Sachin Shetty
Orcid: 0000-0002-8789-0610Affiliations:
- Old Dominion University, Department of Modeling, Simulation and Visualization Engineering, Norfolk, VA, USA
- Tennessee State University, Nashville, TN, USA (2009 - 2016)
- Rowan University, Glassboro, NJ, USA (2008 - 2009)
- Old Dominion University, Norfolk, VA, USA (PhD 2007)
According to our database1,
Sachin Shetty
authored at least 258 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on ww2.odu.edu
-
on publons.com
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
A centralized delay-sensitive hierarchical computation offloading in fog radio access networks.
J. Supercomput., December, 2024
An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things.
IEEE Trans. Intell. Transp. Syst., June, 2024
Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical CFT/BFT consensus groups, IPFS and novel hardware design.
Internet Things, April, 2024
Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., March, 2024
Multi-Timescale Actor-Critic Learning for Computing Resource Management With Semi-Markov Renewal Process Mobility.
IEEE Trans. Intell. Transp. Syst., January, 2024
ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications.
IEEE Trans. Netw. Sci. Eng., 2024
TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization.
IEEE Trans. Inf. Forensics Secur., 2024
Age of correlated information-optimal dynamic policy scheduling for sustainable Green IoT devices: A multi-agent deep reinforcement learning approach.
Internet Things, 2024
Int. J. Syst. Syst. Eng., 2024
Int. J. Syst. Syst. Eng., 2024
Advancing Healthcare: Innovative ML Approaches for Improved Medical Imaging in Data-Constrained Environments.
CoRR, 2024
Accuracy-Privacy Trade-off in the Mitigation of Membership Inference Attack in Federated Learning.
CoRR, 2024
User preference-aware content caching strategy for video delivery in cache-enabled IoT networks.
Comput. Networks, 2024
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security.
IEEE Access, 2024
A Secure and Privacy-Preserving Signature Protocol Using Quantum Teleportation in Metaverse Environment.
IEEE Access, 2024
Enhancing Cyber Resilience Through Traffic Generation Patterns in Complex Networks: A Study on Cascading Failures.
IEEE Access, 2024
CycleGAN-Gradient Penalty for Enhancing Android Adversarial Malware Detection in Gray Box Setting.
IEEE Access, 2024
Detecting Attacks and Optimizing Routes in Radio-frequency Networks Using Machine Learning and Graph Theory.
Proceedings of the 10th IEEE International Conference on Network Softwarization, 2024
Enhancing Sentiment Analysis with Attention Mechanism and Bayesian-Lipschitz Recurrent Neural Networks.
Proceedings of the International Symposium on Networks, Computers and Communications, 2024
WedaGPT - Generative-AI (with Custom-Trained Meta's Llama2 LLM), Blockchain, Self Sovereign Identity, NFT and Model Card Enabled Indigenous Medicine Platform.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
An Edge-Cloud Approach for Dynamic Resource Allocation in Drone Communication Networks.
Proceedings of the IEEE INFOCOM 2024, 2024
AnDet: ML-Based Anomaly Detection of UEs in a Multi-cell B5G Mobile Network for Improved QoS.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
An Attention-based AI Model for 3D Beam Prediction in THz Unmanned Aerial Vehicle Communication.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Proceedings of the International Conference on Computing, Networking and Communications, 2024
RMF-GPT - OpenAI GPT-3.5 LLM, Blockchain, NFT, Model Cards and OpenScap Enabled Intelligent RMF Automation System.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Targeted Transfer Learning: Leveraging Optimal Transport for Enhanced Knowledge Transfer.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Sentiment Analysis With Lipschitz Recurrent Neural Networks Based Generative Adversarial Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
A Zero Trust Framework for Realization and Defense Against Generative AI Attacks in Power Grid.
Proceedings of the IEEE International Conference on Communications, 2024
Blockchain-Enabled Secure Device-to-Device Communication in Software-Defined Networking.
Proceedings of the IEEE International Conference on Communications Workshops, 2024
Secure Location-based Authenticated Key Establishment Scheme for Maritime Communication.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024
2023
Comput. Sci. Rev., November, 2023
Security of Internet of Things (IoT) using federated learning and deep learning - Recent advancements, issues and prospects.
