About

Learn more about me đź”­

Machine Learning Engineer

An avid gamer with a zest for Reinforcement Learning and Robotics!

  • Date of Birth: 4 Nov 1998
  • Phone: +91-8376048185
  • City: Bangalore, India
  • College: Vellore Institute of Technology, Vellore
  • Degree: B.Tech (Electrical & Electronics)
  • Email: menon.uk1998@gmail.com

My research focuses on Reinforcement Learning based techniques and Genetic Algorithms that can be integrated into robots and video games to develop self-learning agents. I'm currently working on a variety of open-source projects, primarily on the Federated Learning and Distributed Computing Framework in the Raven Protocol community.

Currently, I'm seeking an R&D opportunity where I can utilize my technical skills and experience to develop functional products which will change the world.

Research Publications

Projects

Hours Of Gaming

Awards

Skills

Python 95%
C/C++ 85%
JavaScript 80%
Latex 85%
Unity 3D 80%
CUDA 75%

Interests

Reinforcement Learning

Artificial intelligence

Cryptography

Astrophysics

Genetic Algorithms

Computer Vision

Backend Development

Quantum Computing

SocketIO Programming

Electronics

Microcontrollers

Gaming

Testimonials

Energetic, enthusiastic, and with excellent interpersonal skills, this person is a wonder - and all in one (AIO), although he gives it a different meaning overall. He can get anything done when he puts his mind into it. From our first fun project on Ulam spirals to the current day, he remains an inspiration to me. Always thinking, coming up with fresh ideas, and implementing them to perfection. He has an immense thirst for knowledge, especially in the field of electronics, machine learning and AI.

Awnon Bhowmik

Doctor of Philosophy

Department of Mathematics

University of Central Florida

I have known this young man as a skillful programmer, a robotics enthusiast, a bright young researcher, and an excellent student at VIT University. Over the years, he has established himself as one with purpose, focus, honesty, and critical thinking. He demonstrates his ability to handle various aspects of Electrical Engineering, Machine Learning, and Al with ease.

Dr. Rashmi Ranjan Das

Associate Professor

School of Electrical Engineering

Vellore Institute of Technology, Vellore

As an Associate Professor from the Department of Energy and Power Electronics at VIT, I have mentored him for the past 4 years (2017 to 2021). He keeps himself abreast of the latest developments and goes through various technical literature which was evident from the numerous discussions and interviews that I have had with him.

Dr. Razia Sultana W

Associate Professor Grade 1

School of Electrical Engineering

Vellore Institute of Technology, Vellore

I know Mr.Unnikrishnan through a research paper he co-authored with me and I was the advisor for his final year Capstone Project on “Virtual Reality Surveillance Robot”. He has shown tremendous dedication and a desire to succeed in research and development since our first meeting in 2019. One outstanding quality I noticed in him was his caliber to swiftly adapt and increase his skill set to overcome technological challenges. His expertise in electrical hardware, which was flawlessly applied, astounded me as well.

Dr. P. Mahalakshmi

Professor, Department of Instrumentation

School of Electrical Engineering

Vellore Institute of Technology, Vellore

Professional Experience

Artificial Intelligence Engineer

Dec 2019 - May 2020

MellonAI, Chennai, India

  • Worked on multiple CV projects including head pose estimation, deep facial recognition, and emotion detection.

Education

Master of Technology

Artificial Intelligence and Machine Learning
Apr 2023 - Present

Birla Institute of Technology and Science, Pilani

Bachelor of Technology

Electrical and Electronics Engineering
2017 - 2021

Vellore Institute of Technology, Vellore

CGPA: 8.63

Higher Secondary Education (CBSE)

Mar 2016 - Mar 2017

Summer Fields School, New Delhi

Class 12 Boards: 94.2%

Extracurricular

Technical Head of Electrical Department

Feb 2019 - Feb 2020

roboVITics, the Official Robotics Club of VIT

  • Lead a technical team of robotics enthusiasts and successfully completed multiple projects involving Robotics, Reinforcement Learning, Artificial Intelligence, IoT etc.

