Saurabh Bagchi

Orcid: 0000-0002-4239-5632

Affiliations:
  • Purdue University, West Lafayette, USA


According to our database1, Saurabh Bagchi authored at least 268 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, May, 2024

Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, April, 2024

HopTrack: A Real-time Multi-Object Tracking System for Embedded Devices.
CoRR, 2024

Dynamic DAG-Application Scheduling for Multi-Tier Edge Computing in Heterogeneous Networks.
CoRR, 2024

Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey.
CoRR, 2024

Adversarial Attacks on Reinforcement Learning Agents for Command and Control.
CoRR, 2024

Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Benchmarking Algorithms for Federated Domain Generalization.
Proceedings of the Twelfth International Conference on Learning Representations, 2024

SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

RECON: Training-Free Acceleration for Text-to-Image Synthesis with Retrieval of Concept Prompt Trajectories.
Proceedings of the Computer Vision - ECCV 2024, 2024

(Re)-envisioning Approximate Agreement for Distributed Cryptography and Oracles.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Leak and Learn: An Attacker's Cookbook to Train Using Leaked Data from Federated Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon <i>without</i> Threshold Cryptography.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Virtuoso: Energy- and Latency-aware Streamlining of Streaming Videos on Systems-on-Chips.
ACM Trans. Design Autom. Electr. Syst., 2023

Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets.
Sensors, 2023

HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup.
IACR Cryptol. ePrint Arch., 2023

Game Theory in Distributed Systems Security: Foundations, Challenges, and Future Directions.
CoRR, 2023

Secure Aggregation in Federated Learning is not Private: Leaking User Data at Large Scale through Model Modification.
CoRR, 2023

An Open Dataset of Sensor Data from Soil Sensors and Weather Stations at Production Farms.
CoRR, 2023

DAG-based Task Orchestration for Edge Computing.
CoRR, 2023

EESMR: Energy Efficient BFT - SMR for the masses.
Proceedings of the 24th International Middleware Conference, 2023

The Unique Chain Rule and Its Applications.
Proceedings of the Financial Cryptography and Data Security, 2023

How to Learn Collaboratively - Federated Learning to Peer-to-Peer Learning and What's at Stake.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

A Circuit Designer's Perspective on Transistor Modelling Challenges for 6G, Fiberoptics, and Quantum Computing ICs.
Proceedings of the IEEE BiCMOS and Compound Semiconductor Integrated Circuits and Technology Symposium, 2023

FLAIR: Defense against Model Poisoning Attack in Federated Learning.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

Security Properties of Virtual Remotes and SPOOKing their violations.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
ApproxNet: Content and Contention-Aware Video Object Classification System for Embedded Clients.
ACM Trans. Sens. Networks, 2022

Distributed State Estimation Over Time-Varying Graphs: Exploiting the Age-of-Information.
IEEE Trans. Autom. Control., 2022

WISEFUSE: Workload Characterization and DAG Transformation for Serverless Workflows.
Proc. ACM Meas. Anal. Comput. Syst., 2022

Challenges in Firmware Re-Hosting, Emulation, and Analysis.
ACM Comput. Surv., 2022

Anomaly Detection and Inter-Sensor Transfer Learning on Smart Manufacturing Datasets.
CoRR, 2022

DAG-based Task Orchestration for Edge Computing.
Proceedings of the 41st International Symposium on Reliable Distributed Systems, 2022

TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

ORION and the Three Rights: Sizing, Bundling, and Prewarming for Serverless DAGs.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

Root Cause Analysis of Failures in Microservices through Causal Discovery.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

An Automated Approach to Re-Hosting Embedded Firmware by Removing Hardware Dependencies.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

An Analytical Study of Motion of Autonomous Vehicles under Imperfect Sensing.
Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, 2022

LiteReconfig: cost and content aware reconfiguration of video object detection systems for mobile GPUs.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

Real-Time Digital Filtering for IoT Data in Programmable Network Switches.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

