K. P. Subbalakshmi

According to our database1, K. P. Subbalakshmi authored at least 111 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Can Large Language Models Detect Misinformation in Scientific News Reporting?
CoRR, 2024

2023
X-GRL: An Empirical Assessment of Explainable GNN-DRL in B5G/6G Networks.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2023

2022
TONet: A Fast and Efficient Method for Traffic Obfuscation Using Adversarial Machine Learning.
IEEE Commun. Lett., 2022

Revisiting Attention Weights as Explanations from an Information Theoretic Perspective.
CoRR, 2022

2021
Learning Models for Suicide Prediction from Social Media Posts.
CoRR, 2021

Causal-TGAN: Generating Tabular Data Using Causal Generative Adversarial Networks.
CoRR, 2021

Modular Multi-Modal Attention Network for Alzheimer's Disease Detection Using Patient Audio and Language Data.
Proceedings of the Interspeech 2021, 22nd Annual Conference of the International Speech Communication Association, Brno, Czechia, 30 August, 2021

MMCoVaR: multimodal COVID-19 vaccine focused data repository for fake news detection and a baseline architecture for classification.
Proceedings of the ASONAM '21: International Conference on Advances in Social Networks Analysis and Mining, Virtual Event, The Netherlands, November 8, 2021

2020
Explainable Rumor Detection using Inter and Intra-feature Attention Networks.
CoRR, 2020

Explainable CNN-attention Networks (C-Attention Network) for Automated Detection of Alzheimer's Disease.
CoRR, 2020

Personalized Early Stage Alzheimer's Disease Detection: A Case Study of President Reagan's Speeches.
Proceedings of the 19th SIGBioMed Workshop on Biomedical Language Processing, 2020

2019
Optimal Joint Scheduling and Cloud Offloading for Mobile Applications.
IEEE Trans. Cloud Comput., 2019

An analytical system for user emotion extraction, mental state modeling, and rating.
Expert Syst. Appl., 2019

2018
Who Spread That Rumor: Finding the Source of Information in Large Online Social Networks With Probabilistically Varying Internode Relationship Strengths.
IEEE Trans. Comput. Soc. Syst., 2018

Introduction to the Special Section From the IEEE GLOBECOM 2017 Conference.
IEEE Trans. Cogn. Commun. Netw., 2018

2016
A Time-Adaptive Heuristic for Cognitive Cloud Offloading in Multi-RAT Enabled Wireless Devices.
IEEE Trans. Cogn. Commun. Netw., 2016

Joint-channel modeling to attack QIM steganography.
Multim. Tools Appl., 2016

Software defined access for HetNets.
IEEE Commun. Mag., 2016

Harnessing spectrum awareness to enhance mobile computing: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

2015
Spatio-Temporal Analysis of Passive Consumption in Internet Media.
IEEE Trans. Knowl. Data Eng., 2015

Effective Bandwidth for Delay Tolerant Secondary User Traffic in Multi-PU, Multi-SU Dynamic Spectrum Access Networks.
IEEE Trans. Cogn. Commun. Netw., 2015

Identification of Source of Rumors in Social Networks with Incomplete Information.
CoRR, 2015

Cloud offloading for multi-radio enabled mobile devices.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Delay analysis of multi-user dynamic spectrum access networks.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015

2014
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.
IEEE Trans. Veh. Technol., 2014

Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay.
EAI Endorsed Trans. Wirel. Spectr., 2014

Reciprocity, fairness and learning in medium access control games.
Comput. Commun., 2014

A two-stage algorithm to estimate the source of information diffusion in social media networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
A Quantitative Model and Analysis of Information Confusion in Social Networks.
IEEE Trans. Multim., 2013

Altruism in social networks: good guys do finish first.
Soc. Netw. Anal. Min., 2013

Open research issues in multi-hop cognitive radio networks.
IEEE Commun. Mag., 2013

Reciprocity and Fairness in Medium Access Control Games.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Optimizing flow control in multi-interface wireless cognitive radio networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy.
IEEE Trans. Inf. Forensics Secur., 2012

Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks.
IEEE Trans. Commun., 2012

Impact of Constraints on the Complexity and Performance of Channel Assignment in Multi-Hop Wireless Networks.
J. Cyber Secur. Mobil., 2012

Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach.
IET Commun., 2012

Network measurement based modeling and optimization for IP geolocation.
Comput. Networks, 2012

Measuring and quantifying the silent majority on the Internet.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

2011
Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks.
IEEE J. Sel. Areas Commun., 2011

KL-sense secure image steganography.
Int. J. Secur. Networks, 2011

Author gender identification from text.
Digit. Investig., 2011

SpiderRadio: A cognitive radio network with commodity hardware and open source software.
IEEE Commun. Mag., 2011

Cost of Collaboration vs Individual Effort in Social Networks.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

Adaptive Context Modeling for Deception Detection in Emails.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

Authorship Similarity Detection from Email Messages.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense.
Proceedings of IEEE International Conference on Communications, 2011

Human Society Inspired Dynamic Spectrum Access Networks: The Effect of Parochialism.
Proceedings of the Global Communications Conference, 2011

Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks.
Proceedings of the Global Communications Conference, 2011

