Vaibhav Garg

Orcid: 0000-0002-1796-0177

According to our database1, Vaibhav Garg authored at least 53 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Hardware Root-of-Trust implementations in Trusted Execution Environments.
IACR Cryptol. ePrint Arch., 2023

PACO: Provocation Involving Action, Culture, and Oppression.
CoRR, 2023

iRogue: Identifying Rogue Behavior from App Reviews.
CoRR, 2023

Extracting Incidents, Effects, and Requested Advice from MeToo Posts.
CoRR, 2023

Models of Applied Privacy (MAP): A Persona Based Approach to Threat Modeling.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
Deep Reinforcement Learning-Based Traffic Light Scheduling Framework for SDN-Enabled Smart Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

A Standardized Design for Sifting in Quantum Key Distribution Software.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

Pixie: Preference in Implicit and Explicit Comparisons.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), 2022

2021
Order Estimation via Matrix Completion for Multi-Switch Antenna Selection.
IEEE Signal Process. Lett., 2021

DOA estimation via shift-invariant matrix completion.
Signal Process., 2021

Decadal Urban Land Use/Land Cover Changes and Its Impact on Surface Runoff Potential for the Dhaka City and Surroundings Using Remote Sensing.
Remote. Sens., 2021

CARAF: Crypto Agility Risk Assessment Framework.
J. Cybersecur., 2021

Reappraising Domain Generalization in Neural Networks.
CoRR, 2021

Sparse Subspace Averaging for Order Estimation.
Proceedings of the IEEE Statistical Signal Processing Workshop, 2021

A Modular Quantum Key Distribution Software Stack for Rapid Experimental Prototyping.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2021

Congestion Control utilizing Software Defined Control Architecture at the Traffic Light Intersection.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

A Lemon by Any Other Label.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

2020
Design of DQPSK Demodulator for Implantable Biomedical Devices.
J. Circuits Syst. Comput., 2020

Source Enumeration via Toeplitz Matrix Completion.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Subspace Averaging and Order Determination for Source Enumeration.
IEEE Trans. Signal Process., 2019

Source Enumeration in Non-White Noise and Small Sample Size via Subspace Averaging.
Proceedings of the 27th European Signal Processing Conference, 2019

Smart Assistive Navigation Devices for Visually Impaired People.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2015
Why cybercrime?
SIGCAS Comput. Soc., 2015

Learning how to learn with Prof. Barbara Oakley.
SIGCAS Comput. Soc., 2015

Performance evaluation of wireless ad-hoc network for post-disaster recovery using Linux Live USB nodes.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Computer-Supported Cooperative Crime.
Proceedings of the Financial Cryptography and Data Security, 2015

Spare the rod, spoil the network security? Economic analysis of sanctions online.
Proceedings of the 2015 APWG Symposium on Electronic Crime Research, 2015

2014
Facilitative and rememberative: novel incentive structures for increased exercise in interactive media.
SIGCAS Comput. Soc., 2014

Privacy concerns in assisted living technologies.
Ann. des Télécommunications, 2014

2013
Heuristics and Biases: Implications for Security Design.
IEEE Technol. Soc. Mag., 2013

Cross-country analysis of spambots.
EURASIP J. Inf. Secur., 2013

Evaluation of reservoir sedimentation using data driven techniques.
Appl. Soft Comput., 2013

Craigslist Scams and Community Composition: Investigating Online Fraud Victimization.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Studying the effectiveness of android application permissions requests.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Macroeconomic Analysis of Malware.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Cars, Condoms, and Facebook.
Proceedings of the Information Security, 16th International Conference, 2013

Peer-produced privacy protection.
Proceedings of the Social Implications of Wearable Computing and Augmediated Reality in Everyday Life: 2013 IEEE International Symposium on Technology and Society, 2013

Honor among thieves: A common's analysis of cybercrime economies.
Proceedings of the 2013 APWG eCrime Researchers Summit, 2013

Analysis of Ecrime in Crowd-Sourced Labor Markets: Mechanical Turk vs. Freelancer.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Spiking Neuron Computation With the Time Machine.
IEEE Trans. Biomed. Circuits Syst., 2012

Gandhigiri in cyberspace: a novel approach to information ethics.
SIGCAS Comput. Soc., 2012

Analysis of eCrime in Crowd-sourced Labor Markets: Mechanical Turk vs. Freelancer.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Risk Communication Design: Video vs. Text.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Pools, clubs and security: designing for a party not a person.
Proceedings of the New Security Paradigms Workshop, 2012

End User Perception of Online Risk under Uncertainty.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Targeted risk communication for computer security.
Proceedings of the 16th International Conference on Intelligent User Interfaces, 2011

The time machine: A novel spike-based computation architecture.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

The smuggling theory approach to organized digital crime.
Proceedings of the 2011 eCrime Researchers Summit, 2011

2009
Time-mode circuits for analog computation.
Int. J. Circuit Theory Appl., 2009

Low Power Integrate and Fire Circuit for Data Conversion.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2009), 2009

2008
Real time signal reconstruction from spikes on a digital signal processor.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

2007
Analysis and Enhancement of Two Key Agreement Protocols for Wireless Networks.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2006
An asynchronous delta-sigma converter implementation.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006


  Loading...