Radha Poovendran

Orcid: 0000-0003-0269-8097

According to our database1, Radha Poovendran authored at least 256 papers between 1999 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2015, "For contributions to security in cyber-physical systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats.
Autom., January, 2024

Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks.
CoRR, 2024

ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs.
CoRR, 2024

SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding.
CoRR, 2024

Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors.
CoRR, 2024

Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization.
CoRR, 2024

BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models.
CoRR, 2024

Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning.
CoRR, 2024

2023
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint.
ACM Trans. Cyber Phys. Syst., July, 2023

Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems.
IEEE Trans. Ind. Informatics, June, 2023

A Natural Language Processing Approach for Instruction Set Architecture Identification.
IEEE Trans. Inf. Forensics Secur., 2023

Robust Satisfaction of Metric Interval Temporal Logic Objectives in Adversarial Environments.
Games, 2023

Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications.
CoRR, 2023

Risk-Aware Distributed Multi-Agent Reinforcement Learning.
CoRR, 2023

A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees.
CoRR, 2023

Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs.
CoRR, 2023

BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Learning Dissemination Strategies for External Sources in Opinion Dynamic Models with Cognitive Biases.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

Necessary and Sufficient Conditions for Satisfying Linear Temporal Logic Constraints Using Control Barrier Certificates.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

A Submodular Energy Function Approach to Controlled Islanding with Provable Stability.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Cognitive Bias-Aware Dissemination Strategies for Opinion Dynamics with External Information Sources.
Proceedings of the 2023 International Conference on Autonomous Agents and Multiagent Systems, 2023

LDL: A Defense for Label-Based Membership Inference Attacks.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Covert Channel-Based Transmitter Authentication in Controller Area Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Identity-Based Authentication for On-Demand Charging of Electric Vehicles.
CoRR, 2022

Game of Trojans: A Submodular Byzantine Approach.
CoRR, 2022

Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems.
CoRR, 2022

Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning.
CoRR, 2022

Shaping Advice in Deep Reinforcement Learning.
CoRR, 2022

Side-channel attacks on mobile and IoT devices for Cyber-Physical systems.
Comput. Networks, 2022

A Hybrid Submodular Optimization Approach to Controlled Islanding with Heterogeneous Loads.
Proceedings of the IEEE International Conference on Communications, 2022

Verifying Safety for Resilient Cyber-Physical Systems via Reactive Software Restart.
Proceedings of the 13th ACM/IEEE International Conference on Cyber-Physical Systems, 2022

EVExchange: A Relay Attack on Electric Vehicle Charging System.
Proceedings of the Computer Security - ESORICS 2022, 2022

Privacy-Preserving Reinforcement Learning Beyond Expectation.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics.
Proceedings of the 61st IEEE Conference on Decision and Control, 2022

Agent-Temporal Attention for Reward Redistribution in Episodic Multi-Agent Reinforcement Learning.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

A Submodular Optimization Approach to Stable and Minimally Disruptive Controlled Islanding in Power Systems.
Proceedings of the American Control Conference, 2022

2021
Secure Control in Partially Observable Environments to Satisfy LTL Specifications.
IEEE Trans. Autom. Control., 2021

Shaping Advice in Deep Multi-Agent Reinforcement Learning.
CoRR, 2021

Adaptive Learning in Two-Player Stackelberg Games with Application to Network Security.
CoRR, 2021

Truck platoon security: State-of-the-art and road ahead.
Comput. Networks, 2021


A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries.
Proceedings of the Decision and Game Theory for Security - 12th International Conference, 2021

Scalable Planning in Multi-Agent MDPs.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

Reinforcement Learning Beyond Expectation.
Proceedings of the 2021 60th IEEE Conference on Decision and Control (CDC), 2021

2020
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats.
IEEE Trans. Autom. Control., 2020

A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
CoRR, 2020

Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach.
CoRR, 2020

Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Submodular Input Selection for Synchronization in Kuramoto Networks.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

Safety-Critical Online Control with Adversarial Disturbances.
Proceedings of the 59th IEEE Conference on Decision and Control, 2020

FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks.
IEEE Trans. Inf. Forensics Secur., 2019

Minimal Input and Output Selection for Stability of Systems With Uncertainties.
IEEE Trans. Autom. Control., 2019

On the Structure and Computation of Random Walk Times in Finite Graphs.
IEEE Trans. Autom. Control., 2019

Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples.
CoRR, 2019

Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks.
CoRR, 2019

TACAN: transmitter authentication through covert channels in controller area networks.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

Dropping Pixels for Adversarial Robustness.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

Detecting ADS-B Spoofing Attacks Using Deep Neural Networks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Adaptive learning in two-player Stackelberg games with continuous action sets.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Potential-Based Advice for Stochastic Policy Learning.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge.
Proceedings of the 58th IEEE Conference on Decision and Control, 2019

A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching.
Proceedings of the 2019 American Control Conference, 2019

Secure Control under Partial Observability with Temporal Logic Constraints.
Proceedings of the 2019 American Control Conference, 2019

2018
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach.
IEEE Trans. Control. Netw. Syst., 2018

Combinatorial Algorithms for Control of Biological Regulatory Networks.
IEEE Trans. Control. Netw. Syst., 2018

A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats.
CoRR, 2018

Maximizing the smallest eigenvalue of a symmetric matrix: A submodular optimization approach.
Autom., 2018

Cloaking the clock: emulating clock skew in controller area networks.
Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems, 2018

A Game Theoretical Framework for Inter-process Adversarial Intervention Detection.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Multi-stage Dynamic Information Flow Tracking Game.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

Assessing Shape Bias Property of Convolutional Neural Networks.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

Semantic Adversarial Examples.
Proceedings of the 2018 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2018

DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Input Selection for Performance, Stabilizability, and Controllability of Structured Linear Descriptor Systems.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018

Dynamic Defense against Adaptive and Persistent Adversaries.
Proceedings of the 5th ACM Workshop on Moving Target Defense, 2018

Modeling and Mitigating the Coremelt Attack.
Proceedings of the 2018 Annual American Control Conference, 2018

2017
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

Pricing Mechanisms for Crowd-Sensed Spatial-Statistics-Based Radio Mapping.
IEEE Trans. Cogn. Commun. Netw., 2017

Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework.
IEEE Trans. Autom. Control., 2017

Input Selection for Performance and Controllability of Structured Linear Descriptor Systems.
SIAM J. Control. Optim., 2017

Deep Neural Networks Do Not Recognize Negative Images.
CoRR, 2017

Deceiving Google's Perspective API Built for Detecting Toxic Comments.
CoRR, 2017

Blocking Transferability of Adversarial Examples in Black-Box Learning Systems.
CoRR, 2017

Safety and Security for Intelligent Infrastructure.
CoRR, 2017

Detecting LTE-U duty cycling misbehavior for fair sharing with Wi-Fi in shared bands.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Google's Cloud Vision API is Not Robust to Noise.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

On the Limitation of Convolutional Neural Networks in Recognizing Negative Images.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

A submodular optimization approach to controlled islanding under cascading failure.
Proceedings of the 8th International Conference on Cyber-Physical Systems, 2017

Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Minimal input selection for robust control.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

A submodular optimization approach to leader-follower consensus in networks with negative edges.
Proceedings of the 2017 American Control Conference, 2017

No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Secure Error-Tolerant Graph Matching Protocols.
IACR Cryptol. ePrint Arch., 2016

Submodularity in Input Node Selection for Networked Systems.
CoRR, 2016

Towards Scalable Voltage Control in Smart Grid: A Submodular Optimization Approach.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Pricing Mechanism for Quality-Based Radio Mapping via Crowdsourcing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Learning Temporal Dependence from Time-Series Data with Latent Variables.
Proceedings of the 2016 IEEE International Conference on Data Science and Advanced Analytics, 2016

Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

MinGen: Minimal generator set selection for small signal stability in power systems: A submodular framework.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

