Rajarathnam Chandramouli

Orcid: 0000-0001-7889-740X

Affiliations:
  • Stevens Institute of Technology, Hoboken, New Jersey, USA


According to our database1, Rajarathnam Chandramouli authored at least 115 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Using IoT-Type Metadata and Smart Web Design to Create User Interfaces Automatically.
IEEE Trans. Ind. Informatics, March, 2023

2022
Guest Editorial: Blockchain and Industry 4.0 in Resilient Wireless Communications.
IEEE Wirel. Commun., 2022

TONet: A Fast and Efficient Method for Traffic Obfuscation Using Adversarial Machine Learning.
IEEE Commun. Lett., 2022

2021
Learning Models for Suicide Prediction from Social Media Posts.
CoRR, 2021

Causal-TGAN: Generating Tabular Data Using Causal Generative Adversarial Networks.
CoRR, 2021

2020
Personalized Early Stage Alzheimer's Disease Detection: A Case Study of President Reagan's Speeches.
Proceedings of the 19th SIGBioMed Workshop on Biomedical Language Processing, 2020

2019
An analytical system for user emotion extraction, mental state modeling, and rating.
Expert Syst. Appl., 2019

Neural Decoding of Synergy-Based Hand Movements Using Electroencephalography.
IEEE Access, 2019

Spectrum Management over Dynamic Spectrum Access based HetNets.
Proceedings of the 2019 IEEE International Symposium on Dynamic Spectrum Access Networks, 2019

2018
Decoding Asynchronous Reaching in Electroencephalography Using Stacked Autoencoders.
IEEE Access, 2018

2017
Joint Spectrum and Energy Efficiency in Device to Device Communication Enabled Wireless Networks.
IEEE Trans. Cogn. Commun. Netw., 2017

Biometrics Based on Hand Synergies and Their Neural Representations.
IEEE Access, 2017

2016
A Micro-Finance Model for Spectrum Management in Wireless Networks.
IEEE Trans. Cogn. Commun. Netw., 2016

Joint-channel modeling to attack QIM steganography.
Multim. Tools Appl., 2016

Software defined access for HetNets.
IEEE Commun. Mag., 2016

2015
Spatio-Temporal Analysis of Passive Consumption in Internet Media.
IEEE Trans. Knowl. Data Eng., 2015

Complexity Analysis of CSMA Scheduling via Dependencies Matrix.
CoRR, 2015

2014
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.
IEEE Trans. Veh. Technol., 2014

Price-bandwidth dynamics for WSPs in heterogeneous wireless networks.
Phys. Commun., 2014

Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay.
EAI Endorsed Trans. Wirel. Spectr., 2014

Distributed Spectrum Sharing Games Via Congestion Advertisement.
EAI Endorsed Trans. Wirel. Spectr., 2014

Reciprocity, fairness and learning in medium access control games.
Comput. Commun., 2014

2013
A Quantitative Model and Analysis of Information Confusion in Social Networks.
IEEE Trans. Multim., 2013

SpiderRadio: A Cognitive Radio Implementation Using IEEE 802.11 Components.
IEEE Trans. Mob. Comput., 2013

Altruism in social networks: good guys do finish first.
Soc. Netw. Anal. Min., 2013

2012
Power Control Game in Multi-Terminal Covert Timing Channels.
IEEE J. Sel. Areas Commun., 2012

Impact of Constraints on the Complexity and Performance of Channel Assignment in Multi-Hop Wireless Networks.
J. Cyber Secur. Mobil., 2012

MAximum SPECTrum packing: a distributed opportunistic channel acquisition mechanism in dynamic spectrum access networks.
IET Commun., 2012

Network measurement based modeling and optimization for IP geolocation.
Comput. Networks, 2012

Measuring and quantifying the silent majority on the Internet.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

2011
Author gender identification from text.
Digit. Investig., 2011

Estimation of missing RTTs in computer networks: Matrix completion vs compressed sensing.
Comput. Networks, 2011

SpiderRadio: A cognitive radio network with commodity hardware and open source software.
IEEE Commun. Mag., 2011

Cost of Collaboration vs Individual Effort in Social Networks.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

Adaptive Context Modeling for Deception Detection in Emails.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

Authorship Similarity Detection from Email Messages.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure?
Proceedings of IEEE International Conference on Communications, 2011

Distributed Learning in Secondary Spectrum Sharing Graphical Game.
Proceedings of the Global Communications Conference, 2011

Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network.
Proceedings of the Global Communications Conference, 2011

2010
Deception Detection on the Internet.
Proceedings of the Handbook of Research on Computational Forensics, 2010

On the location of an eavesdropper in multiterminal networks.
IEEE Trans. Inf. Forensics Secur., 2010

A network flow based approach for network selection in dynamic spectrum access networks.
Inf. Process. Lett., 2010

Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities.
IEEE Commun. Mag., 2010

An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

SpiderRadio: An Incumbent Sensing Implementation for Cognitive Radio Networking Using IEEE 802.11 Devices.
Proceedings of IEEE International Conference on Communications, 2010

Cross-Layer MAC Enabling Virtual Link for Multi-Hop Routing in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
User strategy learning when pricing a RED buffer.
Simul. Model. Pract. Theory, 2009

On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels?
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

Dynamic pricing for service provisioning and network selection in heterogeneous networks.
Phys. Commun., 2009

Dynamic Spectrum Access for Wireless Networking.
EURASIP J. Adv. Signal Process., 2009

A novel portfolio optimization method for foreign currency investment.
Proceedings of the International Joint Conference on Neural Networks, 2009