Optimal Joint Power Allocation and Phase Control for DS-CDMA Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2011

Zero Kullback-Liebler Divergence Image Data Hiding.
Proceedings of the Global Communications Conference, 2011

Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network.
Proceedings of the Global Communications Conference, 2011

2010
Deception Detection on the Internet.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities.
IEEE Commun. Mag., 2010

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks.
Proceedings of IEEE International Conference on Communications, 2010

Competitive Spectrum Trading in Dynamic Spectrum Access Markets: A Price War.
Proceedings of the Global Communications Conference, 2010

Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks.
Proceedings of the Global Communications Conference, 2010

Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks.
Proceedings of the Global Communications Conference, 2010

2009
Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

Dynamic Spectrum Access for Wireless Networking.
EURASIP J. Adv. Signal Process., 2009

Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks.
Proceedings of IEEE International Conference on Communications, 2009

Towards Secure Spectrum Decision.
Proceedings of IEEE International Conference on Communications, 2009

Gender identification from E-mails.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2009

2008
On stochastic learning in predictive wireless ARQ.
Wirel. Commun. Mob. Comput., 2008

Cryptanalysis of Some Multimedia Encryption Schemes.
IEEE Trans. Multim., 2008

Nonparametric steganalysis of QIM data hiding using approximate entropy.
Proceedings of the Security, 2008

Impact of Constraints on the Complexity of Dynamic Spectrum Assignment.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Security and Robustness Enhancement for Image Data Hiding.
IEEE Trans. Multim., 2007

Dynamic Spectrum Access with QoS and Interference Temperature Constraints.
IEEE Trans. Mob. Comput., 2007

Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2007

Discrete Lyapunov Exponent and Differential Cryptanalysis.
IEEE Trans. Circuits Syst. II Express Briefs, 2007

Guest Editorial Cross-layer Optimized Wireless Multimedia Communications.
IEEE J. Sel. Areas Commun., 2007

A Sequential Distinguisher for Covert Channel Identification.
Int. J. Netw. Secur., 2007

Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences.
Int. J. Netw. Secur., 2007

A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices.
Int. J. Netw. Secur., 2007

Statistical Attack Resilient Data Hiding.
Int. J. Netw. Secur., 2007

Joint Encryption and Compression of Correlated Sources with Side Information.
EURASIP J. Inf. Secur., 2007

Steganalysis of GIM-based data hiding using kernel density estimation.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Detecting Hidden Messages Using Image Power Spectrum.
Proceedings of the International Conference on Image Processing, 2007

Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

Digital Signatures for Centralized DSA Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

On Efficient Message Authentication Via Block Cipher Design Techniques.
Proceedings of the Advances in Cryptology, 2007

2006
Battery power-aware encryption.
ACM Trans. Inf. Syst. Secur., 2006

On the Design of Error-Correcting Ciphers.
EURASIP J. Wirel. Commun. Netw., 2006

Worst Case Attack on Quantization Based Data Hiding.
Proceedings of the Eigth IEEE International Symposium on Multimedia (ISM 2006), 2006

Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints.
Proceedings of IEEE International Conference on Communications, 2006

Energy Efficient Wireless Encryption.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Real-time secondary spectrum sharing with QoS provisioning.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
TCQ-based quantizer design for data hiding in images.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Secure Quantization Based Data Embedding.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Statistically Secure Digital Image Data Hiding.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Distributed Joint Source-Channel Decoding for Correlated Markov Sources.
Proceedings of the 2005 Data Compression Conference (DCC 2005), 2005

2004
Stochastic channel-adaptive rate control for wireless video transmission.
Pattern Recognit. Lett., 2004

Vector-quantization-based scheme for data embedding for images.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

MDC and path diversity in video streaming.
Proceedings of the 2004 International Conference on Image Processing, 2004

Non-uniform quantizer design for image data hiding.
Proceedings of the 2004 International Conference on Image Processing, 2004

Rotation and cropping resilient data hiding with zernike moments.
Proceedings of the 2004 International Conference on Image Processing, 2004

Current trends in steganalysis: a critical survey.
Proceedings of the 8th International Conference on Control, 2004

2003
On the joint source-channel decoding of variable-length encoded sources: the additive-Markov case.
IEEE Trans. Commun., 2003

Joint source-channel decoding for MPEG-4 video transmission over wireless channels.
IEEE J. Sel. Areas Commun., 2003

Active steganalysis of spread spectrum image steganography.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

3-D multiple description video coding for packet switched networks.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Multiple description image coding framework for EBCOT.
Proceedings of the 2002 International Conference on Image Processing, 2002

2001
On the joint source-channel decoding of variable-length encoded sources: the BSC case.
IEEE Trans. Commun., 2001

Preface to Special Sessions on Current Trends in Multimedia Communications and Computing.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

1999
Joint source-channel decoding of entropy coded Markov sources over binary symmetric channels.
Proceedings of the 1999 IEEE International Conference on Communications: Global Convergence Through Communications, 1999

1998
Optimal Decoding of Entrophy Coded Memoryless Sources over Binary Symmetric Channels.
Proceedings of the Data Compression Conference, 1998

1997
Variable dimension VQ encoding and codebook design.
IEEE Trans. Commun., 1997


  Loading...