Smartadapt: Multi-branch Object Detection Framework for Videos on Mobiles.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

AutoForecast: Automatic Time-Series Forecasting Model Selection.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Can we Generalize and Distribute Private Representation Learning?
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2021
Distributed Inference With Sparse and Quantized Communication.
IEEE Trans. Signal Process., 2021

Hybrid Low-Power Wide-Area Mesh Network for IoT Applications.
IEEE Internet Things J., 2021

Context-Aware Collaborative Intelligence With Spatio-Temporal In-Sensor-Analytics for Efficient Communication in a Large-Area IoT Testbed.
IEEE Internet Things J., 2021

Apollo - Optimistically Linear and Responsive SMR.
IACR Cryptol. ePrint Arch., 2021

Virtuoso: Video-based Intelligence for real-time tuning on SOCs.
CoRR, 2021

TESSERACT: Gradient Flip Score to Secure Federated Learning Against Model Poisoning Attacks.
CoRR, 2021

Federated Action Recognition on Heterogeneous Embedded Devices.
CoRR, 2021

Anomaly Detection through Transfer Learning in Agriculture and Manufacturing IoT Systems.
CoRR, 2021

SONIC: Application-aware Data Passing for Chained Serverless Applications.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021

HIOA-CPS: Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Benchmarking Video Object Detection Systems on Embedded Devices under Resource Contention.
Proceedings of the EMDL@MobiSys 2021: Proceedings of the 5th International Workshop on Embedded and Mobile Deep Learning, 2021

Ramps: Next Generation Platform for Real Time and Resilient IoT Analytics using MmWave and Programmable Switches.
Proceedings of the DIDL '21: Proceedings of the Fifth Workshop on Distributed Infrastructures for Deep Learning 2021, 2021

The Effect of Behavioral Probability Weighting in a Simultaneous Multi-Target Attacker-Defender Game.
Proceedings of the 2021 European Control Conference, 2021

Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs.
IEEE Trans. Control. Netw. Syst., 2020

Vision Paper: Grand Challenges in Resilience: Autonomous System Resilience through Design and Runtime Measures.
IEEE Open J. Comput. Soc., 2020

New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges.
IEEE Internet Things J., 2020

Exploring Adversarial Examples via Invertible Neural Networks.
CoRR, 2020

Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems.
CoRR, 2020

I-BOT: Interference-Based Orchestration of Tasks for Dynamic Unmanaged Edge Computing.
CoRR, 2020

Towards Generalized and Distributed Privacy-Preserving Representation Learning.
CoRR, 2020

BASCPS: How does behavioral decision making impact the security of cyber-physical systems?
CoRR, 2020

Resilient Cyberphysical Systems and their Application Drivers: A Technology Roadmap.
CoRR, 2020

Dependability in edge computing.
Commun. ACM, 2020

HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation.
Proceedings of the 29th USENIX Security Symposium, 2020

OPTIMUSCLOUD: Heterogeneous Configuration Optimization for Distributed Databases in the Cloud.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

ApproxDet: content and contention-aware approximate object detection for mobiles.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

Proactive privacy-preserving proximity prevention through bluetooth transceivers: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

µRAI: Securing Embedded Systems with Return Address Integrity.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Vulcan: lessons on reliability of wearables through state-aware fuzzing.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Vulcan: a state-aware fuzzing tool for wear OS ecosystem.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

Closing-the-Loop: A Data-Driven Framework for Effective Video Summarization.
Proceedings of the IEEE International Symposium on Multimedia, 2020

CrowdBind: Fairness Enhanced Late Binding Task Scheduling in Mobile Crowdsensing.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020

AppStreamer: Reducing Storage Requirements of Mobile Games through Predictive Streaming.
Proceedings of the 2020 International Conference on Embedded Wireless Systems and Networks, 2020

The Effect of Motion on PPG Heart Rate Sensors.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Reliability Analysis of Edge Scenarios Using Pedestrian Mobility.
Proceedings of the 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks, 2020

Event-Triggered Distributed Inference.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