ICT Express, October, 2023
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS).
Int. J. Inf. Sec., June, 2023
Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus.
IEEE Trans. Veh. Technol., April, 2023
Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications.
IEEE Internet Things Mag., March, 2023
BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare.
IEEE Trans. Consumer Electron., February, 2023
Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme.
IEEE Internet Things J., January, 2023
Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023
AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare.
IEEE Trans. Inf. Forensics Secur., 2023
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges.
Secur. Priv., 2023
Neuro-Symbolic Explainable Artificial Intelligence Twin for Zero-Touch IoE in Wireless Network.
IEEE Internet Things J., 2023
Decentralizing Cyber Physical Systems for Resilience: An Innovative Case Study from A Cybersecurity Perspective.
Comput. Secur., 2023
Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications.
IEEE Access, 2023
An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks.
IEEE Access, 2023
IEEE Access, 2023
IEEE Access, 2023
Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid.
Proceedings of the Winter Simulation Conference, 2023
Proceedings of the 24th IEEE International Symposium on a World of Wireless, 2023
Vehicular Safety Revolution: A Cutting-Edge Communication Paradigm for Accident Prevention.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment.
Proceedings of the International Symposium on Networks, Computers and Communications, 2023
A Novel Smartphone-Based Human Activity Recognition Approach using Convolutional Autoencoder Long Short-Term Memory Network.
Proceedings of the 24th IEEE International Conference on Information Reuse and Integration for Data Science, 2023
Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix.
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Communication-Efficient and Privacy-Preserving Edge-Cloud Framework For Smart Healthcare.
Proceedings of the IEEE Globecom Workshops 2023, 2023
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment.
Proceedings of the IEEE Global Communications Conference, 2023
Advanced Federated Learning-Empowered Edge-Cloud Framework for School Safety Prediction and Emergency Alert System.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
GreenThread - Blockchain, Non-Fungible Token(NFT), Model Cards, Self-Sovereign Identity and IPFS Enabled Sustainable Circular Fashion Platform.
Proceedings of the Annual Modeling and Simulation Conference, 2023
2022
A Unified Health Information System Framework for Connecting Data, People, Devices, and Systems.
J. Glob. Inf. Manag., 2022
Casper: a blockchain-based system for efficient and secure customer credential verification.
J. Bank. Financial Technol., 2022
TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems.
IEEE Internet Things J., 2022
Guest Editorial Special Issue on Secure Data Analytics for Emerging Internet of Things.
IEEE Internet Things J., 2022
Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks.
Ad Hoc Networks, 2022
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things.
IEEE Access, 2022
Proceedings of the Winter Simulation Conference, 2022
Proceedings of the Winter Simulation Conference, 2022
Moose: A Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection.
Proceedings of the Security and Privacy in Communication Networks, 2022
Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing.
Proceedings of the 19th Annual IEEE International Conference on Sensing, 2022
Proceedings of the IEEE Military Communications Conference, 2022
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace.
Proceedings of the IEEE Military Communications Conference, 2022
Generalized Adversarial and Hierarchical Co-occurrence Network based Synthetic Skeleton Generation and Human Identity Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2022
Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis.
Proceedings of the 23rd IEEE International Conference on High Performance Switching and Routing, 2022
Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022
LUUNU - Blockchain, MISP, Model Cards and Federated Learning Enabled Cyber Threat Intelligence Sharing Platform.
Proceedings of the Annual Modeling and Simulation Conference, 2022
Proceedings of the 28th Americas Conference on Information Systems, 2022
2021
EAI Endorsed Trans. Security Safety, 2021
6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap.
Sensors, 2021
J. Syst. Archit., 2021
Inf. Process. Manag., 2021
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers.
Int. J. Inf. Comput. Secur., 2021
Vind: A Blockchain-Enabled Supply Chain Provenance Framework for Energy Delivery Systems.
Frontiers Blockchain, 2021
J. Cybersecur., 2021
Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap.
IEEE Access, 2021
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement.
IEEE Access, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures.
Proceedings of the IEEE International Conference on Communications, 2021
Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform.
Proceedings of the IEEE International Conference on Smart Computing, 2021
Proceedings of the Intelligent Computing, 2021
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform.
