Manjesh Kumar Hanawal

Orcid: 0000-0002-1807-5487

According to our database1, Manjesh Kumar Hanawal authored at least 109 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
UB3: Fixed Budget Best Beam Identification in mmWave Massive MISO via Pure Exploration Unimodal Bandits.
IEEE Trans. Wirel. Commun., October, 2024

Learning Optimal Phase-Shifts of Holographic Metasurface Transceivers.
IEEE Trans. Wirel. Commun., June, 2024

Fixed Budget Best Arm Identification in Unimodal Bandits.
Trans. Mach. Learn. Res., 2024

Distributed Inference on Mobile Edge and Cloud: An Early Exit based Clustering Approach.
CoRR, 2024

HoloBeam: Learning Optimal Beamforming in Far-Field Holographic Metasurface Transceivers.
Proceedings of the IEEE INFOCOM 2024, 2024

I-SplitEE: Image Classification in Split Computing DNNs with Early Exits.
Proceedings of the IEEE International Conference on Communications, 2024

CapEEN: Image Captioning with Early Exits and Knowledge Distillation.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

DAdEE: Unsupervised Domain Adaptation in Early Exit PLMs.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

FAIR: Filtering of Automatically Induced Rules.
Proceedings of the 18th Conference of the European Chapter of the Association for Computational Linguistics, 2024

CeeBERT: Cross-Domain Inference in Early Exit BERT.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
FairNet: A Measurement Framework for Traffic Discrimination Detection on the Internet.
IEEE Trans. Netw. Serv. Manag., December, 2023

Radar Enhanced Multi-Armed Bandit for Rapid Beam Selection in Millimeter Wave Communications.
IEEE Commun. Lett., September, 2023

Almost exact risk budgeting with return forecasts for portfolio allocation.
Oper. Res. Lett., March, 2023

Online Universal Dirichlet Factor Portfolios.
CoRR, 2023

UB3: Best Beam Identification in Millimeter Wave Systems via Pure Exploration Unimodal Bandits.
CoRR, 2023

Continuous Time Bandits with Sampling Costs.
Proceedings of the 21st International Symposium on Modeling and Optimization in Mobile, 2023

ICQ: A Quantization Scheme for Best-Arm Identification Over Bit-Constrained Channels.
Proceedings of the 21st International Symposium on Modeling and Optimization in Mobile, 2023

AdaEE: Adaptive Early-Exit DNN Inference Through Multi-Armed Bandits.
Proceedings of the IEEE International Conference on Communications, 2023

Thwarting Piracy: Anti-debugging Using GPU-assisted Self-healing Codes.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

State of Internet Privacy and Tales of ECH-TLS.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

Securing Containers: Honeypots for Analysing Container Attacks.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

Fixed Budget Beam Identification in Millimeter Wave Systems via Unimodal Bandits.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

Improving Threat Detection Capabilities in Windows Endpoints with Osquery.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

SplitEE: Early Exit in Deep Neural Networks with Split Computing.
Proceedings of the Third International Conference on AI-ML Systems, 2023

2022
Profit Sharing Contracts Between Content and Service Providers for Enhanced Network Quality.
IEEE Trans. Netw. Serv. Manag., 2022

Multiplay Multiarmed Bandit Algorithm Based Sensing of Noncontiguous Wideband Spectrum for AIoT Networks.
IEEE Trans. Ind. Informatics, 2022

Regret of Age-of-Information Bandits.
IEEE Trans. Commun., 2022

Multiplayer Bandits: A Trekking Approach.
IEEE Trans. Autom. Control., 2022

Challenges in Adapting ECH in TLS for Privacy Enhancement over the Internet.
CoRR, 2022

Exploiting Side Information for Improved Online Learning Algorithms in Wireless Networks.
CoRR, 2022

Extended TLS: Masking Server Host Identity on the Internet Using Encrypted TLS Handshake.
Proceedings of the IEEE International Conference on Signal Processing and Communications, 2022

