Mahalingam Ramkumar

Orcid: 0000-0003-3183-0165

According to our database1, Mahalingam Ramkumar authored at least 72 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Bayesian-Guided Generation of Synthetic Microbiomes with Minimized Pathogenicity.
CoRR, 2024

Towards Interpreting Multi-Objective Feature Associations.
CoRR, 2024

Deep Sensitivity Analysis for Objective-Oriented Combinatorial Optimization.
CoRR, 2024

Towards Interpreting Multi-Objective Feature Associations.
Proceedings of the IEEE International Systems Conference, 2024

EndToEndML: An Open-Source End-to-End Pipeline for Machine Learning Applications.
Proceedings of the 7th International Conference on Information and Computer Technologies, 2024

2023
IoT and Blockchain Integration: Applications, Opportunities, and Challenges.
Network, 2023

Optimization of Merkle Tree Structures: A Focus on Subtree Implementation.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023

Towards Optimal Microbiome to Inhibit Multidrug Resistance.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2023

2022
A Scalable Trustworthy Infrastructure for Collaborative Container Repositories.
Distributed Ledger Technol. Res. Pract., 2022

2019
Secure Queryable Dynamic Graphs using Blockchain.
Proceedings of the First IEEE International Conference on Trust, 2019

Redistricting using Blockchain Network.
Proceedings of the First IEEE International Conference on Trust, 2019

2018
A Scalable, Trustworthy Infrastructure for Collaborative Container Repositories.
CoRR, 2018

A TCB Minimizing Model of Computation.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

2014
A Trustworthy Assurance-as-a-Service Architecture.
Proceedings of the Intelligent Systems and Applications, 2014

2013
Statistical Methods for Ambiguous Sequence Mappings.
Proceedings of the ACM Conference on Bioinformatics, 2013

2012
Trustworthy TCB for DNS Servers.
Int. J. Netw. Secur., 2012

An Efficient TCB for a Generic Content Distribution System.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
Minimizing the TCB for securing SCADA systems.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Securing File Storage in an Untrusted Server - Using a Minimal Trusted Computing Base.
Proceedings of the CLOSER 2011, 2011

2010
The subset keys and identity tickets (SKIT) key distribution scheme.
IEEE Trans. Inf. Forensics Secur., 2010

Minimal trusted computing base for MANET nodes.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

2009
Private logical neighborhoods for wireless ad hoc networks.
Proceedings of the Q2SWinet'09, Proceedings of the Fifth ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Tenerife, Canary Islands, Spain, 2009

2008
Trustworthy Computing under Resource Constraints with the DOWN Policy.
IEEE Trans. Dependable Secur. Comput., 2008

Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications.
IACR Cryptol. ePrint Arch., 2008

Improving the resiliency of Ariadne.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

On the scalability of an efficient "Nonscalable" key distribution scheme.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Proxy Aided Key Pre-distribution Schemes for Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008

A Framework for Dual-Agent MANET Routing Protocols.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Improved utilization of embedding distortion in scalar quantization based data hiding techniques.
Signal Process., 2007

Broadcast Authentication With Preferred Verifiers.
Int. J. Netw. Secur., 2007

Covert Channels In Ad-hoc Networks.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

Safeguarding Mutable Fields in AODV Route Discovery Process.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

An Efficient Secure Route Discovery Protocol for DSR.
Proceedings of the Global Communications Conference, 2007

2006
An overview of scalar quantization based data hiding methods.
Signal Process., 2006

Broadcast Encryption Using Probabilistic Key Distribution and Applications.
J. Comput., 2006

Secure collaborations over message boards.
Int. J. Secur. Networks, 2006

On the Effect of One-way Links on Route Discovery in DSR.
Proceedings of the 15th International Conference On Computer Communications and Networks, 2006

An Efficient Broadcast Authentication Scheme for Ad Hoc Routing Protocols.
Proceedings of IEEE International Conference on Communications, 2006

I-HARPS: An Efficient Key Predistribution Scheme for Mobile Computing Applications.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
An efficient key predistribution scheme for ad hoc network security.
IEEE J. Sel. Areas Commun., 2005

Broadcast Encryption with Random Key Pre-distribution Schemes.
IACR Cryptol. ePrint Arch., 2005

I-HARPS: An Efficient Key Pre-distribution Scheme.
IACR Cryptol. ePrint Arch., 2005

Broadcast Authentication With Hashed Random Preloaded Subsets.
IACR Cryptol. ePrint Arch., 2005

2004
Signaling methods for multimedia steganography.
IEEE Trans. Signal Process., 2004

On the design of data hiding methods robust to lossy compression.
IEEE Trans. Multim., 2004

A robust protocol for proving ownership of multimedia content.
IEEE Trans. Multim., 2004

Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance.
IACR Cryptol. ePrint Arch., 2004

Linear and Nonlinear Oblivious Data Hiding.
EURASIP J. Adv. Signal Process., 2004

A system for digital rights management using key predistribution.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

A classifier design for detecting Image manipulations.
Proceedings of the 2004 International Conference on Image Processing, 2004

An analysis of quantization based embedding-detection techniques.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

Information flow based routing algorithms for wireless sensor networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

An efficient random key pre-distribution scheme.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
HARPS: HAshed Random Preloaded Subset Key Distribution.
IACR Cryptol. ePrint Arch., 2003

A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques.
Proceedings of the 2003 International Conference on Image Processing, 2003

Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

2002
Improvements on data hiding for lossy compression.
Proceedings of the IEEE International Conference on Acoustics, 2002

Security and synchronization in watermark sequence.
Proceedings of the IEEE International Conference on Acoustics, 2002

2001
Capacity estimates for data hiding in compressed images.
IEEE Trans. Image Process., 2001

Set partitioning in oblivious data hiding.
Proceedings of the IEEE International Conference on Acoustics, 2001

MP3 resistant oblivious steganography.
Proceedings of the IEEE International Conference on Acoustics, 2001

2000
Robust Protocols for Proving Ownership of Images.
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000

A Robust Oblivious Watermarking Scheme.
Proceedings of the 2000 International Conference on Image Processing, 2000

Floating Signal Constellations for Multimedia Steganography.
Proceedings of the 2000 IEEE International Conference on Communications: Global Convergence Through Communications, 2000

FFT based signaling for multimedia steganography.
Proceedings of the IEEE International Conference on Acoustics, 2000

A new method for detection of watermarks in geometrically distorted images.
Proceedings of the IEEE International Conference on Acoustics, 2000

1999
On the implementation of 2-band cyclic filterbanks.
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999

A Robust Data Hiding Scheme for Images Using DFT.
Proceedings of the 1999 International Conference on Image Processing, 1999

On the choice of transforms for data hiding in compressed video.
Proceedings of the 1999 IEEE International Conference on Acoustics, 1999

1998
Information theoretic bounds for data hiding in compressed images.
Proceedings of the Second IEEE Workshop on Multimedia Signal Processing, 1998

1997
An FFT-based technique for fast fractal image compression.
Signal Process., 1997


  Loading...