The Effect of Behavioral Probability Weighting in a Sequential Defender-Attacker Game.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Privacy in the Mobile World: An Analysis of Bluetooth Scan Traces.
Proceedings of the CPSIOTSEC'20: Proceedings of the 2020 Joint Workshop on CPS&IoT Security and Privacy, 2020

2019
Grand Challenges of Resilience: Autonomous System Resilience through Design and Runtime Measures.
CoRR, 2019

HAWKEYE: Adversarial Example Detector for Deep Neural Networks.
CoRR, 2019

ApproxNet: Content and Contention Aware Video Analytics System for the Edge.
CoRR, 2019

Smoothing the path to computing: pondering uses for big data.
Commun. ACM, 2019

MG-RAST version 4 - lessons learned from a decade of low-budget ultra-high-throughput metagenome analysis.
Briefings Bioinform., 2019

Federation in genomics pipelines: techniques and challenges.
Briefings Bioinform., 2019

Resilient distributed state estimation with mobile agents: overcoming Byzantine adversaries, communication losses, and intermittent measurements.
Auton. Robots, 2019

SOPHIA: Online Reconfiguration of Clustered NoSQL Databases for Time-Varying Workloads.
Proceedings of the 2019 USENIX Annual Technical Conference, 2019

GPUMixer: Performance-Driven Floating-Point Tuning for GPU Scientific Applications.
Proceedings of the High Performance Computing - 34th International Conference, 2019

Tango of edge and cloud execution for reliability.
Proceedings of the 4th Workshop on Middleware for Edge Clouds & Cloudlets, 2019

XSTRESSOR : Automatic Generation of Large-Scale Worst-Case Test Inputs by Inferring Path Conditions.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

PySE: Automatic Worst-Case Test Generation by Reinforcement Learning.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

AMPT-GA: automatic mixed precision floating point tuning for GPU applications.
Proceedings of the ACM International Conference on Supercomputing, 2019

Misleading Metadata Detection on YouTube.
Proceedings of the Advances in Information Retrieval, 2019

BenchIoT: A Security Benchmark for the Internet of Things.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

SimVecs: Similarity-Based Vectors for Utterance Representation in Conversational AI Systems.
Proceedings of the 23rd Conference on Computational Natural Language Learning, 2019

Protecting Assets with Heterogeneous Valuations under Behavioral Probability Weighting.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Finite-Time Distributed State Estimation over Time-Varying Graphs: Exploiting the Age-of-Information.
Proceedings of the 2019 American Control Conference, 2019

The Impacts of Behavioral Probability Weighting on Security Investments in Interdependent Systems.
Proceedings of the 2019 American Control Conference, 2019

2018
Learning from the Ones that Got Away: Detecting New Forms of Phishing Attacks.
IEEE Trans. Dependable Secur. Comput., 2018

TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices.
IEEE Internet Comput., 2018

ATHENA: Automated Tuning of Genomic Error Correction Algorithms using Language Models.
CoRR, 2018

MAVIS: Managing Datacenters using Smartphones.
CoRR, 2018

Reactive redundancy for data destruction protection (R2D2).
Comput. Secur., 2018

ACES: Automatic Compartments for Embedded Systems.
Proceedings of the 27th USENIX Security Symposium, 2018

VideoChef: Efficient Approximation for Streaming Video Processing Pipelines.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

A Hypergame Analysis for ErsatzPasswords.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Pythia: Improving Datacenter Utilization via Precise Contention Prediction for Multiple Co-located Workloads.
Proceedings of the 19th International Middleware Conference, 2018

How Reliable is My Wearable: A Fuzz Testing-Based Study.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Minerva: A reinforcement learning-based technique for optimal scheduling and bottleneck detection in distributed factory operations.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

2017
MAAT: Multi-Stage Attack Attribution in Enterprise Systems using Software Defined Networks.
EAI Endorsed Trans. Security Safety, 2017

