Rajarathnam Chandramouli

According to our database1, Rajarathnam Chandramouli authored at least 103 papers between 2000 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Decoding Asynchronous Reaching in Electroencephalography Using Stacked Autoencoders.
IEEE Access, 2018

2017
Joint Spectrum and Energy Efficiency in Device to Device Communication Enabled Wireless Networks.
IEEE Trans. Cogn. Comm. & Networking, 2017

Biometrics Based on Hand Synergies and Their Neural Representations.
IEEE Access, 2017

2016
A Micro-Finance Model for Spectrum Management in Wireless Networks.
IEEE Trans. Cogn. Comm. & Networking, 2016

Joint-channel modeling to attack QIM steganography.
Multimedia Tools Appl., 2016

Software defined access for HetNets.
IEEE Communications Magazine, 2016

2015
Spatio-Temporal Analysis of Passive Consumption in Internet Media.
IEEE Trans. Knowl. Data Eng., 2015

Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay.
CoRR, 2015

Complexity Analysis of CSMA Scheduling via Dependencies Matrix.
CoRR, 2015

2014
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.
IEEE Trans. Vehicular Technology, 2014

Price-bandwidth dynamics for WSPs in heterogeneous wireless networks.
Physical Communication, 2014

Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay.
EAI Endorsed Trans. Wireless Spectrum, 2014

Distributed Spectrum Sharing Games Via Congestion Advertisement.
EAI Endorsed Trans. Wireless Spectrum, 2014

Reciprocity, fairness and learning in medium access control games.
Computer Communications, 2014

2013
A Quantitative Model and Analysis of Information Confusion in Social Networks.
IEEE Trans. Multimedia, 2013

SpiderRadio: A Cognitive Radio Implementation Using IEEE 802.11 Components.
IEEE Trans. Mob. Comput., 2013

Altruism in social networks: good guys do finish first.
Social Netw. Analys. Mining, 2013

2012
Power Control Game in Multi-Terminal Covert Timing Channels.
IEEE Journal on Selected Areas in Communications, 2012

MAximum SPECTrum packing: a distributed opportunistic channel acquisition mechanism in dynamic spectrum access networks.
IET Communications, 2012

Network measurement based modeling and optimization for IP geolocation.
Computer Networks, 2012

Measuring and quantifying the silent majority on the Internet.
Proceedings of the 2012 35th IEEE Sarnoff Symposium, Newark, NJ, USA, May 21-22, 2012, 2012

2011
Author gender identification from text.
Digital Investigation, 2011

Estimation of missing RTTs in computer networks: Matrix completion vs compressed sensing.
Computer Networks, 2011

SpiderRadio: A cognitive radio network with commodity hardware and open source software.
IEEE Communications Magazine, 2011

Cost of Collaboration vs Individual Effort in Social Networks.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

Adaptive Context Modeling for Deception Detection in Emails.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

Authorship Similarity Detection from Email Messages.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2011

Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure?
Proceedings of IEEE International Conference on Communications, 2011

Distributed Learning in Secondary Spectrum Sharing Graphical Game.
Proceedings of the Global Communications Conference, 2011

Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network.
Proceedings of the Global Communications Conference, 2011

2010
Deception Detection on the Internet.
Proceedings of the Handbook of Research on Computational Forensics, 2010

On the location of an eavesdropper in multiterminal networks.
IEEE Trans. Information Forensics and Security, 2010

A network flow based approach for network selection in dynamic spectrum access networks.
Inf. Process. Lett., 2010

Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities.
IEEE Communications Magazine, 2010

An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

SpiderRadio: An Incumbent Sensing Implementation for Cognitive Radio Networking Using IEEE 802.11 Devices.
Proceedings of IEEE International Conference on Communications, 2010

Cross-Layer MAC Enabling Virtual Link for Multi-Hop Routing in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
User strategy learning when pricing a RED buffer.
Simulation Modelling Practice and Theory, 2009

On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels?
Mobile Computing and Communications Review, 2009

Dynamic pricing for service provisioning and network selection in heterogeneous networks.
Physical Communication, 2009

Dynamic Spectrum Access for Wireless Networking.
EURASIP J. Adv. Sig. Proc., 2009

A novel portfolio optimization method for foreign currency investment.
Proceedings of the International Joint Conference on Neural Networks, 2009

Gender identification from E-mails.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2009

2008
Stochastic learning solution for distributed discrete power control game in wireless data networks.
IEEE/ACM Trans. Netw., 2008

Reliable Multimedia Transmission Over Cognitive Radio Networks Using Fountain Codes.
Proceedings of the IEEE, 2008

Guest Editorial: Special Issue on Cognitive Radio Oriented Wireless Networks and Communications.
MONET, 2008

Human behavior inspired cognitive radio network design.
IEEE Communications Magazine, 2008

Nonparametric steganalysis of QIM data hiding using approximate entropy.
Proceedings of the Security, 2008

A Game Theoretic Framework for Distributed Self-Coexistence Among IEEE 802.22 Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Impact of Constraints on the Complexity of Dynamic Spectrum Assignment.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