Distributed adaptive patching strategies against malware propagation: A passivity approach.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Introduction to the Issue on Signal and Information Processing for Privacy.
IEEE J. Sel. Top. Signal Process., 2015

Scalable and distributed submodular maximization with matroid constraints.
Proceedings of the 13th International Symposium on Modeling and Optimization in Mobile, 2015

Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense.
Proceedings of the Decision and Game Theory for Security - 6th International Conference, 2015

Incentivizing crowdsourcing for radio environment mapping with statistical interpolation.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2015

Verifiable and privacy-preserving fine-grained data-collection for smart metering.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

A host takeover game model for competing malware.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

Input selection for disturbance rejection in networked cyber-physical systems.
Proceedings of the 54th IEEE Conference on Decision and Control, 2015

LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
Proceedings of the 10th ACM Symposium on Information, 2015

Passivity framework for composition and mitigation of multi-virus propagation in networked systems.
Proceedings of the American Control Conference, 2015

Jamming-based adversarial control of network flow allocation: A passivity approach.
Proceedings of the American Control Conference, 2015

2014
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Efficient Authentication for Mobile and Pervasive Computing.
IEEE Trans. Mob. Comput., 2014

E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels.
IEEE Trans. Computers, 2014

A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems.
IEEE Trans. Autom. Control., 2014

A Supermodular Optimization Framework for Leader Selection Under Link Noise in Linear Multi-Agent Systems.
IEEE Trans. Autom. Control., 2014

Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach.
IEEE Trans. Autom. Control., 2014

Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework.
CoRR, 2014

Distributed online submodular maximization in resource-constrained networks.
Proceedings of the 12th International Symposium on Modeling and Optimization in Mobile, 2014

Passivity framework for modeling, mitigating, and composing attacks on networked systems.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

Graph-based verification and misbehavior detection in multi-agent networks.
Proceedings of the 3rd International Conference on High Confidence Networked Systems (part of CPS Week), 2014

2013
Toward a Statistical Framework for Source Anonymity in Sensor Networks.
IEEE Trans. Mob. Comput., 2013

Aviation Cyber-Physical Systems: Foundations for Future Aircraft and Air Transport.
Proc. IEEE, 2013

A convex optimization approach for clone detection in wireless sensor networks.
Pervasive Mob. Comput., 2013

Security in cognitive radio networks [Guest Editorial].
IEEE Netw., 2013

Using Social Information for Flow Allocation in MANETs.
CoRR, 2013

A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power.
Proceedings of the Radio Frequency Identification System Security, 2013

Optimized relay-route assignment for anonymity in wireless networks.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

LIDAR: a layered intrusion detection and remediationframework for smartphones.
Proceedings of the 4th international ACM Sigsoft symposium on Architecting critical systems, 2013

Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach.
Proceedings of the Control of Cyber-Physical Systems, 2013

Deployment and exploitation of deceptive honeybots in social networks.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

Effectiveness of IP address randomization in decoy-based moving target defense.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

An impact-aware defense against Stuxnet.
Proceedings of the American Control Conference, 2013

Joint leader and link weight selection for fast convergence in multi-agent systems.
Proceedings of the American Control Conference, 2013

2012
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification.
IEEE Trans. Parallel Distributed Syst., 2012

Special Issue on Cyber-Physical Systems [Scanning the Issue].
Proc. IEEE, 2012

SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks
CoRR, 2012

Message from the workshop chairs.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Leader selection for minimizing convergence error in leader-follower systems: A supermodular optimization approach.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Enhancing ADS-B for Future UAV Operations.
Proceedings of the Infotech@Aerospace 2012, 2012

Optimized flow allocation for anonymous communication in multipath wireless networks.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Leader selection games under link noise injection attacks.
Proceedings of the 1st International Conference on High Confidence Networked Systems (HiCoNS, 2012

Deceptive Routing in Relay Networks.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Deceptive routing games.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

On leader selection for performance and controllability in multi-agent systems.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Leader selection in multi-agent systems for smooth convergence via fast mixing.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

