Sachin Shetty

Orcid: 0000-0002-8789-0610

Affiliations:
  • Old Dominion University, Department of Modeling, Simulation and Visualization Engineering, Norfolk, VA, USA
  • Tennessee State University, Nashville, TN, USA (2009 - 2016)
  • Rowan University, Glassboro, NJ, USA (2008 - 2009)
  • Old Dominion University, Norfolk, VA, USA (PhD 2007)


According to our database1, Sachin Shetty authored at least 258 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A centralized delay-sensitive hierarchical computation offloading in fog radio access networks.
J. Supercomput., December, 2024

An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things.
IEEE Trans. Intell. Transp. Syst., June, 2024

Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical CFT/BFT consensus groups, IPFS and novel hardware design.
Internet Things, April, 2024

Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., March, 2024

Multi-Timescale Actor-Critic Learning for Computing Resource Management With Semi-Markov Renewal Process Mobility.
IEEE Trans. Intell. Transp. Syst., January, 2024

ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications.
IEEE Trans. Netw. Sci. Eng., 2024

TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization.
IEEE Trans. Inf. Forensics Secur., 2024

Age of correlated information-optimal dynamic policy scheduling for sustainable Green IoT devices: A multi-agent deep reinforcement learning approach.
Internet Things, 2024

Biocybersecurity and Applications of Predictive Physiological Modeling.
Int. J. Syst. Syst. Eng., 2024

Biocybersecurity and applications of predictive physiological modelling.
Int. J. Syst. Syst. Eng., 2024

Advancing Healthcare: Innovative ML Approaches for Improved Medical Imaging in Data-Constrained Environments.
CoRR, 2024

Accuracy-Privacy Trade-off in the Mitigation of Membership Inference Attack in Federated Learning.
CoRR, 2024

User preference-aware content caching strategy for video delivery in cache-enabled IoT networks.
Comput. Networks, 2024

Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security.
IEEE Access, 2024

A Secure and Privacy-Preserving Signature Protocol Using Quantum Teleportation in Metaverse Environment.
IEEE Access, 2024

Enhancing Cyber Resilience Through Traffic Generation Patterns in Complex Networks: A Study on Cascading Failures.
IEEE Access, 2024

A Defensive Strategy Against Android Adversarial Malware Attacks.
IEEE Access, 2024

CycleGAN-Gradient Penalty for Enhancing Android Adversarial Malware Detection in Gray Box Setting.
IEEE Access, 2024

Detecting Attacks and Optimizing Routes in Radio-frequency Networks Using Machine Learning and Graph Theory.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024

Enhancing Sentiment Analysis with Attention Mechanism and Bayesian-Lipschitz Recurrent Neural Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2024

WedaGPT - Generative-AI (with Custom-Trained Meta's Llama2 LLM), Blockchain, Self Sovereign Identity, NFT and Model Card Enabled Indigenous Medicine Platform.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

An Edge-Cloud Approach for Dynamic Resource Allocation in Drone Communication Networks.
Proceedings of the IEEE INFOCOM 2024, 2024

AnDet: ML-Based Anomaly Detection of UEs in a Multi-cell B5G Mobile Network for Improved QoS.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

An Attention-based AI Model for 3D Beam Prediction in THz Unmanned Aerial Vehicle Communication.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Data-Driven Joint Demodulation and Decoding in THz Communication Systems.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

RMF-GPT - OpenAI GPT-3.5 LLM, Blockchain, NFT, Model Cards and OpenScap Enabled Intelligent RMF Automation System.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Targeted Transfer Learning: Leveraging Optimal Transport for Enhanced Knowledge Transfer.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Sentiment Analysis With Lipschitz Recurrent Neural Networks Based Generative Adversarial Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

A Zero Trust Framework for Realization and Defense Against Generative AI Attacks in Power Grid.
Proceedings of the IEEE International Conference on Communications, 2024

Blockchain-Enabled Secure Device-to-Device Communication in Software-Defined Networking.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

Secure Location-based Authenticated Key Establishment Scheme for Maritime Communication.
Proceedings of the IEEE International Conference on Communications, 2024

Performance Analysis of Indoor 5G NR Systems.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

Self-Sovereign Identity Management in Ship-Based 5G-Devices Use Case.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

Predicting Downlink Retransmissions in 5G Networks Using Deep Learning.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
A review of IoT security and privacy using decentralized blockchain techniques.
Comput. Sci. Rev., November, 2023

