Sanjay K. Jha

Orcid: 0000-0002-1844-1520

Affiliations:
  • University of New South Wales, School of Computer Science and Engineering, Sydney, Australia


According to our database1, Sanjay K. Jha authored at least 266 papers between 1988 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Experimental Cybersecurity Evaluation of Distributed Solar Inverters: Vulnerabilities and Impacts on the Australian Grid.
IEEE Trans. Smart Grid, September, 2024

Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

Exploring Uncharted Waters of Website Fingerprinting.
IEEE Trans. Inf. Forensics Secur., 2024

USAT: A Universal Speaker-Adaptive Text-to-Speech Approach.
IEEE ACM Trans. Audio Speech Lang. Process., 2024

Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning.
CoRR, 2024

Examining the Rat in the Tunnel: Interpretable Multi-Label Classification of Tor-based Malware.
CoRR, 2024

Towards Threat Modelling of IoT Context-Sharing Platforms.
CoRR, 2024

Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification.
CoRR, 2024

AuditNet: A Conversational AI-based Security Assistant [DEMO].
CoRR, 2024

Lack of Systematic Approach to Security of IoT Context Sharing Platforms.
CoRR, 2024

GLOBE: A High-quality English Corpus with Global Accents for Zero-shot Speaker Adaptive Text-to-Speech.
CoRR, 2024

AuditNet: Conversational AI Security Assistant.
Proceedings of the Adjunct Proceedings of the 26th International Conference on Mobile Human-Computer Interaction, 2024

An Investigation into the Non-Uniformity of Channel State Information in WiFi Sensing Systems.
Proceedings of the IEEE INFOCOM 2024, 2024

MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction.
Proceedings of the Advances in Information Retrieval, 2024

SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition.
Proceedings of the 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2024

2023
Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification.
IEEE Access, 2023

Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems.
Proceedings of the IEEE International Conference on Communications, 2023

Generalizable Zero-Shot Speaker Adaptive Speech Synthesis with Disentangled Representations.
Proceedings of the 24th Annual Conference of the International Speech Communication Association, 2023

2022
Network Growth From Global and Local Influential Nodes.
IEEE Trans. Netw. Sci. Eng., 2022

PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool.
IEEE Trans. Inf. Forensics Secur., 2022

Orchestration or Automation: Authentication Flaw Detection in Android Apps.
IEEE Trans. Dependable Secur. Comput., 2022

DIMY: Enabling privacy-preserving contact tracing.
J. Netw. Comput. Appl., 2022

iRECOVer: Patch your IoT on-the-fly.
Future Gener. Comput. Syst., 2022

PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool.
CoRR, 2022

Fake News Quick Detection on Dynamic Heterogeneous Information Networks.
CoRR, 2022

BloomXNOR-Net: privacy-preserving machine learning in IoT.
Proceedings of the S3@MobiCom 2022: Proceedings of the 13th ACM Wireless of the Students, 2022

Autolv: Automatic Lecture Video Generator.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?
Proceedings of the IEEE International Conference on Communications, 2022

Optimised CNN for Human Counting Using Spectrograms of Probabilistic WiFi CSI.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things.
IEEE Trans. Mob. Comput., 2021

B-FERL: Blockchain based framework for securing smart vehicles.
Inf. Process. Manag., 2021

Man versus Machine: AutoML and Human Experts' Role in Phishing Detection.
CoRR, 2021

Network Growth From Global and Local Influential Nodes.
CoRR, 2021

All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks.
CoRR, 2021

De-Anonymisation Attacks on Tor: A Survey.
IEEE Commun. Surv. Tutorials, 2021

Seirios: leveraging multiple channels for LoRaWAN indoor and outdoor localization.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

A Novel Model-Based Security Scheme for LoRa Key Generation.
Proceedings of the IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, 2021

Towards Privacy-preserving Digital Contact Tracing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

2020
Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings.
IEEE Internet Things J., 2020

HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios.
CoRR, 2020

Anonymity with Tor: A Survey on Tor Attacks.
CoRR, 2020

A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases.
CoRR, 2020

A Survey of COVID-19 Contact Tracing Apps.
IEEE Access, 2020

EMIoT: A LoRa-enabled Smart Building Solution Based on Emergency Lights.
Proceedings of the BuildSys '20: The 7th ACM International Conference on Systems for Energy-Efficient Buildings, 2020

Nephalai: towards LPWAN C-RAN with physical layer compression.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