Awards

Achievements đź’«

Top 15 Finalist

MakeMIT 2021

Winner of Urban Innovation Track

HackMIT 2020

Winner

HackerTech 2019

Winner

VIT Hack 2019

Access Denied Hack 2019

Developer's Sprint of Code 2019

Quora Top Writer 2018

6 Near Earth Object Observations

All India Asteroid Search Campaign

Research

My Publications 🚀

A Hybrid Autoencoder Architecture for Text Encryption

Date of Conference: 27-29 Nov. 2021

Publisher: IEEE

Conference: 2021 Innovations in Power and Advanced Computing Technologies (i-PACT)

Location: Kuala Lumpur, Malaysia

Abstract: With the advent of modern computing technologies, there is a wide scope for introduction of advanced and highly secure encryption standards that cannot be rendered obsolete even when subjected to these techniques. This paper introduces one such encryption paradigm, implemented using autoencoders. The proposed algorithm trains an autoencoder to replicate an input 8-bit ASCII value and takes advantage of the bottle-neck architecture to encrypt the data in a way that can only be retrieved using the trained weights. Various analyses are utilized to exemplify the speed as well as security of the proposed cryptosystem.

Authors: Unnikrishnan Menon, Anirudh Rajiv Menon, Atharva Hudlikar, Dr. A. Sharmila and Dr. P. Mahalakshmi

An adaptive cryptosystem on a Finite Field

Published: Aug 16, 2021

Journal: PeerJ Computer Science

Abstract: Owing to mathematical theory and computational power evolution, modern cryptosystems demand ingenious trapdoor functions as their foundation to extend the gap between an enthusiastic interceptor and sensitive information. This paper introduces an adaptive block encryption scheme. This system is based on product, exponent, and modulo operation on a finite field. At the heart of this algorithm lies an innovative and robust trapdoor function that operates in the Galois Field and is responsible for the superior speed and security offered by it. Prime number theorem plays a fundamental role in this system, to keep unwelcome adversaries at bay. This is a self-adjusting cryptosystem that autonomously optimizes the system parameters thereby reducing effort on the user’s side while enhancing the level of security. This paper provides an extensive analysis of a few notable attributes of this cryptosystem such as its exponential rise in security with an increase in the length of plaintext while simultaneously ensuring that the operations are carried out in feasible runtime. Additionally, an experimental analysis is also performed to study the trends and relations between the cryptosystem parameters, including a few edge cases.

Authors: Awnon Bhowmik and Unnikrishnan Menon

A Novel Chaotic System for Text Encryption Optimized with Genetic Algorithm

Published: November 1, 2020

Journal: International Journal of Advanced Computer Science and Applications(IJACSA), 11(10), 2020

Abstract: With meteoric developments in communication systems and data storage technologies, the need for secure data transmission is more crucial than ever. The level of security provided by any cryptosystem relies on the sensitivity of the private key, size of the key space as well as the trapdoor function being used. In order to satisfy the aforementioned constraints, there has been a growing interest over the past few years, in studying the behavior of chaotic systems and their applications in various fields such as data encryption due to characteristics like randomness, unpredictability and sensitivity of the generated sequence to the initial value and its parameters. This paper utilizes a novel 2D chaotic function that displays a uniform bifurcation over a large range of parameters and exhibits high levels of chaotic behavior to generate a random sequence that is used to encrypt the input data. The proposed method uses a genetic algorithm to optimize the parameters of the map to enhance security for any given textual data. Various analyses demonstrate an adequately large key space and the existence of multiple global optima indicating the necessity of the proposed system and the security provided by it.

Authors: Unnikrishnan Menon, Anirudh Rajiv Menon and Atharva Hudlikar

Dragon Crypto - An Innovative Cryptosystem

Published: June 18, 2020

Journal: International Journal of Computer Applications 176(29):37-41

Abstract: In recent years cyber-attacks are continuously developing. This means that hackers can find their way around the traditional cryptosystems. This calls for new and more secure cryptosystems to take their place. This paper outlines a new cryptosystem based on the dragon curve fractal. The security level of this scheme is based on multiple private keys, that are crucial for effective encryption and decryption of data. This paper discusses, how core concepts emerging from fractal geometry can be used as a trapdoor function for this cryptosystem.

Authors: Awnon Bhowmik and Unnikrishnan Menon

MES – Modern Encryption Standard

Published: July 16, 2020

Journal: International Journal of Computer Applications 176(36):21-27

Abstract: As mathematical theory has evolved and computing capabilities have improved, what initially seemed to be adequately difficult trapdoor functions, were deemed not to be later. In this paper, a new block-encryption scheme named Modern Encryption Standard (MES) is proposed based on the multiple concepts arising from number theory for a highly secure and fast cryptosystem that can be considered as an alternative to the existing systems. This is a block cipher like AES, but the inherent algorithm is quite different. The security of the proposed MES algorithm stands on the fundamentals of the Chinese Remainder Theorem, Cantor Pairing Function and the Prime Number Theorem for creating an ingenious trapdoor function. Breaking this algorithm proves to be quite a daunting obstacle to overcome for an unwelcome interceptor.