Security of Internet of Things (IoT) using federated learning and deep learning - Recent advancements, issues and prospects.
ICT Express, October, 2023

Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS).
Int. J. Inf. Sec., June, 2023

Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus.
IEEE Trans. Veh. Technol., April, 2023

Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications.
IEEE Internet Things Mag., March, 2023

BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare.
IEEE Trans. Consumer Electron., February, 2023

Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme.
IEEE Internet Things J., January, 2023

Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare.
IEEE Trans. Inf. Forensics Secur., 2023

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges.
Secur. Priv., 2023

Neuro-Symbolic Explainable Artificial Intelligence Twin for Zero-Touch IoE in Wireless Network.
IEEE Internet Things J., 2023

Decentralizing Cyber Physical Systems for Resilience: An Innovative Case Study from A Cybersecurity Perspective.
Comput. Secur., 2023

Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications.
IEEE Access, 2023

An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks.
IEEE Access, 2023

Energy-Efficient Multi-Rate Opportunistic Routing in Wireless Mesh Networks.
IEEE Access, 2023

APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System.
IEEE Access, 2023

Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid.
Proceedings of the Winter Simulation Conference, 2023

Quantum-Enabled Blockchain for Data Processing and Management in Smart Cities.
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023

Vehicular Safety Revolution: A Cutting-Edge Communication Paradigm for Accident Prevention.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

Proof-of-Pedal - Pedal-Powered Byzantine Green Consensus for Blockchain.
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023

Transmission Power Control for Interference Reduction in Cellular D2D Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

U-Net Based Disaster Damage Detection Through Semantic Segmentation.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Sentiment Analysis With Lipschitz Recurrent Neural Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023

A Novel Smartphone-Based Human Activity Recognition Approach using Convolutional Autoencoder Long Short-Term Memory Network.
Proceedings of the 24th IEEE International Conference on Information Reuse and Integration for Data Science, 2023

Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Cyber Resilience Measurement Through Logical Attack Graph Analysis.
Proceedings of the IEEE International Conference on Communications, 2023

Communication-Efficient and Privacy-Preserving Edge-Cloud Framework For Smart Healthcare.
Proceedings of the IEEE Globecom Workshops 2023, 2023

Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment.
Proceedings of the IEEE Global Communications Conference, 2023

Advanced Federated Learning-Empowered Edge-Cloud Framework for School Safety Prediction and Emergency Alert System.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

GreenThread - Blockchain, Non-Fungible Token(NFT), Model Cards, Self-Sovereign Identity and IPFS Enabled Sustainable Circular Fashion Platform.
Proceedings of the Annual Modeling and Simulation Conference, 2023

2022
A Unified Health Information System Framework for Connecting Data, People, Devices, and Systems.
J. Glob. Inf. Manag., 2022

Casper: a blockchain-based system for efficient and secure customer credential verification.
J. Bank. Financial Technol., 2022

TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems.
IEEE Internet Things J., 2022

Guest Editorial Special Issue on Secure Data Analytics for Emerging Internet of Things.
IEEE Internet Things J., 2022

Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks.
Ad Hoc Networks, 2022

ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things.
IEEE Access, 2022

Towards AI Robustness Multi-Agent Adversarial Planning in Game Play.
Proceedings of the Winter Simulation Conference, 2022

Cyber Deception Metrics For Interconnected Complex Systems.
Proceedings of the Winter Simulation Conference, 2022

Moose: A Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2022

Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022

Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness.
Proceedings of the IEEE Military Communications Conference, 2022

Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace.
Proceedings of the IEEE Military Communications Conference, 2022

Generalized Adversarial and Hierarchical Co-occurrence Network based Synthetic Skeleton Generation and Human Identity Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2022

Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis.
Proceedings of the 23rd IEEE International Conference on High Performance Switching and Routing, 2022

Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

Deception for Characterizing Adversarial Strategies in Complex Networked Systems.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

LUUNU - Blockchain, MISP, Model Cards and Federated Learning Enabled Cyber Threat Intelligence Sharing Platform.
Proceedings of the Annual Modeling and Simulation Conference, 2022

A Proposed Framework for the Governance of Blockchain Technology.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems.
EAI Endorsed Trans. Security Safety, 2021

6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap.
Sensors, 2021

Rahasak - Scalable blockchain architecture for enterprise applications.
J. Syst. Archit., 2021

