II B.Tech, II - Semester (R23) Supplementary Examinations, September-2025. II B.Tech, II - Semester (R20) Supplementary Examinations, September-2025. II B.Tech, II - Semester (R19) Supplementary Examinations, September-2025. I B.Tech, II - Semester (R23) Supplementary Examinations, September-2025. I B.Tech, II - Semester (R20) Supplementary Examinations, September-2025. I B.Tech, II - Semester (R19) Supplementary Examinations, September-2025. II B.Tech, II - Semester (R23) Supplementary Examinations, September-2025. II B.Tech, II - Semester (R20) Supplementary Examinations, September-2025. II B.Tech, II - Semester (R19) Supplementary Examinations, September-2025. I B.Tech, II - Semester (R23) Supplementary Examinations, September-2025. I B.Tech, II - Semester (R20) Supplementary Examinations, September-2025. I B.Tech, II - Semester (R19) Supplementary Examinations, September-2025. 1-2 &2-2 Revaluation Notification-June/July 2025 Results of 2-2 End Semster Examination held in June/July-2025 Results of 1-2 End Semster Examination held in June/July-2025 III B TECH II SEM (R19) SUPPLE NOTIFICATION-AUG-2025 III B TECH II SEM (R20) SUPPLE NOTIFICATION-AUG-2025 III BTECH II SEM (R19) SUPPLE TIME TABLE-AUG 2025 III BTECH II SEM (R20) SUPPLE TIME TABLE-AUG 2025 M TECH (R19) II SEM SUPPLE TIME TABLE JUL 2025 M TECH (R22) II SEM REG & SUPPLE TIME TABLE JUL 2025 I M TECH II SEM (R19) SUPPLE NOTIFICATION-JULY-2025 I M TECH II SEM (R22) REG & SUPPLE NOTIFICATION-JULY-2025 AICTA -2025 3rd International Conference at Lendi - Springer Publications 3-2 Revaluation Notification(June 2025) Results of 3-2 End Semster Examination held in May-2025 Results of 4-2 End Semster Examination held in May-2025 Lendi Institute of Engineering and Technology (LIET) achieved NBA Tier-1 status for CSE| ECE | EEE | Mechanical engineering programmes for the academic years 2025-26 to 2027-28. II B TECH, II-SEM (R19) END EXAM TIME TABLE II B TECH, II-SEM (R20) END EXAM TIME TABLE II B TECH, II-SEM (R23) END EXAM TIME TABLE I B TECH, II-SEM (R19) END EXAM TIME TABLE I B TECH, II-SEM (R20) END EXAM TIME TABLE I B TECH, II-SEM (R23) END EXAM TIME TABLE II B TECH, II-SEM (R23) MID-II TIME TABLE I B TECH, II-SEM (R23) MID-II TIME TABLE Faculty Recruitment 2025-26- CSE(AIML) Summer Internship -Industry-Oriented Internship on Semiconductor Technology, Embedded Systems & AI Offered by ECE Dept Faculty Recruitment for the AY 2025-26 4-2 B.Tech(R19) Supply Timetable-May, 2025 4-2 B.Tech(R19) Supply Timetable-May, 2025 3-2 B.Tech(R19) Supply Timetable-May, 2025 3-2 B.Tech(R20) Regular/Supply Timetable-May, 2025 3-2 B.Tech(R19) Supply Notifcaton-May, 2025 3-2 B.Tech(R20) Regular/Supply Notifcaton-May, 2025 3-2 B.Tech(R19)Supple Notification(May 2025) 3-2 B.Tech(19)Supple Timetable(May 2025) 3-2 B.Tech(R20)Regular/Supple Timetable(May 2025) 3-2 B.Tech(R20)Regular/Supple Notification-May 2025 NIRF-2025 Data for Engineering Colleges NIRF-2025 Data for Overall Notification: M.Tech -IV Sem Examination(R19), Febraury-2025 Notification: III B.Tech -I Sem Supplementary Examination(R20), Febraury-2025 Notification: III B.Tech -I Sem Supplementary Examination(R19), Febraury-2025 Notification: IV B.Tech -I Sem Supplementary Examination(R20), Febraury-2025 Notification: IV B.Tech -I Sem Supplementary Examination(R19), Febraury-2025 Upload here for Faculty Positions for Assistant, Associate and Professors Send your resume on this email : careers@lendi.edu.in Click here to Upload Institutional Activities NIRF Report - 2023 AICTE OBE based Books: E-Kumbh Portal Info ARIIA-2023 Report Viksit Bharat@2047 (Voice of Youth): Upload your selfies with Certificates Viksit Bharat@2047 : Visit Website here SoP for students: Viksit Bharat@2047 (Voice of Youth) Information NIRF-2024 data for Innovation NIRF-2024 data for Engineering Colleges NIRF-2024 data for Overall Faculty Recruitment :Applications are invited for the post of Professor / Associate Professor / Assistant Professor Admission Enquiry Form-2024

