Yo Rahul

Orcid: 0000-0002-1722-8621

Affiliations:
  • City University London, School of Engineering and Mathematical Sciences, UK (2012-2016)
  • Loughborough University, School of Electronic, Electrical and Systems Engineering, London, UK (2011-2012)


According to our database1, Yo Rahul authored at least 59 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
FAST DATA: A Fair, Secure, and Trusted Decentralized IIoT Data Marketplace Enabled by Blockchain.
IEEE Internet Things J., February, 2023

FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users.
CoRR, 2023

Recursive Euclidean Distance Based Robust Aggregation Technique For Federated Learning.
CoRR, 2023

2022
Deep Learning for Encrypted Traffic Classification and Unknown Data Detection.
Sensors, 2022

A Survey: Security, Transparency, and Scalability Issues of NFT's and Its Marketplaces.
Sensors, 2022

Blockchain for Doping Control Applications in Sports: A Conceptual Approach.
Future Internet, 2022

CNN for User Activity Detection Using Encrypted In-App Mobile Data.
Future Internet, 2022

Deep Learning for Encrypted Traffic Classification and Unknown Data Detection.
CoRR, 2022

Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption.
CoRR, 2022

2021
Blockchain at the Edge: Performance of Resource-Constrained IoT Networks.
IEEE Trans. Parallel Distributed Syst., 2021

Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems.
IEEE Internet Things J., 2021

Role recommender-RBAC: Optimizing user-role assignments in RBAC.
Comput. Commun., 2021

A Joint Beamforming and Power-Splitter Optimization Technique for SWIPT in MISO-NOMA System.
IEEE Access, 2021

2020
A New Lightweight Symmetric Searchable Encryption Scheme for String Identification.
IEEE Trans. Cloud Comput., 2020

Scalar Product Lattice Computation for Efficient Privacy-preserving Systems.
CoRR, 2020

Trusted UAV Network Coverage Using Blockchain, Machine Learning, and Auction Mechanisms.
IEEE Access, 2020

In-App Activity Recognition from Wi-Fi Encrypted Traffic.
Proceedings of the Intelligent Computing, 2020

A Novel Speed Estimation Algorithm for Mobile UE's in 5G mmWave Networks.
Proceedings of the Intelligent Computing, 2020

2019
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data.
IEEE Trans. Emerg. Top. Comput., 2019

Privacy-Preserving iVector-Based Speaker Verification.
IEEE ACM Trans. Audio Speech Lang. Process., 2019

Blockchain-Based Distributive Auction for Relay-Assisted Secure Communications.
IEEE Access, 2019

IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing.
IEEE Access, 2019

Type and Leak Your Ethnicity on Smartphones.
Proceedings of the IEEE International Conference on Acoustics, 2019

On Energy Harvesting of Hybrid TDMA-NOMA Systems.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
CARE: Criticality-Aware Data Transmission in CPS-Based Healthcare Systems.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

2017
Robust MMSE Beamforming for Multiantenna Relay Networks.
IEEE Trans. Veh. Technol., 2017

Efficient Privacy-Preserving Facial Expression Classification.
IEEE Trans. Dependable Secur. Comput., 2017

Effective recognition of facial micro-expressions with video motion magnification.
Multim. Tools Appl., 2017

Preface.
Int. J. Found. Comput. Sci., 2017

PIndroid: A novel Android malware detection system using ensemble learning methods.
Comput. Secur., 2017

Android Application Collusion Demystified.
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

SmartARM: A smartphone-based group activity recognition and monitoring scheme for military applications.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Computers, 2016

Security and Privacy Challenges in Vehicular Cloud Computing.
Mob. Inf. Syst., 2016

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption - Full Version.
CoRR, 2016

Smart, secure and seamless access control scheme for mobile devices.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Base station beamforming technique using multiple signal-to-interference plus noise ratio balancing criteria.
IET Signal Process., 2015

Robust access control framework for mobile cloud computing network.
Comput. Commun., 2015

Hide-and-seek: Face recognition in private.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Assessing Data Breach Risk in Cloud Systems.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Privacy-Preserving Clinical Decision Support System Using Gaussian Kernel-Based Classification.
IEEE J. Biomed. Health Informatics, 2014

Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud.
IEEE Trans. Dependable Secur. Comput., 2014

Spontaneous expression classification in the encrypted domain.
CoRR, 2014

Analysing Security requirements in Cloud-based Service Level Agreements.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment.
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014

An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
MMSE-Based Beamforming Techniques for Relay Broadcast Channels.
IEEE Trans. Veh. Technol., 2013

Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis.
IEEE Trans. Affect. Comput., 2013

Minimum mean-square error transceiver optimisation for downlink multiuser multiple-input-multiple-output network with multiple linear transmit covariance constraints.
IET Signal Process., 2013

A mixed quality of service based linear transceiver design for a multiuser MIMO network with linear transmit covariance constraints.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

TRUMP: A Trusted Mobile Platform for Self-management of Chronic Illness in Rural Areas.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Low Complexity Multi-authority Attribute Based Encryption Scheme for Mobile Cloud Computing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

DIVA - Digital Identity in VANETs: A multi-authority framework for VANETs.
Proceedings of the 19th IEEE International Conference on Networks, 2013

E-mail address categorization based on semantics of surnames.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2013

2012
Suboptimal recursive optimisation framework for adaptive resource allocation in spectrum-sharing networks.
IET Signal Process., 2012

2011
A Mixed SINR-Balancing and SINR-Target-Constraints-Based Beamformer Design Technique for Spectrum-Sharing Networks.
IEEE Trans. Veh. Technol., 2011

An SINR Balancing Based Beamforming Technique for Cognitive Radio Networks with Mixed Quality of Service Requirements.
Proceedings of IEEE International Conference on Communications, 2011

A Rate Balancing Technique for MIMO-Cognitive Radio Network under a Mixed QoS Requirement.
Proceedings of the Global Communications Conference, 2011


  Loading...