Biplab Sikdar

Orcid: 0000-0002-0084-4647

Affiliations:
  • National University of Singapore, Department of Electrical and Computer Engineering, Singapore
  • Rensselaer Polytechnic Institute, Troy, NY, USA (PhD 2001)


According to our database1, Biplab Sikdar authored at least 314 papers between 2000 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detection of Malicious Command Injection Attacks Against Static Var Compensators in Smart Grids.
IEEE Trans. Smart Grid, November, 2024

RAM-Based Firmware Attestation for IoT Security: A Representation Learning Framework.
IEEE Internet Things J., November, 2024

A Hybrid Reinforcement Learning-Based Method for Generating Privacy-Preserving Trajectories in Low-Density Traffic Environments.
IEEE Trans. Intell. Transp. Syst., October, 2024

An Asynchronous Shuffled Frog-Leaping With Feasible Jaya Algorithm for Uncertain Task Rescheduling Problem in UAV Emergency Networks.
IEEE Trans. Intell. Transp. Syst., October, 2024

Runtime Self-Attestation of FPGA-Based IoT Devices.
IEEE Internet Things J., October, 2024

An Intelligent Fingerprinting Technique for Low-Power Embedded IoT Devices.
IEEE Trans. Artif. Intell., September, 2024

A Secure PUF-Based Authentication Protocol for Remote Keyless Entry Systems in Cars.
IEEE Trans. Veh. Technol., July, 2024

BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service.
IEEE Trans. Veh. Technol., July, 2024

IoT Device RAM Traces For Firmware Attestation.
Dataset, July, 2024

Soteria: A Quantum-Based Device Attestation Technique for Internet of Things.
IEEE Internet Things J., May, 2024

Consumer Electronics Technologies for Enabling an Immersive Metaverse Experience.
IEEE Consumer Electron. Mag., May, 2024

AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks.
IEEE/ACM Trans. Netw., April, 2024

Path Planning for Heterogeneous UAVs With Radar Sensors.
IEEE Internet Things J., March, 2024

Machine and Representation Learning-Based GNSS Spoofing Detectors Utilizing Feature Set From Generic GNSS Receivers.
IEEE Trans. Consumer Electron., February, 2024

Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy-Preserving Ride-Sharing Application.
IEEE Internet Things J., January, 2024

A Quantum Safe Mutual Authentication Protocol for Smart Meter Communications With Experimental Evaluation.
IEEE Trans. Netw. Sci. Eng., 2024

Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach.
IEEE Trans. Netw. Sci. Eng., 2024

Attacking Delay-Based PUFs With Minimal Adversarial Knowledge.
IEEE Trans. Inf. Forensics Secur., 2024

VFLGAN: Vertical Federated Learning-based Generative Adversarial Network for Vertically Partitioned Data Publication.
Proc. Priv. Enhancing Technol., 2024

Securing Synchrophasors Using Data Provenance in the Quantum Era.
IEEE Open J. Commun. Soc., 2024

TAEGAN: Generating Synthetic Tabular Data For Data Augmentation.
CoRR, 2024

CombU: A Combined Unit Activation for Fitting Mathematical Expressions with Neural Networks.
CoRR, 2024

VFLGAN-TS: Vertical Federated Learning-based Generative Adversarial Networks for Publication of Vertically Partitioned Time-Series Data.
CoRR, 2024

Swarm-Net: Firmware Attestation in IoT Swarms using Graph Neural Networks and Volatile Memory.
CoRR, 2024

Privacy-Preserving Collaborative Split Learning Framework for Smart Grid Load Forecasting.
CoRR, 2024

Attacking Delay-based PUFs with Minimal Adversary Model.
CoRR, 2024

A Survey on Available Tools and Technologies Enabling Quantum Computing.
IEEE Access, 2024

Generative AI for Cyber Security: Analyzing the Potential of ChatGPT, DALL-E, and Other Models for Enhancing the Security Space.
IEEE Access, 2024

Beyond Bits: A Review of Quantum Embedding Techniques for Efficient Information Processing.
IEEE Access, 2024

Privacy and Security Concerns in Generative AI: A Comprehensive Survey.
IEEE Access, 2024

Synthetic Time-Series Data Generation with 3D Convolution for EV Systems.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

Securing Post-Quantum Communication for Smart Grid Applications.
Proceedings of the IEEE International Conference on Communications, 2024

PhenoAuth: A Novel PUF-Phenotype-Based Authentication Protocol for IoT Devices.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

Optimal Machine-Learning Attacks on Hybrid PUFs.
Proceedings of the Computer Security - ESORICS 2024, 2024

