Vijay Laxmi
Orcid: 0000-0002-3662-8487
According to our database1,
Vijay Laxmi
authored at least 181 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
GAN-based Seed Generation for Efficient Fuzzing.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC.
J. Supercomput., October, 2023
Microprocess. Microsystems, 2023
Navigating the Concurrency Landscape: A Survey of Race Condition Vulnerability Detectors.
CoRR, 2023
A Survey of Side-Channel Attacks in Context of Cache - Taxonomies, Analysis and Mitigation.
CoRR, 2023
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks.
IEEE Access, 2023
2022
Microprocess. Microsystems, June, 2022
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges.
ACM Trans. Internet Techn., 2022
Comput. Sci. Rev., 2022
Appl. Intell., 2022
2021
<i>Scaling & fuzzing: </i> Personal image privacy from automated attacks in mobile cloud computing.
J. Inf. Secur. Appl., 2021
Stand-alone PV water pumping system based on high-gain resonant inverter fed induction motor serving two-head for permanent water supply.
Int. J. Circuit Theory Appl., 2021
MapperDroid: Verifying app capabilities from description to permissions and API calls.
Comput. Secur., 2021
2020
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration.
Integr., 2020
Future Gener. Comput. Syst., 2020
Comput. Commun., 2020
Autom. Control. Comput. Sci., 2020
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020
Multiple-NoC Exploration and Customization for Energy Efficient Traffic Distribution.
Proceedings of the 28th IFIP/IEEE International Conference on Very Large Scale Integration, 2020
2019
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures.
J. Supercomput., 2019
Int. J. Inf. Sec., 2019
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Proceedings of the Risks and Security of Internet and Systems, 2019
2018
Wirel. Networks, 2018
A Power Efficient Crossbar Arbitration in Multi-NoC for Multicast and Broadcast Traffic.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the Risks and Security of Internet and Systems, 2018
2017
Moralism: mobility prediction with link stability based multicast routing protocol in MANETs.
Wirel. Networks, 2017
Int. J. Inf. Commun. Technol., 2017
Int. J. Commun. Syst., 2017
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges.
CoRR, 2017
Comput. Secur., 2017
Ad Hoc Networks, 2017
Proceedings of the VLSI Design and Test - 21st International Symposium, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the IEEE International Symposium on Nanoelectronic and Information Systems, 2017
Proceedings of the Information Systems Security - 13th International Conference, 2017
Proceedings of the Risks and Security of Internet and Systems, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
2016
Proceedings of the Recent Advances in Computational Intelligence in Defense and Security, 2016
<i>σ</i> <sup> <i>n</i> </sup>LBDR: generic congestion handling routing implementation for two-dimensional mesh network-on-chip.
IET Comput. Digit. Tech., 2016
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions.
CoRR, 2016
Colluding browser extension attack on user privacy and its implication for web browsers.
Comput. Secur., 2016
Proceedings of the 2016 Wireless Days, 2016
A Power Efficient Dual Link Mesh NoC Architecture to Support Nonuniform Traffic Arbitration at Routing Logic.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016
Proceedings of the 20th International Symposium on VLSI Design and Test, 2016
Proceedings of the 2016 International Conference on Information Networking, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Bandwidth-aware routing and admission control for efficient video streaming over MANETs.
Wirel. Networks, 2015
IEEE Trans. Inf. Forensics Secur., 2015
A Brief Comment on "A Complete Self-Testing and Self-Configuring NoC Infrastructure for Cost-Effective MPSoCs" [ACM Transactions on Embedded Computing Systems 12 (2013) Article 106].
ACM Trans. Embed. Comput. Syst., 2015
J. Inf. Secur. Appl., 2015
J. Inf. Secur. Appl., 2015
IEEE Commun. Surv. Tutorials, 2015
Open Comput. Sci., 2015
Proceedings of the 28th International Conference on VLSI Design, 2015
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Proceedings of the 19th International Symposium on VLSI Design and Test, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
d<sup>2</sup>-LBDR: distance-driven routing to handle permanent failures in 2D mesh NOCs.