On Reliability of Android Wearable Health Devices.
CoRR, 2017

Protecting Bare-Metal Embedded Systems with Privilege Overlays.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Integrity of Data in a Mobile Crowdsensing Campaign: A Case Study.
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, 2017

TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks.
Proceedings of the Security and Privacy in Communication Networks, 2017

Snowpack: efficient parameter choice for GPU kernels via static analysis and statistical prediction.
Proceedings of the 8th Workshop on Latest Advances in Scalable Algorithms for Large-Scale Systems, 2017

Sense-aid: a framework for enabling network as a service for participatory sensing.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

Rafiki: a middleware for parameter tuning of NoSQL datastores for dynamic metagenomics workloads.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

Understanding the Spatial Characteristics of DRAM Errors in HPC Clusters.
Proceedings of the ACM Workshop on Fault-Tolerance for HPC at Extreme Scale, 2017

RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Profiting from attacks on real-time price communications in smart grids.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Position statements from panelists: Smart cities-delusions of grandeur.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Position statements from panelists: Ubiquitous sensing and privacy: Can the twains meet?
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Position statements from panelists: Big data in IoT - Academic hype or industrial reality?
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

TATHYA: A Multi-Classifier System for Detecting Check-Worthy Statements in Political Debates.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Phase-aware optimization in approximate computing.
Proceedings of the 2017 International Symposium on Code Generation and Optimization, 2017

Scalable Genomic Assembly through Parallel <i>de Bruijn</i> Graph Construction for Multiple K-mers.
Proceedings of the 8th ACM International Conference on Bioinformatics, 2017

2016
Toward Optimal Distributed Monitoring of Multi-Channel Wireless Networks.
IEEE Trans. Mob. Comput., 2016

The MG-RAST metagenomics database and portal in 2015.
Nucleic Acids Res., 2016

Sirius: Neural Network Based Probabilistic Assertions for Detecting Silent Data Corruption in Parallel Programs.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

TANGO: Toward a More Reliable Mobile Streaming through Cooperation between Cellular Network and Mobile Devices.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Chameleon: defending secret information from eavesdropping over physical environment.
Proceedings of the International Conference on Networking Systems and Security, 2016

Video through a crystal ball: effect of bandwidth prediction quality on adaptive streaming in mobile environments.
Proceedings of the 8th International Workshop on Mobile Video, 2016

A Study of Failures in Community Clusters: The Case of Conte.
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016

SARVAVID: A Domain Specific Language for Developing Scalable Computational Genomics Applications.
Proceedings of the 2016 International Conference on Supercomputing, 2016

Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage.
Proceedings of the Eleventh European Conference on Computer Systems, 2016

Defending against strategic adversaries in dynamic pricing markets for smart grids.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

Fast training on large genomics data using distributed Support Vector Machines.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
Diagnosis of Performance Faults in LargeScale MPI Applications via Probabilistic Progress-Dependence Inference.
IEEE Trans. Parallel Distributed Syst., 2015

Debugging high-performance computing applications at massive scales.
Commun. ACM, 2015

Denial of Service Elusion (DoSE): Keeping Clients Connected for Less.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Software-only system-level record and replay in wireless sensor networks.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

TARDIS: software-only system-level record and replay in wireless sensor networks.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems.
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015

ICE: An Integrated Configuration Engine for Interference Mitigation in Cloud Services.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

Do specialized distributed frameworks for bioinformatics applications obtain better performance over generic ones?
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

An ensemble SVM model for the accurate prediction of non-canonical MicroRNA targets.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Dealing with the Unknown: Resilience to Prediction Errors.
Proceedings of the 2015 International Conference on Parallel Architectures and Compilation, 2015

2014
Addressing failures in exascale computing.
Int. J. High Perform. Comput. Appl., 2014

Reliable and Efficient Distributed Checkpointing System for Grid Environments.
J. Grid Comput., 2014

A risk assessment tool for advanced metering infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Orion: Scaling Genomic Sequence Matching with Fine-Grained Parallelization.
Proceedings of the International Conference for High Performance Computing, 2014