2023
A Geo-Indistinguishable Context-Based Mix Strategy for Trajectory Protection in VANETs.
IEEE Trans. Veh. Technol., December, 2023

A Privacy-Preserving Authenticated Key Exchange Protocol for V2G Communications Using SSI.
IEEE Trans. Veh. Technol., November, 2023

Anomaly Detection Using LSTM-Based Variational Autoencoder in Unsupervised Data in Power Grid.
IEEE Syst. J., September, 2023

A Blockchain and ML-Based Framework for Fast and Cost-Effective Health Insurance Industry Operations.
IEEE Trans. Comput. Soc. Syst., August, 2023

The Internet of Vehicles (IoV) - Security, Privacy, Trust, and Reputation Management for Connected Vehicles.
IEEE Internet Things Mag., June, 2023

PLAKE: PUF-Based Secure Lightweight Authentication and Key Exchange Protocol for IoT.
IEEE Internet Things J., May, 2023

Confluence of Blockchain and Artificial Intelligence Technologies for Secure and Scalable Healthcare Solutions: A Review.
IEEE Internet Things J., April, 2023

Decentralized Renewable Resource Redistribution and Optimization for Beyond 5G Small Cell Base Stations: A Machine Learning Approach.
IEEE Syst. J., March, 2023

Privacy-Preserving User-Centric Authentication Protocol for IoT-Enabled Vehicular Charging System Using Decentralized Identity.
IEEE Internet Things Mag., March, 2023

QR-PUF: Design and Implementation of a RFID-Based Secure Inpatient Management System Using XOR-Arbiter-PUF and QR-Code.
IEEE Trans. Netw. Sci. Eng., 2023

Guest Editorial: Security and Privacy in 5G-Enabled Industrial IoT Current Progress and Future Challenges.
IEEE Trans. Ind. Informatics, 2023

Next Generation of Multi-Agent Driven Smart City Applications and Research Paradigms.
IEEE Open J. Commun. Soc., 2023

A Light-Weight Technique to Detect GPS Spoofing Using Attenuated Signal Envelopes.
IEEE Open J. Comput. Soc., 2023

Co-Existence With IEEE 802.11 Networks in the ISM Band Without Channel Estimation.
IEEE Open J. Comput. Soc., 2023

An Effective LSTM-DDPM Scheme for Energy Theft Detection and Forecasting in Smart Grid.
CoRR, 2023

Security, Trust and Privacy Solutions for Intelligent Internet of Vehicular Things - Part II.
IEEE Consumer Electron. Mag., 2023

Unleashing the Potential of Conversational AI: Amplifying Chat-GPT's Capabilities and Tackling Technical Hurdles.
IEEE Access, 2023

A Review of Trustworthy and Explainable Artificial Intelligence (XAI).
IEEE Access, 2023

A Game Theoretic Adversarial Synthetic Data Generation Method to Address Privacy Concerns in the Use of Deep Learning Models for IoT Applications.
Proceedings of the 9th IEEE World Forum on Internet of Things, 2023

PREVENT: A Mechanism for Preventing Message Tampering Attacks in Electric Vehicle Networks.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

A Quantum Safe Authentication Protocol for Remote Keyless Entry Systems in Cars.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

Representation Learning based Time Synchronization Attack Detection for Synchrophasors.
Proceedings of the IEEE International Conference on Communications, 2023

Poster Abstract: Efficient Knowledge Distillation to Train Lightweight Neural Network for Heterogeneous Edge Devices.
Proceedings of the 21st ACM Conference on Embedded Networked Sensor Systems, 2023

Computer Vision and IoT-Enabled Robotic Platform for Automated Crack Detection in Road and Bridges.
Proceedings of the 6th IEEE International Conference on Multimedia Information Processing and Retrieval, 2023

An Efficient and Secure Post-Quantum Multi-Authority Ciphertext-Policy Attribute-Based Encryption Method Using Lattice.
Proceedings of the IEEE INFOCOM 2023, 2023

A Privacy-Preserving Protocol Level Approach to Prevent Machine Learning Modelling Attacks on PUFs in the Presence of Semi-Honest Verifiers.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

Privacy-Preserving Mutual Authentication Protocol for Drone Delivery Services.
Proceedings of the IEEE Global Communications Conference, 2023

Task Rescheduling for UAV-Assisted Emergency Communications under Uncertainty.
Proceedings of the IEEE Global Communications Conference, 2023

Machine Learning based Time Synchronization Attack Detection for Synchrophasors.
Proceedings of the IEEE Global Communications Conference, 2023