Poster Abstract: A Novel Modeling Involved Security Approach for LoRa Key Generation.
Proceedings of the 19th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2020

Leveraging lightweight blockchain to establish data integrity for surveillance cameras.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

ProxiCar: Proximity-Based Secure Digital Key Solution for Cars.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting.
IEEE Trans. Mob. Comput., 2019

Long-term secure management of large scale Internet of Things applications.
J. Netw. Comput. Appl., 2019

The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings.
IEEE Internet Things J., 2019

LoRa-Key: Secure Key Generation System for LoRa-Based Network.
IEEE Internet Things J., 2019

Analyzing XACML policies using answer set programming.
Int. J. Inf. Sec., 2019

Measurement, Characterization and Modeling of LoRa Technology in Multi-floor Buildings.
CoRR, 2019

Risk Analysis Study of Fully Autonomous Vehicle.
CoRR, 2019

Light weight and fine-grained access mechanism for secure access to outsourced data.
Concurr. Comput. Pract. Exp., 2019

MTRA: Multi-Tier randomized remote attestation in IoT networks.
Comput. Secur., 2019

Finding Flaws from Password Authentication Code in Android Apps.
Proceedings of the Computer Security - ESORICS 2019, 2019

PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

An empirical study of SMS one-time password authentication in Android apps.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Light Weight Write Mechanism for Cloud Data.
IEEE Trans. Parallel Distributed Syst., 2018

SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2018

Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions.
CoRR, 2018

A Blockchain Based Liability Attribution Framework for Autonomous Vehicles.
CoRR, 2018

Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems.
Proceedings of the 17th IEEE International Symposium on Network Computing and Applications, 2018

Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Exploiting multiple side channels for secret key agreement in Wireless Networks.
Proceedings of the 19th International Conference on Distributed Computing and Networking, 2018

2017
Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2017

Sparsity Based Efficient Cross-Correlation Techniques in Sensor Networks.
IEEE Trans. Mob. Comput., 2017

Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables.
IEEE Trans. Inf. Forensics Secur., 2017

WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
CoRR, 2017

ESIoT: enabling secure management of the internet of things.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study.
Proceedings of the 2017 IFIP Networking Conference, 2017

Privacy preserving data access scheme for IoT devices.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers.
Proceedings of the 16th IEEE International Symposium on Network Computing and Applications, 2017

Access Mechanism for Outsourced Data by Preserving Data Owner's Preference.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

MTRA: Multiple-tier remote attestation in IoT networks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Automated Analysis of Secure Internet of Things Protocols.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles.
IEEE Trans. Mob. Comput., 2016

Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna.
Pervasive Mob. Comput., 2016

On the importance of link characterization for aerial wireless sensor networks.
IEEE Commun. Mag., 2016

Secure key generation and distribution protocol for wearable devices.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Demo abstract: Location fingerprint evidence and authorisation using WiFi channel characteristics.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

Towards Policy Enforcement Point as a Service (PEPS).
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Anomaly-free policy composition in software-defined networks.
Proceedings of the 2016 IFIP Networking Conference, 2016

I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Timestamp integrity in wearable healthcare devices.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
A Survey of Securing Networks Using Software Defined Networking.
IEEE Trans. Reliab., 2015

High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2015

Interdependent Security Risk Analysis of Hosts and Flows.
IEEE Trans. Inf. Forensics Secur., 2015

Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.
IEEE Trans. Dependable Secur. Comput., 2015

A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.
Secur. Commun. Networks, 2015

CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO.
Pervasive Mob. Comput., 2015

Sparse representation based acoustic rangefinders: from sensor platforms to mobile devices.
IEEE Commun. Mag., 2015

Lightweight clustering of spatio-temporal data in resource constrained mobile sensing.
Proceedings of the 16th IEEE International Symposium on A World of Wireless, 2015

Poster: Fair Scheduling for Energy Harvesting WSN in Smart City.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Poster: Were You in the Cafe Yesterday?: Location Proof Generation & Verification for Mobile Users.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

DLINK: Dual link based radio frequency fingerprinting for wearable devices.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Method for providing secure and private fine-grained access to outsourced data.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

A trust assessment framework for streaming data in WSNs using iterative filtering.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

A Collaborative Reputation System Based on Credibility Propagation in WSNs.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

EPLA: Energy-balancing packets scheduling for airborne relaying networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel.
Proceedings of the 10th ACM Symposium on Information, 2015

Securing the Timestamping of Sensor Data from Wearable Healthcare Devices.
Proceedings of the 10th EAI International Conference on Body Area Networks, 2015

