Sukumar Nandi

Orcid: 0000-0002-5869-1057

Affiliations:
  • Indian Institute of Technology Guwahati, India
  • Nanyang Technological University, Singapore (2002 - 2003)
  • Indian Institute of Technology Kharagpur, West Bengal, India (PhD 1995)


According to our database1, Sukumar Nandi authored at least 292 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A multifaceted survey on privacy preservation of federated learning: progress, challenges, and opportunities.
Artif. Intell. Rev., July, 2024

Sec-NoC: A Lightweight Secure Communication System for On-Chip Interconnects.
IEEE Embed. Syst. Lett., June, 2024

A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks.
Int. J. Inf. Sec., April, 2024

TROP: TRust-aware OPportunistic Routing in NoC with Hardware Trojans.
ACM Trans. Design Autom. Electr. Syst., March, 2024

Impact of Language-Specific Training on Image Caption Synthesis: A Case Study on Low-Resource Assamese Language.
Int. J. Asian Lang. Process., March, 2024

Cost-effective live video streaming for internet of connected vehicles using heterogeneous networks.
Ad Hoc Networks, February, 2024

RFPM: A RSU-aided framework for pseudonym management to preserve location privacy in IoV.
Secur. Priv., 2024

Secret sharing: A comprehensive survey, taxonomy and applications.
Comput. Sci. Rev., 2024

Part-of-Speech Tagger for Bodo Language using Deep Learning approach.
CoRR, 2024

Automated aerial assessment for seamless adaptive adhoc restoration in partially collapsed network.
Comput. Commun., 2024

Distributed neighbor discovery with mobility adaptive probing for beyond 5G D2D communications.
Comput. Networks, 2024

Design and Implementation of a Neighbor Discovery Framework Through Base Station Coordination for 5G D2D Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Spectroformer: Multi-Domain Query Cascaded Transformer Network For Underwater Image Enhancement.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

IndiSentiment140: Sentiment Analysis Dataset for Indian Languages with Emphasis on Low-Resource Languages using Machine Translation.
Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (Volume 1: Long Papers), 2024

Evaluating Performance of Pre-trained Word Embeddings on Assamese, a Low-resource Language.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

2023
Mobile app-based tomato disease identification with fine-tuned convolutional neural networks.
Comput. Electr. Eng., December, 2023

Part-of-speech Tagger for Assamese Using Ensembling Approach.
ACM Trans. Asian Low Resour. Lang. Inf. Process., October, 2023

Mobility Assisted Adaptive Clustering Hierarchy for IoT Based Sensor Networks in 5G and Beyond.
J. Commun., June, 2023

OPTIMIST: Lightweight and Transparent IDS With Optimum Placement Strategy to Mitigate Mixed-Rate DDoS Attacks in IoT Networks.
IEEE Internet Things J., May, 2023

A study on the channel bonding in IoT networks: Requirements, applications, and challenges.
Int. J. Commun. Syst., April, 2023

Effective injection of adversarial botnet attacks in IoT ecosystem using evolutionary computing.
Internet Technol. Lett., 2023

NTRU and Secret Sharing Based Secure Group Communication for IoT Applications.
IEEE Access, 2023

Secret Image Sharing Schemes: A Comprehensive Survey.
IEEE Access, 2023

A Novel Energy-Efficient Scheme for RPL Attacker Identification in IoT Networks Using Discrete Event Modeling.
IEEE Access, 2023

Network based Intrusion Detection using Time aware LSTM Autoencoder.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Protocol Aware Unsupervised Network Intrusion Detection System.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Image Caption Synthesis for Low Resource Assamese Language using Bi-LSTM with Bilinear Attention.
Proceedings of the 37th Pacific Asia Conference on Language, 2023

An Implementation and Analysis of Zero Knowledge Based E-Voting Solution With Proof of Vote on Public Ethereum Blockchain.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

ATOM : A Decentralized Task Offloading Framework for Mobile Edge Computing through Blockchain and Smart Contracts.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Enhancing Anonymity in NoC Communication to Counter Traffic Profiling by Hardware Trojans.
Proceedings of the 16th IEEE International Symposium on Embedded Multicore/Many-core Systems-on-Chip, 2023

Exploring Trustable Paths in Network-on-Chip for Low-Slack Packets.
Proceedings of the 20th International SoC Design Conference, 2023