Misbehaviour Detection for Smart Grids using a Privacy-centric and Computationally Efficient Federated Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2023

SRAM and Generative Network-based Physical Fingerprinting for Trust Management in the Internet of Things.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2023

POSTER: Security Logs Graph Analytics for Industry Network System.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential.
ACM Trans. Manag. Inf. Syst., December, 2022

An Ultra-Lightweight Data-Aggregation Scheme with Deep Learning Security for Smart Grid.
IEEE Wirel. Commun., 2022

SHOTS: Scalable Secure Authentication-Attestation Protocol Using Optimal Trajectory in UAV Swarms.
IEEE Trans. Veh. Technol., 2022

Unified Detection of Attacks Involving Injection of False Control Commands and Measurements in Transmission Systems of Smart Grids.
IEEE Trans. Smart Grid, 2022

A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things.
IEEE Trans. Ind. Informatics, 2022

Protecting Network-on-Chip Intellectual Property Using Timing Channel Fingerprinting.
ACM Trans. Embed. Comput. Syst., 2022

Editorial Preface: Special issue on sustainable computing for cyber-physical systems.
Sustain. Comput. Informatics Syst., 2022

UAV SECaaS: Game-Theoretic Formulation for Security as a Service in UAV Swarms.
IEEE Syst. J., 2022

IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks.
IEEE Syst. J., 2022

PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices.
IEEE Syst. J., 2022

Scalable Topologies for Time-Optimal Authentication of UAV Swarms.
IEEE Netw., 2022

Enabling Cost-Effective and Secure Minor Medical Teleconsultation Using Artificial Intelligence and Blockchain.
IEEE Internet Things Mag., 2022

Machine-Learning-Assisted Security and Privacy Provisioning for Edge Computing: A Survey.
IEEE Internet Things J., 2022

A Low-Delay Routing-Integrated MAC Protocol for Wireless Sensor Networks.
IEEE Internet Things J., 2022

Adversarial Attack and Defence Strategies for Deep-Learning-Based IoT Device Classification Techniques.
IEEE Internet Things J., 2022

Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces.
IEEE Internet Things J., 2022

DRiVe: Detecting Malicious Roadside Units in the Internet of Vehicles With Low Latency Data Integrity.
IEEE Internet Things J., 2022

E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System.
CoRR, 2022

Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid.
CoRR, 2022

Special issue on scalable and secure platforms for UAV networks.
Comput. Commun., 2022

Security, Trust, and Privacy Solutions for Intelligent Internet of Vehicular Things - Part I.
IEEE Consumer Electron. Mag., 2022

Black-Box Adversarial Attack for Deep Learning Classifiers in IoT Applications.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Ensemble and Transfer Adversarial Attack on Smart Grid Demand-Response Mechanisms.
Proceedings of the IEEE International Conference on Communications, 2022

A Reconfigurable and Secure Firmware Updating Framework for Advanced Metering Infrastructure.
Proceedings of the IEEE International Conference on Communications, 2022

Security and Privacy Challenges for the Internet of Things.
Proceedings of the 11th International Conference on Sensor Networks, 2022

An Authentication Mechanism for Remote Keyless Entry Systems in Cars to Prevent Replay and RollJam Attacks.
Proceedings of the 2022 IEEE Intelligent Vehicles Symposium, 2022

Secure and Trusted Attestation Protocol for UAV Fleets.
Proceedings of the IEEE INFOCOM 2022, 2022

PIC: Preserving Data Integrity in UAV Assisted Communication.
Proceedings of the IEEE INFOCOM 2022, 2022

Fault Resilient Authentication Architecture for Drone Networks.
Proceedings of the 2022 IEEE International Conference on Communications Workshops, 2022

MaDe: Malicious Aerial Vehicle Detection using Generalized Likelihood Ratio Test.
Proceedings of the IEEE International Conference on Communications, 2022

A PUF-based Lightweight and Secure Mutual Authentication Mechanism for Remote Keyless Entry Systems.
Proceedings of the IEEE Global Communications Conference, 2022

Blockchain based Secure Group Data Collaboration in Cloud with Differentially Private Synthetic Data and Trusted Execution Environment.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
A Secure and Scalable Framework for Blockchain Based Edge Computation Offloading in Social Internet of Vehicles.
IEEE Trans. Veh. Technol., 2021

S-MAPS: Scalable Mutual Authentication Protocol for Dynamic UAV Swarms.
IEEE Trans. Veh. Technol., 2021

