Ankit Gangwal

Orcid: 0000-0002-8065-3700

According to our database1, Ankit Gangwal authored at least 21 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
De-Authentication Using Ambient Light Sensor.
IEEE Access, 2024

2023
A survey of Layer-two blockchain protocols.
J. Netw. Comput. Appl., 2023

A First Look at Shill Looping in NFT Ecosystem.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2023

AutoSpill: Credential Leakage from Mobile Password Managers.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
On the Feasibility of Profiling Electric Vehicles through Charging Data.
CoRR, 2022

BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration.
Proceedings of the Computer Security - ESORICS 2022, 2022

Analyzing Price Deviations in DeFi Oracles.
Proceedings of the Cryptology and Network Security - 21st International Conference, 2022

2020
Cryptomining Cannot Change Its Spots: Detecting Covert Cryptomining Using Magnetic Side-Channel.
IEEE Trans. Inf. Forensics Secur., 2020

The Road Ahead for Networking: A Survey on ICN-IP Coexistence Solutions.
IEEE Commun. Surv. Tutorials, 2020

Averages don't characterise the heavy tails of ransoms.
Proceedings of the APWG Symposium on Electronic Crime Research, 2020

Detecting Covert Cryptomining Using HPC.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2019
Improving Password Guessing via Representation Learning.
IACR Cryptol. ePrint Arch., 2019

Mind your wallet's privacy: identifying Bitcoin wallet apps and user's actions through network traffic analysis.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

On the Exploitation of Online SMS Receiving Services to Forge ID Verification.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective.
Comput. Secur., 2018

Spot the Difference: Your Bucket is Leaking : A Novel Methodology to Expose A/B Testing Effortlessly.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A comprehensive and effective mechanism for DDoS detection in SDN.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

Blocking intrusions at border using software defined-internet exchange point (SD-IXP).
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017

Panorama: Real-time bird's eye view of an OpenFlow network.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

2016
ELBA: Efficient Layer Based Routing Algorithm in SDN.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016


  Loading...