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Multi-Class Malware Classification Using Deep Residual Network with Non-SoftMax Classifier.
Proceedings of the 22nd IEEE International Conference on Information Reuse and Integration for Data Science, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
CySCPro - Cyber Supply Chain Provenance Framework for Risk Management of Energy Delivery Systems.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
Proceedings of the Annual Modeling and Simulation Conference, 2021
2020
CoRR, 2020
IEEE Commun. Surv. Tutorials, 2020
A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things.
IEEE Access, 2020
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020
Proceedings of the Spring Simulation Conference, 2020
A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments.
Proceedings of the Spring Simulation Conference, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Wireless Mobile Communication and Healthcare, 2020
Proceedings of the IEEE International Smart Cities Conference, 2020
On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the Blockchain - ICBC 2020, 2020
Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems.
Proceedings of the IEEE Global Communications Conference, 2020
2019
EAI Endorsed Trans. Security Safety, 2019
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment.
Sensors, 2019
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment.
IEEE Internet Things J., 2019
EURASIP J. Inf. Secur., 2019
IEEE Consumer Electron. Mag., 2019
IEEE Access, 2019
Proceedings of the 2019 Winter Simulation Conference, 2019
Proceedings of the 2019 Spring Simulation Conference, 2019
Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System.
Proceedings of the Security and Privacy in Communication Networks, 2019
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework.
Proceedings of the Security and Privacy in Communication Networks, 2019
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk.
Proceedings of the 2019 IEEE Military Communications Conference, 2019
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019
Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Tenth ACM International Conference on Future Energy Systems, 2019
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities.
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms.
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019
2018
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications.
EAI Endorsed Trans. Pervasive Health Technol., 2018
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain.
Int. J. Inf. Secur. Priv., 2018
Hybrid simulation for cyber physical systems: a panel on where are we going regarding complexity, intelligence, and adaptability of CPS using simulation.
Proceedings of the Symposium on Modeling and Simulation of Complexity in Intelligent, 2018
Proceedings of the Communications and Networking Symposium, 2018
Improving bulk power system resilience by ranking critical nodes in the vulnerability graph.
Proceedings of the Annual Simulation Symposium, 2018
Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets.
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights.
Proceedings of the 2018 IEEE International Conference on Intelligence and Security Informatics, 2018
Proceedings of the IEEE International Smart Cities Conference, 2018
Proceedings of the IEEE International Smart Cities Conference, 2018
Proceedings of the IEEE International Smart Cities Conference, 2018
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System.
Proceedings of the IEEE Conference on Control Technology and Applications, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel.
IEEE Trans. Veh. Technol., 2017
Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks.
Int. J. Netw. Comput., 2017
Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels.
IEEE Access, 2017
Consensus protocols for blockchain-based data provenance: Challenges and opportunities.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017
Integrating blockchain for data sharing and collaboration in mobile healthcare applications.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Generalized stochastic Petri Net model based security risk assessment of software defined networks.
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Software Defined Networking enabled resilience for IEC 61850-based substation communication systems.
Proceedings of the 2017 International Conference on Computing, 2017
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance.
Proceedings of the Decision and Game Theory for Security - 8th International Conference, 2017
Proceedings of the Game Theory for Networks - 7th International EAI Conference, 2017
Proceedings of the IEEE International Conference on Edge Computing, 2017
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
Wireless Networks, Springer, ISBN: 978-3-319-31032-9, 2016
IEEE Syst. J., 2016
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game.
J. Comput. Networks Commun., 2016
Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks.
Int. J. Grid High Perform. Comput., 2016
A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs.
Proceedings of the Wired/Wireless Internet Communications, 2016
Proceedings of the IEEE World Congress on Services, 2016
Proceedings of the IEEE World Congress on Services, 2016
Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016
Robust cooperative beamforming against steering vector uncertainty in cognitive radio networks.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
SCREDENT: Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Mobile Devices.
Proceedings of the 7th International Conference on Ambient Systems, 2016
2015
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-319-15299-8, 2015
Int. J. Metaheuristics, 2015
Achievable rates and outage probability of cognitive radio with dynamic frequency hopping under imperfect spectrum sensing.
IET Commun., 2015
Physical layer security in wireless cooperative relay networks: state of the art and beyond.
