M. A. Rajan
Orcid: 0000-0001-9839-4754
According to our database1,
M. A. Rajan
authored at least 40 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
QueryShield: A Platform to Mitigate Enterprise Data Leakage in Queries to External LLMs.
Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies, 2025
Efficient privacy enabled data sharing in cloud using a novel Homomorphic Proxy Re-Encryption Scheme.
Proceedings of the 17th International Conference on COMmunication Systems and NETworks, 2025
Proceedings of the 17th International Conference on COMmunication Systems and NETworks, 2025
2024
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024
TrapShield: Enhancing Security and Privacy in Serverless Workflows using Honeypots by Robust Adversary Penalization.
Proceedings of the IEEE International Conference on Cloud Engineering, 2024
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
Decentralized Inter-Hospital Motor Imagery Detection using Robust Multiparty Model Aggregation.
Proceedings of the 8th International Conference on Data Science and Management of Data (12th ACM IKDD CODS and 30th COMAD), 2024
2023
Robust Cross-Silo Federated Fraudulent Transaction Detection in Banks Using Epsilon Cluster Selection.
SN Comput. Sci., July, 2023
Proceedings of the 16th Innovations in Software Engineering Conference, 2023
Proceedings of the Information Systems Security - 19th International Conference, 2023
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023
2022
Resilience to denial-of-service and integrity attacks: A structured systems approach.
Eur. J. Control, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 14th International Conference on COMmunication Systems & NETworkS, 2022
2021
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021
WiP: Privacy Enabled Biometric Authentication Based on Proof of Decryption Techniques.
Proceedings of the Information Systems Security - 17th International Conference, 2021
WiP: QoS Based Recommendation System for Efficient Private Inference of CNN Using FHE.
Proceedings of the Information Systems Security - 17th International Conference, 2021
Proceedings of the Database and Expert Systems Applications - DEXA 2021 Workshops, 2021
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021
2020
An efficient greedy task scheduling algorithm for heterogeneous inter-dependent tasks on computational grids.
Int. J. Grid Util. Comput., 2020
A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications.
CoRR, 2020
Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic Encryption.
Proceedings of the 19th IEEE International Conference on Trust, 2020
A Recommender System for Efficient Implementation of Privacy Preserving Machine Learning Primitives Based on FHE.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
VeriBlock: A Novel Blockchain Framework based on Verifiable Computing and Trusted Execution Environment.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020
2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017
2016
Proceedings of the 2016 American Control Conference, 2016
Security and Privacy for Real Time Video Streaming Using Hierarchical Inner Product Encryption Based Publish-Subscribe Architecture.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2014
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014
Design of a Mix Network Using Connectivity Index - A Novel Privacy Enhancement Approach.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
2013
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013
2012
An identity based encryption using elliptic curve cryptography for secure M2M communication.
Proceedings of the First International Conference on Security of Internet of Things, 2012
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012
2011
Monotonic Signed Graph approach for cross-layer congestion control in wireless ad-hoc networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011
Proceedings of the Third International Conference on Communication Systems and Networks, 2011