Detection of Stealthy Cyber-Physical Line Disconnection Attacks in Smart Grid.
IEEE Trans. Smart Grid, 2021

A Privacy-Aware Reconfigurable Authenticated Key Exchange Scheme for Secure Communication in Smart Grids.
IEEE Trans. Smart Grid, 2021

A Defense Mechanism Against Timing Attacks on User Privacy in ICN.
IEEE/ACM Trans. Netw., 2021

A Secure IoT-Based Modern Healthcare System With Fault-Tolerant Decision Making Process.
IEEE J. Biomed. Health Informatics, 2021

A Checkpoint Enabled Scalable Blockchain Architecture for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

Differentiated Service Support in Wireless Networks With Multibeam Antennas.
IEEE Trans. Commun., 2021

A Lightweight Protocol for Secure Data Provenance in the Internet of Things Using Wireless Fingerprints.
IEEE Syst. J., 2021

Guest Editorial: Internet of Drones: Novel Applications, Recent Deployments, and Integration.
IEEE Internet Things Mag., 2021

Multihypothesis Sequential Testing for Illegitimate Access and Collision-Based Attack Detection in Wireless IoT Networks.
IEEE Internet Things J., 2021

A Game-Theoretic Approach for Enhancing Data Privacy in SDN-Based Smart Grids.
IEEE Internet Things J., 2021

Disaster and Pandemic Management Using Machine Learning: A Survey.
IEEE Internet Things J., 2021

A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles.
IEEE Internet Things J., 2021

Guest editorial.
Int. J. Pervasive Comput. Commun., 2021

Location Aware Clustering: Scalable Authentication Protocol for UAV Swarms.
IEEE Netw. Lett., 2021

Security and privacy solutions in edge envisioned connected things environment.
Trans. Emerg. Telecommun. Technol., 2021

Security Function Virtualization for IoT Applications in 6G Networks.
IEEE Commun. Stand. Mag., 2021

Delay and Power consumption Analysis for Queue State Dependent Service Rate Control in WirelessHart System.
CoRR, 2021

A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation.
Computer, 2021

A Survey of Energy and Spectrum Harvesting Technologies and Protocols for Next Generation Wireless Networks.
IEEE Access, 2021

A Review on the Role of Machine Learning in Enabling IoT Based Healthcare Applications.
IEEE Access, 2021

Adversarial Attack for Deep Learning Based IoT Appliance Classification Techniques.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Adversarial Machine Learning Against False Data Injection Attack Detection for Smart Grid Demand Response.
Proceedings of the IEEE International Conference on Communications, 2021

A Blockchain and Machine Learning based Framework for Efficient Health Insurance Management.
Proceedings of the SenSys '21: The 19th ACM Conference on Embedded Networked Sensor Systems, Coimbra, Portugal, November 15, 2021

A Privacy-Preserving Pedestrian Dead Reckoning Framework Based on Differential Privacy.
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021

Security Service Pricing Model for UAV Swarms: A Stackelberg Game Approach.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A Flickering Context-based Mix Strategy for Privacy Protection in VANETs.
Proceedings of the ICC 2021, 2021

Deep Neural Networks for Securing IoT Enabled Vehicular Ad-Hoc Networks.
Proceedings of the ICC 2021, 2021

A Secure and Efficient Mutual Authentication Protocol Framework for Unmanned Aerial Vehicles.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

AI Based Algorithm-Hardware Separation for IoV Security.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

2020
An Efficient Privacy-Preserving Authenticated Key Agreement Scheme for Edge-Assisted Internet of Drones.
IEEE Trans. Veh. Technol., 2020

Lightweight Mutual Authentication Protocol for V2G Using Physical Unclonable Function.
IEEE Trans. Veh. Technol., 2020

Detection of Hidden Transformer Tap Change Command Attacks in Transmission Networks.
IEEE Trans. Smart Grid, 2020

Optimal Pending Interest Table Size for ICN With Mobile Producers.
IEEE/ACM Trans. Netw., 2020

Blockage Aware Fair Scheduling with Differentiated Service Support in mmWave WPANs/WLANs.
IEEE Trans. Mob. Comput., 2020

A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks.
IEEE Trans. Inf. Forensics Secur., 2020

An Efficient Privacy-Friendly Hop-by-Hop Data Aggregation Scheme for Smart Grids.
IEEE Syst. J., 2020

Energy and Latency Aware Resource Management for Solar Powered Cellular Networks.
IEEE Netw., 2020

A Scalable Protocol for Driving Trust Management in Internet of Vehicles With Blockchain.
IEEE Internet Things J., 2020

HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability.
IEEE Internet Things J., 2020

Consumer IoT: Security Vulnerability Case Studies and Solutions.
IEEE Consumer Electron. Mag., 2020

Computation Offloading for Vehicular Environments: A Survey.
IEEE Access, 2020

Towards Seamless Producer Mobility in Information Centric Vehicular Networks.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

Defining trust in IoT environments via distributed remote attestation using blockchain.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

Detecting Selective Forwarding using Sentinels in lustered IoT Networks.
Proceedings of the IEEE Global Communications Conference, 2020

Optimizing Blockchain Networks with Artificial Intelligence: Towards Efficient and Reliable IoT Applications.
Proceedings of the Convergence of Artificial Intelligence and the Internet of Things, 2020

2019
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication.
IEEE Trans. Smart Grid, 2019

Privacy-Aware Authenticated Key Agreement Scheme for Secure Smart Grid Communication.
IEEE Trans. Smart Grid, 2019

Lightweight and Privacy-Friendly Spatial Data Aggregation for Secure Power Supply and Demand Management in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2019

Lightweight and Privacy-Preserving Two-Factor Authentication Scheme for IoT Devices.
IEEE Internet Things J., 2019

Token-Based Security for the Internet of Things With Dynamic Energy-Quality Tradeoff.
IEEE Internet Things J., 2019

Data Provenance for IoT With Light Weight Authentication and Privacy Preservation.
IEEE Internet Things J., 2019

Two-Factor Authentication for IoT With Location Information.
IEEE Internet Things J., 2019

A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures.
IEEE Access, 2019

DrivMan: Driving Trust Management and Data Sharing in VANETs with Blockchain and Smart Contracts.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Detecting Selective Modification in Vehicular Edge Computing.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Transient Model-Based Detection Scheme for False Data Injection Attacks in Microgrids.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Methodology for Detecting Stealthy Transformer Tap Command Injection Attacks in Smart Grids.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Detection of Stealthy attacks on Electric Grids Using Transient Analysis.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

An Efficient Privacy-Friendly Multi-Hop Data Aggregation Scheme for Smart Grids.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

Impact of GPS Time Spoofing Attacks on Cyber Physical Systems.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Detecting RSU Misbehavior in Vehicular Edge Computing.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Achieving Fairness in IEEE 802.11ah Networks for IoT Applications with Different Requirements.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

BlockCom: A Blockchain Based Commerce Model for Smart Communities using Auction Mechanism.
Proceedings of the 17th IEEE International Conference on Communications Workshops, 2019

Data Provenance for IoT using Wireless Channel Characteristics and Physically Unclonable Functions.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Fair Scheduling in IEEE 802.11ah Networks for Internet of Things Applications.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Machine Learning-based Jamming Detection in Wireless IoT Networks.
Proceedings of the IEEE VTS Asia Pacific Wireless Communications Symposium, 2019

2018
Classification and Detection of PMU Data Manipulation Attacks Using Transmission Line Parameters.
IEEE Trans. Smart Grid, 2018

An Online Mechanism for Detection of Gray-Hole Attacks on PMU Data.
IEEE Trans. Smart Grid, 2018

Green Energy and Delay Aware Downlink Power Control and User Association for Off-Grid Solar-Powered Base Stations.
IEEE Syst. J., 2018

An Efficient Data Aggregation Scheme for Privacy-Friendly Dynamic Pricing-Based Billing and Demand-Response Management in Smart Grids.
IEEE Internet Things J., 2018

Low Power Data Integrity in IoT Systems.
IEEE Internet Things J., 2018

ATT-Auth: A Hybrid Protocol for Industrial IoT Attestation With Authentication.
IEEE Internet Things J., 2018

Securing Substations through Command Authentication Using On-the-fly Simulation of Power System Dynamics.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments.
Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems, 2018

Detecting Forwarding Misbehavior In Clustered IoT Networks.
Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2018

Mitigating loT Device based DDoS Attacks using Blockchain.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

A Lightweight and Privacy-Preserving Data Aggregation for Dynamic Pricing-based Billing in Smart Grids.
Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe, 2018

Fair Scheduling of Concurrent Transmissions in Directional Antenna Based WPANs/WLANs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Adaptive N-Policy Queueing System Design for Energy Efficient and Delay Sensitive Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Opportunistic MAC protocol for co-existence of M2M and Wi-Fi network.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

An Efficient Privacy-Preserving Dynamic Pricing-based Billing Scheme for Smart Grids.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Delay Aware Resource Management for Grid Energy Savings in Green Cellular Base Stations With Hybrid Power Supplies.
IEEE Trans. Commun., 2017

