Story Timeline
A narrative timeline of work, research, and projects designed for readability across all devices.
Tip: Tap any card to expand for details. On desktop, use arrow keys to browse the project and research showcase.
work
Production-grade backend engineering in banking and payments, focused on reliability, security, and transaction integrity at scale.
Hint: Click a role to expand highlights.
Java Developer — Mindgate Solutions Backend developer working on high-volume transaction systems, bulk corporate payments, and critical banking infrastructure. 7 mo · Jul 2, 2025 – Present Skills JavaSpring BootMicroservicesOracleDBPostgreSQLPaymentsTransactions
- Building and maintaining production banking and payment platforms.
- Responsibilities:
- - Backend transaction processing and validation
- - Bulk corporate payment workflows
- - Critical infrastructure improvements and reliability work
- - Auditability, reconciliation, and traceability
- - Performance and resiliency tuning
- - Java, Spring Boot, microservices
- - OracleDB and PostgreSQL
Notes emphasize production constraints: idempotency, reconciliation, audit trails, deterministic error handling, and operational safety.
projects
Selected engineering systems spanning secure banking platforms, web builds, tooling, and applied prototypes.
Hint: Select a card to see the deep‑dive panel. Tap to expand on mobile.
WiFi Trolley Bot — ESP32 WiFi-controlled trolley bot built on ESP32 with real-time control logic.
- Designed an ESP32-based trolley bot with wireless control capability.
- Highlights:
- - ESP32 WiFi control
- - Motor control and navigation
- - Lightweight firmware structure
- - Hardware-software integration
Hands-on embedded project emphasizing control logic and reliable WiFi command handling.
- Abinash S — Co-Creator
- Srivatsan N — Co-Creator
- HariPrasad — Co-Creator
Conference Site Website for SASTRA ICMAT conference with a structured flow for paper submissions.
- Built the ICMAT conference site for SASTRA, focused on clear submission flow and accessible event information.
- Highlights:
- - Paper submission guidance and calls
- - Schedule and speaker section layout
- - Clean, responsive UI
- - Structured content sections
Designed to minimize confusion around submission requirements and keep deadlines and tracks easy to find.
Theta2k23 — Event Web Presence Fest site for SASTRA Theta2k23 with fast access to events and updates.
- Created a fest website for Theta2k23, highlighting event lists, announcements, and quick navigation.
- Highlights:
- - Compact, focused content
- - Mobile-first layout
- - Simple navigation flow
- - Event-centric sections
Prioritizes speed and clarity for event attendees on mobile.
Hell Pine — VS Code Theme Extension Forked from Rosé Pine and customized for higher contrast and personal workflow.
- Built a VS Code theme by forking Rosé Pine and customizing colors for clarity and long coding sessions.
- Highlights:
- - Rosé Pine base with tuned contrasts
- - Adjusted token colors for readability
- - Extension packaging and publishing
- - Consistent UI appearance
Theme focuses on readability and personalized color balance without losing the Rosé Pine character.
TheGlobe — Freelance Web Build Website for a digital marketing organization with a clean, business-first layout.
- Delivered a freelance website for a digital marketing company, emphasizing clear service presentation and client trust.
- Highlights:
- - Business-focused information architecture
- - Responsive layout and performance
- - Clean components and styling system
- - Client-ready delivery
Focused on clarity, credibility, and a solid handoff for client ownership.
Neovim Configuration — nvim Modern Neovim setup for development speed, ergonomics, and consistent tooling.
- Curated Neovim configuration focused on developer velocity.
- Highlights:
- - Modular Lua configuration
- - LSP and formatter integration
- - Fast startup and workflow shortcuts
- - Opinionated plugin setup
Config-first productivity project with an emphasis on speed and maintainability.
- Designed an ESP32-based trolley bot with wireless control capability.
- Highlights:
- - ESP32 WiFi control
- - Motor control and navigation
- - Lightweight firmware structure
- - Hardware-software integration
Hands-on embedded project emphasizing control logic and reliable WiFi command handling.
- Abinash S — Co-Creator
- Srivatsan N — Co-Creator
- HariPrasad — Co-Creator
- Built the ICMAT conference site for SASTRA, focused on clear submission flow and accessible event information.
- Highlights:
- - Paper submission guidance and calls
- - Schedule and speaker section layout
- - Clean, responsive UI
- - Structured content sections
Designed to minimize confusion around submission requirements and keep deadlines and tracks easy to find.
- Created a fest website for Theta2k23, highlighting event lists, announcements, and quick navigation.
- Highlights:
- - Compact, focused content
- - Mobile-first layout
- - Simple navigation flow
- - Event-centric sections
Prioritizes speed and clarity for event attendees on mobile.
- Built a VS Code theme by forking Rosé Pine and customizing colors for clarity and long coding sessions.
- Highlights:
- - Rosé Pine base with tuned contrasts
- - Adjusted token colors for readability
- - Extension packaging and publishing
- - Consistent UI appearance
Theme focuses on readability and personalized color balance without losing the Rosé Pine character.
- Delivered a freelance website for a digital marketing company, emphasizing clear service presentation and client trust.
- Highlights:
- - Business-focused information architecture
- - Responsive layout and performance
- - Clean components and styling system
- - Client-ready delivery
Focused on clarity, credibility, and a solid handoff for client ownership.
- Curated Neovim configuration focused on developer velocity.