Exploiting Side Information for Intelligent and Reconfigurable PHY: Experiments on LTE Transceivers.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Evading Malware Analysis Using Reverse Execution.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool and Improvements.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Multi-Player Age-of-Information Bandits: A Trekking Approach.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Threat Detection and Response in Linux Endpoints.
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022

Unsupervised Early Exit in DNNs with Multiple Exits.
Proceedings of the Second International Conference on AI-ML Systems, 2022

2021
Learning to Optimize Energy Efficiency in Energy Harvesting Wireless Sensor Networks.
IEEE Wirel. Commun. Lett., 2021

Revenue sharing on the Internet: A case for going soft on neutrality regulations.
Perform. Evaluation, 2021

Federated Learning for Intrusion Detection in IoT Security: A Hybrid Ensemble Approach.
CoRR, 2021

Censored Semi-Bandits for Resource Allocation.
CoRR, 2021

Masking Host Identity on Internet: Encrypted TLS/SSL Handshake.
CoRR, 2021

Stochastic Multi-Armed Bandits with Control Variates.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Unsupervised Learning of Explainable Parse Trees for Improved Generalisation.
Proceedings of the International Joint Conference on Neural Networks, 2021

Monitoring COVID Hotspots Using Telecom Data: Voronoi Tessellations for Marking Buffer Zones.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

Challenges in Net Neutrality Violation Detection: A Case Study of Wehe Tool.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
Zero-Rating of Content and Its Effect on the Quality of Service in the Internet.
IEEE/ACM Trans. Netw., 2020

Learning to Coordinate in a Decentralized Cognitive Radio Network in Presence of Jammers.
IEEE Trans. Mob. Comput., 2020

Cognitive Networks With In-Band Full-Duplex Radios: Jamming Attacks and Countermeasures.
IEEE Trans. Cogn. Commun. Netw., 2020

Effective Utilization of Licensed and Unlicensed Spectrum in Large Scale Ad Hoc Networks.
IEEE Trans. Cogn. Commun. Netw., 2020

Distributed Learning and Coordination in Cognitive Infrastructureless Networks of Unknown Size.
IEEE Syst. J., 2020

Distributed Learning in Ad-Hoc Networks: A Multi-player Multi-armed Bandit Framework.
CoRR, 2020

Age-of-Information Bandits.
Proceedings of the 18th International Symposium on Modeling and Optimization in Mobile, 2020

Learning and Fairness in Energy Harvesting: A Maximin Multi-Armed Bandits Approach.
Proceedings of the International Conference on Signal Processing and Communications, 2020

Online Algorithm for Unsupervised Sequential Selection with Contextual Information.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Stochastic Network Utility Maximization with Unknown Utilities: Multi-Armed Bandits Approach.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Distributed Algorithm for Opportunistic Spectrum Access in Dynamic Ad Hoc Networks.
Proceedings of the 16th International Conference on Distributed Computing in Sensor Systems, 2020

Unsupervised Online Feature Selection for Cost-Sensitive Medical Diagnosis.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

Revenue Sharing in a Soft-Neutral Regime.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

Detection of Traffic Discrimination in the Internet.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

Thompson Sampling for Unsupervised Sequential Selection.
Proceedings of The 12th Asian Conference on Machine Learning, 2020

2019
Learning Policies for Markov Decision Processes From Data.
IEEE Trans. Autom. Control., 2019

Multi-Player Multi-Armed Bandits for Stable Allocation in Heterogeneous Ad-Hoc Networks.
IEEE J. Sel. Areas Commun., 2019

Distributed Algorithm for Learning to Coordinate in Infrastructure-Less Network.
IEEE Commun. Lett., 2019

Revenue Sharing in the Internet: A Moral Hazard Approach and a Net-neutrality Perspective.
CoRR, 2019

Distributed Algorithms for Efficient Learning and Coordination in Ad Hoc Networks.
Proceedings of the International Symposium on Modeling and Optimization in Mobile, 2019

