Hi, I am

Svetlana Radosavac

Data Scientist

Data Scientist with 10+ years of industry experience.

About me

I am a data scientist with background in machine learning, network security and fraud detection. My current interests lie in the areas of cyber security, graph neural networks, graph databases, building machine learning pipelines and general machine learning model orchestration.

My expertise is a mix of machine learning and software skills. I have been responisble for delivering machine learning models as well as designing machine learning pipelines, PySpark pipelines, developing and deploying Python packages, desiging Jenkins CI/CD jobs for package and model release, developing MLFlow and Airflow pipelines.

Technical skills

01Programming languages

Python, Julia, SQL, Java (beginner)

02Machine learning tools

Scikit-Learn, PyTorch, TensorFlow

03Data Processing Tools

Amazon Web Services (Batch, Lambda, S3), Apache Spark/Pyspark, Pandas, Dask

04GNNs and Graph Databases

Graph Convolutional Networks (GCN), Graph Attention Networks (GAT), GraphSage, Deep Graph Infomax (DGI), Graph Isomorphism Networks (GIN), Neo4j

05ML Pipelines and Orchestration

Kubeflow, MLFlow, Airflow, NiFi, Papermill

Education

Experience

Selected publications

You can access my complete list of publications at Google Scholar

  1. A. A. Cardenas, S. Radosavac and J. S. Baras, “Evaluation of Detection Algorithms for MAC Layer Misbehavior: Theory and Experiments”, IEEE/ACM Transactions on Networking (ToN), Pages 605-617, Vol. 17, Issue 2. April 2009.

  2. S. Radosavac, G. V. Moustakides, J. S. Baras and I. Koutsopoulos, “An analytic framework for modeling and detecting access layer misbehavior in wireless networks”, ACM Transactions on Information and System Security (ACM TISSEC), Vol. 11, No. 4, July 2008.

  3. Svetlana Radosavac, Alvaro A Cárdenas, John S Baras, George V Moustakides, Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers, Journal of Computer Security, Volume 15, Issue 1, January 2007, pp 103–128

  4. H. Sharara, C. Westphal, S. Radosavac and U. C. Kozat, “Utilizing Social Influence in Content Distribution Networks” in Proceedings of IEEE ICC-2011, Kyoto, Japan, 2011 (best paper award)

  5. J. Grossklags, S. Radosavac, A. Cardenas, J. Chuang, “Nudge: Intermediaries’ Role in Interdependent Network Security” Proceedings of 3rd International Conference on Trust and Trustworthy Computing (Trust’10), June 2010.

  6. A. Cardenas, S. Radosavac, J. Grossklags, J. Chuang and C. Hoofnagle, “An Economic Map of Cybercrime”, 37th Research Conference on Communication, Information and Internet Policy (TPRC) 2009, George Mason University Law School, Arlington, VA, September 25-27, 2009.

  7. S. Radosavac and J. S. Baras, “Application of Sequential Detection Schemes for Obtaining Performance Bounds of Greedy Users in the IEEE 802.11 MAC”, IEEE Communications Magazine: special issue on Security in Mobile Ad Hoc and Sensor Networks, pages 148-154, Vol. 46, No. 2, February 2008.

  8. S. Radosavac, J. Kempf and U. C. Kozat , “Using Insurance for Increasing Internet Security”, ACM SIGCOMM Workshop on the Economics of Networks, Systems and Computation (NetEcon ’08), August 22, Seattle, WA

  9. A. A. Cardenas, S. Radosavac and J. S. Baras, “An Analytical Evaluation of MAC Layer Misbehavior Detection Schemes”, Proceedings of the 26th Annual IEEE Conference on Computer Communications, INFOCOM 2007.

  10. S. Radosavac, J. S. Baras, I. Koutsopoulos, "A framework for MAC protocol misbehavior detection in wireless networks", Proceedings of the 4th ACM workshop on Wireless security, WiSE 2005