J. Harshan

According to our database1, J. Harshan authored at least 27 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On Homomorphic Encryption Based Strategies for Class Imbalance in Federated Learning.
CoRR, 2024

Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

On High-Rate, Low-Overhead Mitigation Strategies Against Cognitive Adversaries.
Proceedings of the National Conference on Communications, 2024

Analog Lagrange Coded Computing: On the Curious Case of Adversarial Workers.
Proceedings of the National Conference on Communications, 2024

On Securing Analog Lagrange Coded Computing from Colluding Adversaries.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Optimized Denial-of-Service Threats on the Scalability of LT Coded Blockchains.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Self-Sustainable Key Generation: Strategies and Performance Bounds under DoS Attacks.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

On Distribution-Preserving Mitigation Strategies for Communication under Cognitive Adversaries.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
Path-Aware OMP Algorithms for Provenance Recovery in Wireless Networks.
Proceedings of the 95th IEEE Vehicular Technology Conference, 2022

2021
Do Not Forget the Past: A Buffer-Aided Framework for Relay Based Key Generation.
CoRR, 2021

Path-Aware OMP Algorithms for Provenance Recovery in Vehicular Networks.
CoRR, 2021

On Opportunistic Selection of Common Randomness and LLR generation for Algebraic Group Secret-Key Generation.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

2019
Achievable Rates of Attack Detection Strategies in Echo-Assisted Communication.
CoRR, 2019

Low-Latency Exchange of Common Randomness for Group-Key Generation.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019

2018
Group Secret-Key Generation using Algebraic Rings in Three-User Wireless Networks.
CoRR, 2018

RASI: Relay-Assisted Physical-Layer Key Generation in Unmanned Aerial Vehicles.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

Practical Physical-Layer Group Secret-Key Generation in Three-User Wireless Networks.
Proceedings of the 2018 International Conference on Signal Processing and Communications (SPCOM), 2018

2017
Performance of lattice coset codes on Universal Software Radio Peripherals.
Phys. Commun., 2017

On shaping complex lattice constellations from multi-level constructions.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Differential Erasure Codes for Efficient Archival of Versioned Data in Cloud Storage Systems.
Trans. Large Scale Data Knowl. Centered Syst., 2016

DiVers: An erasure code based storage architecture for versioning exploiting sparsity.
Future Gener. Comput. Syst., 2016

Performance of Lattice Coset Codes on a USRP Testbed.
CoRR, 2016

Sparsity exploiting erasure coding for distributed storage of versioned data.
Computing, 2016

2015
Compressed Differential Erasure Codes for Efficient Archival of Versioned Data.
CoRR, 2015

On Algebraic Manipulation Detection codes from linear codes and their application to storage systems.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Sparsity Exploiting Erasure Coding for Resilient Storage and Efficient I/O Access in Delta Based Versioning Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

2014
A USRP implementation of wiretap lattice codes.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014


  Loading...