPHS FOR JOHNSON AND STRONGLY REGULAR GRAPHS IN POLYNOMIAL TIME

2. METHOD AND SYSTEM FOR IDENTIFICATION OF ISOMORPHS FOR GENERALISED JOHNSON GRAPHS IN POLYNOMIAL TIME

3. METHOD AND SYSTEM FOR ASSIGNING UNIQUE LABELS TO ATOMS IN A CHEMICAL COMPOUND;

Citations

Citations: 108

h-Index:   05

i-Index:    03