Relevance of Language-Specific Training on Image Caption Synthesis for Low Resource Assamese Language.
Proceedings of the International Conference on Asian Language Processing, 2023

IndiSocialFT: Multilingual Word Representation for Indian languages in code-mixed environment.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

An Improved PBFT-Based Consensus Protocol for Industrial IoT.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

2022
Reduplication in Assamese: Identification and Modeling.
ACM Trans. Asian Low Resour. Lang. Inf. Process., September, 2022

Distributed Gateway Selection for Video Streaming in VANET Using IP Multicast.
ACM Trans. Multim. Comput. Commun. Appl., 2022

Video streaming over IoV using IP multicast.
J. Netw. Comput. Appl., 2022

Hardware Trojan Mitigation for Securing On-chip Networks from Dead Flit Attacks.
Proceedings of the 30th IFIP/IEEE 30th International Conference on Very Large Scale Integration, 2022

AsNER - Annotated Dataset and Baseline for Assamese Named Entity recognition.
Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022

Generating Monolingual Dataset for Low Resource Language Bodo from old books using Google Keep.
Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022

Cost-effective Distributed Edge vehicle selection for Multi-tier Video streaming over Vehicular network.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

Securing On-chip Interconnect against Delay Trojan using Dynamic Adaptive Caging.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

AsPOS: Assamese Part of Speech Tagger using Deep Learning Approach.
Proceedings of the 19th IEEE/ACS International Conference on Computer Systems and Applications, 2022

2021
Blockchain-Based Adaptive Trust Management in Internet of Vehicles Using Smart Contract.
IEEE Trans. Intell. Transp. Syst., 2021

PGOpt: Multi-objective design space exploration framework for large-Scale on-chip power grid design in VLSI SoC using evolutionary computing technique.
Microprocess. Microsystems, 2021

An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network.
J. Netw. Comput. Appl., 2021

Performance analysis of lattice reduction-assisted precoder for multi-user millimeter wave MIMO system.
Int. J. Commun. Syst., 2021

Smart inter-operable vehicular communication using hybrid IEEE 802.11p, IEEE 802.16d/e technology.
Int. J. Commun. Syst., 2021

Blockchain Meets AI for Resilient and Intelligent Internet of Vehicles.
CoRR, 2021

Preventing COVID-19 Spread Using Information and Communication Technology.
IEEE Consumer Electron. Mag., 2021

HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments.
Ad Hoc Networks, 2021

DAISS: Design of an Attacker Identification Scheme in CoAP Request/Response Spoofing.
Proceedings of the IEEE Region 10 Conference, 2021

Packet header attack by hardware trojan in NoC based TCMP and its impact analysis.
Proceedings of the NOCS '21: International Symposium on Networks-on-Chip, 2021

Dead flit attack on NoC by hardware trojan and its impact analysis.
Proceedings of the NoCArc '21: Proceedings of the 14th International Workshop on Network on Chip Architectures, Virtual Event, Greece, October 18, 2021

Evaluating DASH QoE with MPTCP Under Different MPTCP Buffer Sizes and Path Latencies.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

ML for IEEE 802.15. 4e/TSCH: Energy Efficient Approach to Detect DDoS Attack Using Machine Learning.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Machine Learning for VLSI CAD: A Case Study in On-Chip Power Grid Design.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2021

Alternate Crop Prediction using Artificial Intelligence: A Case Study in Assam.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2021

LIENE: Lifetime Enhancement for 6LoWPAN Network Using Clustering Approach Use Case: Smart Agriculture.
Proceedings of the Innovations for Community Services - 21st International Conference, 2021

A Blockchain-based Approach for Optimal Energy Dispatch and Fault Reporting in P2P Microgrid.
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021

LPECN: Leveraging PIT placement and explicit marking for congestion control in NDN.
Proceedings of the ICN '21: 8th ACM Conference on Information-Centric Networking, Paris, France, September 22, 2021

Online Network Attack Detection using Statistical Features.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021

2020
PGRDP: Reliability, Delay, and Power-Aware Area Minimization of Large-Scale VLSI Power Grid Network Using Cooperative Coevolution.
Proceedings of the Intelligent Computing Paradigm: Recent Trends, 2020

MPFSLP: Masqueraded Probabilistic Flooding for Source-Location Privacy in VANETs.
IEEE Trans. Veh. Technol., 2020

