Chandra Thapa

Orcid: 0000-0002-3855-3378

According to our database1, Chandra Thapa authored at least 44 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Access-Based Lightweight Physical-Layer Authentication for the Internet of Things Devices.
IEEE Internet Things J., April, 2024

From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways.
CoRR, 2024

A Hybrid Quantum Neural Network for Split Learning.
CoRR, 2024

Attacking Slicing Network via Side-channel Reinforcement Learning Attack.
CoRR, 2024

MTDSense: AI-Based Fingerprinting of Moving Target Defense Techniques in Software-Defined Networking.
CoRR, 2024

Elevating Software Trust: Unveiling and Quantifying the Risk Landscape.
CoRR, 2024

ST-DPGAN: A Privacy-preserving Framework for Spatiotemporal Data Generation.
CoRR, 2024

One-Shot Collaborative Data Distillation.
Proceedings of the ECAI 2024 - 27th European Conference on Artificial Intelligence, 19-24 October 2024, Santiago de Compostela, Spain, 2024

MTD in Plain Sight: Hiding Network Behavior in Moving Target Defenses.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
Graph Lifelong Learning: A Survey.
IEEE Comput. Intell. Mag., February, 2023

Evaluation of Federated Learning in Phishing Email Detection.
Sensors, 2023

Entropy Causal Graphs for Multivariate Time Series Anomaly Detection.
CoRR, 2023

Radio Signal Classification by Adversarially Robust Quantum Machine Learning.
CoRR, 2023

Federated Split Learning with Only Positive Labels for resource-constrained IoT environment.
CoRR, 2023

ACE: A Consent-Embedded privacy-preserving search on genomic database.
CoRR, 2023

Discretization-based ensemble model for robust learning in IoT.
CoRR, 2023

Vertical Federated Learning: Taxonomies, Threats, and Prospects.
CoRR, 2023

Enabling All In-Edge Deep Learning: A Literature Review.
IEEE Access, 2023

Beyond Key-Based Authentication: A Novel Continuous Authentication Paradigm for IoTs.
Proceedings of the IEEE Globecom Workshops 2023, 2023

POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined Networking.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things.
IEEE Trans. Computers, 2022

Bushfire Risk Detection Using Internet of Things: An Application Scenario.
IEEE Internet Things J., 2022

Enabling Deep Learning for All-in EDGE paradigm.
CoRR, 2022

Transformer-Based Language Models for Software Vulnerability Detection: Performance, Model's Security and Platforms.
CoRR, 2022

Demo - MaLFraDA: A Machine Learning Framework with Data Airlock.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Transformer-Based Language Models for Software Vulnerability Detection.
Proceedings of the Annual Computer Security Applications Conference, 2022

SplitFed: When Federated Learning Meets Split Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Splitfed learning without client-side synchronization: Analyzing client-side split network portion size to overall performance.
CoRR, 2021

Precision health data: Requirements, challenges and existing techniques for data security and privacy.
Comput. Biol. Medicine, 2021

FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2021

Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021

2020
Advancements of federated learning towards privacy preservation: from federated learning to split learning.
CoRR, 2020

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning.
CoRR, 2020

SplitFed: When Federated Learning Meets Split Learning.
CoRR, 2020

End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT).
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Can We Use Split Learning on 1D CNN Models for Privacy Preserving Training?
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Structural Characteristics of Two-Sender Index Coding.
Entropy, 2019

2018
Corrections to "Interlinked Cycles for Index Coding: Generalizing Cycles and Cliques".
IEEE Trans. Inf. Theory, 2018

2017
Interlinked Cycles for Index Coding: Generalizing Cycles and Cliques.
IEEE Trans. Inf. Theory, 2017

2016
Graph-Theoretic Approaches to Two-Sender Index Coding.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016

2015
Generalized interlinked cycle cover for index coding.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

A new index coding scheme exploiting interlinked cycles.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2012
Analysis of Fractional Frequency Reuse (FFR) over Classical Reuse Scheme in 4G (LTE) Cellular Network.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012


  Loading...