A blockchain empowered and privacy preserving digital contact tracing platform.
Inf. Process. Manag., 2021

Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers.
Int. J. Inf. Comput. Secur., 2021

Tikiri - Towards a lightweight blockchain for IoT.
Future Gener. Comput. Syst., 2021

Vind: A Blockchain-Enabled Supply Chain Provenance Framework for Energy Delivery Systems.
Frontiers Blockchain, 2021

Simulation for cybersecurity: state of the art and future directions.
J. Cybersecur., 2021

Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap.
IEEE Access, 2021

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.
IEEE Access, 2021

Resilient and Verifiable Federated Learning against Byzantine Colluding Attacks.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Selective Targeted Transfer Learning for Malware Classification.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures.
Proceedings of the IEEE International Conference on Communications, 2021

Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform.
Proceedings of the IEEE International Conference on Smart Computing, 2021

Promize - Blockchain and Self Sovereign Identity Empowered Mobile ATM Platform.
Proceedings of the Intelligent Computing, 2021

Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

Multi-Class Malware Classification Using Deep Residual Network with Non-SoftMax Classifier.
Proceedings of the 22nd IEEE International Conference on Information Reuse and Integration for Data Science, 2021

A Blockchain and Self-Sovereign Identity Empowered Digital Identity Platform.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

ATTL: An Automated Targeted Transfer Learning with Deep Neural Networks.
Proceedings of the IEEE Global Communications Conference, 2021

Dealing with the Domain Name Abuse: Issues and Approaches.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

CySCPro - Cyber Supply Chain Provenance Framework for Risk Management of Energy Delivery Systems.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Comparative Analysis of Elliptic Curve and Lattice Based Cryptography.
Proceedings of the Annual Modeling and Simulation Conference, 2021

2020
An SDN-IoT-based Framework for Future Smart Cities: Addressing Perspective.
CoRR, 2020

Exploring the Attack Surface of Blockchain: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2020

A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things.
IEEE Access, 2020

Measuring Decentrality in Blockchain Based Systems.
IEEE Access, 2020

SaaS - Microservices-Based Scalable Smart Contract Architecture.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

Enforcing Security and Privacy in Distributed Ledgers by Intel SGX.
Proceedings of the Spring Simulation Conference, 2020

A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments.
Proceedings of the Spring Simulation Conference, 2020

Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems.
Proceedings of the Security and Privacy in Communication Networks, 2020

Connect - Blockchain and Self-Sovereign Identity Empowered Contact Tracing Platform.
Proceedings of the Wireless Mobile Communication and Healthcare, 2020

Bassa-Scalable Blockchain Architecture for Smart Cities.
Proceedings of the IEEE International Smart Cities Conference, 2020

On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems.
Proceedings of the Blockchain - ICBC 2020, 2020

Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Attacker Capability based Dynamic Deception Model for Large-Scale Networks.
EAI Endorsed Trans. Security Safety, 2019

LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
Sensors, 2019

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment.
IEEE Internet Things J., 2019

Transfer learning for detecting unknown network attacks.
EURASIP J. Inf. Secur., 2019

Exploring the Attack Surface of Blockchain: A Systematic Overview.
CoRR, 2019

Security risk assessment for SDN-enabled smart grids.
Comput. Commun., 2019

Data Provenance in the Cloud: A Blockchain-Based Approach.
IEEE Consumer Electron. Mag., 2019

IoMT Malware Detection Approaches: Analysis and Research Challenges.
IEEE Access, 2019

Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go?
Proceedings of the 2019 Winter Simulation Conference, 2019

Security Analysis of Multiple SDN Controllers Based on Stochastic Petri Nets.
Proceedings of the 2019 Spring Simulation Conference, 2019

Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System.
Proceedings of the Security and Privacy in Communication Networks, 2019

Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019

Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain Wallets.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Optimal Cyber Defense Remediation in Energy Delivery Systems.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A State-aware Proof of Stake Consensus Protocol for Power System Resilience.
Proceedings of the Tenth ACM International Conference on Future Energy Systems, 2019

Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019

Yugala: Blockchain Based Encrypted Cloud Storage for IoT Data.
Proceedings of the IEEE International Conference on Blockchain, 2019

Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms.
Proceedings of the IEEE International Conference on Blockchain, 2019

ICS-CRAT: A Cyber Resilience Assessment Tool for Industrial Control Systems.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2018
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications.
EAI Endorsed Trans. Pervasive Health Technol., 2018

