Dinesh C. Verma

Orcid: 0000-0003-1933-7343

Affiliations:
  • IBM


According to our database1, Dinesh C. Verma authored at least 104 papers between 1990 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
FLAP - A Federated Learning Framework for Attribute-based Access Control Policies.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
Trustable service discovery for highly dynamic decentralized workflows.
Future Gener. Comput. Syst., 2022

Self-describing Digital Assets and Their Applications in an Integrated Science and Engineering Ecosystem.
Proceedings of the Accelerating Science and Engineering Discoveries Through Integrated Research Infrastructure for Experiment, Big Data, Modeling and Simulation, 2022

Network Insights for IoT Solution Resiliency.
Proceedings of the 18th International Conference on the Design of Reliable Communication Networks, 2022

Inference for Trustworthy Machine Intelligence: Challenges and Solutions.
Proceedings of the 4th IEEE International Conference on Cognitive Machine Intelligence, 2022

A Privacy-preserving Product Recommender System.
Proceedings of the Federated Learning, 2022

2021
ProFact: A Provenance-Based Analytics Framework for Access Control Policies.
IEEE Trans. Serv. Comput., 2021

A framework for fostering transparency in shared artificial intelligence models by increasing visibility of contributions.
Concurr. Comput. Pract. Exp., 2021

Risks and Challenges of Training Classifiers for IoT.
Proceedings of the Internet of Things - ICIOT 2021, 2021

A Security-Constrained Reinforcement Learning Framework for Software Defined Networks.
Proceedings of the ICC 2021, 2021

Addressing the Limitations of AI/ML in creating Cognitive Solutions.
Proceedings of the Third IEEE International Conference on Cognitive Machine Intelligence, 2021

2020
Enabling Discoverable Trusted Services for Highly Dynamic Decentralized Workflows.
Proceedings of the IEEE/ACM Workflows in Support of Large-Scale Science, 2020

Polisma - A Framework for Learning Attribute-Based Access Control Policies.
Proceedings of the Computer Security - ESORICS 2020, 2020

Preparing Network Intrusion Detection Deep Learning Models with Minimal Data Using Adversarial Domain Adaptation.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Blockchain analytics and artificial intelligence.
IBM J. Res. Dev., 2019

Methods and Tools for Policy Analysis.
ACM Comput. Surv., 2019

Federated Learning for Coalition Operations.
CoRR, 2019

Using AI/ML to gain situational understanding from passive network observations.
CoRR, 2019

Quantifying Transparency of Machine Learning Systems through Analysis of Contributions.
CoRR, 2019

A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment.
CoRR, 2019

Pruning deep convolutional neural networks for efficient edge computing in condition assessment of infrastructures.
Comput. Aided Civ. Infrastructure Eng., 2019

On the Impact of Generative Policies on Security Metrics.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Overcoming the Lack of Labeled Data: Training Intrusion Detection Models Using Transfer Learning.
Proceedings of the IEEE International Conference on Smart Computing, 2019

Towards Traceability in Data Ecosystems using a Bill of Materials Model.
Proceedings of the 11th International Workshop on Science Gateways, 2019

An AI Enabled System for Distributed System Characterization.
Proceedings of the 2019 IEEE International Conference on Cognitive Computing, 2019

Federated AI for the Enterprise: A Web Services Based Implementation.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

Generative Policies for Coalition Systems - A Symbolic Learning Framework.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Generating Client Side Policies for Cyber-Physical Safety.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

Policy based Ensembles for applying ML on Big Data.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

A Policy-based Approach for Measuring Data Quality.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
The Challenge of Access Control Policies Quality.
ACM J. Data Inf. Qual., 2018

Federated AI for building AI Solutions across Multiple Agencies.
CoRR, 2018

Implicit Terrorist Networks: A Two-Mode Social Network Analysis of Terrorism in India.
Proceedings of the Social, Cultural, and Behavioral Modeling, 2018

Self-Generation of Access Control Policies.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

How to Prevent Skynet from Forming (A Perspective from Policy-Based Autonomic Device Management).
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Distributed AI and security issues in federated environments.
Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, 2018

Security Issues for Distributed Fusion in Coalition Environments.
Proceedings of the 21st International Conference on Information Fusion, 2018

A Policy System for Control of Data Fusion Processes and Derived Data.
Proceedings of the 21st International Conference on Information Fusion, 2018

Self-Generating Policies for Machine Learning in Coalition Environments.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

Value of Information: Quantification and Application to Coalition Machine Learning.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

Secure Model Fusion for Distributed Learning Using Partial Homomorphic Encryption.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

Policy-Based Identification of IoT Devices' Vendor and Type by DNS Traffic Analysis.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

AGENP: An ASGrammar-based GENerative Policy Framework.
Proceedings of the Policy-Based Autonomic Data Governance [extended papers from the Second International Workshop on Policy-based Autonomic Data Governance, 2018

2017
Improving Security in Coalition Tactical Environments Using an SDN Approach.
Proceedings of the Guide to Security in SDN and NFV, 2017

Towards an architecture for policy-based management of software defined coalitions.
Proceedings of the 2017 IEEE SmartWorld, 2017

Generative policy model for autonomic management.
Proceedings of the 2017 IEEE SmartWorld, 2017

Provenance-Based Analytics Services for Access Control Policies.
Proceedings of the 2017 IEEE World Congress on Services, 2017

Distributed Intelligence: Trends in the Management of Complex Systems.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