FakeBook: Detecting Fake Profiles in On-Line Social Networks.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

Multipath flow allocation in anonymous wireless networks with dependent sources.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

A passivity-based framework for composing attacks on networked control systems.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
Jamming-aware traffic allocation for multiple-path routing using portfolio selection.
IEEE/ACM Trans. Netw., 2011

Future E-Enabled Aircraft Communications and Security: The Next 20 Years and Beyond.
Proc. IEEE, 2011

Securing low-cost RFID systems: An unconditionally secure approach.
J. Comput. Secur., 2011

Distributed clone detection in wireless sensor networks: An optimization approach.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Resource-efficient and reliable long term wireless monitoring of the photoplethysmographic signal.
Proceedings of Wireless Health 2011, 2011

Energy-efficient long term physiological monitoring.
Proceedings of Wireless Health 2011, 2011

An energy framework for the network simulator 3 (NS-3).
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques, 2011

Maximizing Influence in Competitive Environments: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - Second International Conference, 2011

Security and privacy of future aircraft wireless communications with offboard systems.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

A submodular optimization framework for leader selection in linear multi-agent systems.
Proceedings of the 50th IEEE Conference on Decision and Control and European Control Conference, 2011

GeM-REM: Generative Model-Driven Resource Efficient ECG Monitoring in Body Sensor Networks.
Proceedings of the International Conference on Body Sensor Networks, 2011

2010
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Group Event Detection With a Varying Number of Group Members for Video Surveillance.
IEEE Trans. Circuits Syst. Video Technol., 2010

Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View].
Proc. IEEE, 2010

The power of primes: security of authentication based on a universal hash-function family.
J. Math. Cryptol., 2010

Privacy versus scalability in radio frequency identification systems.
Comput. Commun., 2010

Evaluation of body sensor network platforms: a design space and benchmarking analysis.
Proceedings of Wireless Health 2010, 2010

A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

Spatial-Temporal Access Control for E-health Services.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

$\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

Statistical Framework for Source Anonymity in Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Node capture attacks in wireless sensor networks: A system theoretic approach.
Proceedings of the 49th IEEE Conference on Decision and Control, 2010

Minimizing Energy Consumption in Body Sensor Networks via Convex Optimization.
Proceedings of the International Conference on Body Sensor Networks, 2010

2009
Detection of mobile targets on the plane and in space using heterogeneous sensor networks.
Wirel. Networks, 2009

Analytic evaluation of target detection in heterogeneous wireless sensor networks.
ACM Trans. Sens. Networks, 2009

Mitigation of Control Channel Jamming under Node Capture Attacks.
IEEE Trans. Mob. Comput., 2009

Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis.
IEEE Trans. Dependable Secur. Comput., 2009

Tradeoffs between jamming resilience and communication efficiency in key establishment.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

Information Theoretically Secure Encryption with Almost Free Authentication.
J. Univers. Comput. Sci., 2009

Secure wireless networking.
J. Commun. Networks, 2009

A coding-theoretic approach for efficient message verification over insecure channels.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Unconditionally Secure Authenticated Encryption with Shorter Keys.
Proceedings of the Security in Information Systems, 2009

Group Event Detection for Video Surveillance.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

2008
Activity Recognition Using a Combination of Category Components and Local Models for Video Surveillance.
IEEE Trans. Circuits Syst. Video Technol., 2008

Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes.
Proc. IEEE, 2008

Linear programming models for jamming attacks on network traffic flows.
Proceedings of the 6th International Symposium on Modeling and Optimization in Mobile, 2008

Throughput optimization for multipath unicast routing under probabilistic jamming.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

On the Authentication of RFID Systems with Bitwise Operations.
Proceedings of the NTMS 2008, 2008

Public key based authentication for secure integration of sensor data and RFID.
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008

Human activity recognition for video surveillance.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Efficient Generic Forward-Secure Signatures and Proxy Signatures.
Proceedings of the Public Key Infrastructure, 2008

Modeling node capture attacks in wireless sensor networks.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Secure Localization for Wireless Sensor Networks using Range-Independent Methods.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks.
Wirel. Networks, 2007

