Prince Bhardwaj

Prince Bhardwaj

Computer Scientist

Hi, I’m Prince Bhardwaj, a researcher in computer systems and security.
My work spans energy-efficient systems at Samsung R&D and deepfake detection at Ben-Gurion University.
I’m passionate about AI, cybersecurity, and high-performance computing.

Experience

present

Research Engineer at University of Surrey

Penetration Tester at CyRAACS Pvt Ltd

Research Intern at Samsung Research Center, India

Reduced energy consumption in HTAP systems with user-space scheduling xAPPs. HTAP, xAPP, user-space scheduling, energy efficiency, performance optimization, machine learning.

Visitng Research Student at Ben-Gurion University of the Negev, Israel

Combating Deepfakes: Machine Learning for Content Authenticity Verification, Implemented algorithms & neural networks Showcasing innovation in fighting deceptive media.

present

Research Student at SRM University, India

Member of research team in the field of Cyber Security. Safeguarding Smart Homes: ML-powered DDoS Mitigation for IoT Networks, Designed & implemented mitigation system, Leveraged machine learning, Ensured minimal energy consumption.

Education

Bachelor in Information Technology
  from SRM Institute of Science & Technology, Chennai with GPA of 9.1/10

Computer Hacker and Forensics Investigator

Projects

Open-Source Inspector (OSI) :

Employed advanced Machine Learning algorithms to identify trustworthy contributors and analyze security vulnerabilities in open-source projects.

SimpleDB :

A built-from-scratch database management system that supports most of the basic SQL and advanced features including indexing and table joins.

Mini - Compiler :

A compiler for an educational C_subset language. Implenetation includes the full stack of compiler construction.

Coding-Fingers :

A terminal themed typewriting practice website for students. Handled 500+ traffic uses per day, built to help students improve their typing skills and learn the basics of the terminal.

Publications

IoT Under Attack: Designing Techniques for Mitigating Energy-Oriented DDOS Attacks on Smart Home Networks by Springer

Paper accepted in NIELIT’s International Conference on Communication, Electronics and Digital Technologies (NICEDT – 2024) and publishing under Scopus indexed Springer Journal.

OPEN - SOURCE INSPECTOR: A Comprehensive Analysis for Open-Source Security by Scopus Indexed

Paper accepted in Hinweis Second International Conference on Advanced Research in Engineering and Technology (ARET)

Awards

Best Performer in Ben-Gurion Summer Program
  from Ben-Gurion University of the Negev, Israel

Awarded for outstanding performance in Ben-Gurion Summer Program

Research Student
  from Stanford University, USA

Accepted as Research Student in Stanford School of Computing

Best Research Paper Award 2023 at National Conference on Cyber Security
  from DRDO, India

Paper accepted in DRDO’s National Conference on Cyber Security (NCCS - 2023)

Computer Hacking & Forensics Investigator v10
  from EC-Council

Recognized by EC-Council as a Computer Hacking & Forensics Investigator v10 with a score of 86%

Security, Compliance and Identity Fundamentals
  from Microsoft

Recognized by Microsoft as a Security, Compliance and Identity Fundamentals with a score of 80%

Volunteer

present

President at Community of Hackers and Advanced Technologists (CHAT)

Highlights

    present

    Tech Lead at Logic Players Club, SRMIST

    Highlights

      Languages

      Hindi
      Fluency: Native speaker
      English
      Fluency: Fluent
      Tamil
      Fluency: Fluent
      German
      Fluency: elementary proficiency

      Skills

      Programming Languages
      Level: Intermediate
      Keywords:
      • C
      • C++
      • Python
      • JavaScript
      • Structed Query Language
      • BASH/SHELL Scripting
      • CodeQL
      Operating Systems
      Level: Master
      Keywords:
      • Windows
      • Linux
      Software & Packages
      Level: Intermediate
      Keywords:
      • Bash
      • Python
      • VScode
      • Debugging
      • Docker
      • Git/GitHub
      • Jupyter Notebook
      • Wireshark
      • Burp Suite
      • Metasploit
      • Nmap
      • Ghidra
      • IDA Pro
      • Autopsy
      • Volatility
      • Azure cloud
      • NodeJS
      • Postman
      • Microsoft Office
      • Google Suite
      Digital Forensics
      Level: Intermediate
      Keywords:
      • Memory Forensics
      • Network Forensics
      • File System Forensics
      • Mobile Forensics
      • Incident Response
      • Forensic Reporting
      • Forensic Techniques
      Open Source Contributor
      Level: Intermediate
      Networking
      Level: Intermediate
      Keywords:
      • Tcp/IP
      • ISO Model
      • Network Security
      • Network Design
      Sociability
      Level: Master
      Keywords:
      • Leadership
      • Affable