Parampalli Udaya

Orcid: 0000-0002-9798-0134

Affiliations:
  • University of Melbourne, School of Computing and Information Systems, Australia


According to our database1, Parampalli Udaya authored at least 132 papers between 1996 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Impact of Data Augmentation on QCNNs.
CoRR, 2023

Two-Dimensional Z-Complementary Array Quads with Low Column Sequence PMEPRs.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
IoT Device Integration and Payment via an Autonomic Blockchain-Based Service for IoT Device Sharing.
Sensors, 2022

Construction of Multiple Constrained DNA Codes.
CoRR, 2022

Automated Quantum Circuit Design with Nested Monte Carlo Tree Search.
CoRR, 2022

Improved transformation algorithms for generalized Galois NLFSRs.
Cryptogr. Commun., 2022

A new family of polyphase sequences with low correlation.
Cryptogr. Commun., 2022

Stabilizer codes and Symbol-Pair Metric are Related.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Is internet freedom good for society?
Proceedings of the Australasian Conference on Information Systems, 2022

2021
Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database.
World Wide Web, 2021

A Tighter Correlation Lower Bound for Quasi-Complementary Sequence Sets with Low Correlation Zone.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Efficient dynamic multi-replica auditing for the cloud with geographic location.
Future Gener. Comput. Syst., 2021

Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers.
Cryptogr. Commun., 2021

Capacity-achieving private information retrieval scheme with a smaller sub-packetization.
Adv. Math. Commun., 2021

Deep Learning Evaluation of a Steganographic Algorithm.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2021

2020
New Optimal $Z$-Complementary Code Sets Based on Generalized Paraunitary Matrices.
IEEE Trans. Signal Process., 2020

Secure Path Balanced BDD-Based Pre-Charge Logic for Masking.
IEEE Trans. Circuits Syst., 2020

Optimal placement for repair-efficient erasure codes in geo-diverse storage centres.
J. Parallel Distributed Comput., 2020

Two classes of optimal LRCs with information (r, t)-locality.
Des. Codes Cryptogr., 2020

A New Evaluation Method for Medical Image Information Hiding Techniques.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

2019
Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments.
World Wide Web, 2019

Path-Balanced Logic Design to Realize Block Ciphers Resistant to Power and Timing Attacks.
IEEE Trans. Very Large Scale Integr. Syst., 2019

Improved Upper Bounds on Systematic-Length for Linear Minimum Storage Regenerating Codes.
IEEE Trans. Inf. Theory, 2019

Interference Mitigation in Automotive Radars Using Pseudo-Random Cyclic Orthogonal Sequences.
Sensors, 2019

Optimal Cyclic Locally Repairable Codes via Cyclotomic Polynomials.
IEEE Commun. Lett., 2019

Generalized NLFSR Transformation Algorithms and Cryptanalysis of the Class of Espresso-like Stream Ciphers.
CoRR, 2019

New Optimal Z-Complementary Code Sets from Matrices of Polynomials.
CoRR, 2019

Integrity Verification in Medical Image Retrieval Systems using Spread Spectrum Steganography.
Proceedings of the 2019 on International Conference on Multimedia Retrieval, 2019

Construction of New Optimal Z-Complementary Code Sets from Z-Paraunitary Matrices.
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019

Near-Optimal Zero Correlation Zone Sequence Sets from Paraunitary Matrices.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Empirically Analyzing Ethereum's Gas Mechanism.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

2018
A Family of Polyphase Sequences With Asymptotically Optimal Correlation.
IEEE Trans. Inf. Theory, 2018

Spectrally-Constrained Sequences: Bounds and Constructions.
IEEE Trans. Inf. Theory, 2018

Cyclic codes over $M_{2}(\mathbb {F}_{2}+u\mathbb {F}_{2})$.
Cryptogr. Commun., 2018

Geo-aware erasure coding for high-performance erasure-coded storage clusters.
Ann. des Télécommunications, 2018

Privacy-Preserving Access Control in Electronic Health Record Linkage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Spread Spectrum Steganographic Capacity Improvement for Medical Image Security in Teleradiology.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

Improve sprout cipher to resist the divide and conquer based key recovery attack.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
On Secrecy Capacity of Minimum Storage Regenerating Codes.
IEEE Trans. Inf. Theory, 2017

Public key encryption resilient to leakage and tampering attacks.
J. Comput. Syst. Sci., 2017

Self-Dual Cyclic Codes over ℤ<sub>4</sub>+uℤ<sub>4</sub>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Online Coded Caching With Random Access.
IEEE Commun. Lett., 2017

Construction of low-hit-zone frequency hopping sequences with optimal partial Hamming correlation by interleaving techniques.
Des. Codes Cryptogr., 2017