On the Secrecy Capacity of Fading Cognitive Wireless Networks.
Proceedings of the 3rd International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, 2008

2007
Dynamic Spectrum Access with QoS and Interference Temperature Constraints.
IEEE Trans. Mob. Comput., 2007

Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks.
IEEE Trans. Dependable Sec. Comput., 2007

Price dynamics in competitive agile spectrum access markets.
IEEE Journal on Selected Areas in Communications, 2007

A Sequential Distinguisher for Covert Channel Identification.
I. J. Network Security, 2007

Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences.
I. J. Network Security, 2007

Joint Encryption and Compression of Correlated Sources with Side Information.
EURASIP J. Information Security, 2007

Blind source separation for steganalytic secret message estimation.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents IX, 2007

Steganalysis of GIM-based data hiding using kernel density estimation.
Proceedings of the 9th workshop on Multimedia & Security, 2007

Decentralized Learning for Pricing a RED Buffer.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Economics of Security: Research Challenges.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

2006
Block-based frequency scalable technique for efficient hierarchical coding.
IEEE Trans. Signal Processing, 2006

Battery power-aware encryption.
ACM Trans. Inf. Syst. Secur., 2006

Dynamic spectrum access in open spectrum wireless networks.
IEEE Journal on Selected Areas in Communications, 2006

Learning through Multimedia Interaction.
IEEE MultiMedia, 2006

Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints.
Proceedings of IEEE International Conference on Communications, 2006

On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Secret key estimation in sequential steganography.
IEEE Trans. Signal Processing, 2005

Adaptive downlink scheduling and rate selection: a cross-layer design.
IEEE Journal on Selected Areas in Communications, 2005

On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, 2005

A Bayesian image steganalysis approach to estimate the embedded secret message.
Proceedings of the 7th workshop on Multimedia & Security, 2005

Analysis and performance evaluation of a fair channel access protocol for open spectrum wireless networks.
Proceedings of IEEE International Conference on Communications, 2005

Robust encryption for secure image transmission over wireless channels.
Proceedings of IEEE International Conference on Communications, 2005

2004
Studying Energy Trade Offs in Offloading Computation/Compilation in Java-Enabled Mobile Devices.
IEEE Trans. Parallel Distrib. Syst., 2004

Adaptive stochastic iterative rate selection for wireless channels.
IEEE Communications Letters, 2004

Locally most-powerful detector for secret key estimation in spread spectrum image steganography.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

On the complexity and hardness of the steganography embedding problem.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

Web search steganalysis: some challenges and approaches.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

On information hiding with incomplete information about steganalysis.
Proceedings of the 2004 International Conference on Image Processing, 2004

Distributed discrete power control for bursty transmissions over wireless data networks.
Proceedings of IEEE International Conference on Communications, 2004

Joint adaptive rate control and randomized scheduling for multimedia wireless systems.
Proceedings of IEEE International Conference on Communications, 2004

Energy-aware on-line algorithms for image transmission over wireless LAN.
Proceedings of IEEE International Conference on Communications, 2004

Battery power optimized encryption.
Proceedings of IEEE International Conference on Communications, 2004

Current trends in steganalysis: a critical survey.
Proceedings of the 8th International Conference on Control, 2004

2003
On sequential watermark detection.
IEEE Trans. Signal Processing, 2003

A mathematical framework for active steganalysis.
Multimedia Syst., 2003

To transmit or not to transmit: an investigation using competitive analysis.
Proceedings of the 2003 IEEE Wireless Communications and Networking, 2003

Active steganalysis of sequential steganography.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Steganography capacity: a steganalysis perspective.
Proceedings of the Security and Watermarking of Multimedia Contents V, 2003

Image Steganography and Steganalysis: Concepts and Practice.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Energy-Aware Compilation and Execution in Java-Enabled Mobile Devices.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Computation and transmission energy modeling through profiling for MPEG4 video transmission.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

An adaptive energy-efficient link layer protocol using stochastic learning control.
Proceedings of IEEE International Conference on Communications, 2003

2002
Adaptive steganography.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Mathematical approach to steganalysis.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Waterfilling: a connection between information theoretic and perceptually based watermarking.
Proceedings of the 2002 International Conference on Image Processing, 2002

Power efficient adaptive M-QAM design using adaptive pipelined analog-to-digital converter.
Proceedings of the IEEE International Conference on Acoustics, 2002

2001
Multiple-description framework for oblivious watermarking.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Data hiding capacity in the presence of an imperfectly known channel.
Proceedings of the Security and Watermarking of Multimedia Contents III, 2001

Preface to Special Session on Recent Advances in Wireless Communication.
Proceedings of the 2001 International Symposium on Information Technology (ITCC 2001), 2001

Analysis of LSB based image steganography techniques.
Proceedings of the 2001 International Conference on Image Processing, 2001

2000
A distributed detection framework for Steganalysis.
Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30, 2000

How Many Pixels to Watermark?
Proceedings of the 2000 International Symposium on Information Technology (ITCC 2000), 2000


  Loading...