Emotion Dynamics of Public Opinions on Twitter.
ACM Trans. Inf. Syst., 2020

Machine Learning Approach for Fast Electromigration Aware Aging Prediction in Incremental Design of Large Scale On-chip Power Grid Network.
ACM Trans. Design Autom. Electr. Syst., 2020

Aloe: Fault-Tolerant Network Management and Orchestration Framework for IoT Applications.
IEEE Trans. Netw. Serv. Manag., 2020

An empirical approach towards characterization of encrypted and unencrypted VoIP traffic.
Multim. Tools Appl., 2020

An efficient blockchain-based approach for cooperative decision making in swarm robotics.
Internet Technol. Lett., 2020

V-CARE: A Blockchain Based Framework for Secure Vehicle Health Record System.
CoRR, 2020

Quality of Service provisioning in Named Data Networking via PIT entry reservation and PIT replacement policy.
Comput. Commun., 2020

InOvIn: A fuzzy-rough approach for detecting overlapping communities with intrinsic structures in evolving networks.
Appl. Soft Comput., 2020

Amalgam: Distributed Network Control With Scalable Service Chaining.
Proceedings of the 2020 IFIP Networking Conference, 2020

DTLS based secure group communication scheme for Internet of Things.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

SCAN: Smart Collaborative Attack in Named Data Networking.
Proceedings of the 45th IEEE Conference on Local Computer Networks, 2020

Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Towards implementing fast and scalable Network Intrusion Detection System using Entropy based Discretization Technique.
Proceedings of the 11th International Conference on Computing, 2020

Designing a Blockchain Based Framework for IoT Data Trade.
Proceedings of the Innovations for Community Services, 2020

TA-ACS: A Trust Aware Adaptive Carrier Selection Scheme for Reliable Routing in Delay Tolerant Networks.
Proceedings of the Innovations for Community Services, 2020

SAS: Seasonality Aware Social-Based Forwarder Selection in Delay Tolerant Networks.
Proceedings of the Innovations for Community Services, 2020

ReFIT: Reliability Challenges and Failure Rate Mitigation Techniques for IoT Systems.
Proceedings of the Innovations for Community Services, 2020

BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network.
Proceedings of the Innovations for Community Services, 2020

Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network.
Proceedings of the Innovations for Community Services, 2020

PowerPlanningDL: Reliability-Aware Framework for On-Chip Power Grid Design using Deep Learning.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

ArsPAN: Attacker Revelation Scheme using Discrete Event System in 6LoWPAN based Buffer Reservation Attack.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city.
Veh. Commun., 2019

A tutorial survey on vehicular communication state of the art, and future research directions.
Veh. Commun., 2019

CPESP: Cooperative Pseudonym Exchange and Scheme Permutation to preserve location privacy in VANETs.
Veh. Commun., 2019

Analysis, Modeling and Optimization of Equal Segment Based Approximate Adders.
IEEE Trans. Computers, 2019

Discrete event system framework for fault diagnosis with measurement inconsistency: case study of rogue DHCP attack.
IEEE CAA J. Autom. Sinica, 2019

A class of key-node indexed hash chains based key predistribution (KPS): Signed weighted graphs.
Comput. Networks, 2019

CCAPS: Cooperative Context Aware Privacy Scheme for VANETs.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

A Blockchain-Based Approach for Usage Based Insurance and Incentive in ITS.
Proceedings of the TENCON 2019, 2019

Evaluating DASH Player QoE with MPTCP in Presence of a Shared Bottleneck Link.
Proceedings of the 30th IEEE Annual International Symposium on Personal, 2019

Aloe: An Elastic Auto-Scaled and Self-stabilized Orchestration Framework for IoT Applications.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Managing Smart Home Appliances with Proof of Authority and Blockchain.
Proceedings of the Innovations for Community Services - 19th International Conference, 2019

Smart Contract Based Decentralized Parking Management in ITS.
Proceedings of the Innovations for Community Services - 19th International Conference, 2019

Elliptic Curve Cryptography Based Mechanism for Secure Wi-Fi Connectivity.
Proceedings of the Distributed Computing and Internet Technology, 2019

JSpongeGen: A Pseudo Random Generator for Low Resource Devices.
Proceedings of the Distributed Computing and Internet Technology, 2019

EQPR: Enhancing QoS in Named Data Networking using Priority and RTT Driven PIT Replacement Policy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Machine Learning Based Approach to Detect Wormhole Attack in VANETs.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