New sets of optimal low-hit-zone frequency-hopping sequences based on m-sequences.
Cryptogr. Commun., 2017

Efficient Range-Doppler Processing for Random Stepped Frequency Radar in Automotive Applications.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Novel authentication scheme with pseudorandom sequences in the frequency domain of images.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017

Re-engineering simultaneous internet sessions process-separated browsers.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Security Concerns in Minimum Storage Cooperative Regenerating Codes.
IEEE Trans. Inf. Theory, 2016

Tone code: A novel method for covert communications based on musical components.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

On improving recovery performance in erasure code based geo-diverse storage clusters.
Proceedings of the 12th International Conference on the Design of Reliable Communication Networks, 2016

Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Personally controlled & privacy preserving medication management system.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Framework of Constructions of Minimal Storage Regenerating Codes With the Optimal Access/Update Property.
IEEE Trans. Inf. Theory, 2015

Characterization of Secrecy Capacity for General MSR Codes under Passive Eavesdropping Model.
CoRR, 2015

Benchmarking the performance of hadoop triple replication and erasure coding on a nation-wide distributed cloud.
Proceedings of the 2015 International Symposium on Network Coding, 2015

Self-dual cyclic codes over ℤ4 + uℤ4.
Proceedings of the Seventh International Workshop on Signal Design and its Applications in Communications, 2015

Preface.
Proceedings of the Seventh International Workshop on Signal Design and its Applications in Communications, 2015

Optimal spectrally-constrained sequences.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Properties of an Emergency Broadcasting System Based on Audio Data Hiding.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

2014
A New Weight Vector for a Tighter Levenshtein Bound on Aperiodic Correlation.
IEEE Trans. Inf. Theory, 2014

Optimal Odd-Length Binary Z-Complementary Pairs.
IEEE Trans. Inf. Theory, 2014

New Complete Complementary Codes for Peak-to-Mean Power Control in Multi-Carrier CDMA.
IEEE Trans. Commun., 2014

On Even-Period Binary Z-Complementary Pairs with Large ZCZs.
IEEE Signal Process. Lett., 2014

A class of quaternary noncyclic Hadamard matrices.
Australas. J Comb., 2014

A new construction of zero correlation zone sequences from generalized reed-muller codes.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

A disaster prevention broadcasting based on data hiding scheme using complete complementary codes.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Constructions of Optimal and Near-Optimal Quasi-Complementary Sequence Sets from Singer Difference Sets.
IEEE Wirel. Commun. Lett., 2013

On the Construction of Binary Sequence Families With Low Correlation and Large Sizes.
IEEE Trans. Inf. Theory, 2013

A Framework of Constructions of Minimum Storage Regenerating Codes with the Optimal Update/Access Property for Distributed Storage Systems Based on Invariant Subspace Technique.
CoRR, 2013

64-QAM complementary sets for high-rate OFDM transmissions.
Proceedings of the Sixth International Workshop on Signal Design and Its Applications in Communications, 2013

An audio data hiding based on complete complementary codes and its application to an evacuation guiding system.
Proceedings of the Sixth International Workshop on Signal Design and Its Applications in Communications, 2013

Privacy-preserving data aggregation in Participatory Sensing Networks.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

Quadratic weight vector for tighter aperiodic Levenshtein bound.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

On optimal binary Z-complementary pair of odd period.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

2012
A Hybrid Incomplete Exponential Sum With Application to Aperiodic Hamming Correlation of Some Frequency-Hopping Sequences.
IEEE Trans. Inf. Theory, 2012

New Classes of Frequency-Hopping Sequences With Optimal Partial Correlation.
IEEE Trans. Inf. Theory, 2012

On the Aperiodic Hamming Correlation of Frequency-Hopping Sequences from Norm Functions.
Proceedings of the Sequences and Their Applications - SETA 2012, 2012

Efficiently Shuffling in Public.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Low Probability of Intercept properties of some binary sequence families with good correlation properties.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

An adaptive algorithm for online time series segmentation with error bound guarantee.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

E cient Identity-based Signcryption without Random Oracles.
Proceedings of the Tenth Australasian Information Security Conference, 2012

2011
New Constructions for Optimal Sets of Frequency-Hopping Sequences.
IEEE Trans. Inf. Theory, 2011

New Bound on Frequency Hopping Sequence Sets and Its Optimal Constructions.
IEEE Trans. Inf. Theory, 2011

Authentication Codes from difference Balanced Functions.
Int. J. Found. Comput. Sci., 2011

Orthogonal and ZCZ Sets of Real-Valued Periodic Orthogonal Sequences from Huffman Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

New p-ary sequence family with low correlation and large linear span.
Appl. Algebra Eng. Commun. Comput., 2011

On multiple information embedding by digital watermarking based on complete complementary codes.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011

