Ranjan Bose

According to our database1, Ranjan Bose authored at least 84 papers between 2004 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems.
IEEE Trans. Dependable Secur. Comput., 2022

2021
NOMA Combined With RC for Reliable and Secure Transmission in a Delay-Constrained System.
IEEE Wirel. Commun. Lett., 2021

Analyzing Secrecy Outage in Hybrid Full-Duplex Attack While Exploiting CSI of Legitimate Link.
IEEE Wirel. Commun. Lett., 2021

Fair Subcarrier Allocation for Securing OFDMA in IoT Against Full-Duplex Hybrid Attacker.
IEEE Trans. Inf. Forensics Secur., 2021

Secure Communication With Energy-Harvesting Buffer-Aided Jammer.
IEEE Open J. Commun. Soc., 2021

Development and Validation of Serious Games for Teaching Cybersecurity.
Proceedings of the Serious Games - Joint International Conference, 2021

2020
Optimal Green Hybrid Attacks in Secure IoT.
IEEE Wirel. Commun. Lett., 2020

Precoding-Aided Spatial Modulation Assisted Joint Two-Tier Downlink Reception.
IEEE Trans. Wirel. Commun., 2020

Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT.
IEEE Internet Things J., 2020

QoS-aware stochastic spatial PLS model for analysing secrecy performance under eavesdropping and jamming.
IET Commun., 2020

Precoding-Aided Secure Time-Domain Index Modulation.
IEEE Commun. Lett., 2020

Fairness-aware Subcarrier Allocation to Combat full duplex Eavesdropping and Jamming attacks in IoT.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Framework for Automatically Generating IoT Security Quizzes in 360VR Images/Videos Based on Linked Data.
Proceedings of the Advances in Internet, 2020

PAPR Minimization Technique in MIMO V2V Transmission using SVM-based Channel Estimation.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
Secure Cooperative Transmission in Rateless-Coded Environment Using TAS and Artificial Noise.
IEEE Trans. Veh. Technol., 2019

Exploiting Mapping Diversity for Enhancing Security at Physical Layer in the Internet of Things.
IEEE Internet Things J., 2019

Energy theft detection for AMI using principal component analysis based reconstructed data.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

Stackelberg game for price and power control in secure cooperative relay network.
IET Cyper-Phys. Syst.: Theory & Appl., 2019

QVP-based relay selection to improve secrecy for rateless-codes in delay-constrained systems.
IET Commun., 2019

Channel-Aware Artificial Intersymbol Interference for Enhancing Physical Layer Security.
IEEE Commun. Lett., 2019

Secure Energy Efficiency with Poisson Point Process Distributed Jammers.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

Automatically Generate E-Learning Quizzes from IoT Security Ontology.
Proceedings of the 8th International Congress on Advanced Applied Informatics, 2019

Novel QoS-Aware Physical Layer Security Analysis Considering Random Inter-Node Distances.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Framework for Automatically Generating IoT Security Quizzes in a Virtual 3D Environment Based on Linked Data.
Proceedings of the Advances in Internet, 2019

E-Learning Material Development Framework Supporting 360VR Images/Videos Based on Linked Data for IoT Security Education.
Proceedings of the Advances in Internet, 2019

Rateless Code-Aided Transmission Scheme to Achieve Secrecy in a Delay-Constraint Environment.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid.
IEEE Trans. Ind. Informatics, 2018

Secrecy performance of threshold-based cognitive relay network with diversity combining.
J. Commun. Networks, 2018

Entropy-based electricity theft detection in AMI network.
IET Cyper-Phys. Syst.: Theory & Appl., 2018

Secrecy outage of threshold-based cooperative relay network with and without direct links.
EURASIP J. Inf. Secur., 2018

Energy theft detection in advanced metering infrastructure.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Jammer Assisted SEE Maximization in Decode-and-Forward Relay Network.
Proceedings of the 2018 International Conference on Signal Processing and Communications (SPCOM), 2018

Anomaly Detection Algorithms for Smart Metering using Swarm Intelligence.
Proceedings of the 1st International Workshop on Future Industrial Communication Networks, 2018

E-learning Material Development Framework Supporting VR/AR Based on Linked Data for IoT Security Education.
Proceedings of the Advances in Internet, 2018

Analyzing CDR/IPDR Data to Find People Network from Encrypted Messaging Services.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Entropy Based Image Segmentation for Energy Efficient LTE System with Cloud.
Wirel. Pers. Commun., 2017

Secrecy Outage of Dual-Hop Amplify-and-Forward Relay System with Diversity Combining at the Eavesdropper.
Wirel. Pers. Commun., 2017

Resource Allocation in Secure Multicarrier AF Relay System Under Individual Power Constraints.
IEEE Trans. Veh. Technol., 2017

Partner Selection Based on Optimal Power Allocation for Lifetime Maximization in Cooperative Networks.
IEEE Trans. Veh. Technol., 2017

Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network.
IET Commun., 2017

Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying.
IEEE Access, 2017

Channel-based mapping diversity for enhancing the physical layer security in the Internet of Things.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Analyzing secrecy of delay-constrained system in cooperative relay environment using rateless codes.
Proceedings of the Twenty-third National Conference on Communications, 2017