Mobility Independent Secret Key Generation for Wearable Health-care Devices.
Proceedings of the 10th EAI International Conference on Body Area Networks, 2015

Secret Key Generation by Virtual Link Estimation.
Proceedings of the 10th EAI International Conference on Body Area Networks, 2015

2014
Multiuser MIMO Scheduling for Mobile Video Applications.
IEEE Trans. Wirel. Commun., 2014

Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2014

Reliable positioning with hybrid antenna model for aerial wireless sensor and actor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Low complexity user pairing and resource allocation of heterogeneous users for uplink virtual MIMO system over LTE-A network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2014

Provenance-aware security risk analysis for hosts and network flows.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

CSI-MIMO: Indoor Wi-Fi fingerprinting system.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks.
Proceedings of the Wireless Sensor Networks - 11th European Conference, 2014

Trajectory Approximation for Resource Constrained Mobile Sensor Networks.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

An SDN-based Framework for Detection of Illegal Rebroadcasting of Channels in P2PTV.
Proceedings of the 2014 Workshop on Design, 2014

MalwareMonitor: An SDN-based Framework for Securing Large Networks.
Proceedings of the 2014 CoNEXT on Student Workshop, 2014

2013
Acoustical ranging techniques in embedded wireless sensor networked devices.
ACM Trans. Sens. Networks, 2013

Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks.
IEEE J. Sel. Areas Commun., 2013

A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks.
Comput. Secur., 2013

Optimal opportunistic routing and network coding for bidirectional wireless flows.
Comput. Networks, 2013

A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

An end-to-end delay metric for multi-rate wireless mesh networks with cooperative retransmission.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Received signal strength indicator and its analysis in a typical WLAN system (short paper).
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Joint channel and delay aware user scheduling for multiuser MIMO system over LTE-A network.
Proceedings of the 21st IEEE/ACM International Symposium on Quality of Service, 2013

Priority-based coverage path planning for Aerial Wireless Sensor Networks.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2013

Securing data provenance in body area networks using lightweight wireless link fingerprints.
Proceedings of the TrustED'13, 2013

2012
Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2012

Outdoor Sensornet Design and Deployment: Experiences from a Sugar Farm.
IEEE Pervasive Comput., 2012

An empirical study of asymmetry in low-power wireless links.
IEEE Commun. Mag., 2012

Feasibility of SINR guarantees for downlink transmissions in relay-enabled OFDMA networks.
Autom., 2012

ECTX: A high-throughput path metric for multi-hop wireless routing exploiting MAC-layer cooperative retransmission.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

A fast gradient projection algorithm for efficient cross-correlation via sparse representation in sensor networks.
Proceedings of the 10th ACM Conference on Embedded Network Sensor Systems, 2012

Relay-aided high-throughput path selection in multi-rate wireless mesh networks.
Proceedings of the 15th ACM International Conference on Modeling, 2012

Flexible resource allocation for multicast in OFDMA based wireless networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Reliable communications in aerial sensor networks by using a hybrid antenna.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

Efficient cross-correlation via sparse representation in sensor networks.
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012

2011
A pragmatic approach to area coverage in hybrid wireless sensor networks.
Wirel. Commun. Mob. Comput., 2011

Secure Multihop Network Programming with Multiple One-Way Key Chains.
IEEE Trans. Mob. Comput., 2011

Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2011

Improving the coverage range of ultrasound-based localization systems.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Robust Power Allocation for MIMO Beamforming under Time Varying Channel Conditions.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks.
Proceedings of the PM2HW2N@MSWiM 2011: Proceedings of the 6th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, 2011

TWEET: an envelope detection based broadband ultrasonic ranging system.
Proceedings of the 14th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2011

A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Characterization of Asymmetry in Low-Power Wireless Links: An Empirical Study.
Proceedings of the Distributed Computing and Networking - 12th International Conference, 2011

Link characterization for Aerial Wireless Sensor Networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

2010
Statistical reliability for energy efficient data transport in wireless sensor networks.
Wirel. Networks, 2010

Toward trusted wireless sensor networks.
ACM Trans. Sens. Networks, 2010

Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Safety assurance and rescue communication systems in high-stress environments: A mining case study.
IEEE Commun. Mag., 2010

Mitigating the effect of interference in Wireless Sensor Networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

A hardware-based remote attestation protocol in wireless sensor networks.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

Long-range detection in acoustic sensor networks.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