Censored Semi-Bandits: A Framework for Resource Allocation with Censored Feedback.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Distributed Learning and Optimal Assignment in Multiplayer Heterogeneous Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Pricing in Ride Sharing Platforms: Static vs Dynamic Strategies.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

Revenue Sharing Between Service Providers in the Internet: A Moral Hazard Approach.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

Representation Learning on Graphs by Integrating Content and Structure Information.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

Online Algorithm for Unsupervised Sensor Selection.
Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, 2019

2018
Distributed Learning in Ad-Hoc Networks with Unknown Number of Players.
SIGMETRICS Perform. Evaluation Rev., 2018

Distributed Learning and Stable Orthogonalization in Ad-Hoc Networks with Heterogeneous Channels.
CoRR, 2018

Multi-Player Bandits: A Trekking Approach.
CoRR, 2018

Distributed learning algorithms for coordination in a cognitive network in presence of jammers.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Trekking based distributed algorithm for opportunistic spectrum access in infrastructure-less network.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Differential pricing of traffic in the Internet.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

User Response Based Recommendations.
Proceedings of the Communication Systems and Networks - 10th International Conference, 2018

User response based recommendations: A local angle approach.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

Unsupervised cost sensitive predictions with side information.
Proceedings of the ACM India Joint International Conference on Data Science and Management of Data, 2018

2017
Throughput maximization of large-scale secondary networks over licensed and unlicensed spectra.
Proceedings of the 15th International Symposium on Modeling and Optimization in Mobile, 2017

Unsupervised Sequential Sensor Acquisition.
Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 2017

2016
Joint Adaptation of Frequency Hopping and Transmission Rate for Anti-Jamming Wireless Systems.
IEEE Trans. Mob. Comput., 2016

Sequential Learning without Feedback.
CoRR, 2016

Jamming attack on in-band full-duplex communications: Detection and countermeasures.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Efficient algorithms for linear polyhedral bandits.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

Learning parameterized policies for Markov decision processes through demonstrations.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Algorithms for Linear Bandits on Polyhedral Sets.
CoRR, 2015

Stochastic Geometric Models for Green Networking.
IEEE Access, 2015

Cheap Bandits.
Proceedings of the 32nd International Conference on Machine Learning, 2015

Efficient detection and localization on graph structured data.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

Cost effective algorithms for spectral bandits.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Regulation of Off-Network Pricing in a Nonneutral Network.
ACM Trans. Internet Techn., 2014

Game theoretic anti-jamming dynamic frequency hopping and rate adaptation in wireless systems.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

2013
Analysis of Spatial and Economical Effects in Communication Networks (Analyse des effets spatiaux et aspects économiques dans les réseaux de communications).
PhD thesis, 2013

Network non-neutrality through preferential signaling.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Modeling and Simulation of Mobility of Crowds.
Proceedings of the Analytical and Stochastic Modelling Techniques and Applications, 2013

2012
Game theoretic analysis of collusions in nonneutral networks.
SIGMETRICS Perform. Evaluation Rev., 2012

Stochastic Geometry Based Medium Access Games in Wireless Ad Hoc Networks.
IEEE J. Sel. Areas Commun., 2012

Nonneutral network and the role of bargaining power in side payments
CoRR, 2012

Stochastic Geometry based jamming games in Mobile Ad hoc Networks.
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012

Stochastic geometry based medium access games.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
The Shannon Cipher System With a Guessing Wiretapper: General Sources.
IEEE Trans. Inf. Theory, 2011

Guessing Revisited: A Large Deviations Approach.
IEEE Trans. Inf. Theory, 2011

Tradeoffs in green cellular networks.
SIGMETRICS Perform. Evaluation Rev., 2011

Stochastic Geometry based Medium Access Games in Mobile Ad hoc Networking
CoRR, 2011

Spatio-temporal Control for Dynamic Routing Games.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

Net Neutrality and Quality of Service.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011


  Loading...