Secrecy outage of cooperative relay network with and without eavesdropper's direct link.
Proceedings of the Twenty-third National Conference on Communications, 2017

2016
Joint constellation size, energy allocation and relay location optimisation for energy-efficient DF relaying.
IET Commun., 2016

Secrecy performance of dual-hop decode-and-forward relay system with diversity combining at the eavesdropper.
IET Commun., 2016

Energy-aware relay selection and power allocation for multiple-user cooperative networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Entropy based image segmentation with wavelet compression for energy efficient LTE systems.
Proceedings of the 23rd International Conference on Telecommunications, 2016

2015
Secrecy Outage of Dual-Hop Regenerative Multi-Relay System With Relay Selection.
IEEE Trans. Wirel. Commun., 2015

Energy-Efficient Joint Power Allocation and Relay Selection in Bit Error Rate Constrained Two-Way Relay Network.
Int. J. Interdiscip. Telecommun. Netw., 2015

Joint optimal power allocation and relay location for decode-and-forward multi-hop relaying over log-normal channel.
IET Commun., 2015

Energy-efficient joint routing and power allocation optimisation in bit error rate constrained multihop wireless networks.
IET Commun., 2015

Resource Allocation for Secure Multicarrier AF Relay System Under Total Power Constraint.
IEEE Commun. Lett., 2015

Green design for smart antenna system using iterative beamforming algorithms.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

2014
Performance of a Multi-hop UWB Transmitted Reference System using Decode-and-Forward Relays.
Wirel. Pers. Commun., 2014

The VLAB OER Experience: Modeling Potential-Adopter Student Acceptance.
IEEE Trans. Educ., 2014

An information-theoretic approach to analyzing CLEAN.
IEEE Trans. Aerosp. Electron. Syst., 2014

Secrecy Outage of Dual-Hop AF Relay System With Relay Selection Without Eavesdropper's CSI.
IEEE Commun. Lett., 2014

Secrecy Outage of Dual-Hop Amplify-and-Forward System and Its Application to Relay Selection.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

Outage optimal relay selection strategy using destination-based jamming for secure communication in amplify-and-forward relay networks.
Proceedings of the IEEE Workshop on Statistical Signal Processing, 2014

Power analysis of LTE system for uplink scenario.
Proceedings of the Twentieth National Conference on Communications, 2014

An integrated framework for optimizing power consumption of Smart Antennas.
Proceedings of the Twentieth National Conference on Communications, 2014

2013
Virtual Labs Project: A Paradigm Shift in Internet-Based Remote Experimentation.
IEEE Access, 2013

Joint Optimal Power Allocation and Relay Location for Amplify-and-Forward Multihop Relaying over Lognormal Channel.
Proceedings of the 77th IEEE Vehicular Technology Conference, 2013

Joint routing and power allocation optimization in outage constrained multihop wireless networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

2012
System-Level Design Space Exploration Methodology for Energy-Efficient Sensor Node Configurations: An Experimental Validation.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2012

Active CLEAN: A Modified CLEAN Algorithm for HRRPs of Contiguous Targets with Thinned Spectrum.
IEEE Trans. Aerosp. Electron. Syst., 2012

2011
Direction of Arrival Estimation of Multiple UWB Signals.
Wirel. Pers. Commun., 2011

Lean CLEAN: Deconvolution Algorithm for Radar Imaging of Contiguous Targets.
IEEE Trans. Aerosp. Electron. Syst., 2011

2010
Multi-User Relaying of High-Rate Space-Time Code in Cooperative Networks.
Wirel. Pers. Commun., 2010

Direction of Arrival Estimation and Beamforming of Multiple Coherent UWB Signals.
Proceedings of IEEE International Conference on Communications, 2010

2009
Integrated energy analysis of error correcting codes and modulation for energy efficient wireless sensor nodes.
IEEE Trans. Wirel. Commun., 2009

A Framework for Energy-Consumption-Based Design Space Exploration for Wireless Sensor Nodes.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2009

Increasing the secrecy capacity by cooperation in wireless networks.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

An experimental validation of system level design space exploration methodology for energy efficient sensor nodes.
Proceedings of the 2009 International Symposium on Low Power Electronics and Design, 2009

2008
M-PAM space - time trellis codes for ultra-wideband multiple-input multiple-output communications.
IET Commun., 2008

Pulse position modulated space-time trellis coding for ultra-wideband impulse radio multiple-input multiple-output communication systems.
IET Commun., 2008

Smart antenna design for beamforming of UWB signals in Gaussian noise.
Proceedings of the 2008 International ITG Workshop on Smart Antennas, 2008

Precoded DDOSTBC with non-unitary constellations over correlated Rayleigh channels with carrier offsets.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
A New Distance Notion for PPAM Space--Time Trellis Codes for UWB MIMO Communications.
IEEE Trans. Commun., 2007

Relay Strategies for High Rate Space-Time Code in Cooperative MIMO Networks.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

2006
A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system.
IEEE Trans. Circuits Syst. I Regul. Pap., 2006

2004
Improving Capacity in LMDS Networks Using Trellis-Coded Modulation.
EURASIP J. Wirel. Commun. Netw., 2004

Kola codes: a constructive technique for trellis codes with large d<sub>free</sub>.
Proceedings of IEEE International Conference on Communications, 2004


  Loading...