Authors: Awnon Bhowmik and Unnikrishnan Menon

An Efficient Application of Neuroevolution for Competitive Multiagent Learning

Published: June 25, 2021

Journal: Transactions on Machine Learning and Artificial Intelligence, 9(3). 01-13

Abstract: Multiagent systems provide an ideal environment for the evaluation and analysis of real-world problems using reinforcement learning algorithms. Most traditional approaches to multiagent learning are affected by long training periods as well as high computational complexity. NEAT (NeuroEvolution of Augmenting Topologies) is a popular evolutionary strategy used to obtain the best performing neural network architecture often used to tackle optimization problems in the field of artificial intelligence. This paper utilizes the NEAT algorithm to achieve competitive multiagent learning on a modified pong game environment in an efficient manner. The competing agents abide by different rules while having similar observation space parameters. The proposed algorithm utilizes this property of the environment to define a singular neuroevolutionary procedure that obtains the optimal policy for all the agents. The compiled results indicate that the proposed implementation achieves ideal behaviour in a very short training period when compared to existing multiagent reinforcement learning models.

Authors: Unnikrishnan Menon and Anirudh Rajiv Menon

Design and Evaluation of Electric Bus Systems for Metropolitan Cities

Published: October 26, 2020

Journal: SSRG International Journal of Mechanical Engineering 7(10), 16-23

Abstract: Over the past decade, most of the metropolitan cities across the world have been witnessing a degrading trend in air quality index. Exhaust emission data observations show that promotion of public transport could be a potential way out of this gridlock. Due to environmental concerns, numerous public transport authorities harbor a great interest in introducing zeroemission electric buses. A shift from conventional diesel buses to electric buses comes with several benefits in terms of reduction in local pollution, noise, and fuel consumption. This paper proposes the relevant vehicle technologies, powertrain, and charging systems, which, in combination, provides a comprehensive methodology to design an Electric Bus that can be deployed in metropolitan cities to mitigate emission concerns.

Authors: Unnikrishnan Menon and Divyani Panda

Scytale - An Evolutionary Cryptosystem

Published: August 5, 2020

Journal: International Journal of Computer Science and Network, Volume 9, Issue 4

Abstract: With the advent of quantum computing, and other advancements in computation and processing capabilities of modern systems, there arises a need to develop new trapdoor functions that will serve as the foundation for a new generation of encryption schemes. This paper explores the possibility of one such potential trapdoor function using concepts stemming from Reversible Cellular Automata (RCA) - specifically, the Critter’s Rule set up in a Margolus Neighborhood. The proposed block encryption algorithm discusses how sensitive data can be manipulated and converted efficiently into a two dimensional sequence of bits, that can be iteratively evolved using the rules of the RCA and a private key to achieve a desirable level of encryption within a reasonable runtime. The performance benchmark and analysis results exemplify how well the proposed encryption algorithm stands against different forms of attacks.

Authors: Unnikrishnan Menon, Atharva Hudlikar and Divyani Panda

Enhancing the NTRU Cryptosystem

Published: June 18, 2020

Journal: International Journal of Computer Applications 176(29):46-53

Abstract: NTRU is an open-source public key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. Unlike other popular public-key cryptosystems, it is resistant to attacks using Shor's Algorithm and its performance has been shown to be significantly greater. This paper talks about how Koblitz encoding from Elliptic Curve Cryptography (ECC) can be used to convert each character in a dataset to a point on an elliptic curve. A sum of squares analogy is pitted against the cantor pairing function to turn the point to a single number, which is converted to a sequence of coefficients in ℤ. A polynomial is then generated for each of these characters. Then the polynomial is reduced, and then shown that choosing appropriate parameters for the cryptosystem can make it highly secure and that the decryption algorithm turns out taking linear time. Since each character is represented by its own polynomial, it increases obscurity thereby increasing the complexity for decryption and thus the security level. A form of data compression has also been implemented and it has been tested whether data compression and expansion during the encryption-decryption process results in original data with no or minimal loss.

Authors: Awnon Bhowmik and Unnikrishnan Menon

Projects

Highlights đź› 

Rummy RL

Target Chaser

Path Prediction for Smart Vehicles

Contact

Contact Međź“Ť

Social Profiles

Email Me

menon.uk1998@gmail.com

Work Address

Matelabs Innovations Pvt Ltd, 3rd Floor, 1507, 19th Main Rd, 11th Cross Rd, Bengaluru, Karnataka 560102

Call Me

+91-8376048185