Mutual Authentication in IoT Systems Using Physical Unclonable Functions.
IEEE Internet Things J., 2017

O-MAC: Opportunistic MAC Protocol for M2M Communication in WiFi White Spaces.
IEEE Commun. Lett., 2017

STDMA scheduling for WLANs and WPANs with non-uniform traffic demand.
Proceedings of the 2017 IEEE International Symposium on Local and Metropolitan Area Networks, 2017

Hop-Count Based Forwarding for Seamless Producer Mobility in NDN.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Light-Weight Mutual Authentication Protocol for IoT Systems.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Physically secure mutual authentication for IoT.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Efficient detection of false data injection attacks on AC state estimation in smart grids.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Spatio-Temporal Correlations in Cyber-Physical Systems: A Defense Against Data Availability Attacks.
Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 2017

Secure Data Provenance for the Internet of Things.
Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017

2016
Characterization of White Spaces in Wi-Fi Networks for Opportunistic M2M Communications.
IEEE Trans. Commun., 2016

Power Outage Estimation and Resource Dimensioning for Solar Powered Cellular Base Stations.
IEEE Trans. Commun., 2016

An Energy and Delay Aware Downlink Power Control Strategy for Solar Powered Base Stations.
IEEE Commun. Lett., 2016

Solar powered cellular base stations: current scenario, issues and proposed solutions.
IEEE Commun. Mag., 2016

Detecting data integrity attacks on SCADA systems using limited PMUs.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Downlink power control for latency aware grid energy savings in green cellular networks.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

Detecting data tampering attacks in synchrophasor networks using time hopping.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference Europe, 2016

Anomaly detection in diurnal CPS monitoring data using a local density approach.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Position Paper: Physical Unclonable Functions for IoT Security.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016

Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
On the Feasibility of Using WiFi White Spaces for Opportunistic M2M Communications.
IEEE Wirel. Commun. Lett., 2015

A Survey of MAC Layer Issues and Protocols for Machine-to-Machine Communications.
IEEE Internet Things J., 2015

Detecting malicious manipulation of synchrophasor data.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

On exploiting white spaces in WiFi networks for opportunistic M2M communications.
Proceedings of the 2015 IEEE International Workshop on Local and Metropolitan Area Networks, 2015

Outage estimation for solar powered cellular base stations.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Optimal parameter selection for discrete-time throughput-optimal MAC protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Efficient packet recovery in wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Real-time detection of packet drop attacks on synchrophasor data.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Queue-aware optimal frequency selection for energy minimization in wireless networks.
Proceedings of the IEEE Latin-America Conference on Communications, 2014

A wireless MAC protocol with efficient packet recovery.
Proceedings of the 20th IEEE International Workshop on Local & Metropolitan Area Networks, 2014

A mechanism for detecting data manipulation attacks on PMU data.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Dimensioning stand-alone cellular base station using series-of-worst-months meteorological data.
Proceedings of the IEEE International Conference on Communication Systems, 2014

A mechanism for detecting gray hole attacks on synchrophasor data.
Proceedings of the IEEE International Conference on Communications, 2014

Addressing the energy-delay tradeoff in wireless networks with load-proportional energy usage.
Proceedings of the IEEE International Conference on Communications, 2014

Resource provisioning and dimensioning for solar powered cellular base stations.
Proceedings of the IEEE Global Communications Conference, 2014

2013
An Analytical Approach to the Design of Energy Harvesting Wireless Sensor Nodes.
IEEE Trans. Wirel. Commun., 2013

An Energy Saving Throughput-Optimal MAC Protocol for Cooperative MIMO Transmissions.
IEEE Trans. Commun., 2013

A study of the environmental impact of wired and wireless local area network access.
IEEE Trans. Consumer Electron., 2013

A mechanism for load proportional energy use in wireless local area networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Comparison of Broadcasting Schemes for Infrastructure to Vehicular Communications.
IEEE Trans. Intell. Transp. Syst., 2012

Queueing Analysis of Polling Based Wireless MAC Protocols with Sleep-Wake Cycles.
IEEE Trans. Commun., 2012

A Queueing Model for Polled Service in WiMAX/IEEE 802.16 Networks.
IEEE Trans. Commun., 2012

A CART based mechanism for collision detection in IEEE 802.11.
Proceedings of the IEEE Latin-America Conference on Communications, 2012

