Ram Dantu

Orcid: 0000-0001-9362-1559

According to our database1, Ram Dantu authored at least 157 papers between 1987 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing.
Proceedings of the Proceedings 27th International Conference on Extending Database Technology, 2024

2023
Seamless Asset Exchange in Interconnected Metaverses: Unraveling On-Chain Atomic Swap.
Proceedings of the 5th IEEE International Conference on Trust, 2023

The Dark Side of the Metaverse: Why is it Falling Short of Expectations?
Proceedings of the 5th IEEE International Conference on Trust, 2023

Performance Analysis of Homomorphically-Encrypted Heterogeneous Multi-Layer Graph Databases.
Proceedings of the 5th IEEE International Conference on Trust, 2023

k-Anonymity in Federated Heterogenous Graphs and k-Core Anonymization.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Layerwise Interoperability in Metaverse: Key to Next-Generation Electronic Commerce.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Phoenix: IoT Trust Evaluation Using Game Theory with Second Chance Protocol.
Proceedings of the 10th International Conference on Internet of Things: Systems, 2023

W-State as a OHE Scheme for Efficient Path Selection on Quantum Random Walks.
Proceedings of the IEEE INFOCOM 2023, 2023

Proof of Review: Trust Me, It's Been Reviewed.
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023

2022
Maintaining Review Credibility Using NLP, Reputation, and Blockchain.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Auditing Metaverse Requires Multimodal Deep Learning.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Towards a Threat Model and Security Analysis for Data Cooperatives.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Graph Algorithms over Homomorphic Encryption for Data Cooperatives.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2022

Multi-Tier Reputation for Data Cooperatives.
Proceedings of the 3rd International Conference on Mathematical Research for Blockchain Economy, 2022

Qubit Reset and Refresh: A Gamechanger for Random Number Generation.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Data Cooperatives for Trusted News Sharing in Social Media.
Proceedings of the Blockchain Technology and Emerging Technologies, 2022

Scalable Smart Contracts for Linear Regression Algorithm.
Proceedings of the Blockchain Technology and Emerging Technologies, 2022

Making Blockchain Validators Honest.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

Smarter Contracts to Predict using Deep-Learning Algorithms.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

Trusted AI with Blockchain to Empower Metaverse.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

Making Smart Contracts Predict and Scale.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

2021
Paradigm Shift from Paper Contracts to Smart Contracts.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Make Consumers Happy by Defuzzifying the Service Level Agreements.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Can't Understand SLAs? Use the Smart Contract.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Investing Data with Untrusted Parties using HE.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Cyber-Physiotherapy: Rehabilitation to Training.
Proceedings of the 17th IFIP/IEEE International Symposium on Integrated Network Management, 2021

Data Cooperatives for Neighborhood Watch.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Making Smart Contracts Smarter.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

A Collaborative and Adaptive Feedback System for Physical Exercises.
Proceedings of the 7th IEEE International Conference on Collaboration and Internet Computing, 2021

2020
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews.
IACR Cryptol. ePrint Arch., 2020

Cyber-Human System for Remote Collaborators.
CoRR, 2020

On-Road Performance Evaluation of IEEE 802.11p/WAVE in BSM Signalling and Video Streaming using WSMP.
Proceedings of the 2020 Wireless Telecommunications Symposium, 2020

Performance Analysis of Elliptic Curves for VoIP Audio Encryption Using a Softphone.
Proceedings of the Security and Privacy in Communication Networks, 2020

EW<sub>256357</sub>: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security.
Proceedings of the Security and Privacy in Communication Networks, 2020

Adaptive and Predictive SDN Control During DDoS Attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

A Human-Network-Security-Interface for an Average Joe.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Integrating DOTS With Blockchain Can Secure Massive IoT Sensors.
Proceedings of the 2020 IEEE International Parallel and Distributed Processing Symposium Workshops, 2020

Is Your Legal Contract Ambiguous? Convert to a Smart Legal Contract.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Detecting driver distraction using stimuli-response EEG analysis.
CoRR, 2019

Blockchain Based Authentication and Authorization Framework for Remote Collaboration Systems.
Proceedings of the 20th IEEE International Symposium on "A World of Wireless, 2019