A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain.
Int. J. Inf. Secur. Priv., 2018

Hybrid simulation for cyber physical systems: a panel on where are we going regarding complexity, intelligence, and adaptability of CPS using simulation.
Proceedings of the Symposium on Modeling and Simulation of Complexity in Intelligent, 2018

Security game for cyber physical systems.
Proceedings of the Communications and Networking Symposium, 2018

Improving bulk power system resilience by ranking critical nodes in the vulnerability graph.
Proceedings of the Annual Simulation Symposium, 2018

Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2018

Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018

Towards Secure and Smart Healthcare in Smart Cities Using Blockchain.
Proceedings of the IEEE International Smart Cities Conference, 2018

Exploring the Attack Surfaces in Blockchain Enabled Smart Cities.
Proceedings of the IEEE International Smart Cities Conference, 2018

Attack Surface Analysis of Permissioned Blockchain Platforms for Smart Cities.
Proceedings of the IEEE International Smart Cities Conference, 2018

Diversity Modeling to Evaluate Security of Multiple SDN Controllers.
Proceedings of the 2018 International Conference on Computing, 2018

Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018

CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel.
IEEE Trans. Veh. Technol., 2017

Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks.
Int. J. Netw. Comput., 2017

Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels.
IEEE Access, 2017

Consensus protocols for blockchain-based data provenance: Challenges and opportunities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Integrating blockchain for data sharing and collaboration in mobile healthcare applications.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Feature-based transfer learning for network security.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Towards data assurance and resilience in IoT using blockchain.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Generalized stochastic Petri Net model based security risk assessment of software defined networks.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Markov Game Theoritic Approach for Power Grid Security.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

A Security Framework for SDN-Enabled Smart Power Grids.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Software Defined Networking enabled resilience for IEC 61850-based substation communication systems.
Proceedings of the 2017 International Conference on Computing, 2017

Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017

Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance.
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017

Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure.
Proceedings of the IEEE International Conference on Edge Computing, 2017

Cross layer attacks on GSM mobile networks using software defined radios.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Moving Target Defense for Distributed Systems
Wireless Networks, Springer, ISBN: 978-3-319-31032-9, 2016

Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems.
IEEE Syst. J., 2016

Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game.
J. Comput. Networks Commun., 2016

Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks.
Int. J. Grid High Perform. Comput., 2016

A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs.
Proceedings of the Wired/Wireless Internet Communications, 2016

Towards Network-Topology Aware Virtual Machine Placement in Cloud Datacenters.
Proceedings of the IEEE World Congress on Services, 2016

Hierarchical Random Graph Based Network Diversity Modeling for the Cloud.
Proceedings of the IEEE World Congress on Services, 2016

Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Polarized beamforming for enhanced countermeasure of wireless jamming attacks.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Survey Toward a Smart Campus Using the Internet of Things.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016

Robust cooperative beamforming against steering vector uncertainty in cognitive radio networks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

SCREDENT: Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Mobile Devices.
Proceedings of the 7th International Conference on Ambient Systems, 2016

2015
Dynamic Spectrum Access for Wireless Networks
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-319-15299-8, 2015

Enhanced learning classifier to locate data in cloud data centres.
Int. J. Metaheuristics, 2015

Achievable rates and outage probability of cognitive radio with dynamic frequency hopping under imperfect spectrum sensing.
IET Commun., 2015

Physical layer security in wireless cooperative relay networks: state of the art and beyond.
IEEE Commun. Mag., 2015

Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Secrecy capacity of the full-duplex AF relay wire-tap channel under residual self-interference.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Achievable Rate and Outage Probability of Cognitive Radio with Finite-Alphabet Inputs under Imperfect Spectrum Sensing.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015

Enabling security-aware virtual machine placement in IaaS clouds.
Proceedings of the 34th IEEE Military Communications Conference, 2015

A testbed for modeling and detecting attacks on NFC enabled mobile devices.
Proceedings of the 34th IEEE Military Communications Conference, 2015

POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Geolocation-aware resource management in cloud computing-based cognitive radio networks.
Int. J. Cloud Comput., 2014

Auditing and analysis of network traffic in cloud environment.
Int. J. Bus. Process. Integr. Manag., 2014

Enhancing connectivity for spectrum-agile Vehicular Ad hoc NETworks in fading channels.
Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, 2014