Is QUIC Quicker Than TCP? - A Performance Evaluation.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019

Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss.
Proceedings of the Advanced Information Networking and Applications, 2019

LandLedger: Blockchain-powered Land Property Administration System.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

LORD: LOw Rate DDoS Attack Detection and Mitigation Using Lightweight Distributed Packet Inspection Agent in IoT Ecosystem.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Temporal link prediction in multi-relational network.
World Wide Web, 2018

Analysis and Design of Adders for Approximate Computing.
ACM Trans. Embed. Comput. Syst., 2018

Scalability of correlation clustering.
Pattern Anal. Appl., 2018

Exploiting reciprocity toward link prediction.
Knowl. Inf. Syst., 2018

MATEM: A unified framework based on trust and MCDM for assuring security, reliability and QoS in DTN routing.
J. Netw. Comput. Appl., 2018

An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks.
Int. J. Wirel. Inf. Networks, 2018

Accuracy enhancement of equal segment based approximate adders.
IET Comput. Digit. Tech., 2018

Improving MPTCP Performance by Enabling Sub-Flow Selection over a SDN Supported Network.
Proceedings of the 14th International Conference on Wireless and Mobile Computing, 2018

Impact of Security Attacks on Cooperative Driving Use Case: CACC Platooning.
Proceedings of the TENCON 2018, 2018

ML-Based Approach to Detect DDoS Attack in V2I Communication Under SDN Architecture.
Proceedings of the TENCON 2018, 2018

Leader Election in Cooperative Adaptive Cruise Control Based Platooning.
Proceedings of the 1st International Workshop on Communication and Computing in Connected Vehicles and Platooning, 2018

PGIREM: Reliability-Constrained IR Drop Minimization and Electromigration Assessment of VLSI Power Grid Networks Using Cooperative Coevolution.
Proceedings of the 2018 IEEE Computer Society Annual Symposium on VLSI, 2018

Machine Learning Based Approach to Detect Position Falsification Attack in VANETs.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

EvadePDF: Towards Evading Machine Learning Based PDF Malware Classifiers.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Misbehavior Detection in C-ITS Using Deep Learning Approach.
Proceedings of the Intelligent Systems Design and Applications, 2018

Fast and Secure Handoffs for V2I Communication in Smart City Wi-Fi Deployment.
Proceedings of the Distributed Computing and Internet Technology, 2018

Using Digital Tokens to Improve Amortized Performance of eSign.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Survey of Textbased Chatbot in Perspective of Recent Technologies.
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2018

CRT-KPS: A Key Predistribution Schemes Using CRT.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Blockchain based Security Framework for P2P Filesharing system.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

On the Security of Remote Key Less Entry for Vehicles.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
Intrusion detection system for PS-Poll DoS attack in 802.11 networks using real time discrete event system.
IEEE CAA J. Autom. Sinica, 2017

Markov Chain Model Using Lévy Flight for VLSI Power Grid Analysis.
Proceedings of the 30th International Conference on VLSI Design and 16th International Conference on Embedded Systems, 2017

Approxhash: delay, power and area optimized approximate hash functions for cryptography applications.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Primary Path Effect in Multi-Path TCP: How Serious Is It for Deployment Consideration?
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

FLIPPER: Fault-tolerant distributed network management and control.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

2016
Alleviating Hidden and Exposed Nodes in High-Throughput Wireless Mesh Networks.
IEEE Trans. Wirel. Commun., 2016

Deciding Handover Points Based on Context-Aware Load Balancing in a WiFi-WiMAX Heterogeneous Network Environment.
IEEE Trans. Veh. Technol., 2016

Energy efficient secure communication architecture for wireless sensor network.
Secur. Commun. Networks, 2016

Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization.
Int. J. Mach. Learn. Cybern., 2016

Impact of redundant sensor deployment over data gathering performance: A model based approach.
J. Netw. Comput. Appl., 2016

Influence of edge weight on node proximity based link prediction methods: An empirical analysis.
Neurocomputing, 2016

A Time Aware Method for Predicting Dull Nodes and Links in Evolving Networks for Data Cleaning.
Proceedings of the 2016 IEEE/WIC/ACM International Conference on Web Intelligence, 2016

Exploring Approximate Computing for Yield Improvement via Re-design of Adders for Error-Resilient Applications.
Proceedings of the 29th International Conference on VLSI Design and 15th International Conference on Embedded Systems, 2016