Proceedings of the 2015 Design, Automation & Test in Europe Conference & Exhibition, 2015
2014
Exploiting convergence characteristics to tackle collusion attacks in OLSR for <i>Security and Communication Networks</i>.
Secur. Commun. Networks, 2014
Int. J. Secur. Networks, 2014
Int. J. Inf. Comput. Secur., 2014
Proceedings of the 2014 27th International Conference on VLSI Design, 2014
Proceedings of the 22nd International Conference on Very Large Scale Integration, 2014
Proceedings of the 18th International Symposium on VLSI Design and Test, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the 2014 NORCHIP, Tampere, Finland, October 27-28, 2014, 2014
Proceedings of the Eighth IEEE/ACM International Symposium on Networks-on-Chip, 2014
Proceedings of the 3rd International Workshop on Many-core Embedded Systems (MES'2015) held on June 13, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the Seventh International Conference on Contemporary Computing, 2014
Proceedings of the Great Lakes Symposium on VLSI 2014, GLSVLSI '14, Houston, TX, USA - May 21, 2014
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014
Proceedings of the 2014 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2014
Proceedings of the 7th ACM India Computing Conference, 2014
2013
Int. J. Pattern Recognit. Artif. Intell., 2013
Proceedings of the VLSI Design and Test, 17th International Symposium, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Proceedings of the Recent Advances in Intelligent Informatics, 2013
Proceedings of the International Conference on Advances in Computing, 2013
An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs.
Proceedings of the International Conference on Advances in Computing, 2013
Proceedings of the 2013 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 2013
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013
Proceedings of the 4th International Conference on Ambient Systems, 2013
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013
Proceedings of the Wireless Networks and Security, Issues, Challenges and Research Trends., 2013
2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Detection of incorrect position information using speed and time span verification in VANET.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Mining control flow graph as <i>API call-grams</i> to detect portable executable malware.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the 5th IAPR International Conference on Biometrics, 2012
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the 2012 International Conference on Advances in Computing, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012
2011
Proceedings of the IEEE/IFIP 19th International Conference on VLSI and System-on-Chip, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Position forging attacks in Vehicular Ad Hoc Networks: Implementation, impact and detection.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the Computer and Information Sciences II, 2011
Proceedings of the Computer and Information Sciences II, 2011
Proceedings of the 13th IEEE International Conference on High Performance Computing & Communication, 2011
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011
Proceedings of the Sixth IEEE International Symposium on Electronic Design, 2011
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs.
Proceedings of the Advanced Communication and Networking, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Advances in Computing and Communications, 2011
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011
2010
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
ERA: An Efficient Routing Algorithm for Power, Throughput and Latency in Network-on-Chips.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010
Genetic algorithm based topology generation for application specific Network-on-Chip.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010
Minimal Path, Fault Tolerant, QoS Aware Routing with Node and Link Failure in 2-D Mesh NoC.
Proceedings of the 25th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems, 2010
Proceedings of the Recent Trends in Network Security and Applications, 2010
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
Proceedings of the Computational Intelligence in Security for Information Systems 2010, 2010
2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
Proceedings of the Contemporary Computing - Second International Conference, 2009
2008
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008
Proceedings of the Nano-Net - Third International ICST Conference, 2008
Feature Point Detection for Real Time Applications.
Proceedings of the 2008 International Conference on Image Processing, 2008
Corner Detection on Curves.
Proceedings of the GRAPP 2008, 2008
2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Optimizing Task Distribution for Heterogeneous Desktop Clusters.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2007
Transformation Invariant Robust Shape Analysis.
Proceedings of the 2007 International Conference on Image Processing, 2007
2006
Morphological Edge Detection and Corner Detection Algorithm Using Chain Encoding.
Proceedings of the 2006 International Conference on Image Processing, 2006
2003
Biologically-inspired motion detection and classification : human and machine perception.
PhD thesis, 2003
2002
Proceedings of the 10th Eurorean Symposium on Artificial Neural Networks, 2002