Gender identification from E-mails.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2009

2008
Stochastic learning solution for distributed discrete power control game in wireless data networks.
IEEE/ACM Trans. Netw., 2008

Reliable Multimedia Transmission Over Cognitive Radio Networks Using Fountain Codes.
Proc. IEEE, 2008

Guest Editorial: Special Issue on Cognitive Radio Oriented Wireless Networks and Communications.
Mob. Networks Appl., 2008

Human behavior inspired cognitive radio network design.
IEEE Commun. Mag., 2008

Nonparametric steganalysis of QIM data hiding using approximate entropy.
Proceedings of the Security, 2008

A Game Theoretic Framework for Distributed Self-Coexistence Among IEEE 802.22 Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Impact of Constraints on the Complexity of Dynamic Spectrum Assignment.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On the Secrecy Capacity of Fading Cognitive Wireless Networks.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

2007
Dynamic Spectrum Access with QoS and Interference Temperature Constraints.
IEEE Trans. Mob. Comput., 2007

Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks.
IEEE Trans. Dependable Secur. Comput., 2007

Price dynamics in competitive agile spectrum access markets.
IEEE J. Sel. Areas Commun., 2007

A Sequential Distinguisher for Covert Channel Identification.
Int. J. Netw. Secur., 2007

Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences.
Int. J. Netw. Secur., 2007

Joint Encryption and Compression of Correlated Sources with Side Information.
EURASIP J. Inf. Secur., 2007

Blind source separation for steganalytic secret message estimation.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Steganalysis of GIM-based data hiding using kernel density estimation.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Decentralized Learning for Pricing a RED Buffer.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Economics of Security: Research Challenges.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Secondary Spectrum Access with LT Codes for Delay-Constrained Applications.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
Block-based frequency scalable technique for efficient hierarchical coding.
IEEE Trans. Signal Process., 2006

Battery power-aware encryption.
ACM Trans. Inf. Syst. Secur., 2006

Dynamic spectrum access in open spectrum wireless networks.
IEEE J. Sel. Areas Commun., 2006

Learning through Multimedia Interaction.
IEEE Multim., 2006

Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints.
Proceedings of IEEE International Conference on Communications, 2006

Real-time secondary spectrum sharing with QoS provisioning.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Secret key estimation in sequential steganography.
IEEE Trans. Signal Process., 2005

Adaptive downlink scheduling and rate selection: a cross-layer design.
IEEE J. Sel. Areas Commun., 2005

On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

A Bayesian image steganalysis approach to estimate the embedded secret message.
Proceedings of the 7th workshop on Multimedia & Security, 2005

Analysis and performance evaluation of a fair channel access protocol for open spectrum wireless networks.
Proceedings of IEEE International Conference on Communications, 2005

Robust encryption for secure image transmission over wireless channels.
Proceedings of IEEE International Conference on Communications, 2005

2004
Studying Energy Trade Offs in Offloading Computation/Compilation in Java-Enabled Mobile Devices.
IEEE Trans. Parallel Distributed Syst., 2004

Adaptive stochastic iterative rate selection for wireless channels.
IEEE Commun. Lett., 2004

Locally most-powerful detector for secret key estimation in spread spectrum image steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

On the complexity and hardness of the steganography embedding problem.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Web search steganalysis: some challenges and approaches.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

On information hiding with incomplete information about steganalysis.
Proceedings of the 2004 International Conference on Image Processing, 2004

Distributed discrete power control for bursty transmissions over wireless data networks.
Proceedings of IEEE International Conference on Communications, 2004

Joint adaptive rate control and randomized scheduling for multimedia wireless systems.
Proceedings of IEEE International Conference on Communications, 2004

Energy-aware on-line algorithms for image transmission over wireless LAN.
Proceedings of IEEE International Conference on Communications, 2004

Battery power optimized encryption.
Proceedings of IEEE International Conference on Communications, 2004

Current trends in steganalysis: a critical survey.
Proceedings of the 8th International Conference on Control, 2004

2003
On sequential watermark detection.
IEEE Trans. Signal Process., 2003

A mathematical framework for active steganalysis.
Multim. Syst., 2003

Guest editorial recent advances in wireless multimedia.
IEEE J. Sel. Areas Commun., 2003

To transmit or not to transmit: an investigation using competitive analysis.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Active steganalysis of sequential steganography.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Steganography capacity: a steganalysis perspective.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Image Steganography and Steganalysis: Concepts and Practice.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Energy-Aware Compilation and Execution in Java-Enabled Mobile Devices.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Computation and transmission energy modeling through profiling for MPEG4 video transmission.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

An adaptive energy-efficient link layer protocol using stochastic learning control.
Proceedings of IEEE International Conference on Communications, 2003

2002
Adaptive steganography.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Mathematical approach to steganalysis.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Waterfilling: a connection between information theoretic and perceptually based watermarking.
Proceedings of the 2002 International Conference on Image Processing, 2002

Power efficient adaptive M-QAM design using adaptive pipelined analog-to-digital converter.
Proceedings of the IEEE International Conference on Acoustics, 2002

2001
Multiple-description framework for oblivious watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Data hiding capacity in the presence of an imperfectly known channel.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Preface to Special Session on Recent Advances in Wireless Communication.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Analysis of LSB based image steganography techniques.
Proceedings of the 2001 International Conference on Image Processing, 2001

2000
A distributed detection framework for Steganalysis.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000

How Many Pixels to Watermark?
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000


  Loading...