Dulal C. Kar

Orcid: 0000-0001-6368-9501

Affiliations:
  • Texas A&M University-Corpus Christi, TX, USA
  • North Dakota State University, Fargo, ND, USA (PhD 1994)


According to our database1, Dulal C. Kar authored at least 41 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Unifying Sky and Chain: A Perspective on Blockchain's Role in UAV Swarms.
Proceedings of the 2nd International Conference on Artificial Intelligence, 2024

2023
Supporting Low-Income, Talented Undergraduate Students in Engineering and Computing Sciences with Scholarships and Mentoring.
J. Comput. Sci. Coll., 2023

UAV GPS Spoofing Detection via Neural Generative One-Class Classification.
Proceedings of the Twenty-fourth International Symposium on Theory, 2023

2022
Energy Harvesting Aware Multi-Hop Routing Policy in Distributed IoT System Based on Multi-Agent Reinforcement Learning.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

2021
MalDuoNet: A DualNet Framework to Detect Android Malware.
Proceedings of the RIVF International Conference on Computing and Communication Technologies, 2021

Supporting Undergraduates for Careers in Computing and Engineering with Scholarships and Supervision.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding.
IEEE Internet Things J., 2020

Surfzone Bathymetry Estimation Using Wave Characteristics Observed by Unmanned Aerial Systems.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2020

2018
A new statistical attack resilient steganography scheme for hiding messages in audio files.
Int. J. Inf. Comput. Secur., 2018

2017
On Pruning of Data in a Sliding Window for Computing a Rank-Order Element.
IEEE Signal Process. Lett., 2017

A Secure Body Sensor Network Architecture with CP-ABE Based Fine-Grained Data Access Control.
Proceedings of the Second International Conference on Advanced Wireless Information, 2017

2015
A multi-threshold based audio steganography scheme.
J. Inf. Secur. Appl., 2015

2013
MHIP: Effective Key Management for Mobile Heterogeneous Sensor Networks.
Int. J. Netw. Secur., 2013

An Efficient Protocol for Privacy and Authentication for Resource-Constrained Devices in Wireless Networks.
Int. J. Cyber Warf. Terror., 2013

Finding Partially Link-Disjoint Paths in Wireless Sensor Networks.
Proceedings of the European Wireless 2013, 2013

2010
LPC Vocoders for Environmental Monitoring Using Wireless Sensor Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

Implementing Security Measures for Portable Devices.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

SCIBED: A Web-Based Testbed for Wireless Sensor Networks.
Proceedings of the 2010 International Conference on Internet Computing, 2010

2009
Applied Cryptography for Security and Privacy in Wireless Sensor Networks.
Int. J. Inf. Secur. Priv., 2009

2008
An integrated web-based system for assignment creation, management, and peer evaluation.
J. Comput. Sci. Coll., 2008

Synchronous Key Generation from Chaotic Systems.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Programming a microcontroller for data capture and display.
Proceedings of the 16th International Conference on Software Engineering and Data Engineering (SEDE-2007), 2007

2006
Teaching cryptography in an applied computing program.
J. Comput. Sci. Coll., 2006

On Fast Estimation of Network Bandwidth.
Proceedings of the 2006 International Conference on Communications in Computing, 2006

An Application for Automatic Extraction of Objects from Digital Images.
Proceedings of the 21st International Conference on Computers and Their Applications, 2006

2005
A web-based system for intrusion detection.
J. Comput. Sci. Coll., 2005

WLAN traffic graphing application using simple network management protocol.
J. Comput. Sci. Coll., 2005

Ethereal vs. Tcpdump: a comparative study on packet sniffing tools for educational purpose.
J. Comput. Sci. Coll., 2005

Computer forensics: a critical need in computer science programs.
J. Comput. Sci. Coll., 2005

2004
Network measurement and path characterization using user datagram protocol.
J. Comput. Sci. Coll., 2004

Optimal Message Routing in a Distributed Double Loop Network with Faulty Nodes and Links.
Proceedings of the 2nd International Conference Computing, 2004

2003
Automatic assignment management and peer evaluation.
J. Comput. Sci. Coll., 2003

Internet path characterization using common internet tools.
J. Comput. Sci. Coll., 2003

Routing Tables for Message Routing in Distributed Double Loop Networks.
Proceedings of the ISCA 18th International Conference Computers and Their Applications, 2003

2002
Internet path characterization tools.
J. Comput. Sci. Coll., 2002

Pruning of a Sliding Window for Rank-Order Filtering.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

A Tree-Based, Constant-Time Rank-Order Algorithm for Moving Window Filtering Applications.
Proceedings of the 15th International Conference on Computer Applications in Industry and Engineering, 2002

2000
Detection of plagiarism in computer programming assignments.
J. Comput. Sci. Coll., 2000

1996
A CORDIC-based unified systolic architecture for sliding window applications of discrete transforms.
IEEE Trans. Signal Process., 1996

1994
On the prime factor decomposition algorithm for the discrete sine transform.
IEEE Trans. Signal Process., 1994

1993
A new systolic realization for the discrete Fourier transform.
IEEE Trans. Signal Process., 1993


  Loading...