Incremental Approach for Detecting Arbitrary and Embedded Cluster Structures.
Proceedings of the Model and Data Engineering - 6th International Conference, 2016

Evaluating the Effectiveness of Soft K-Means in Detecting Overlapping Clusters.
ICTCS, 2016

Leveraging the trade-off between spatial reuse and channel contention in wireless mesh networks.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
Performance Modeling and Analysis of IEEE 802.11 IBSS PSM in Different Traffic Conditions.
IEEE Trans. Mob. Comput., 2015

MAC Layer Channel Access and Forwarding in a Directional Multi-Interface Mesh Network.
IEEE Trans. Mob. Comput., 2015

Distributed Service Level Flow Control and Fairness in Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2015

A new similarity measure using Bhattacharyya coefficient for collaborative filtering in sparse data.
Knowl. Based Syst., 2015

Effective data summarization for hierarchical clustering in large datasets.
Knowl. Inf. Syst., 2015

Dynamic Tree Switching for Distributed Message-Passing Applications.
J. Netw. Syst. Manag., 2015

Fault resilience in sensor networks: Distributed node-disjoint multi-path multi-sink forwarding.
J. Netw. Comput. Appl., 2015

Advanced Stealth Man-in-The-Middle Attack in WPA2 Encrypted Wi-Fi Networks.
IEEE Commun. Lett., 2015

Data rate, path length and network contention trade-off in IEEE 802.11s mesh networks: A dynamic data rate selection approach.
Comput. Networks, 2015

A High-Performance Energy-Efficient Hybrid Redundant MAC for Error-Resilient Applications.
Proceedings of the 28th International Conference on VLSI Design, 2015

Variability-aware parametric yield enhancement via post-silicon tuning of hybrid redundant MAC units.
Proceedings of the VLSI Design, Automation and Test, 2015

Detection of De-Authentication DoS Attacks in Wi-Fi Networks: A Machine Learning Approach.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

I<sup>2</sup>-diagnosability framework for detection of Advanced Stealth Man in the Middle attack in Wi-Fi networks.
Proceedings of the 23rd Mediterranean Conference on Control and Automation, 2015

Controlling Unfairness due to Physical Layer Capture and Channel Bonding in 802.11n+s Wireless Mesh Networks.
Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015

Adaptive path selection for high throughput Heterogeneous Wireless Mesh Networks.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2014
Vertical Handover Over Intermediate Switching Framework: Assuring Service Quality for Mobile Users.
Wirel. Pers. Commun., 2014

Context Aware Inter-BSS Handoff in IEEE 802.11 Networks: Efficient Resource Utilization and Performance Improvement.
Wirel. Pers. Commun., 2014

Selective greedy routing: exploring the path diversity in backbone mesh networks.
Wirel. Networks, 2014

Context Aware Handover Management: Sustaining QoS and QoE in a Public IEEE 802.11e Hotspot.
IEEE Trans. Netw. Serv. Manag., 2014

ADCROSS: Adaptive Data Collection from Road Surveilling Sensors.
IEEE Trans. Intell. Transp. Syst., 2014

Evaluating transport protocol performance over a wireless mesh backbone.
Perform. Evaluation, 2014

Probabilistic model checking of IEEE 802.11 IBSS power save mode.
Int. J. Wirel. Mob. Comput., 2014

Topology Management Ensuring Reliability in Delay Sensitive Sensor Networks with Arbitrary Node Failures.
Int. J. Wirel. Inf. Networks, 2014

Evaluation of the end-to-end TCP performance for vertical handover using intermediate switching network.
Int. J. Commun. Networks Distributed Syst., 2014

Tuple space enhancements for mobile middleware.
Int. J. Commun. Networks Distributed Syst., 2014

Performance modeling and evaluation of IEEE 802.11 IBSS power save mode.
Ad Hoc Networks, 2014

Exploiting Bhattacharyya Similarity Measure to Diminish User Cold-Start Problem in Sparse Data.
Proceedings of the Discovery Science - 17th International Conference, 2014

M-HRP for Wireless Mesh Networks and its performance evaluation.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

Evaluating the effect of path diversity over QoS and QoE in a high speed indoor mesh backbone.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

Defending concealedness in IEEE 802.11n.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

Scalability of Correlation Clustering Through Constraint Reduction.
Proceedings of the 1st IKDD Conference on Data Sciences, Delhi, India, March 21 - 23, 2014, 2014

