K. P. Subbalakshmi

According to our database1, K. P. Subbalakshmi
  • authored at least 96 papers between 1997 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Who Spread That Rumor: Finding the Source of Information in Large Online Social Networks With Probabilistically Varying Internode Relationship Strengths.
IEEE Trans. Comput. Social Systems, 2018

Introduction to the Special Section From the IEEE GLOBECOM 2017 Conference.
IEEE Trans. Cogn. Comm. & Networking, 2018

2016
A Time-Adaptive Heuristic for Cognitive Cloud Offloading in Multi-RAT Enabled Wireless Devices.
IEEE Trans. Cogn. Comm. & Networking, 2016

Joint-channel modeling to attack QIM steganography.
Multimedia Tools Appl., 2016

Software defined access for HetNets.
IEEE Communications Magazine, 2016

Harnessing spectrum awareness to enhance mobile computing: poster.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

2015
Spatio-Temporal Analysis of Passive Consumption in Internet Media.
IEEE Trans. Knowl. Data Eng., 2015

Effective Bandwidth for Delay Tolerant Secondary User Traffic in Multi-PU, Multi-SU Dynamic Spectrum Access Networks.
IEEE Trans. Cogn. Comm. & Networking, 2015

Cloud Offloading for Multi-Radio Enabled Mobile Devices.
CoRR, 2015

Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay.
CoRR, 2015

Identification of Source of Rumors in Social Networks with Incomplete Information.
CoRR, 2015

Cloud offloading for multi-radio enabled mobile devices.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Delay analysis of multi-user dynamic spectrum access networks.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015

2014
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.
IEEE Trans. Vehicular Technology, 2014

Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay.
EAI Endorsed Trans. Wireless Spectrum, 2014

Reciprocity, fairness and learning in medium access control games.
Computer Communications, 2014

A two-stage algorithm to estimate the source of information diffusion in social media networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
A Quantitative Model and Analysis of Information Confusion in Social Networks.
IEEE Trans. Multimedia, 2013

Altruism in social networks: good guys do finish first.
Social Netw. Analys. Mining, 2013

Open research issues in multi-hop cognitive radio networks.
IEEE Communications Magazine, 2013

Reciprocity and Fairness in Medium Access Control Games.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Optimizing flow control in multi-interface wireless cognitive radio networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy.
IEEE Trans. Information Forensics and Security, 2012

Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks.
IEEE Trans. Communications, 2012

Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach.
IET Communications, 2012

Network measurement based modeling and optimization for IP geolocation.
Computer Networks, 2012

Measuring and quantifying the silent majority on the Internet.
Proceedings of the 2012 35th IEEE Sarnoff Symposium, Newark, NJ, USA, May 21-22, 2012, 2012

2011
Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks.
IEEE Journal on Selected Areas in Communications, 2011

KL-sense secure image steganography.
IJSN, 2011

Author gender identification from text.
Digital Investigation, 2011

SpiderRadio: A cognitive radio network with commodity hardware and open source software.
IEEE Communications Magazine, 2011

Cost of Collaboration vs Individual Effort in Social Networks.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

Adaptive Context Modeling for Deception Detection in Emails.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

Authorship Similarity Detection from Email Messages.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense.
Proceedings of IEEE International Conference on Communications, 2011

Human Society Inspired Dynamic Spectrum Access Networks: The Effect of Parochialism.
Proceedings of the Global Communications Conference, 2011

Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks.
Proceedings of the Global Communications Conference, 2011

Optimal Joint Power Allocation and Phase Control for DS-CDMA Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2011

Zero Kullback-Liebler Divergence Image Data Hiding.
Proceedings of the Global Communications Conference, 2011

Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network.
Proceedings of the Global Communications Conference, 2011

2010
Deception Detection on the Internet.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities.
IEEE Communications Magazine, 2010

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks.
Proceedings of IEEE International Conference on Communications, 2010

Competitive Spectrum Trading in Dynamic Spectrum Access Markets: A Price War.
Proceedings of the Global Communications Conference, 2010

Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks.
Proceedings of the Global Communications Conference, 2010

Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks.
Proceedings of the Global Communications Conference, 2010

2009
Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing.
Mobile Computing and Communications Review, 2009

