Krishna K. Venkatasubramanian

Orcid: 0000-0001-7593-2513

According to our database1, Krishna K. Venkatasubramanian authored at least 59 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
"I... caught a person casing my house... and scared him off: " The Use of Security-Focused Smart Home Devices by People with Disabilities.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
An E-Textile Respiration Sensing System for NICU Monitoring: Design and Validation.
J. Signal Process. Syst., 2022

"Sometimes I feel that I'm being left behind": Exploring Computing Device Use by People with Upper Extremity Impairment During the COVID-19 Pandemic.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
Identifying Opioid Withdrawal Using Wearable Biosensors.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Exploring A Reporting Tool to Empower Individuals with Intellectual and Developmental Disabilities to Self-Report Abuse.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

"I...Got my Nose-Print. But it Wasn't Accurate": How People with Upper Extremity Impairment Authenticate on their Personal Computing Devices.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

Exploring the Requirements of Abuse Reporting for Persons with Intellectual and Developmental Disabilities.
Proceedings of the ASSETS '21: The 23rd International ACM SIGACCESS Conference on Computers and Accessibility, 2021

Designing an App to Help Individuals with Intellectual and Developmental Disabilities to Recognize Abuse.
Proceedings of the ASSETS '21: The 23rd International ACM SIGACCESS Conference on Computers and Accessibility, 2021

2020
A New Authentication Approach for People with Upper Extremity Impairment.
Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications Workshops, 2020

2019
A Machine Learning-based Approach for Collaborative Non-Adherence Detection during Opioid Abuse Surveillance using a Wearable Biosensor.
Proceedings of the 12th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2019), 2019

Data-Driven Detection of Sensor-Hijacking Attacks on Electrocardiogram Sensors.
Proceedings of the Mission-Oriented Sensor Networks and Systems: Art and Science, 2019

2018
Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems.
EURASIP J. Inf. Secur., 2018

Ballistocardiogram-based Authentication using Convolutional Neural Networks.
CoRR, 2018

Authentication-Based on Biomechanics of Finger Movements Captured Using Optical Motion-Capture.
Proceedings of the Advances in Visual Computing - 13th International Symposium, 2018

A Novel Authentication Biometric for Pacemakers.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

2017
A cyber-physical approach to trustworthy operation of health monitoring systems.
Proceedings of the 2017 IEEE SmartWorld, 2017

Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

Patient Identity Verification Based on Physiological Signal Fusion.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

2016
A methodology for systematic attack trees generation for interoperable medical devices.
Proceedings of the Annual IEEE Systems Conference, 2016

A honeypot system for wearable networks.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

Detecting Signal Injection Attack-Based Morphological Alterations of ECG Measurements.
Proceedings of the International Conference on Distributed Computing in Sensor Systems, 2016

2015
Guest Editorial Special Issue on Internet of Things for Smart and Connected Health.
IEEE Internet Things J., 2015

Requirement Engineering for Functional Alarm System for Interoperable Medical Devices.
Proceedings of the Computer Safety, Reliability, and Security, 2015

Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

An approach for user identification for head-mounted displays.
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

Detecting malicious morphological alterations of ECG signals in body sensor networks.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

Methodology for generating attack trees for interoperable medical devices.
Proceedings of the ACM/IEEE Sixth International Conference on Cyber-Physical Systems, 2015

2014
CAAC - An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures.
ACM Trans. Auton. Adapt. Syst., 2014

Designing user-specific plug-n-play into body area networks.
Proceedings of the 4th ACM MobiHoc workshop on Pervasive wireless healthcare, 2014

Understanding the security of interoperable medical devices using attack graphs.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Functional Alarms for Systems of Interoperable Medical Devices.
Proceedings of the 15th International IEEE Symposium on High-Assurance Systems Engineering, 2014

Bandwidth aggregation in allied WiFi routers.
Proceedings of the 2014 IEEE GLOBECOM Workshops, Austin, TX, USA, December 8-12, 2014, 2014

Toward seamless wearable sensing: Automatic on-body sensor localization for physical activity monitoring.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

2013
AS-CRED: Reputation and Alert Service for Interdomain Routing.
IEEE Syst. J., 2013

Analyzing and defending against web-based malware.
ACM Comput. Surv., 2013

A trust model for vehicular network-based incident reports.
Proceedings of the 5th IEEE International Symposium on Wireless Vehicular Communications, 2013

PEES: physiology-based end-to-end security for mHealth.
Proceedings of the Wireless Health 2013, 2013

Short paper: Establishing trust in a vehicular network.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

TrustForge: Flexible access control for collaborative crowd-sourced environment.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012
Challenges and Research Directions in Medical Cyber-Physical Systems.
Proc. IEEE, 2012

Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber-Physical Systems.
Proc. IEEE, 2012

Security and Interoperable-Medical-Device Systems, Part 1.
IEEE Secur. Priv., 2012

Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification.
IEEE Secur. Priv., 2012

Trust in collaborative web applications.
Future Gener. Comput. Syst., 2012

HMM-based characterization of channel behavior for networked control systems.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

2011
AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Reputation-based networked control with data-corrupting channels.
Proceedings of the 14th ACM International Conference on Hybrid Systems: Computation and Control, 2011

Biomedical devices and systems security.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

ToMaTo: a trustworthy code mashup development tool.
Proceedings of the 5th International Workshop on Web APIs and Service Mashups, 2011

Link spamming Wikipedia for profit.
Proceedings of the 8th Annual Collaboration, 2011

2010
Physiological value-based efficient usable security solutions for body sensor networks.
ACM Trans. Sens. Networks, 2010

PSKA: usable and secure key agreement scheme for body area networks.
IEEE Trans. Inf. Technol. Biomed., 2010

2009
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks.
Proceedings of the Sixth International Workshop on Wearable and Implantable Body Sensor Networks, 2009

Challenges of implementing cyber-physical security solutions in body area networks.
Proceedings of the 4th International ICST Conference on Body Area Networks, 2009

2006
Proximity Based Access Control in Smart-Emergency Departments.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

Criticality Aware Access Control Model for Pervasive Applications.
Proceedings of the 4th IEEE International Conference on Pervasive Computing and Communications (PerCom 2006), 2006

Performance modeling of critical event management for ubiquitous computing applications.
Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2006

2005
Ayushman: A Wireless Sensor Network Based Health Monitoring Infrastructure and Testbed.
Proceedings of the Distributed Computing in Sensor Systems, 2005

2003
BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003


  Loading...