Experimental evaluation of multi-hop routing protocols for wireless sensor networks.
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010

2009
Design and evaluation of a hybrid sensor network for cane toad monitoring.
ACM Trans. Sens. Networks, 2009

Energy Efficient Reliable Data Collection in Wireless Sensor Networks with Asymmetric Links.
Int. J. Wirel. Inf. Networks, 2009

ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks.
Comput. Commun., 2009

Analysis of an omni-directional narrowband ultrasonic receiver and CSS-based broadband transmission.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

Characterization of link asymmetry in wireless sensor networks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

Socially conscious channel selection in 802.11 WLANs for coexistence in a non-cooperative environment.
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009

Poster abstract: Multi-channel interference in wireless sensor networks.
Proceedings of the 8th International Conference on Information Processing in Sensor Networks, 2009

2008
Comments on "Dynamic routing of restorable bandwidth-guaranteed tunnels using aggregated network resource usage information".
IEEE/ACM Trans. Netw., 2008

Rate-Diversity and Resource-Aware Broadcast and Multicast in Multi-rate Wireless Mesh Networks.
Mob. Networks Appl., 2008

The impact of fading and shadowing on the network performance of wireless sensor networks.
Int. J. Sens. Networks, 2008

Probabilistically reliable on-demand multicast in wireless mesh networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Secure multi-hop network programming with multiple one-way key chains.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Efficient Reliable Data Collection in Wireless Sensor Networks.
Proceedings of the 68th IEEE Vehicular Technology Conference, 2008

Overcoming radio link asymmetry in wireless sensor networks.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Host-aware routing in multicast overlay backbone.
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

A Distributed Algorithm for Overlay Backbone Multicast Routing in Content Delivery Networks.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

Performance evaluation of a wireless sensor network based tracking system.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

Design and implementation of a policy-based management system for data reliability in Wireless Sensor Networks.
Proceedings of the LCN 2008, 2008

Graph theory based aggregation of sensor readings in wireless sensor networks.
Proceedings of the LCN 2008, 2008

ARQ with Implicit and Explicit ACKs in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Implementation aspects of reliable transport protocols in wireless sensor networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Design, Analysis, and Implementation of a Novel Low Complexity Scheduler for Joint Resource Allocation.
IEEE Trans. Parallel Distributed Syst., 2007

Design, Analysis and Implementation of a Novel Multiple Resource Scheduler.
IEEE Trans. Computers, 2007

A Cut-through MAC for Multiple Interface, Multiple Channel Wireless Mesh Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Detection and tracking using wireless sensor networks.
Proceedings of the 5th International Conference on Embedded Networked Sensor Systems, 2007

Confidential and Secure Broadcast in Wireless Sensor Networks.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Construction of a Proxy-Based Overlay Skeleton Tree for Large-Scale Real-Time Group Communications.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Ensuring Area Coverage in Hybrid Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

A Graph Drawing Approach to Sensor Network Localization.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Topology Control and Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

Non-Cooperative Coexistence of Co-located Independent Wireless Mesh Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

A Scheme for Probabilistically Reliable Multicast Routing in Wireless Mesh Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

Placing Multicast Proxies for Internet Live Media Streaming.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

2006
QoS Driven Parallelization of Resources to Reduce File Download Delay.
IEEE Trans. Parallel Distributed Syst., 2006

Deploying long-lived and cost-effective hybrid sensor networks.
Ad Hoc Networks, 2006

On the Sensitivity of Sensor Network Simulations.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Learning Sensor Data Characteristics in Unknown Environments.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

On the Fading and Shadowing Effects for Wireless Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Efficient Boundary Estimation for Practical Deployment of Mobile Sensors in Hybrid Sensor Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Protecting Multicast Sessions in Wireless Mesh Networks.
Proceedings of the LCN 2006, 2006

A Congestion-aware Medium Access Control Protocol for Multi-rate Ad-hoc Networks.
Proceedings of the LCN 2006, 2006

Bandwidth Aware Slot Allocation in Hybrid MAC.
Proceedings of the LCN 2006, 2006

Location-free fault repair in hybrid sensor networks.
Proceedings of the First International Conference in Integrated Internet Ad Hoc and Sensor Networks, 2006

Fault repair framework for mobile sensor networks.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

2005
Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks.
IEEE Trans. Mob. Comput., 2005

The holes problem in wireless sensor networks: a survey.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2005

Video Decompression Estimation and Playout Scheme Over the Internet.
Multim. Tools Appl., 2005

