Sriram Chellappan

Orcid: 0000-0002-5330-8549

According to our database1, Sriram Chellappan authored at least 100 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Orchestrating Image Retrieval and Storage Over a Cloud System.
IEEE Trans. Cloud Comput., 2023

2022
Designing a Health Coach-Augmented mHealth System for the Secondary Prevention of Coronary Heart Disease Among Women.
IEEE Trans. Engineering Management, 2022

Note: CORONOSIS: Corona Prognosis via a Global Lens to Enable Efficient Policy-making Both at Global and Local Levels.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

2021
Man-in-the-Middle Attack on Contactless Payment over NFC Communications: Design, Implementation, Experiments and Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Dakter Bari: Introducing Intermediary to Ensure Healthcare Services to Extremely Impoverished People.
Proc. ACM Hum. Comput. Interact., 2021

Context-driven detection of distracted driving using images from in-car cameras.
Internet Things, 2021

Evaluating Multiway Multilingual NMT in the Turkic Languages.
CoRR, 2021

Evaluating Multiway Multilingual NMT in the Turkic Languages.
Proceedings of the Sixth Conference on Machine Translation, 2021

A Large-Scale Study of Machine Translation in Turkic Languages.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Assessing COVID-19 Impacts on College Students via Automated Processing of Free-form Text.
Proceedings of the 14th International Joint Conference on Biomedical Engineering Systems and Technologies, 2021

2020
Guest Editorial Introduction to the Special Section on Network Science for High-Confidence Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2020

Learning from Tweets: Opportunities and Challenges to Inform Policy Making During Dengue Epidemic.
Proc. ACM Hum. Comput. Interact., 2020

Trace-Σ: a privacy-preserving contact tracing app.
IACR Cryptol. ePrint Arch., 2020

The Past, Present, and Future of COVID-19: A Data-Driven Perspective.
CoRR, 2020

A Framework based on Deep Neural Networks to Extract Anatomy of Mosquitoes from Images.
CoRR, 2020

An Integrated Digital Platform for Bridging Gaps between General Public, Donors, and Social Welfare Organizations Working for Street Children in Bangladesh.
CoRR, 2020

Computer Vision Assisted Approaches to Detect Street Garbage from Citizen Generated Imagery.
Proceedings of the Science and Technologies for Smart Cities, 2020

Evaluating the Effectiveness of Inhaler Use Among COPD Patients via Recording and Processing Cough and Breath Sounds from Smartphones.
Proceedings of the Mobile Computing, Applications, and Services, 2020

Enhancing Fidelity of Quantum Cryptography using Maximally Entangled Qubits.
Proceedings of the IEEE Global Communications Conference, 2020

Automating the Surveillance of Mosquito Vectors from Trapped Specimens Using Computer Vision Techniques.
Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies, 2020

Detecting Distracted Driving from Images by Processing Relative Locations of Objects of Interest Inside Vehicles.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2020

2019
HuMAn: Complex Activity Recognition with Multi-Modal Multi-Positional Body Sensing.
IEEE Trans. Mob. Comput., 2019

Leveraging Smartphone Sensors to Detect Distracted Driving Activities.
IEEE Trans. Intell. Transp. Syst., 2019

TussisWatch: A Smart-Phone System to Identify Cough Episodes as Early Symptoms of Chronic Obstructive Pulmonary Disease and Congestive Heart Failure.
IEEE J. Biomed. Health Informatics, 2019

Predicting Community Engagement on Twitter on Environmental Health Hazards.
Proceedings of the 13th IEEE International Conference on Semantic Computing, 2019

A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics.
Proceedings of the MobiQuitous 2019, 2019

How smart your smartphone is in lie detection?
Proceedings of the MobiQuitous 2019, 2019

HEliOS: huffman coding based lightweight encryption scheme for data transmission.
Proceedings of the MobiQuitous 2019, 2019

A Novel Privacy-Preserving Socio-technical Platform for Detecting Cyber Abuse (Extended Abstract).
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

An Experimental Investigation Comparing Age-Specific and Mixed-Age Models for Wearable Assisted Activity Recognition in Women.
Proceedings of the 12th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2019), 2019

Pairing Users in Social Media via Processing Meta-data from Conversational Files.
Proceedings of the Big Data Analytics - 7th International Conference, 2019

2018
Watch-Dog: Detecting Self-Harming Activities From Wrist Worn Accelerometers.
IEEE J. Biomed. Health Informatics, 2018

Detecting Distracted Driving Using a Wrist-Worn Wearable.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Exploiting a Synergy between Greedy Approach and NSGA for Scheduling in Computing Clusters.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

Super-savior: An Independent Open Platform Wearable for Generating Emergency Alarms.
Proceedings of the 5th International Conference on Networking, Systems and Security, 2018

Leveraging Smart-Phone Cameras and Image Processing Techniques to Classify Mosquito Species.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

svLoad: An Automated Test-Driven Architecture for Load Testing in Cloud Systems.
Proceedings of the IEEE Global Communications Conference, 2018

On Detecting Chronic Obstructive Pulmonary Disease (COPD) Cough using Audio Signals Recorded from Smart-Phones.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

A Statistical Framework to Forecast Duration and Volume of Internet Usage Based on Pervasive Monitoring of NetFlow Logs.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Leveraging multi-modal smartphone sensors for ranging and estimating the intensity of explosion events.
Pervasive Mob. Comput., 2017