Cloud-assisted dynamic spectrum access for VANET in transportation cyber-physical systems.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Robust transmit beamforming against steering vector uncertainty in cognitive radio networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Game Theoretic Dynamic Spectrum Access in Cloud-Based Cognitive Radio Networks.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Network Aware VM Migration in Cloud Data Centers.
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014

RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.
Proceedings of the Computer Security - ESORICS 2014, 2014

Towards a network aware VM migration: Evaluating the cost of VM migration in cloud data centers.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

Enhanced learning classifier to locate data in cloud datacenters.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014

2013
Optimum transmit beamforming scheme for underlay cognitive radio networks.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Auditing and Analysis of Network Traffic in Cloud Environment.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Toward a Real-Time Cloud Auditing Paradigm.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Robust beamforming for cognitive radio based vehicular communication.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

Trace transform based identifier for speech based image retrieval on mobile phones.
Proceedings of the International Conference on Advances in Computing, 2013

Game theoretic approach to dynamic spectrum access with multi-radio and QoS requirements.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Waiting Probability Analysis for Dynamic Spectrum Access in Cognitive Radio Networks.
Proceedings of the Seventh International Conference on Complex, 2013

Security Risk Assessment of Cloud Carrier.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

2012
Development of an integrated network visualisation and graph analysis tool for biological networks.
Int. J. Comput. Biol. Drug Des., 2012

Detection of anomalies in network traffic using L2E for accurate speaker recognition.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012

Enhancing the classification accuracy of IP geolocation.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Open-ended design and performance evaluation of a biometric speaker identification system.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

Feature and Signal Enhancement for Robust Speaker Identification of G.729 Decoded Speech.
Proceedings of the Neural Information Processing - 19th International Conference, 2012

Assessing network path vulnerabilities for secure cloud computing.
Proceedings of IEEE International Conference on Communications, 2012

Mining Concept Drifting Network Traffic in Cloud Computing Environments.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Special issue on information dissemination and new services in P2P systems.
Peer-to-Peer Netw. Appl., 2011

Adaptive virtual reality game system for personalized problem-based learning.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2011

Opportunistic spectrum access in multi-user multi-channel cognitive radio networks.
Proceedings of the 19th European Signal Processing Conference, 2011

Development of information fusion model for layered sensing systems using computing with words.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2011

2010
Using Hidden Markov Model to detect rogue access points.
Secur. Commun. Networks, 2010

Blind channel estimation based robust physical layer key generation in MIMO networks.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

TCP Venoplus - A cross-layer approach to improve TCP performance in wired-cum-wireless networks using signal strength.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010

Control-Free Dynamic Spectrum Access for Cognitive Radio Networks.
Proceedings of IEEE International Conference on Communications, 2010

Empowering students with engineering literacy and problem-solving through interactive virtual reality games.
Proceedings of the 2010 International IEEE Consumer Electronics Society's Games Innovations Conference, 2010

The affine transform and feature fusion for robust speaker identification in the presence of speech coding distortion.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010

2009
Learning distributed bayesian network structure using majority-based method.
J. Comput. Methods Sci. Eng., 2009

PLL Based Time Synchronization in Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009

Distributed Adaptive Protocols for Information Dissemination in Large-Scale Communication Systems.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

A Learning-based Multiuser Opportunistic Spectrum Access Approach in Unslotted Primary Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Min Song, Youjun Yang, Mary Mathews: Learning Bayesian Network over Distributed Databases Using Majority-based Method.
Proceedings of the 17th International Conference on Software Engineering and Data Engineering (SEDE-2008), June 30, 2008

2007
Coexistence of IEEE 802.11b and Bluetooth: An Integrated Performance Analysis.
Mob. Networks Appl., 2007

Detecting Compromised Nodes in Wireless Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Wireless Sensor Payload Design for Sounding Rocket.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

2005
Structure learning of Bayesian networks using a semantic genetic algorithm-based approach.
Proceedings of the ITRE 2005, 2005

Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

2004
A New Multicast Queuing Mechanism for High-Speed Packet Switches.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Evolutionary Programming in a Distributed Packet Scheduling Architecture.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

Efficient Queuing Scheme for Multicast Switches in Overlay Networks.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Evolutionary Scheduling in a Multi-Service Routing Switch.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002

2001
A windowing condition for characterization of finite signals from spectral phase or magnitude.
Proceedings of the IEEE International Conference on Acoustics, 2001


  Loading...