Dynamic Spectrum Access for Wireless Networking.
EURASIP J. Adv. Sig. Proc., 2009

Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks.
Proceedings of IEEE International Conference on Communications, 2009

Towards Secure Spectrum Decision.
Proceedings of IEEE International Conference on Communications, 2009

Gender identification from E-mails.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2009

2008
On stochastic learning in predictive wireless ARQ.
Wireless Communications and Mobile Computing, 2008

Cryptanalysis of Some Multimedia Encryption Schemes.
IEEE Trans. Multimedia, 2008

Nonparametric steganalysis of QIM data hiding using approximate entropy.
Proceedings of the Security, 2008

Impact of Constraints on the Complexity of Dynamic Spectrum Assignment.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Security and Robustness Enhancement for Image Data Hiding.
IEEE Trans. Multimedia, 2007

Dynamic Spectrum Access with QoS and Interference Temperature Constraints.
IEEE Trans. Mob. Comput., 2007

Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks.
IEEE Trans. Dependable Sec. Comput., 2007

Discrete Lyapunov Exponent and Differential Cryptanalysis.
IEEE Trans. on Circuits and Systems, 2007

Guest Editorial Cross-layer Optimized Wireless Multimedia Communications.
IEEE Journal on Selected Areas in Communications, 2007

A Sequential Distinguisher for Covert Channel Identification.
I. J. Network Security, 2007

Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences.
I. J. Network Security, 2007

A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices.
I. J. Network Security, 2007

Statistical Attack Resilient Data Hiding.
I. J. Network Security, 2007

Joint Encryption and Compression of Correlated Sources with Side Information.
EURASIP J. Information Security, 2007

Steganalysis of GIM-based data hiding using kernel density estimation.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Detecting Hidden Messages Using Image Power Spectrum.
Proceedings of the International Conference on Image Processing, 2007

Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

On Efficient Message Authentication Via Block Cipher Design Techniques.
Proceedings of the Advances in Cryptology, 2007

2006
Battery power-aware encryption.
ACM Trans. Inf. Syst. Secur., 2006

On the Design of Error-Correcting Ciphers.
EURASIP J. Wireless Comm. and Networking, 2006

Worst Case Attack on Quantization Based Data Hiding.
Proceedings of the Eigth IEEE International Symposium on Multimedia (ISM 2006), 2006

Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints.
Proceedings of IEEE International Conference on Communications, 2006

Energy Efficient Wireless Encryption.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
TCQ-based quantizer design for data hiding in images.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

Secure Quantization Based Data Embedding.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Statistically Secure Digital Image Data Hiding.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

Distributed Joint Source-Channel Decoding for Correlated Markov Sources.
Proceedings of the 2005 Data Compression Conference (DCC 2005), 2005

2004
Stochastic channel-adaptive rate control for wireless video transmission.
Pattern Recognition Letters, 2004

Vector-quantization-based scheme for data embedding for images.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

MDC and path diversity in video streaming.
Proceedings of the 2004 International Conference on Image Processing, 2004

Non-uniform quantizer design for image data hiding.
Proceedings of the 2004 International Conference on Image Processing, 2004

Rotation and cropping resilient data hiding with zernike moments.
Proceedings of the 2004 International Conference on Image Processing, 2004

Current trends in steganalysis: a critical survey.
Proceedings of the 8th International Conference on Control, 2004

2003
On the joint source-channel decoding of variable-length encoded sources: the additive-Markov case.
IEEE Trans. Communications, 2003

Joint source-channel decoding for MPEG-4 video transmission over wireless channels.
IEEE Journal on Selected Areas in Communications, 2003

Active steganalysis of spread spectrum image steganography.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

3-D multiple description video coding for packet switched networks.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

2002
Multiple description image coding framework for EBCOT.
Proceedings of the 2002 International Conference on Image Processing, 2002

2001
On the joint source-channel decoding of variable-length encoded sources: the BSC case.
IEEE Trans. Communications, 2001

Preface to Special Sessions on Current Trends in Multimedia Communications and Computing.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

1998
Optimal Decoding of Entrophy Coded Memoryless Sources over Binary Symmetric Channels.
Proceedings of the Data Compression Conference, 1998

1997
Variable dimension VQ encoding and codebook design.
IEEE Trans. Communications, 1997


  Loading...