Early detection of VoIP network flows based on sub-flow statistical characteristics of flows using machine learning techniques.
Proceedings of the 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2014

QoS associated path selection in wireless mesh networks.
Proceedings of the 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2014

2013
An architectural framework for seamless handoff between IEEE 802.11 and UMTS networks.
Wirel. Networks, 2013

IEEE 802.11s Mesh Backbone for Vehicular Communication: Fairness and Throughput.
IEEE Trans. Veh. Technol., 2013

Towards reducing false alarms in network intrusion detection systems with data summarization technique.
Secur. Commun. Networks, 2013

Steganalysis of Network Packet Length Based Data Hiding.
Circuits Syst. Signal Process., 2013

An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification.
CoRR, 2013

Proportional fairness in MAC layer channel access of IEEE 802.11s EDCA based wireless mesh networks.
Ad Hoc Networks, 2013

Convergecast tree management from arbitrary node failure in sensor network.
Ad Hoc Networks, 2013

Formal Modeling of Mobile Middleware for Tuple Space Coordination over Multiple Heterogeneous Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

Distance based Incremental Clustering for Mining Clusters of Arbitrary Shapes.
Proceedings of the Pattern Recognition and Machine Intelligence, 2013

Beyond conventional routing protocols: Opportunistic path selection for IEEE 802.11s mesh networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Exploring gradient in sensor deployment pattern for data gathering with sleep based energy saving.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

RelBAS: Reliable data gathering from border area sensors.
Proceedings of the 2013 IEEE Symposium on Computers and Communications, 2013

MCRD: Motion coherent region detection in H.264 compressed video.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo, 2013

POSTER: Distributed Lagrangean Clustering Protocol.
Proceedings of the Distributed Computing and Networking, 14th International Conference, 2013

Consistent Coordination Decoupling in Tuple Space Based Mobile Middleware: Design and Formal Specifications.
Proceedings of the Distributed Computing and Internet Technology, 2013

DisTree: A scheme for DHT.
Proceedings of the International Conference on Advances in Computing, 2013

Analysis of VBR coded VoIP for traffic classification.
Proceedings of the International Conference on Advances in Computing, 2013

CRP: Cluster head Re-election Protocol for heterogeneous wireless sensor networks.
Proceedings of the Fifth International Conference on Communication Systems and Networks, 2013

Energy-Efficient Data Gathering for Road-Side Sensor Networks Ensuring Reliability and Fault-Tolerance.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Link prediction on evolving social network using spectral analysis.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

Surpassing flow fairness in a mesh network: How to ensure equity among end users?
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2013

2012
Enhanced service differentiation using priority-based MAC protocol for MANETs.
Int. J. Commun. Networks Distributed Syst., 2012

Modeling an Enhanced Tuple Space Based Mobile Middleware in UNITY.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A HiperLAN/2 Based MAC Protocol for Efficient Vehicle-to-Infrastructure Communication Using Directional Wireless Mesh Backbone.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An Active Detection Mechanism for Detecting ICMP Based Attacks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Detection of NDP based attacks using MLD.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Obfuscated malware detection using API call dependency.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Detection of packed malware.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Performance analysis of IEEE 802.11 IBSS power save mode using a discrete-time markov model.
Proceedings of the ACM Symposium on Applied Computing, 2012

Security in Mobile agent systems with Locator mechanism.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

A novel crash-tolerant data gathering in wireless sensor networks.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Formalization of a Fully-Decoupled Reactive Tuple Space Model for Mobile Middleware.
Proceedings of the Mobile Wireless Middleware, Operating Systems, and Applications, 2012

Achieving fairness for multi-class traffic in directional multi-interface IEEE 802.11s MCCA.
Proceedings of the 18th IEEE International Conference on Networks, 2012

MAC layer fairness in IEEE 802.11 DCF based Wireless Mesh Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Performance optimization in single channel directional multi-interface IEEE 802.11s EDCA using beam prioritization.
Proceedings of IEEE International Conference on Communications, 2012

An Anomaly Based Approach for HID Attack Detection Using Keystroke Dynamics.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Supporting Tuple Space based Mobile Middleware over unreliable mobile infrastructures: Design and formal specifications.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

2011
Tolerance Rough Set Theory Based Data Summarization for Clustering Large Datasets.
Trans. Rough Sets, 2011

Network specific false alarm reduction in intrusion detection system.
Secur. Commun. Networks, 2011