A Communication Paradigm for Hybrid Sensor/Actuator Networks*.
Int. J. Wirel. Inf. Networks, 2005

Addressing Mobility in Wireless Sensor Media Access Protocol.
Int. J. Distributed Sens. Networks, 2005

Processing resource scheduling in programmable networks.
Comput. Commun., 2005

Using frequency division to reduce MAI in DS-CDMA wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A hybrid sensor network for cane-toad monitoring.
Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, 2005

Efficient Bandwidth Guaranteed Restoration Algorithms for Multicast Connections.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

Implementation and Performance Analysis of a Packet Scheduler on a Programmable Network Processor.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Resilience Provisioning in Provider-Based Overlay Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Dynamic Routing of Restorable QoS Connections in MPLS Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Probabilistic Coverage in Wireless Sensor Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

On large scale deployment of parallelized file transfer protocol.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
Location estimation and trajectory prediction for cellular networks with mobile base stations.
IEEE Trans. Veh. Technol., 2004

Failure-Oriented Path Restoration Algorithm for Survivable Networks.
IEEE Trans. Netw. Serv. Manag., 2004

Robust extended Kalman filter based technique for location management in PCS networks.
Comput. Commun., 2004

Advances in future mobile/wireless networks and services.
Comput. Commun., 2004

Design and analysis of location management schemes for a new light-weight wireless network.
Comput. Commun., 2004

The REKF localization system: node localization using mobile robots.
Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, 2004

A self-organizing, location-aware media access control protocol for DS-CDMA sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

An Energy Efficient Select Optimal Neighbor Protocol for Wireless Ad Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

On the Optimization Trade-Offs of Expanding Ring Search.
Proceedings of the Distributed Computing, 2004

A composite scheduling algorithm for programmable networks.
Proceedings of IEEE International Conference on Communications, 2004

Resilience-differentiation in programmable virtual networks.
Proceedings of IEEE International Conference on Communications, 2004

Adaptive, distributed location management in mobile, wireless networks.
Proceedings of IEEE International Conference on Communications, 2004

Joint-path computation algorithms for restoration networks.
Proceedings of IEEE International Conference on Communications, 2004

Optimising expanding ring search for multi-hop wireless networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Cell hopping: a lightweight architecture for wireless communications.
IEEE Wirel. Commun., 2003

An Adaptive Resource Management Architecture for Active Networks.
Telecommun. Syst., 2003

Empirical study of traffic trunking in Linux-based MPLS test-bed.
Int. J. Netw. Manag., 2003

Java implementation of policy-based bandwidth management.
Int. J. Netw. Manag., 2003

Mobility modelling and trajectory prediction for cellular networks with mobile base stations.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

Parallelized File Transfer Protocol (P-FTP).
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Scheduling Resources in Programmable and Active Networks Based on Adaptive Estimations.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

An Analysis of Virtual Private Network Solutions.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Optimized Allocation of Distributed Applications Across Local Area Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Reducing Signalling Overhead in Cell-Hopping Mobile Wireless Networks using Location Caches.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Recent directions in virtual private network solutions.
Proceedings of the 11th IEEE International Conference on Networks, 2003

APLS: active protocol label switching.
Proceedings of IEEE International Conference on Communications, 2003

2002
Building agents for rule-based intrusion detection system.
Comput. Commun., 2002

G-QoSM: Grid Service Discovery Using QoS Properties.
Comput. Artif. Intell., 2002

Design and Experimental Evaluation of Mobile Wireless Control Load Protoco.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Engineering internet QoS.
Artech House, ISBN: 978-1-58053-341-6, 2002

2001
SBM+: Enhanced SBM for Managing Bandwidth in Multiple Access Subnets.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Implementing Bandwidth Broker Using COPS-PR in Java.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Current directions in active programmable network.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

Internet charging-behind the time$.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

Universal Network of Small Wireless Operators (UNSWo).
Proceedings of the First IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2001), 2001

2000
Intra-domain Bandwidth Management in Differentiated Services Network.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

1999
Synchronization Skew: A QoS Measurement Study.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999

1994
Capacity Planning of LAN Using Network Management.
Proceedings of the Proceedings 19th Conference on Local Computer Networks, 1994

1991
Direction of arrival estimation using artificial neural networks.
IEEE Trans. Syst. Man Cybern., 1991

1990
Bearing estimation using neural optimisation methods.
Proceedings of the 1990 International Conference on Acoustics, 1990

1988
Bearing estimation using neural networks.
Proceedings of the IEEE International Conference on Acoustics, 1988


  Loading...