IEEE Commun. Mag., 2015
Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015
Secrecy capacity of the full-duplex AF relay wire-tap channel under residual self-interference.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015
Achievable Rate and Outage Probability of Cognitive Radio with Finite-Alphabet Inputs under Imperfect Spectrum Sensing.
Proceedings of the IEEE 81st Vehicular Technology Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
Geolocation-aware resource management in cloud computing-based cognitive radio networks.
Int. J. Cloud Comput., 2014
Int. J. Bus. Process. Integr. Manag., 2014
Enhancing connectivity for spectrum-agile Vehicular Ad hoc NETworks in fading channels.
Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, 2014
Cloud-assisted dynamic spectrum access for VANET in transportation cyber-physical systems.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Robust transmit beamforming against steering vector uncertainty in cognitive radio networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014
Proceedings of the 2014 Third GENI Research and Educational Experiment Workshop, 2014
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment.
Proceedings of the Computer Security - ESORICS 2014, 2014
Towards a network aware VM migration: Evaluating the cost of VM migration in cloud data centers.
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014
2013
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the International Conference on Connected Vehicles and Expo, 2013
Proceedings of the International Conference on Advances in Computing, 2013
Game theoretic approach to dynamic spectrum access with multi-radio and QoS requirements.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013
Waiting Probability Analysis for Dynamic Spectrum Access in Cognitive Radio Networks.
Proceedings of the Seventh International Conference on Complex, 2013
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013
2012
Development of an integrated network visualisation and graph analysis tool for biological networks.
Int. J. Comput. Biol. Drug Des., 2012
Detection of anomalies in network traffic using L2E for accurate speaker recognition.
Proceedings of the 55th IEEE International Midwest Symposium on Circuits and Systems, 2012
Proceedings of the 31st IEEE Military Communications Conference, 2012
Open-ended design and performance evaluation of a biometric speaker identification system.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012
Feature and Signal Enhancement for Robust Speaker Identification of G.729 Decoded Speech.
Proceedings of the Neural Information Processing - 19th International Conference, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012
2011
Peer-to-Peer Netw. Appl., 2011
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2011
Proceedings of the 19th European Signal Processing Conference, 2011
Development of information fusion model for layered sensing systems using computing with words.
Proceedings of the IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2011
2010
Secur. Commun. Networks, 2010
Blind channel estimation based robust physical layer key generation in MIMO networks.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
TCP Venoplus - A cross-layer approach to improve TCP performance in wired-cum-wireless networks using signal strength.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010
Proceedings of IEEE International Conference on Communications, 2010
Empowering students with engineering literacy and problem-solving through interactive virtual reality games.
Proceedings of the 2010 International IEEE Consumer Electronics Society's Games Innovations Conference, 2010
The affine transform and feature fusion for robust speaker identification in the presence of speech coding distortion.
Proceedings of the IEEE Asia Pacific Conference on Circuits and Systems, 2010
2009
J. Comput. Methods Sci. Eng., 2009
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009
Distributed Adaptive Protocols for Information Dissemination in Large-Scale Communication Systems.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009
A Learning-based Multiuser Opportunistic Spectrum Access Approach in Unslotted Primary Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
2008
Min Song, Youjun Yang, Mary Mathews: Learning Bayesian Network over Distributed Databases Using Majority-based Method.
Proceedings of the 17th International Conference on Software Engineering and Data Engineering (SEDE-2008), June 30, 2008
2007
Mob. Networks Appl., 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Wireless Sensor Payload Design for Sounding Rocket.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007
2005
Structure learning of Bayesian networks using a semantic genetic algorithm-based approach.
Proceedings of the ITRE 2005, 2005
Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
2004
A New Multicast Queuing Mechanism for High-Speed Packet Switches.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004
2003
Evolutionary Programming in a Distributed Packet Scheduling Architecture.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003
Efficient Queuing Scheme for Multicast Switches in Overlay Networks.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003
2002
Evolutionary Scheduling in a Multi-Service Routing Switch.
Proceedings of the 11th Conference on Intelligent Systems: Emerging Technologies, 2002
2001
A windowing condition for characterization of finite signals from spectral phase or magnitude.
Proceedings of the IEEE International Conference on Acoustics, 2001