Accurate application progress analysis for large-scale parallel debugging.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

Mitigating interference in cloud services by middleware reconfiguration.
Proceedings of the 15th International Middleware Conference, 2014

Is Your Web Server Suffering from Undue Stress due to Duplicate Requests?
Proceedings of the 11th International Conference on Autonomic Computing, 2014

pSigene: Webcrawling to Generalize SQL Injection Signatures.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
McrEngine: A scalable checkpointing system using data-aware aggregation and compression.
Sci. Program., 2013

DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks.
Secur. Commun. Networks, 2013

Distributed mobility management for efficient video delivery over all-IP mobile networks: Competing approaches.
IEEE Netw., 2013

An optimization framework for monitoring multi-channel multi-radio wireless mesh networks.
Ad Hoc Networks, 2013

A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks.
Ad Hoc Networks, 2013

Automatic Problem Localization via Multi-dimensional Metric Profiling.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

Toward optimal sniffer-channel assignment for reliable monitoring in multi-channel wireless networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

WuKong: effective diagnosis of bugs at large system scales.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2013

Characterizing configuration problems in Java EE application servers: An empirical study with GlassFish and JBoss.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

WuKong: automatically detecting and localizing bugs that manifest at large system scales.
Proceedings of the 22nd International Symposium on High-Performance Parallel and Distributed Computing, 2013

Using big data for more dependability: a cellular network tale.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013

Lilliput meets brobdingnagian: Data center systems management through mobile devices.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Secure and resilient proximity-based access control.
Proceedings of the 2013 International Workshop on Data Management & Analytics for Healthcare, 2013

2012
Mitigating the Effects of Software Component Shifts for Incremental Reprogramming of Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Multi-armed Bandit Congestion Control in Multi-hop Infrastructure Wireless Mesh Networks.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012

Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

ABHRANTA: Locating Bugs that Manifest at Large System Scales.
Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, 2012

PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters.
Proceedings of the Computer Security - ESORICS 2012, 2012

A study of soft error consequences in hard disk drives.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Dependability as a cloud service - a modular approach.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

An empirical study of the robustness of Inter-component Communication in Android.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Automatic fault characterization via abnormality-enhanced classification.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Probabilistic diagnosis of performance faults in large-scale parallel applications.
Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, 2012

2011
Efficient incremental code update for sensor networks.
ACM Trans. Sens. Networks, 2011

Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure.
IEEE Trans. Mob. Comput., 2011

The NEEShub Cyberinfrastructure for Earthquake Engineering.
Comput. Sci. Eng., 2011

Secure neighbor discovery through overhearing in static multihop wireless networks.
Comput. Networks, 2011

Dangers and Joys of Stock Trading on the Web: Failure Characterization of a Three-Tier Web Service.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Aveksha: a hardware-software approach for non-intrusive tracing and profiling of wireless embedded systems.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems.
Proceedings of the Security and Privacy in Communication Networks, 2011

v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011

Large scale debugging of parallel tasks with AutomaDeD.
Proceedings of the Conference on High Performance Computing Networking, 2011

Dependence-based multi-level tracing and replay for wireless sensor networks debugging.
Proceedings of the ACM SIGPLAN/SIGBED 2011 conference on Languages, 2011

Vrisha: using scaling properties of parallel programs for bug detection and localization.
Proceedings of the 20th ACM International Symposium on High Performance Distributed Computing, 2011

2010
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks.
Ad Hoc Networks, 2010

Fixed Cost Maintenance for Information Dissemination in Wireless Sensor Networks.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

AutomaDeD: Automata-based debugging for dissimilar parallel tasks.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Intrusion detection in voice over IP environments.
Int. J. Inf. Sec., 2009

Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping.
Ad Hoc Networks, 2009

A tale of two synchronizing clocks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

FALCON: a system for reliable checkpoint recovery in shared grid environments.
Proceedings of the ACM/IEEE Conference on High Performance Computing, 2009