Verifying OAuth Implementations Through Encrypted Network Analysis.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

CMCAP: Ephemeral Sandboxes for Adaptive Access Control.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Distributed Ledger for Spammers' Resume.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Micro-Accreditation for Matching Employer E-Hire Needs.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
A novel heart-mobile interface for detection and classification of heart sounds.
Biomed. Signal Process. Control., 2018

Uninterrupted Video Surveillance in the Face of an Attack.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Performance Analysis of Elliptic Curves for Real-Time Video Encryption.
Proceedings of the National Cyber Summit, 2018

An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems.
Proceedings of the National Cyber Summit, 2018

Prediction of human error using eye movements patterns for unintentional insider threat detection.
Proceedings of the IEEE 4th International Conference on Identity, 2018

Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

A Decentralized Marketplace Application on the Ethereum Blockchain.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Feedback control for resiliency in face of an attack.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals.
J. Internet Serv. Inf. Secur., 2016

Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms.
Comput. Secur., 2016

Automating ECU Identification for Vehicle Security.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Random anonymization of mobile sensor data: Modified Android framework.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

An opportunistic encryption extension for the DNS protocol.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Unintentional bugs to vulnerability mapping in Android applications.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Pass-pic: A mobile user authentication.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

A framework for secured collaboration in mHealth.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

PhD Forum: A System Identification Approach to Monitoring Network Traffic Security.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Towards Insider Threat Detection Using Psychophysiological Signals.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Another free app: Does it have the right intentions?
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

Tire-road friction estimation utilizing smartphones.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Smart phone monitoring of second heart sound split.
Proceedings of the 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014

Context-aware multimedia encryption in mobile platforms.
Proceedings of the Cyber and Information Security Research Conference, 2014

2013
LocateMe: Magnetic-fields-based indoor localization using smartphones.
ACM Trans. Intell. Syst. Technol., 2013

Cuffless Differential Blood Pressure Estimation Using Smart Phones.
IEEE Trans. Biomed. Eng., 2013

Socio-technical aspects of remote media control for a NG9-1-1 system.
Multim. Tools Appl., 2013

Quantifying cognitive impairment due to physical or mental stress.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Evaluation of respiration quality using smart phone.
Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, 2013

Finger Blood Flow Monitoring Using Smart Phones.
Proceedings of the 8th International Conference on Body Area Networks, 2013

Cerebral Autoregulation Assessment using Electroencephalograms.
Proceedings of the 8th International Conference on Body Area Networks, 2013

Self-Tracking via Brain-Mobile-Cloud Interface.
Proceedings of the Data Driven Wellness: From Self-Tracking to Behavior Change, 2013

2012
Safe Driving Using Mobile Phones.
IEEE Trans. Intell. Transp. Syst., 2012

2011
Socioscope: Human Relationship and Behavior Analysis in Social Networks.
IEEE Trans. Syst. Man Cybern. Part A, 2011

Magnetic Maps for Indoor Navigation.
IEEE Trans. Instrum. Meas., 2011

Behavior-based adaptive call predictor.
ACM Trans. Auton. Adapt. Syst., 2011

Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches.
Soc. Netw. Anal. Min., 2011

Towards ubiquitous computing with call prediction.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

Mobile social group sizes and scaling ratio.
AI Soc., 2011

Current and Future Trends in Social Media.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Unveiling Hidden Patterns to Find Social Relevance.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Indoor localization through dynamic time warping.
Proceedings of the IEEE International Conference on Systems, 2011

Evaluation of gyroscope-embedded mobile phones.
Proceedings of the IEEE International Conference on Systems, 2011

2010
A testbed for large mobile social computing experiments.
Int. J. Sens. Networks, 2010

ContextAlert: context-aware alert mode for a mobile phone.
Int. J. Pervasive Comput. Commun., 2010

Small World VoIP.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Predicting social ties in mobile phone networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2010

Email Shape Analysis.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

Socio-technical aspects of video phones.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

Efficiency of social connection-based routing in P2P VoIP networks.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

Mobile Social Closeness and Communication Patterns.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

Are you my friend? [Twitter response estimator].
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Network risk management using attacker profiling.
Secur. Commun. Networks, 2009