An analytical approach towards cooperative relay scheduling under partial state information.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Collision detection in IEEE 802.11 networks by error vector magnitude analysis.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Distinguishing between channel errors and collisions in IEEE 802.11.
Proceedings of the 46th Annual Conference on Information Sciences and Systems, 2012

2011
Relay Scheduling for Cooperative Communications in Sensor Networks with Energy Harvesting.
IEEE Trans. Wirel. Commun., 2011

Defending Synchrophasor Data Networks Against Traffic Analysis Attacks.
IEEE Trans. Smart Grid, 2011

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks.
IEEE Trans. Dependable Secur. Comput., 2011

Throughput Guarantee for Maximal Schedulers in Sensor Networks with Cooperative Relays.
IEEE Trans. Commun., 2011

2010
A mechanism for detecting session hijacks in wireless networks.
IEEE Trans. Wirel. Commun., 2010

A Queuing Model for Evaluating the Transfer Latency of Peer-to-Peer Systems.
IEEE Trans. Parallel Distributed Syst., 2010

Characterization and Abatement of the Reassociation Overhead in Vehicle to Roadside Networks.
IEEE Trans. Commun., 2010

Energy Efficient Transmission Strategies for Body Sensor Networks with Energy Harvesting.
IEEE Trans. Commun., 2010

Environmental impact of IEEE 802.11 access points: a case study.
SIGMETRICS Perform. Evaluation Rev., 2010

A population based approach to model the lifetime and energy distribution in battery constrained wireless sensor networks.
IEEE J. Sel. Areas Commun., 2010

Performance Modeling of Transmission Schedulers for Sensor Networks Capable of Energy Harvesting.
Proceedings of IEEE International Conference on Communications, 2010

Relay Usage Scheduling in Sensor Networks with Energy Harvesting.
Proceedings of IEEE International Conference on Communications, 2010

A Performance Guarantee for Maximal Schedulers in Sensor Networks with Cooperative Relays.
Proceedings of the Global Communications Conference, 2010

Cooperative Relay Scheduling under Partial State Information in Energy Harvesting Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
Queueing analysis of polled service classes in the IEEE 802.16 MAC protocol.
IEEE Trans. Wirel. Commun., 2009

Multicasting with Localized Control in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2009

A distributed coordination scheme to improve the performance of IEEE 802.11 in multi-hop networks.
IEEE Trans. Commun., 2009

A Quasi-Species Model for the Propagation and Containment of Polymorphic Worms.
IEEE Trans. Computers, 2009

An Online Mechanism for BGP Instability Detection and Analysis.
IEEE Trans. Computers, 2009

A Threshold Based MAC Protocol for Cooperative MIMO Transmissions.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

A Framework for Modeling the Lifetime and Residual Energy Distribution in Wireless Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Scalable Peer-to-Peer Video Streaming in WiMAX Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Modeling queueing and channel access delay in unsaturated IEEE 802.11 random access MAC based wireless networks.
IEEE/ACM Trans. Netw., 2008

An online scheme for the isolation of BGP misconfiguration errors.
IEEE Trans. Netw. Serv. Manag., 2008

A Swarm-Intelligence-Based Protocol for Data Acquisition in Networks with Mobile Sinks.
IEEE Trans. Mob. Comput., 2008

Classification and Evaluation of Examples for Teaching Probability to Electrical Engineering Students.
IEEE Trans. Educ., 2008

Design and Analysis of a MAC Protocol for Vehicle to Roadside Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A Real-Time Algorithm for Long Range Signal Strength Prediction in Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Medium Access Control in Vehicle to Roadside Networks.
Proceedings of IEEE International Conference on Communications, 2008

A Wavelet Based Long Range Signal Strength Prediction in Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008

A Mobility Based Architecture for Underwater Acoustic Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Broadcasting Scheme for Infrastructure to Vehicle Communications.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A Distributed System for Cooperative MIMO Transmissions.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Wavelet Based Detection of Session Hijacking Attacks in Wireless Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Modeling and analysis of energy harvesting nodes in wireless sensor networks.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
Scaling of Spatial Reuse and Saturation Throughput in a Class of MAC Protocols.
IEEE Trans. Wirel. Commun., 2007

An Analytic Model for the Delay in IEEE 802.11 PCF MAC-Based Wireless Networks.
IEEE Trans. Wirel. Commun., 2007

Distributed Mobility Transparent Broadcasting in Vehicle-to-Vehicle Networks.
IEEE Trans. Veh. Technol., 2007

A Wireless MAC Protocol with Collision Detection.
IEEE Trans. Mob. Comput., 2007

Modeling Seed Scheduling Strategies in BitTorrent.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Optimal Cluster Head Selection in the LEACH Architecture.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Performance Analysis of Polling based TDMA MAC Protocols with Sleep and Wakeup Cycles.
Proceedings of IEEE International Conference on Communications, 2007