Can You Get into the Middle of Near Field Communication?
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

On the feasibility of profiling internet users based on volume and time of usage.
Proceedings of the 9th IEEE Latin-American Conference on Communications, 2017

Many-objective performance enhancement in computing clusters.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Identifying mosquito species using smart-phone cameras.
Proceedings of the 2017 European Conference on Networks and Communications, 2017

2016
Special Issue-Big Data for Healthcare.
Pervasive Mob. Comput., 2016

RescuePal: A smartphone-based system to discover people in emergency scenarios.
Proceedings of the 17th IEEE International Symposium on A World of Wireless, 2016

Determining the effectiveness of soil treatment on plant stress using smart-phone cameras.
Proceedings of the International Conference on Selected Topics in Mobile & Wireless Networking, 2016

2015
MoodTrek-A New App to Improve Mental HealthCare [Leading Edge].
IEEE Technol. Soc. Mag., 2015

Multimodal Wearable Sensing for Fine-Grained Activity Recognition in Healthcare.
IEEE Internet Comput., 2015

Ranging explosion events using smartphones.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Detecting self-harming activities with wearable devices.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

On the Feasibility of Leveraging Smartphone Accelerometers to Detect Explosion Events.
Proceedings of the 16th IEEE International Conference on Mobile Data Management, 2015

Mining digital data for smarter mental healthcare.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

2014
Unified Invariants for Cyber-Physical Switched System Stability.
IEEE Trans. Smart Grid, 2014

Small Spacecraft Software Modeling: A Petri Net-Based Approach.
J. Aerosp. Inf. Syst., 2014

Distributed exploratory coverage with limited mobility.
Int. J. Space Based Situated Comput., 2014

Sensor authentication in collaborating sensor networks.
Proceedings of the 13th Annual Mediterranean Ad Hoc Networking Workshop, 2014

Investigating the fractal nature of individual user netflow data.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Adaptive Scheduling with Explicit Congestion Notification in a Cyber-Physical Smart Grid System.
Proceedings of the 40th EUROMICRO Conference on Software Engineering and Advanced Applications, 2014

2013
Mobility in Wireless Sensor Networks.
Adv. Comput., 2013

Leveraging platoon dispersion for Sybil detection in vehicular networks.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Exploratory Coverage in Limited Mobility Sensor Networks.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Differences in Internet usage patterns with Stress and Anxiety among college students.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

Stability of a Cyber-physical Smart Grid System Using Cooperating Invariants.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

Context Aware Identity Management Using Smart Phones.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Arrival Time Based Traffic Signal Optimization for Intelligent Transportation Systems.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Vehicle Path Verification Using Wireless Sensor Networks.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

An empirical study on symptoms of heavier Internet usage among young adults.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

2012
Associating Internet Usage with Depressive Behavior Among College Students.
IEEE Technol. Soc. Mag., 2012

2011
Providing End-to-End Secure Communications in Wireless Sensor Networks.
IEEE Trans. Netw. Serv. Manag., 2011

Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2011

Directed Coverage in Wireless Sensor Networks: Concept and Quality.
Ad Hoc Sens. Wirel. Networks, 2011

Challenges in Secure Sensor-Cloud Computing.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

A Multi-tiered Architecture for Content Retrieval in Mobile Peer-to-Peer Networks.
Proceedings of the 12th IEEE International Conference on Mobile Data Management, 2011

2010
On Optimizing Traffic Signal Phase Ordering in Road Networks.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Defending Wireless Sensor Networks against Adversarial Localization.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

2009
Sensor network configuration under physical attacks.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Event Coverage in Sparse Mobile Sensor Networks.
Proceedings of the NBiS 2009, 2009

Privacy Preserving Portable Health Record (P^3HR).
Proceedings of the NBiS 2009, 2009

Angular Mobility Assisted Coverage in Directional Sensor Networks.
Proceedings of the NBiS 2009, 2009

2008
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense.
Comput. Commun., 2008

TTL Based Packet Marking for IP Traceback.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Network Decoupling: A Methodology for Secure Communications in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2007

Mobility Limited Flip-Based Sensor Networks Deployment.
IEEE Trans. Parallel Distributed Syst., 2007

Deploying Wireless Sensor Networks under Limited Mobility Constraints.
IEEE Trans. Mob. Comput., 2007

2006
On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks.
IEEE Trans. Parallel Distributed Syst., 2006

Distributed policy processing in active-service based infrastructures.
Int. J. Commun. Syst., 2006

Policy-driven physical attacks in sensor networks: modeling and measurement.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Network Decoupling for Secure Communications in Wireless Sensor Networks.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

2005
P2P/Grid-based overlay architecture to support VoIP services in large-scale IP networks.
Future Gener. Comput. Syst., 2005

Defending against search-based physical attacks in sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Sensor networks deployment using flip-based sensors.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Control Theory Optimization of MECN in Satellite Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Search-based physical attacks in sensor networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

Peer-to-peer system-based active worm attacks: modeling and analysis.
Proceedings of IEEE International Conference on Communications, 2005

Lifetime optimization of sensor networks under physical attacks.
Proceedings of IEEE International Conference on Communications, 2005

On defending peer-to-peer system-based active worm attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Resilience of Structured Peer-to-Peer Systems.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

2004
Analyzing the Secure Overlay Services Architecture under Intelligent DDoS Attacks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004


  Loading...