Skip to content
View sonali6062's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report sonali6062

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
sonali6062/README.md

Hi there πŸ‘‹, I'm Sonali

πŸ” Cybersecurity Enthusiast | 🌱 Machine Learning Explorer | πŸ‘©β€πŸŽ“ M.Tech @ NIT Jamshedpur


Profile Views

πŸ‘©β€πŸ’» About Me

πŸ”­ Currently pursuing M.Tech in Information System Security Engineering at NIT Jamshedpur, where I bridge the worlds of secure systems and intelligent machines.
🌱 Passionate about all things Cybersecurity, Machine Learning, and Applied AI.

πŸ§ͺ I love experimenting with:

  • πŸ” Vulnerability detection & secure software design
  • πŸ€– AI-based solutions for real-world applications
  • 🧠 Deep learning, NLP, and image recognition

πŸŽ“ Mentored under industry-grade training and real-time project work through internships and hackathons.

πŸ’¬ Let’s collaborate if you're working on: ML for security, intelligent systems, or cool backend tools.
πŸ“« Drop a mail at: sonalikumari6062@gmail.com
πŸ“Ί Or catch my tutorials on YouTube: Code with Daisy


πŸ’Ό Cybersecurity & Machine Learning Gigs

πŸ” Security-Focused Development

  • Designed and implemented an advanced image encryption system leveraging chaotic maps (e.g., Logistic, Tent, or Henon maps) to generate highly secure, non-linear cryptographic keys.
  • Integrated chaotic key generation with pixel-level transformations to encrypt images with high sensitivity, entropy, and resistance to brute-force and statistical attacks.
  • Applied principles from information theory and cryptography to simulate and analyze system robustness for secure image transmission and storage.
  • Explored information system assurance, secure coding practices, and cryptographic algorithm design in academic and applied settings.

πŸ€– Applied Machine Learning & AI

  • Intern @ The Sparks Foundation: Developed machine learning pipelines using Python, scikit-learn, and pandas, focusing on regression/classification tasks and model performance optimization.
  • Built and trained CNN-based models for plant disease detection, integrating real-time image processing and predictive analysis into a user-friendly web platform.
  • Developed an end-to-end ML-powered full stack application where users upload images of plant leaves through a web interface to:
    • πŸ” Detect the disease,
    • πŸ’Š Display the cure, and
    • πŸ›‘οΈ Recommend preventive measures to avoid recurrence.
  • Implemented data pipelines, data preprocessing, and visualization dashboards to monitor model behavior and performance metrics.

πŸ§ͺ Automation & Quality Engineering

  • Completed professional training in Automation Testing using Java and Selenium, improving QA efficiency for backend and ML-integrated systems.
  • Designed automated test cases for web apps and model-serving interfaces, ensuring end-to-end functionality, data integrity, and user experience reliability.
  • Built reusable test suites to simulate real-world user behavior and validate robustness across system components.

πŸ› οΈ Languages, Tools & Technologies

πŸš€ Languages

C C++ Python Java

🧰 Frameworks & Libraries

Django TensorFlow

πŸ—„οΈ Databases

MySQL Oracle

πŸ§‘β€πŸ’» Tools & Platforms

Git GitHub Anaconda VS Code

πŸ€– Machine Learning & Data Science

Machine Learning Deep Learning Scikit-learn Pandas NumPy Matplotlib TensorFlow Keras Data Preprocessing


πŸ” Research Domain- Network Security,Cryptography & Encryption,Privacy and Data Protection

πŸ›°οΈ Securing the future of image and video communication in an increasingly connected world.

This research explores cutting-edge techniques to make image and video transmission safer over potentially insecure networks. Our focus spans multiple dimensions of visual security:

πŸ” Key Focus Areas

  • πŸ›‘οΈ End-to-End Encryption for real-time visual data streams
  • 🧠 AI-powered Tamper & Spoof Detection to identify unauthorized modifications
  • πŸ‘οΈβ€πŸ—¨οΈ Visual Privacy Techniques β€” including transforming the data converted to unreadable format
  • πŸ“‘ Secure Streaming Protocols with integrity verification and low-latency encryption

πŸ’‘ Research Supervisor: [Prof. Alekha Kumar Mishra] πŸ›οΈ Institution: National Institute of Technology (NIT), Jamshedpur
πŸ§ͺ Department: Computer Science & Engineering

This work aims to build a foundation for trustworthy, private, and tamper-resistant visual communication across digital platforms.


πŸŽ“ Certifications & Training

  • πŸŽ“ Summer Trainee – ICT Academy, IIT Kanpur (C & C++)
  • πŸ’» Automation Testing – Internshala (Java + Selenium)
  • 🧠 GATE CS 2024 Qualified

πŸ… Achievements

  • πŸ₯‡ 1st Place (Agri Domain) – IEEE JU Hackathon 2021
  • πŸ”₯ Built and presented innovative ML systems at national-level competitions
  • 🧠 Solved 180+ LeetCode Problems
  • 🌍 Girlscript Scholar – Education Outreach Program

πŸ“ˆ GitHub Stats

Sonali's GitHub stats Sonali's Top Languages

GitHub Streak


πŸ”— Let's Connect


πŸ’‘ "Engineering intelligent defenses-where AI meets cybersecurity"

Pinned Loading

  1. Cotton_plant_disese_detection Cotton_plant_disese_detection Public

    HTML 1

  2. Employee-Management-System Employee-Management-System Public

    Employee Management System using Django A web-based Employee Management System built with the Django framework. This system enables organizations to efficiently manage employee records through a c…

    Python

  3. EncryptoLog-Logistic-Chaos-for-Image-Security EncryptoLog-Logistic-Chaos-for-Image-Security Public

    This project implements image encryption using the Logistic Map, a well-known chaotic system known for its sensitivity to initial conditions and control parameters. The encryption technique ensures…

    Jupyter Notebook

  4. CS4215-Database-security-lab CS4215-Database-security-lab Public

    CS4215 This course is offered by the Prof. Chandrashekhar Azad Sir @nit jsr, this repo contains the problem statement I did in CS771-Intro to Database Security course.

    1 2