Power proximity based key management for secure multicast in ad hoc networks.
Wirel. Networks, 2007

A canonical seed assignment model for key predistribution in wireless sensor networks.
ACM Trans. Sens. Networks, 2007

Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach.
IEEE/ACM Trans. Netw., 2007

AMOEBA: Robust Location Privacy Scheme for VANET.
IEEE J. Sel. Areas Commun., 2007

Modeling adaptive node capture attacks in multi-hop wireless networks.
Ad Hoc Networks, 2007

On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety.
Proceedings of the Computer Safety, 2007

Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Probabilistic detection of mobile targets in heterogeneous sensor networks.
Proceedings of the 6th International Conference on Information Processing in Sensor Networks, 2007

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Passive Attacks on a Class of Authentication Protocols for RFID.
Proceedings of the Information Security and Cryptology, 2007

2006
The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE).
RFC, August, 2006

The AES-CMAC-96 Algorithm and Its Use with IPsec.
RFC, June, 2006

The AES-CMAC Algorithm.
RFC, June, 2006

Stochastic coverage in heterogeneous sensor networks.
ACM Trans. Sens. Networks, 2006

Disenrollment with perfect forward secrecy in threshold schemes.
IEEE Trans. Inf. Theory, 2006

A Survey on Mix Networks and Their Secure Applications.
Proc. IEEE, 2006

HiRLoc: high-resolution robust localization for wireless sensor networks.
IEEE J. Sel. Areas Commun., 2006

A framework and taxonomy for comparison of electronic voting schemes.
Comput. Secur., 2006

Swing & swap: user-centric approaches towards maximizing location privacy.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

A general probabilistic model for improving key assignment in wireless networks.
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006

Coverage in heterogeneous sensor networks.
Proceedings of the 4th International Symposium on Modeling and Optimization in Mobile, 2006

2005
SeRLoc: Robust localization for wireless sensor networks.
ACM Trans. Sens. Networks, 2005

Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks.
Mob. Networks Appl., 2005

Minimizing center key storage in hybrid one-way function based group key management with communication constraints.
Inf. Process. Lett., 2005

Iterated Local Optimization for Minimum Energy Broadcast.
Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile, 2005

Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Scalable power-efficient broadcast over densely deployed wireless ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Information assurance in manets and wireless sensor networks.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Rope: robust position estimation in wireless sensor networks.
Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, 2005

A key management scheme in distributed sensor networks using attack probabilities.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
SeRLoc: secure range-independent localization for wireless sensor networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

COBRA: center-oriented broadcast routing algorithms for wireless ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

VP3: using vertex path and power proximity for energy efficient key distribution.
Proceedings of the 60th IEEE Vehicular Technology Conference, 2004

Cross-layer design for energy-efficient secure multicast communications in ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

Broadcast with heterogeneous node capability [wireless ad hoc or sensor networks].
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Key management and distribution for secure multimedia multicast.
IEEE Trans. Multim., 2003

Broadcast Enforced Threshold Schemes with Disenrollment.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

Maximizing static network lifetime of wireless broadcast ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2003

Energy-aware secure multicast communication in ad-hoc networks using geographic location information.
Proceedings of the 2003 IEEE International Conference on Acoustics, 2003

A comparison of power-efficient broadcast routing algorithms.
Proceedings of the Global Telecommunications Conference, 2003

2002
Design of secure multicast key management schemes with communication budget constraint.
IEEE Commun. Lett., 2002

2001
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes.
IEEE Trans. Inf. Theory, 2001

Dynamic key distribution scheme using data embedding for secure multimedia multicast.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Key distribution for secure multimedia multicasts via data embedding.
Proceedings of the IEEE International Conference on Acoustics, 2001

2000
A Decision-Process Analysis of Implicit Coscheduling.
Proceedings of the 14th International Parallel & Distributed Processing Symposium (IPDPS'00), 2000

1999
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.
Proceedings of the Advances in Cryptology, 1999


  Loading...