Skip to main content

Shreya Girish Savadatti

Carnegie Mellon University
INI
Education
Masters in cybersecurity at CMU
Advisor: David Varodayan
Profile

Awards: Raman Research Award, Vellore Institute of Technology, 2024, Received for the research publication "Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing"

Research

My research focuses on the intersection of quantum computing, cybersecurity, and machine learning, with particular emphasis on developing practical quantum algorithms for real-world security applications. I am deeply interested in exploring how quantum computational advantages can address critical challenges in threat detection, cryptographic systems, and secure data processing.

My work spans several key areas: quantum machine learning for healthcare diagnostics, where I pioneered the application of quantum kernels to kidney disease prediction using QSVM with custom feature maps; quantum cryptography and privacy-preserving computation, including comprehensive analysis of Quantum Fully Homomorphic Encryption (QFHE) schemes and novel memory management architectures; and quantum-enhanced cybersecurity, demonstrated through my recent development of a Hybrid Quantum-Insider-Agent framework using Variational Quantum Circuits for insider threat detection.

With a strong foundation in both theoretical quantum information processing (IBM Quantum certifications) and practical security implementation (Google Cybersecurity Certificate, hands-on experience with penetration testing and incident response), I am positioned to bridge the gap between quantum computing theory and applied cybersecurity solutions. My publications in leading venues (IEEE Access, Springer Nature, Wiley) and patent on quantum ML demonstrate my commitment to advancing the field through rigorous research and innovation.

I am particularly excited about opportunities to collaborate on quantum algorithm development, quantum security protocols, and the practical implementation of quantum technologies to solve pressing cybersecurity challenges in an era of evolving threats and quantum computational capabilities.

Recent Publications

Patent: Quantum ML for CKD Detection using QSVM with Custom Feature Map

Deemed patentable by Indian Patent Office, selected by VIT for filing | Inventor

First application of quantum kernels to kidney disease prediction featuring novel integration of LASSO feature selection, sparse autoencoder augmentation, and domain-tuned quantum feature maps to improve early CKD detection sensitivity on imbalanced clinical datasets.

Analysis of Quantum Fully Homomorphic Encryption Schemes and Hierarchical Memory Management for QFHE Springer Nature - Complex & Intelligent Systems | First Author | 4 citations. Conducted comprehensive survey of two QFHE schemes analyzing impact and security considerations, and proposed hierarchical memory management system using a quantum cache and reinforcement learning agent for dynamic data placement optimization.

A Comprehensive Taxonomy of Jamming Attacks on 5G Networks. Wiley Journal | First Author | 10 citations. Developed first taxonomy for 5G jamming attacks across six dimensions including attack techniques, jammer characteristics, and countermeasure strategies, validated through real-world case studies from Ukraine, South China Sea, and Cuba.

Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing. IEEE Access | First Author | 11 citations. Comprehensive survey of DLT systems focusing on scalability solutions, exploring use cases in healthcare and supply chain management with emphasis on security, scalability, practical applications, compliance, and governance.

A Bibliometric Analysis of Agent-based Systems in Cybersecurity and Broader Security Domains: Trends and Insights. IEEE Access | First Author | 6 citations. Bibliometric study analyzing over 1,500 publications on agent-based systems and cybersecurity intersection using WOS database, mapping thematic clusters and identifying key collaboration networks.

Analyzing RSA, AES, and ECC across 13 Critical Factors in the Healthcare Domain International Conference on Next Generation Communication & Information Processing | First Author | 1 citation. Evaluated RSA, AES, and ECC encryption schemes against 13 factors, highlighting trade-offs in memory use, key length, and encryption speed for healthcare security applications.