On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics.
Proceedings of IEEE International Conference on Communications, 2007

Real Time Detection of Link Failures in Inter Domain Routing.
Proceedings of IEEE International Conference on Communications, 2007

A MAC Protocol for Cooperative MIMO Transmissions in Sensor Networks.
Proceedings of the Global Communications Conference, 2007

Wavelet Based Detection of Shadow Fading in Wireless Networks.
Proceedings of the Global Communications Conference, 2007

2006
On randomizing the sending times in TCP and other window based algorithms.
Comput. Networks, 2006

Analysis of Contention-Based Multi-Channel Wireless MAC for Point-to-Multipoint Networks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Modeling malware propagation in Gnutella type peer-to-peer networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

SIMPLE: Using Swarm Intelligence Methodology to Design Data Acquisition Protocol in Sensor Networks with Mobile Sinks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

Enhancing MAC Coordination to Boost Spatial Reuse in IEEE 802.11 Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2006

Distributed Mobility Transparent Broadcast in Mobile Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A New MAC Protocol for Wireless Packet Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Statistical Approach to Anomaly Detection in Interdomain Routing.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
An efficient and scalable loss-recovery scheme for video multicast.
IEEE Trans. Multim., 2005

A population based approach to model network lifetime in wireless sensor networks.
SIGMETRICS Perform. Evaluation Rev., 2005

An analytic framework for modeling peer to peer networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

Delay analysis of IEEE 802.11 PCF MAC based wireless networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Analysis of 802.16 based last mile wireless networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Multilayer multicast congestion control in satellite environments.
IEEE J. Sel. Areas Commun., 2004

A dynamic query-tree energy balancing protocol for sensor networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Queueing Analysis and Delay Mitigation in IEEE 802.11 Random Access MAC based Wireless Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A queueing model for finite load IEEE 802.11 random access MAC.
Proceedings of IEEE International Conference on Communications, 2004

Distance-aware virtual carrier sensing for improved spatial reuse in wireless networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Early detection of BGP instabilities resulting from Internet worm attacks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

On the impact of route processing and MRAI timers on BGP convergence times.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Analytic models for the latency and steady-state throughput of TCP tahoe, Reno, and SACK.
IEEE/ACM Trans. Netw., 2003

On the impact of IEEE 802.11 MAC on traffic characteristics.
IEEE J. Sel. Areas Commun., 2003

Multicast loss recovery with active injection.
Proceedings of the 12th International Conference on Computer Communications and Networks, 2003

Scalable and distributed GPS free positioning for sensor networks.
Proceedings of IEEE International Conference on Communications, 2003

Improving spatial reuse of IEEE 802.11 based ad hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

A multicast congestion control scheme for mobile ad-hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Input queued switches for variable length packets: analysis for Poisson and self-similar traffic.
Comput. Commun., 2002

Routing-Based Video Multicast Congestion Control.
Proceedings of the Management of Multimedia on the Internet, 2002

Modeling and analysis of traffic characteristics in IEEE 802.11 MAC based networks.
Proceedings of the Global Telecommunications Conference, 2002

On reducing the degree of second-order scaling in network traffic.
Proceedings of the Global Telecommunications Conference, 2002

2001
Integral expressions for the numerical evaluation of product form expressions over irregular multidimensional integer state spaces.
Telecommun. Syst., 2001

An integrated model for the latency and steady-state throughput of TCP connections.
Perform. Evaluation, 2001

On the Contribution of TCP to the Self-Similarity of Network Traffic.
Proceedings of the Evolutionary Trends of the Internet, 2001

A Multiplicative Multifractal Model for TCP Traffic.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Traffic management and network control using collaborative on-line simulation.
Proceedings of the IEEE International Conference on Communications, 2001

Variable Length Packet Switches: Input Queued Fabrics with Finite Buffers, Speedup, and Parallelism.
Proceedings of the High Performance Computing - HiPC 2001, 8th International Conference, 2001

Analytic models and comparative study of the latency and steady-state throughput of TCP Tahoe, Reno and SACK.
Proceedings of the Global Telecommunications Conference, 2001

2000
Queueing analysis of scheduling policies in copy networks of space-based multicast packet switches.
IEEE/ACM Trans. Netw., 2000

Variable Length Packet Switches: Delay Analysis of Crossbar Switches under Poisson and Self Similar Traffic.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000


  Loading...