A virtual environment for network testing.
J. Netw. Comput. Appl., 2009

Issues and challenges in securing VoIP.
Comput. Secur., 2009

A society-integrated testbed architecture for peer-to-peer telecommunications.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

A testbed for mobile social computing.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

Change point detection based on call detail records.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Defense against SPIT using community signals.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

BBN-based privacy management system for facebook.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Quantifying Reciprocity in Social Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

iKnow Where You Are.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Are You a Safe Driver?
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Penetration Testing for Spam Filters.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Opt-In Detection Based on Call Detail Records.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Achieving Peer-to-Peer Telecommunication Services through Social Hashing.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Email Shape Analysis for Spam Botnet Detection.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

A Dimension-Reduction Framework for Human Behavioral Time Series Data.
Proceedings of the Technosocial Predictive Analytics, 2009

2008
An Impatient Evolutionary Algorithm With Probabilistic Tabu Search for Unified Solution of Some NP-Hard Problems in Graph and Set Theory via Clique Finding.
IEEE Trans. Syst. Man Cybern. Part B, 2008

Estimation of Defects Based on Defect Decay Model: ED^{3}M.
IEEE Trans. Software Eng., 2008

Nuisance level of a voice call.
ACM Trans. Multim. Comput. Commun. Appl., 2008

VoIP Security - Attacks and Solutions.
Inf. Secur. J. A Glob. Perspect., 2008

Spam Classification Based on E-Mail Path Analysis.
Int. J. Inf. Secur. Priv., 2008

Discovery of Social Groups Using Call Detail Records.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

CPL: Enhancing Mobile Phone Functionality by Call Predicted List.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

Inferring Social Groups Using Call Logs.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

Group Recommendation System for Facebook.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008 Workshops, 2008

Experiences in building a multi-university testbed for research in multimedia communications.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Privacy Management for Facebook.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Behavior analysis of spam botnets.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Quantifying presence using calling patterns.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Quantifying the Presence of Phone Users.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

Call Algebra.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

Traffic Shaping of Spam Botnets.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Fast Worm Containment Using Feedback Control.
IEEE Trans. Dependable Secur. Comput., 2007

Socio-technical defense against voice spamming.
ACM Trans. Auton. Adapt. Syst., 2007

EAP methods for wireless networks.
Comput. Stand. Interfaces, 2007

Goliath: A Configurable Approach for Network Testing.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

Predicting Calls - New Service for an Intelligent Phone.
Proceedings of the Real-Time Mobile Multimedia Services, 2007

Classification of Attributes and Behavior in Risk Management Using Bayesian Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Unwanted SMTP Paths and Relays.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

Automatic Calibration Using Receiver Operating Characteristics Curves.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2006
Dynamic resource management in QoS controlled networks.
Telecommun. Syst., 2006

SS7 over IP: signaling interworking vulnerabilities.
IEEE Netw., 2006

2005
Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Peer-to-Peer Adaptation Layer (M2PA).
RFC, September, 2005

Detecting Spam in VoIP Networks.
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005

Risk Management Using Behavior Based Bayesian Networks.
Proceedings of the Intelligence and Security Informatics, 2005

Sensitivity Analysis of an Attack Containment Model.
Proceedings of the Intelligence and Security Informatics, 2005

An Architecture for Network Security Using Feedback Control.
Proceedings of the Intelligence and Security Informatics, 2005

2004
Forwarding and Control Element Separation (ForCES) Framework.
RFC, April, 2004

Risk Management using Behavior based Attack Graphs.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Collaborative Vision using Networked Sensors.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Dynamic Control of Worm Propagation.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

2002
Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Adaptation Layer.
RFC, September, 2002

Constraint-Based LSP Setup using LDP.
RFC, January, 2002

1991
Depth perception using blurring and its application in VLSI wafer probing.
Mach. Vis. Appl., 1991

1988
A micro-manipulator vision in IC Manufacturing.
Proceedings of the 1988 IEEE International Conference on Robotics and Automation, 1988

1987
The Homogeneous Multiprocessor System, An Overview.
Proceedings of the International Conference on Parallel Processing, 1987


  Loading...