PLACEMENTS - 2024-25 - 614*- Still Counting , INFOSYS - 42 , COGNIZANT - 35 , TCS - 31 , PEGA - 01 , TECH MAHINDRA - 10 , PALTECH - 09 , WIPRO - 07 , MINDX360 - 05 , HCL TECHNOLOGIES - 20 , JMAN GROUP - 18 , PEOPLE TECH - 13 , CALIBER - 20 , MEDHA SERVO - 07 , VIRTUSA - 12 , EFFTRONICS - 12 , DELOITTE - 03 , TATA STRIVE - 35 , SMART ED - 02 , SIMPLYFI - 02 , M-CORE TECHNOLOGIES - 13 , TILICHO LABS - 05 , WELLNESS 360 - 01 , SOTI - 01 , COFORGE - 02 , BRAKES INDIA PVT LTD - 84 , TURTIL - 10 , GLOBAL LOGIC - 51 , TEKWISSEN GROUP - 18 , MOVATE - 14 , VERIZON - 01 , HANSA SOLUTIONS - 03 , BOSCH - 10 , EQIC - 10 , APMOSYS - 14 , STEELCUBE ENGINEERING PVT LTD - 13 , COVALENSE DIGITAL - 09 , ZFTECH - 01 , JOHN DEERE - 01 , QNUEVE SOLUTIONS - 10 , QUALITYKIOSK TECHNOLOGIES - 16 , HDFC BANK - 18 , SOLAR EDGE - 01 , CCC DIGITAL WORLD - 06 , GROW CONTROLS - 14 , DEALATECORP - 01 , APTROID - 02 , VEM - 10 , EVIONICS - 03 , AMARA RAJA - 01 Many More.....

K Venkata Rama Krishna Reddy

K Venkata Rama Krishna Reddy

Assistant Professor, CSE (AI & Machine Learning)
vrkreddy.k@lendi.edu.in
Profile

01 Year

Male

Artificial Intelligence & Machine Learning

BTech - CSE, MTech -Data Science

2025-07-31
Projects & Others

Federated and Transfer Learning-Based Network Intrusion Detection Systems (NIDS) for Cyber Attack Detection

This project addresses the growing need for intelligent and privacy-aware solutions in cybersecurity by implementing Federated Learning and Transfer Learning for Network Intrusion Detection using the UNSW-NB15 dataset. The objective was to build a system capable of accurately detecting various cyber-attacks while overcoming the limitations of traditional machine learning methods.

Traditional machine learning techniques, while effective in controlled environments, require large centralized datasets, struggle with imbalanced data, and do not support distributed or privacy-sensitive deployments. These constraints make them less suitable for modern, real-world cybersecurity applications.

To overcome these limitations, we implemented the following approaches:

  • Transfer Learning: Leveraged pre-trained models (XGBoost, Autoencoders, LSTM) to improve detection accuracy in scenarios with limited or imbalanced labeled data. Transfer learning reduced training time and boosted generalization.

  • Federated Learning: Enabled training across decentralized data sources without transferring raw data. Using algorithms like Random Forest, Decision Trees, and CNN in a federated setup, we ensured privacy while maintaining strong model performance in distributed environments.

Challenges and Solutions:

  • Challenge 1: Data Imbalance
    Solution: Applied techniques like SMOTE and class weighting to improve model performance on minority attack classes.

  • Challenge 2: Data Privacy and Distribution
    Solution: Used Federated Learning to train models collaboratively without sharing raw data across devices or institutions.

  • Challenge 3: Model Convergence and Resource Constraints
    Solution: Selected efficient models like Random Forest and XGBoost, and fine-tuned federated settings to balance accuracy with computational efficiency.

Why Advanced Over Traditional ML:

  • Improved Generalization: Transfer learning significantly outperformed traditional models trained from scratch by reusing learned features from related domains.

  • Privacy-Preserving: Federated learning allowed training on sensitive data locally, something that normal ML models cannot do.

  • Scalable and Real-World Ready: Our methods aligned with modern, distributed cybersecurity infrastructures, unlike traditional centralized ML.

  • Efficient on Imbalanced Data: Traditional models are often biased toward majority classes, while our approach enhanced detection across all attack types.

CONCLUSION :

This project successfully demonstrated the application of Federated Learning and Transfer Learning to develop a robust, scalable, and privacy-preserving Network Intrusion Detection System (NIDS).The findings pave the way for future research in deploying advanced machine learning models in distributed, real-time, and privacy-constrained cybersecurity systems.