Vireshwar Kumar

Orcid: 0000-0002-2214-1571

According to our database1, Vireshwar Kumar authored at least 26 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EP-CuMAC: Energy and performance-efficient integrity protection for narrow-band IoT.
Internet Things, April, 2024

PANDA: Practical Adversarial Attack Against Network Intrusion Detection.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
ZBCAN: A Zero-Byte CAN Defense System.
Proceedings of the 32nd USENIX Security Symposium, 2023

SmrtComp: Intelligent and Online CAN Data Compression.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2023

SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

2021
Cumulative Message Authentication Codes for Resource-Constrained IoT Networks.
IEEE Internet Things J., 2021

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.
Proceedings of the 30th USENIX Security Symposium, 2021

PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications.
Proceedings of the 30th USENIX Security Symposium, 2021

Evading Voltage-Based Intrusion Detection on Automotive CAN.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
Proceedings of the 14th USENIX Workshop on Offensive Technologies, 2020

BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks.
Proceedings of the 23rd International Symposium on Research in Attacks, 2020

Cumulative Message Authentication Codes for Resource-Constrained Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing.
IEEE Trans. Cogn. Commun. Netw., 2019

2018
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System.
IACR Cryptol. ePrint Arch., 2018

Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters.
Proceedings of the 2018 IEEE International Symposium on Dynamic Spectrum Access Networks, 2018

2017
Transmitter authentication using hierarchical modulation in dynamic spectrum sharing.
J. Netw. Comput. Appl., 2017

2016
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement.
IEEE Trans. Inf. Forensics Secur., 2016

2015
Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Security and Enforcement in Spectrum Sharing.
Proc. IEEE, 2014

PHY-layer authentication using hierarchical modulation and duobinary signaling.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Blind Transmitter Authentication for Spectrum Security and Enforcement.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
PHY-layer authentication by introducing controlled inter symbol interference.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Physical layer authentication using controlled inter symbol interference.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

2011
Achievable Secrecy Sum-Rate in a Fading MAC-WT with Power Control and without CSI of Eavesdropper
CoRR, 2011


  Loading...