Optimal monitoring in multi-channel multi-radio wireless mesh networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

How to Keep Your Head above Water While Detecting Errors.
Proceedings of the Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30, 2009

Stateful error detection in high throughput applications.
Proceedings of the Middleware 2008, 2009

Multigrade Security Monitoring for Ad-Hoc Wireless Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

TCP/IP Timing Channels: Theory to Implementation.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Hermes: Fast and Energy Efficient Incremental Code Updates for Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Spam detection in voice-over-IP calls through semi-supervised clustering.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Energy-efficient on-demand reprogramming of large-scale sensor networks.
ACM Trans. Sens. Networks, 2008

Modeling and Automated Containment of Worms.
IEEE Trans. Dependable Secur. Comput., 2008

MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks.
Ad Hoc Networks, 2008

Single versus multi-hop wireless reprogramming in sensor networks.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008

Optimizing AES for embedded devices and wireless sensor networks.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008

SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2007
Automated Rule-Based Diagnosis through a Distributed Monitor System.
IEEE Trans. Dependable Secur. Comput., 2007

Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking.
ACM Trans. Auton. Adapt. Syst., 2007

Prediction of Resource Availability in Fine-Grained Cycle Sharing Systems Empirical Evaluation.
J. Grid Comput., 2007

Automated adaptive intrusion containment in systems of interacting services.
Comput. Networks, 2007

LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks.
Comput. Networks, 2007

Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks.
Ad Hoc Networks, 2007

Performance Comparison of SPIN based Push-Pull Protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Data-Centric Routing in Sensor Networks: Single-hop Broadcast or Multi-hop Unicast?
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Stateful Detection in High Throughput Distributed Systems.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Distributed Diagnosis of Failures in a Three Tier E-Commerce System.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Capacity Bounds on Timing Channels with Bounded Service Times.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Stream: Low Overhead Wireless Reprogramming for Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Failure-aware checkpointing in fine-grained cycle sharing systems.
Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 2007

SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Automated Online Monitoring of Distributed Applications through External Monitors.
IEEE Trans. Dependable Secur. Comput., 2006

Detection and Repair of Software Errors in Hierarchical Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Pesticide: Using SMT Processors to Improve Performance of Pointer Bug Detection.
Proceedings of the 24th International Conference on Computer Design (ICCD 2006), 2006

Resource Availability Prediction in Fine-Grained Cycle Sharing Systems.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

Fast Abstracts.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
LRRM: A Randomized Reliable Multicast Protocol for Optimizing Recovery Latency and Buffer Utilization.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Location Estimation in Ad Hoc Networks with Directional Antennas.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Self Checking Network Protocols: A Monitor Based Approach.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Failure Handling in a Reliable Multicast Protocol for Improving Buffer Utilization and Accommodating Heterogeneous Receivers.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Analysis and Evaluation of Topological and Application Characteristics of Unreliable Mobile Wireless Ad-hoc Network.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Efficient Collection of Sensor Data in Remote Fields Using Mobile Collectors.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Open Source Software - A Recipe for Vulnerable Software, or The Only Way to Keep the Bugs and the Bad Guys Out?
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Exactly-once Delivery in a Content-based Publish-Subscribe System.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Hierarchical Error Detection in a Software Implemented Fault Tolerance (Sift) Environment
PhD thesis, 2001

Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Dependency Analysis in Distributed Systems using Fault Injection: Application to Problem Determination in an e-commerce Environment.
Proceedings of the Operations & Management, 2001

A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment.
IEEE Trans. Knowl. Data Eng., 2000

1999
Chameleon: A Software Infrastructure for Adaptive Fault Tolerance.
IEEE Trans. Parallel Distributed Syst., 1999

1998
The Chameleon Infrastructure for Adaptive, Software Implemented Fault Tolerance.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

A Flexible Software Architecture for High Availability Computing.
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998

1997
Chameleon: Adaptive Fault Tolerance Using Reliable, Mobile Agents.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997


  Loading...