A distance based clustering method for arbitrary shaped clusters in large datasets.
Pattern Recognit., 2011

Cross Layer Adaptation for QoS in WSN
CoRR, 2011

Context Awarw Mobile Initiated Handoff for Performance Improvement in IEEE 802.11 Networks
CoRR, 2011

Stage Staffing Scheme for Copyright Protection in Multimedia
CoRR, 2011

Zone Based Seamless Vertical Handoff Technique between WiFi and WiMax.
Proceedings of the Recent Trends in Wireless and Mobile Networks, 2011

Detecting Metamorphic Virus Using Hidden Markov Model and Genetic Algorithm.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

An active DES based IDS for ARP spoofing.
Proceedings of the IEEE International Conference on Systems, 2011

Detection of neighbor solicitation and advertisement spoofing in IPv6 neighbor discovery protocol.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

<i>NDoT</i>: Nearest Neighbor Distance Based Outlier Detection Technique.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

Neighborhood Based Clustering Method for Arbitrary Shaped Clusters.
Proceedings of the Foundations of Intelligent Systems - 19th International Symposium, 2011

An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks.
Proceedings of the Information Systems Security - 7th International Conference, 2011

A Tree-Based Local Repairing Approach for Increasing Lifetime of Query Driven WSN.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

Research and application of One-class small hypersphere support vector machine for network anomaly detection.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

Sequencegram: n-gram modeling of system calls for program based anomaly detection.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

A host based DES approach for detecting ARP spoofing.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

E-AODV for Wireless Mesh Networks and Its Performance Evaluation.
Proceedings of the 2011 International Conference on Broadband, 2011

Multi-density Clustering Algorithm for Anomaly Detection Using KDD'99 Dataset.
Proceedings of the Advances in Computing and Communications, 2011

Distributed smart camera network and mobile devices.
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011

TCP performance for WLAN-GPRS handover in an Intermediate Switching Network based framework.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2010
Route Stability Based QoS Routing in Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2010

Service differentiation using priority-based MAC protocol in MANETs.
Int. J. Internet Protoc. Technol., 2010

An Active Intrusion Detection System for LAN Specific Attacks.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Distance Based Fast Hierarchical Clustering Method for Large Datasets.
Proceedings of the Rough Sets and Current Trends in Computing, 2010

Peer-to-Peer Network Classification Using nu-Maximal Margin Spherical Structured Multiclass Support Vector Machine.
Proceedings of the Data Engineering and Management - Second International Conference, 2010

Seamless Handoff between IEEE 802.11 and GPRS Networks.
Proceedings of the Distributed Computing and Internet Technology, 2010

Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection.
Proceedings of the ARES 2010, 2010

2009
LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption.
Int. J. Netw. Secur., 2009

Fast Single-Link Clustering Method Based on Tolerance Rough Set Model.
Proceedings of the Rough Sets, 2009

A Zone Based Interleaved Scanning Technique for Fast Handoff in IEEE 802.11 Wireless Networks.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

QDMAC: An Energy Efficient Low Latency MAC Protocol for Query Based Wireless Sensor Networks.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009

2008
Secure user-identification and key distribution scheme preserving anonymity.
Int. J. Secur. Networks, 2008

Defense against outside attacks in wireless sensor networks.
Comput. Commun., 2008

A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks.
Proceedings of the Q2SWinet'08, 2008

Enhancing Route Recovery for QAODV Routing in Mobile Ad Hoc Networks.
Proceedings of the 9th International Symposium on Parallel Architectures, 2008

A dynamic balanced-energy sleep scheduling scheme in heterogeneous wireless sensor network.
Proceedings of the 16th International Conference on Networks, 2008

A Route Stability Based Multipath QoS Routing (SMQR) in MANETs.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

QoS Aware Stable path Routing (QASR) Protocol for MANETs.
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008

A Strict Priority Based QoS-Aware MAC Protocol for Mobile Ad Hoc Networks.
Proceedings of the Distributed Computing and Internet Technology, 2008

Modified Optimized Link State Routing (M-OLSR) for Wireless Mesh Networks.
Proceedings of the 2008 International Conference on Information Technology, 2008

2007
Sahnet: a secure system for ad-hoc networking using ecc.
Proceedings of the Q2SWinet'07, 2007

Improving MAC Layer Fairness in Multi-Hop 802.11 Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