A Cognitive Policy Framework for Next-Generation Distributed Federated Systems: Concepts and Research Directions.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Audio Analysis as a Control Knob for Social Sensing.
Proceedings of the 2nd International Workshop on Social Sensing, 2017

Measures of network centricity for edge deployment of IoT applications.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Policy enabled caching for distributed AI.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Edge computing architecture for applying AI to IoT.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Community-based self generation of policies and processes for assets: Concepts and research directions.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Intra-group Tension Under Inter-group Conflict: A Generative Model Using Group Social Norms and Identity.
Proceedings of the Advances in Cross-Cultural Decision Making, 2017

2016
Acoustic Signal Processing for Anomaly Detection in Machine Room Environments: Demo Abstract.
Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments, 2016

2015
Experiences Deploying a Transparent Split TCP Middlebox and the Implications for NFV.
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015

Advances in network sciences via collaborative multi-disciplinary research.
Proceedings of the 18th International Conference on Information Fusion, 2015

2012
More is more: The benefits of denser sensor deployment.
ACM Trans. Sens. Networks, 2012

Distributed state machines: A declarative framework for the management of distributed systems.
Proceedings of the 8th International Conference on Network and Service Management, 2012

An information-centric architecture for data center networks.
Proceedings of the ICN'12, 2012

2011
Self-organizing systems based on morphogenesis principles.
IBM J. Res. Dev., 2011

Anomaly detection in information streams without prior domain knowledge.
IBM J. Res. Dev., 2011

2010
Biologically inspired networking [Guest Editorial].
IEEE Netw., 2010

Understanding the Quality of Monitoring for Network Management.
Comput. J., 2010

Dynamic Service Execution in Sensor Networks.
Comput. J., 2010

Dynamic Composition of Services in Sensor Networks.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Guest Editors' Introduction: Special Section on Autonomic Network Computing.
IEEE Trans. Computers, 2009

A circulatory system approach for wireless sensor networks.
Ad Hoc Networks, 2009

Application of Halftoning Algorithms to Location Dependent Sensor Placement.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

Muti-scale temporal segmentation and outlier detection in sensor networks.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

An end to end life cycle for ISR in coalition networks.
Proceedings of the 12th International Conference on Information Fusion, 2009

Building principles for a quality of information specification for sensor information.
Proceedings of the 12th International Conference on Information Fusion, 2009

2008
Measurement and analysis of LDAP performance.
IEEE/ACM Trans. Netw., 2008

Evolution of storage management: Transforming raw data into information.
IBM J. Res. Dev., 2008

The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Policy Enabled ITA Sensor Fabric, A Distributed Framework for the Validation of Experimental Algorithms Using Real and Simulated Sensors.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

More is more: The benefits of dense sensor deployment.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

A sensor placement algorithm for redundant covering based on Riesz energy minimization.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Intelligence, Surveillance, and Reconnaissance fusion for coalition operations.
Proceedings of the 11th International Conference on Information Fusion, 2008

2007
A Circulatory System Approach for Wireless Sensor Networks.
Proceedings of the Bio-Inspired Computing and Communication, 2007

2006
Deployment Time Performance Optimization of Internet Services.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Policy management for networked systems and applications.
Proceedings of the Integrated Network Management, 2005

2004
Service level agreements on IP networks.
Proc. IEEE, 2004

Policy Transformation Techniques in Policy-based Systems Management.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

A Toolkit for Policy Enablement in Autonomic Computing.
Proceedings of the 1st International Conference on Autonomic Computing (ICAC 2004), 2004

Developing innovative technologies for commercial grids.
Proceedings of the Grid Computing: The New Frontier of High Performance Computing [post-proceedings of the High Performance Computing Workshop, 2004

2003
SRIRAM: A scalable resilient autonomic mesh.
IBM Syst. J., 2003

2002
Policy-based management of content distribution networks.
IEEE Netw., 2002

A Policy Service for GRID Computing.
Proceedings of the Grid Computing, 2002

Authentication for Distributed Web Caches.
Proceedings of the Computer Security, 2002

2001
ALMI: An Application Level Multicast Infrastructure.
Proceedings of the 3rd USENIX Symposium on Internet Technologies and Systems, 2001

Policy Based SLA Management in Enterprise Networks.
Proceedings of the Policies for Distributed Systems and Networks, 2001

IPSECvalidate: A Tool to Validate IPSEC Configurations.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001

Network prediction in a policy-based IP network.
Proceedings of the Global Telecommunications Conference, 2001

2000
Policy-Based Diffserv on Internet Servers: The AIX Approach (On the Wire).
IEEE Internet Comput., 2000

1997
Interactive digital video networks: lessons from a commercial deployment.
IEEE Commun. Mag., 1997

1996
The Tenet real-time protocol suite: design, implementation, and experiences.
IEEE/ACM Trans. Netw., 1996

1995
NBBS Path Selection Framework.
IBM Syst. J., 1995

The NBBS Access Node.
IBM Syst. J., 1995

1994
Tree Computation for Reserved Bandwidth Traffic.
J. High Speed Networks, 1994

Private Communication Groups in Packet-Switched Networks.
Proceedings of the Upper Layer Protocols, 1994

1993
Routing Reserved Bandwith Multi-Point Connections.
Proceedings of the ACM SIGCOMM 1993 Conference on Communications Architectures, 1993

1990
A Scheme for Real-Time Channel Establishment in Wide-Area Networks.
IEEE J. Sel. Areas Commun., 1990


  Loading...