On the relative abundance of nonbinary sequences with perfect autocorrelations.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

2010
On the noncyclic property of Sylvester Hadamard matrices.
IEEE Trans. Inf. Theory, 2010

A Large Class of <i>p</i>-Ary Cyclic Codes and Sequence Families.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Low Correlation Zone Sequences from Interleaved Construction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Optimal Authentication Codes from Difference Balanced Functions.
Proceedings of the Sequences and Their Applications - SETA 2010, 2010

New Families of 2D & 3D Arrays for Sub-image Watermarking.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Nonbinary sequences with perfect and nearly perfect autocorrelations.
Proceedings of the IEEE International Symposium on Information Theory, 2010

2009
Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption, .
J. Networks, 2009

Optimal variable-weight optical orthogonal codes via cyclic difference families.
Proceedings of the IEEE International Symposium on Information Theory, 2009

A Privacy Preserving E-Payment Scheme.
Proceedings of the Intelligent Distributed Computing III, Proceedings of the 3rd International Symposium on Intelligent Distributed Computing, 2009

2008
An Efficient Clustering Scheme to Exploit Hierarchical Data in Network Traffic Analysis.
IEEE Trans. Knowl. Data Eng., 2008

Efficient identity-based signatures in the standard model.
IET Inf. Secur., 2008

Privacy and forensics investigation process: The ERPINA protocol.
Comput. Stand. Interfaces, 2008

On Partial Correlations of Various Z4 Sequence Families.
Proceedings of the Sequences and Their Applications, 2008

Identity-based Signcryption without Random Oracles.
Proceedings of the SECRYPT 2008, 2008

A Trusted Approach to E-Commerce.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

An Anonymity Revocation Technology for Anonymous Communication.
Proceedings of the Information Systems Development, 2008

Designing Information Systems Which Manage or Avoid Privacy Incidents.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Generalized Binary Udaya-Siddiqi Sequences.
IEEE Trans. Inf. Theory, 2007

A Note on the Optimal Quadriphase Sequences Families.
IEEE Trans. Inf. Theory, 2007

A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear Maps.
Proceedings of the SECRYPT 2007, 2007

Monitoring Employees' Emails without Violating Their Privacy Right.
Proceedings of the Eighth International Conference on Parallel and Distributed Computing, 2007

A scalable sampling scheme for clustering in network traffic analysis.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

2006
Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis.
Proceedings of the NETWORKING 2006, 2006

2005
A root-finding algorithm for list decoding of Reed-Muller codes.
IEEE Trans. Inf. Theory, 2005

A new family of nonbinary sequences with three-level correlation property and large linear span.
IEEE Trans. Inf. Theory, 2005

On the decoding radius of Lee-metric decoding of algebraic-geometric codes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

New construction of low correlation zone sequences from hadamard matrices.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
New Families of p-Ary Sequences from Quadratic Form with Low Correlation and Large Linear Span.
Proceedings of the Sequences and Their Applications, 2004

Quadriphase Sequences Obtained from Binary Quadratic Form Sequences.
Proceedings of the Sequences and Their Applications, 2004

A class of algebraic-geometric codes for Lee-Metric and their decoding.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

2003
A New Class of Ternary Cocyclic Hadamard Codes.
Appl. Algebra Eng. Commun. Comput., 2003

2002
A New Construction of Central Relative (p<sup>a</sup>, p<sup>a</sup>, p<sup>a</sup>, 1)-Difference Sets.
Des. Codes Cryptogr., 2002

2001
Tricolore 3-designs in Type III codes.
Discret. Math., 2001

On the Aperiodic Correlation Function of Galois Ring m-Sequences.
Proceedings of the Applied Algebra, 2001

2000
Cocyclic Hadamard codes.
IEEE Trans. Inf. Theory, 2000

Generalized GMW Quadriphase Sequences Satisfying the Welch Bound with Equality.
Appl. Algebra Eng. Commun. Comput., 2000

1999
Decoding of cyclic codes over F<sub>2</sub> + µF<sub>2</sub>.
IEEE Trans. Inf. Theory, 1999

Cyclic Codes and Self-Dual Codes Over F<sub>2</sub> + uF<sub>2</sub>.
IEEE Trans. Inf. Theory, 1999

1998
Optimal Large Linear Complexity Frequency Hopping Patterns Derived from Polynomial Residue Class Rings.
IEEE Trans. Inf. Theory, 1998

Optimal and Suboptimal Quadriphase Sequences Derived from Maximal Length Sequences over Z<sub>4</sub>.
Appl. Algebra Eng. Commun. Comput., 1998

1996
Optimal biphase sequences with large linear complexity derived from sequences over Z<sub>4</sub>.
IEEE Trans. Inf. Theory, 1996


  Loading...