Rakesh Bobba

Orcid: 0000-0002-5440-0785

According to our database1, Rakesh Bobba authored at least 80 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ROS2-Based Simulation Framework for Cyberphysical Security Analysis of UAVs.
CoRR, 2024

2023
BERT Lost Patience Won't Be Robust to Adversarial Slowdown.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Beyond Just Safety: Delay-aware Security Monitoring for Real-time Control Systems.
ACM Trans. Cyber Phys. Syst., 2022

If This Context Then That Concern: Exploring users' concerns with IFTTT applets.
Proc. Priv. Enhancing Technol., 2022

Adversarial Images Against Super-Resolution Convolutional Neural Networks for Free.
Proc. Priv. Enhancing Technol., 2022

2021
Resilience Against Data Manipulation in Distributed Synchrophasor-Based Mode Estimation.
IEEE Trans. Smart Grid, 2021

On the (Im)Practicality of Adversarial Perturbation for Image Privacy.
Proc. Priv. Enhancing Technol., 2021

Safety Critical Networks using Commodity SDNs.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Fourth International Workshop on Dependable and Secure Machine Learning - DSML 2021.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2020
Adversarial Profiles: Detecting Out-Distribution & Adversarial Samples in Pre-trained CNNs.
CoRR, 2020

On Scheduler Side-Channels in Dynamic-Priority Real-Time Systems.
CoRR, 2020

Improving Dependability via Deadline Guarantees in Commodity Real-time Networks.
Proceedings of the IEEE Globecom Workshops, 2020

Toward Metrics for Differentiating Out-of-Distribution Sets.
Proceedings of the ECAI 2020 - 24th European Conference on Artificial Intelligence, 29 August-8 September 2020, Santiago de Compostela, Spain, August 29 - September 8, 2020, 2020

Third International Workshop on Dependable and Secure Machine Learning - DSML 2020.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2020

Period Adaptation for Continuous Security Monitoring in Multicore Real-Time Systems.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks.
Proceedings of the Advances in Artificial Intelligence, 2020

2019
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption.
IACR Cryptol. ePrint Arch., 2019

MultiK: A Framework for Orchestrating Multiple Specialized Kernels.
CoRR, 2019

False Data Detection in Distributed Oscillation Mode Estimation using Hierarchical k-means.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Novel Side-Channel in Real-Time Schedulers.
Proceedings of the 25th IEEE Real-Time and Embedded Technology and Applications Symposium, 2019

2018
Controlling Over-generalization and its Effect on Adversarial Examples Generation and Detection.
CoRR, 2018

ScheduLeak: A Novel Scheduler Side-Channel Attack Against Real-Time Autonomous Control Systems.
CoRR, 2018

Towards Dependable Deep Convolutional Neural Networks (CNNs) with Out-distribution Learning.
CoRR, 2018

Scheduling, Isolation, and Cache Allocation: A Side-Channel Defense.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

A design-space exploration for allocating security tasks in multicore real-time systems.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

Learning Based Anomaly Detection for Industrial Arm Applications.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

2017
Approximate Thumbnail Preserving Encryption.
IACR Cryptol. ePrint Arch., 2017

A Novel Scheduling Framework Leveraging Hardware Cache Partitioning for Cache-Side-Channel Elimination in Clouds.
CoRR, 2017

Dependable End-to-End Delay Constraints for Real-Time Systems using SDNs.
CoRR, 2017

A Reconnaissance Attack Mechanism for Fixed-Priority Real-Time Systems.
CoRR, 2017

Understanding user perceptions of privacy, and configuration challenges in home automation.
Proceedings of the 2017 IEEE Symposium on Visual Languages and Human-Centric Computing, 2017

End-to-End Network Delay Guarantees for Real-Time Systems Using SDN.
Proceedings of the 2017 IEEE Real-Time Systems Symposium, 2017

Trustworthy Services Built on Event-Based Probing for Layered Defense.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

Contego: An Adaptive Framework for Integrating Security Tasks in Real-Time Systems.
Proceedings of the 29th Euromicro Conference on Real-Time Systems, 2017

I'm too Busy to Reset my LinkedIn Password: On the Effectiveness of Password Reset Emails.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

CPS-SPC 2017: Third Workshop on Cyber-Physical Systems Security and PrivaCy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Integrating security constraints into fixed priority real-time schedulers.
Real Time Syst., 2016

Next-Generation Access Control for Distributed Control Systems.
IEEE Internet Comput., 2016

Cyber-Physical models for power grid security analysis: 8-substation case.
Proceedings of the 2016 IEEE International Conference on Smart Grid Communications, 2016

Exploring Opportunistic Execution for Integrating Security into Legacy Hard Real-Time Systems.
Proceedings of the 2016 IEEE Real-Time Systems Symposium, 2016

A Resilient Algorithm for Power System Mode Estimation using Synchrophasors.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016

Second Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC'16).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Cyber-Physical Modeling and Assessment Framework for Power Grid Infrastructures.
IEEE Trans. Smart Grid, 2015

On the Memorability of System-generated PINs: Can Chunking Help?
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

A generalized model for preventing information leakage in hard real-time systems.
Proceedings of the 21st IEEE Real-Time and Embedded Technology and Applications Symposium, 2015

Inter-flow consistency: A novel SDN update abstraction for supporting inter-flow constraints.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

First Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC): Challenges and Research Directions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures.
IEEE Trans. Smart Grid, 2014

A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014

A risk assessment tool for advanced metering infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

On the practicality of detecting anomalies with encrypted traffic in AMI.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Real-Time Systems Security through Scheduler Constraints.
Proceedings of the 26th Euromicro Conference on Real-Time Systems, 2014

Moving Target Defense for Hardening the Security of the Power System State Estimation.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures.
Proceedings of the American Control Conference, 2014

2013
Limiting Data Exposure in Monitoring Multi-domain Policy Conformance.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Confidentiality-preserving obfuscation for cloud-based power system contingency analysis.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Formal design of communication checkers for ICCP using UPPAAL.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Assessing software integrity of virtual appliances through software whitelists.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Cloud Computing for the Power Grid: From Service Composition to Assured Clouds.
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing, 2013

Towards SDN enabled network control delegation in clouds.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

An empirical study on the software integrity of virtual appliances: are you really getting what you paid for?
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Formal Analysis of Fault-tolerant Group Key Management Using ZooKeeper.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

2012
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures.
IEEE Trans. Smart Grid, 2012

AMI threats, intrusion detection requirements and deployment recommendations.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Power flow cyber attacks and perturbation-based defense.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

A framework integrating attribute-based policies into role-based access control.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Topology Perturbation for Detecting Malicious Data Injection.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Evidence of log integrity in policy-based security monitoring.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

2010
Attribute-Based Messaging: Access Control and Confidentiality.
ACM Trans. Inf. Syst. Secur., 2010

Design Principles for Power Grid Cyber-Infrastructure Authentication Protocols.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2009

Usable secure mailing lists with untrusted servers.
Proceedings of the IDtrust 2009, 2009

PBES: a policy based encryption system with application to data sharing in the power grid.
Proceedings of the 2009 ACM Symposium on Information, 2009

2007
DLPKH - Distributed Logical Public-Key Hierarchy.
Proceedings of the Information Systems Security, Third International Conference, 2007

2006
Using Attribute-Based Access Control to Enable Attribute-Based Messaging.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Administering Access Control in Dynamic Coalitions.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005

2003
Bootstrapping security associations for routing in mobile ad-hoc networks.
Proceedings of the Global Telecommunications Conference, 2003

Integrated Security Services for Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003


  Loading...