Devu Manikantan Shila

Orcid: 0000-0001-9882-147X

According to our database1, Devu Manikantan Shila authored at least 40 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Advancing the State-of-the-Art in Hardware Trojans Detection.
IEEE Trans. Dependable Secur. Comput., 2019

Guest Editorial Special Issue on Enabling a Smart City: Internet of Things Meets AI.
IEEE Internet Things J., 2019

Side channel attack on smartphone sensors to infer gender of the user: poster abstract.
Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019

Optimal Strategic Pricing Attacks in Smart Grids: A Dynamic Programming Approach.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

2018
CASTRA: Seamless and Unobtrusive Authentication of Users to Diverse Mobile Services.
IEEE Internet Things J., 2018

Adversarial Gait Detection on Mobile Devices Using Recurrent Neural Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Automatic Construction of Attack Graphs in Cyber Physical Systems Using Temporal Logic.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Physics-Based Features for Anomaly Detection in Power Grids with Micro-PMUs.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Detecting Data Integrity Attacks on Correlated Solar Farms Using Multi-layer Data Driven Algorithm.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System.
IEEE Wirel. Commun., 2017

Catching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection.
CoRR, 2017

2016
Ghost-in-ZigBee: Energy Depletion Attack on ZigBee-Based Wireless Networks.
IEEE Internet Things J., 2016

Moving target defense for Internet of Things using context aware code partitioning and code diversification.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Detecting and thwarting hardware trojan attacks in cyber-physical systems.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
A Systematic Study of Maximal Scheduling Algorithms in Multiradio Multichannel Wireless Networks.
IEEE/ACM Trans. Netw., 2015

Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors.
IACR Cryptol. ePrint Arch., 2015

Unraveling the Security Puzzle: A Distributed Framework to Build Trust in FPGAs.
Proceedings of the Network and System Security - 9th International Conference, 2015

FIDES: Enhancing trust in reconfigurable based hardware systems.
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015

2014
HaTCh: Hardware Trojan Catcher.
IACR Cryptol. ePrint Arch., 2014

Ghost-in-the-Wireless: Energy Depletion Attack on ZigBee.
CoRR, 2014

A systematic study of the delayed column generation method for optimizing wireless networks.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Design, implementation and security analysis of Hardware Trojan Threats in FPGA.
Proceedings of the IEEE International Conference on Communications, 2014

Secure key establishment for Device-to-Device communications.
Proceedings of the IEEE Global Communications Conference, 2014

Design, implementation and security analysis of hardware trojan threats in FPGA (abstract only).
Proceedings of the 2014 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2014

xDEFENSE: an extended DEFENSE for mitigating next generation intrusions (abstract only).
Proceedings of the 2014 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2014

2013
Capacity gain through power enhancement in multi-radio multi-channel wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

High throughput implementations of cryptography algorithms on GPU and FPGA.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2013

Hardware acceleration of TEA and XTEA algorithms on FPGA, GPU and multi-core processors (abstract only).
Proceedings of the 2013 ACM/SIGDA International Symposium on Field Programmable Gate Arrays, 2013

2012
Ad hoc wireless networks meet the infrastructure: Mobility, capacity and delay.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Capacity enhancement of cognitive wireless networks with 7-distance spectrum usage policy.
Proceedings of IEEE International Conference on Communications, 2012

2011
Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Mitigating selective forwarding attacks with a channel-aware approach in WMNs.
IEEE Trans. Wirel. Commun., 2010

An Interference-Aware Admission Control Design for Wireless Mesh Networks.
EURASIP J. Wirel. Commun. Netw., 2010

A Game Theoretic Approach to Multi-radio Multi-channel Assignment in Wireless Networks.
Proceedings of the Wireless Algorithms, 2010

Extracting More Capacity from Multi-channel Multi-radio Wireless Networks by Exploiting Power.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Capacity of Cooperative Wireless Networks Using Multiple Channels.
Proceedings of IEEE International Conference on Communications, 2010

A Cooperative Multi-Channel MAC Protocol for Wireless Networks.
Proceedings of the Global Communications Conference, 2010

2009
Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Load aware traffic engineering for mesh networks.
Comput. Commun., 2008

Defending selective forwarding attacks in WMNs.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008


  Loading...