- Highlights:
- - Modular Lua configuration
- - LSP and formatter integration
- - Fast startup and workflow shortcuts
- - Opinionated plugin setup
Config-first productivity project with an emphasis on speed and maintainability.
research
Academic research in cybersecurity and applied machine learning, centered on intrusion detection models and IIoT datasets.
Hint: Select a card to see the deep‑dive panel. Tap to expand on mobile.
HGCNN–LSTM Intrusion Detection Hybrid deep-learning intrusion detection system for cyber-physical networks.
- Hybrid IDS model combining Hierarchical Gated CNN (HGCNN) for spatial feature extraction and LSTM for temporal sequence modeling.
- Key Contributions:
- - HGCNN + LSTM end-to-end pipeline
- - Multi-class CPS attack detection
- - Evaluation on IIoT benchmark data
- - Clear ablation and error analysis
Notebook-driven experiments detailing preprocessing, feature engineering, and model training with reproducible metrics.
- Abinash S — Author
- Priyanga S — Author, Project Guide
- Srivatsan N — Author
Intrusion Detection System (IIoT) — Hybrid CNN + LSTM Deep-learning IDS for IIoT networks using a hybrid CNN + LSTM approach.
- Hybrid CNN + LSTM IDS designed to detect malicious IIoT traffic with improved accuracy on benchmark data.
- Highlights:
- - UNSW-NB15 benchmark dataset
- - CNN for attack event detection
- - LSTM for temporal sequence modeling
- - Focus on lowering misclassification and false alarms
Notebook-driven workflow with clear dataset preprocessing, model training, and evaluation steps.
- Abinash S — Author
- Priyanga S — Author, Project Guide
- Srivatsan N — Author
HGCNN-LSTM — Cyber Attack Detection in Cyber-Physical Systems Data-driven intrusion detection research using HGCNN + LSTM for CPS environments.
- Research implementation focused on cyber-physical system security.
- Highlights:
- - HGCNN + LSTM architecture
- - Sequence modeling for CPS data
- - Multi-class detection focus
- - Reproducible notebook workflow
Detailed model notebook includes preprocessing, training curves, and confusion-matrix evaluation.
- Abinash S — Author
- Priyanga S — Author, Project Guide
HyperCoar-DAM — Robust IDS for IIoT Networks Robust intrusion detection approach focused on IIoT network protection.
- Research prototype targeting robust IDS performance in IIoT.
- Highlights:
- - Robust detection objective
- - Focus on IIoT threat resilience
- - Notebook-based workflow
- - Reproducible experimentation
Research artifact documents robustness-focused training and evaluation within Jupyter notebooks.
- Abinash S — Author
- Priyanga S — Author, Project Guide
- Srivatsan N — Author
Genetic Programming Approach for Advanced Persistent Threat Detection Tree-based genetic programming approach for APT detection on highly imbalanced cyber-attack data.
- Research project targeting APT detection using a tree-based genetic programming algorithm trained on highly imbalanced data (99:1).
- Highlights:
- - Genetic programming classifier (tree-based)
- - Handles extreme class imbalance (99:1)
- - Python-based experimentation pipeline
- - Reproducible training and evaluation workflow
Focuses on imbalance-aware training and GP-driven model evolution for minority attack detection.
- Abinash S — Author
- Priyanga S — Author, Project Guide
- Srivatsan N — Author
- Hybrid IDS model combining Hierarchical Gated CNN (HGCNN) for spatial feature extraction and LSTM for temporal sequence modeling.
- Key Contributions:
- - HGCNN + LSTM end-to-end pipeline
- - Multi-class CPS attack detection
- - Evaluation on IIoT benchmark data
- - Clear ablation and error analysis
Notebook-driven experiments detailing preprocessing, feature engineering, and model training with reproducible metrics.
- Abinash S — Author
- Priyanga S — Author, Project Guide
- Srivatsan N — Author
- Hybrid CNN + LSTM IDS designed to detect malicious IIoT traffic with improved accuracy on benchmark data.
- Highlights:
- - UNSW-NB15 benchmark dataset
- - CNN for attack event detection
- - LSTM for temporal sequence modeling
- - Focus on lowering misclassification and false alarms
Notebook-driven workflow with clear dataset preprocessing, model training, and evaluation steps.
- Abinash S — Author
- Priyanga S — Author, Project Guide
- Srivatsan N — Author
- Research implementation focused on cyber-physical system security.
- Highlights:
- - HGCNN + LSTM architecture
- - Sequence modeling for CPS data
- - Multi-class detection focus
- - Reproducible notebook workflow
Detailed model notebook includes preprocessing, training curves, and confusion-matrix evaluation.
- Abinash S — Author
- Priyanga S — Author, Project Guide
- Research prototype targeting robust IDS performance in IIoT.
- Highlights:
- - Robust detection objective
- - Focus on IIoT threat resilience
- - Notebook-based workflow
- - Reproducible experimentation
Research artifact documents robustness-focused training and evaluation within Jupyter notebooks.
- Abinash S — Author
- Priyanga S — Author, Project Guide
- Srivatsan N — Author
- Research project targeting APT detection using a tree-based genetic programming algorithm trained on highly imbalanced data (99:1).
- Highlights:
- - Genetic programming classifier (tree-based)
- - Handles extreme class imbalance (99:1)
- - Python-based experimentation pipeline
- - Reproducible training and evaluation workflow
Focuses on imbalance-aware training and GP-driven model evolution for minority attack detection.
- Abinash S — Author
- Priyanga S — Author, Project Guide
- Srivatsan N — Author