Securing Wireless Sensor Networks Against Spurious Injections.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

OSASMAC: Opportunistic Secure Adaptive Sensor MAC Protocol.
Proceedings of the 10th International Conference on Information Technology, 2007

2006
Modeling the short-term unfairness of IEEE 802.11 in presence of hidden terminals.
Perform. Evaluation, 2006

Power Efficient and Low Latency MAC for Wireless Sensor Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

LLM: Low Latency MAC Protocol for Wireless Sensor Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

Distributed Location and Lifetime Biased Clustering for Large Scale Wireless Sensor Network.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

Efficient Remote User Authentication and Key Establishment for Multi-server Environment.
Proceedings of the Distributed Computing and Internet Technology, 2006

CARA: Cellular automata based remote-user authentication scheme.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

Modular approach for anomaly based NIDS.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

CARMA: Cellular Automata Based Remote Mutual Authentication Scheme.
Proceedings of the 9th International Conference in Information Technology, 2006

QoS Constrained Adaptive Routing Protocol For Mobile Adhoc Networks.
Proceedings of the 9th International Conference in Information Technology, 2006

2005
ECS: An enhanced carrier sensing mechanism for wireless ad hoc networks.
Comput. Commun., 2005

Improving the reliability of IEEE 802.11 broadcast scheme for multicasting in mobile ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Detecting ARP Spoofing: An Active Technique.
Proceedings of the Information Systems Security, First International Conference, 2005

Enhanced Network Traffic Anomaly Detector.
Proceedings of the Distributed Computing and Internet Technology, 2005

2004
An improvement to the reliability of IEEE 802.11 broadcast scheme for multicasting in mobile ad networks.
Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004

Improving MAC Performance in Wireless Ad Hoc Networks Using Enhanced Carrier Sensing (ECS).
Proceedings of the NETWORKING 2004, 2004

Achieving MAC fairness in wireless ad-hoc networks using adaptive transmission control.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Quality of Service Model and Signaling for Cellular IP Access Network.
Proceedings of the Broadband Satellite Comunication Systems and the Challenges of Mobility, 2004

2003
A Secure Location Service in Mobile Ad Hoc Networks.
Proceedings of the Mobile and Wireless Communications Networks, 2003

Gateway-based Multicast Protocol for Mobile Ad Hoc Networks.
Proceedings of the Mobile and Wireless Communications Networks, 2003

Study of IEEE 802.11 Fairness and its Interaction with Routing Mechanism.
Proceedings of the Mobile and Wireless Communications Networks, 2003

Utilizing Statistical Characteristics of N-grams for Intrusion Detection.
Proceedings of the 2nd International Conference on Cyberworlds (CW 2003), 2003

1999
A VLSI Architecture for Cellular Automata Based Reed-Solomon Decoder.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

A Parallel Algorithm to Construct Voronoi Diagram and Its VLSI Architecture.
Proceedings of the 1999 IEEE International Conference on Robotics and Automation, 1999

1998
A parallel skeletonization algorithm and its VLSI architecture.
Proceedings of the 5th International Conference On High Performance Computing, 1998

1997
Reply to Comments on "Theory and Application of Cellular Automata in Cryptography".
IEEE Trans. Computers, 1997

An efficient class of SEC-DED-AUED codes.
Proceedings of the 1997 International Symposium on Parallel Architectures, 1997

1996
Analysis of Periodic and Intermediate Boundary 90/150 Cellular Automata.
IEEE Trans. Computers, 1996

Programmable cellular automata based testbed for fault diagnosis in VLSI circuits.
Proceedings of the 9th International Conference on VLSI Design (VLSI Design 1996), 1996

Architecture of a VLSI Chip for Modeling Amino Acid Sequence in Proteins.
Proceedings of the 9th International Conference on VLSI Design (VLSI Design 1996), 1996

1995
Theory and applications of cellular automata for synthesis of easily testable combinational logic.
Proceedings of the 4th Asian Test Symposium (ATS '95), 1995

1994
Theory and Applications of Cellular Automata in Cryptography.
IEEE Trans. Computers, 1994

A CAD Tool for Design of On-Chip Store & Generate Scheme.
Proceedings of the Seventh International Conference on VLSI Design, 1994

1993
Delay Fault Test Generation with Cellular Automata.
Proceedings of the Sixth International Conference on VLSI Design, 1993


  Loading...