Select Publications
Journal articles
2015, 'Sparse representation based acoustic rangefinders: From sensor platforms to mobile devices', IEEE Communications Magazine, 53, pp. 249 - 257, http://dx.doi.org/10.1109/MCOM.2015.7010542
,2014, 'TrustMeter: A Trust Assessment Scheme for Collaborative Privacy Mechanisms in Participatory Sensing Applications', ntelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2014 IEEE Ninth International Conference, pp. 1 - 6, http://dx.doi.org/10.1109/issnip.2014.6827614
,2014, 'A reputation framework for social participatory sensing systems', Mobile Networks and Applications, 19, pp. 88 - 100, http://dx.doi.org/10.1007/s11036-013-0455-x
,2014, 'On the need for a reputation system in mobile phone based sensing', Ad Hoc Networks, 12, pp. 130 - 149, http://dx.doi.org/10.1016/j.adhoc.2011.12.002
,2013, 'Performance analysis of geography-limited broadcasting in multihop wireless networks', Wireless Communications and Mobile Computing, 13, pp. 1406 - 1421, http://dx.doi.org/10.1002/wcm.1188
,2013, 'Erratum: Utilizing link characterization for improving the performance of aerial wireless sensor networks (IEEE Journal on Selected Areas in Communications)', IEEE Journal on Selected Areas in Communications, 31, pp. 1638, http://dx.doi.org/10.1109/JSAC.2013.08.erratum
,2013, 'Utilizing link characterization for improving the performance of aerial wireless sensor networks', IEEE Journal on Selected Areas in Communications, 31, pp. 1639 - 1649, http://dx.doi.org/10.1109/JSAC.2013.130825
,2013, 'Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)', IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 31, pp. 1638 - 1638, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000322396800025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
,2013, 'HUBCODE: Hub-based forwarding using network coding in delay tolerant networks', Wireless Communications and Mobile Computing, 13, pp. 828 - 846, http://dx.doi.org/10.1002/wcm.1143
,2013, 'IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications', Pervasive and Mobile Computing, 9, pp. 353 - 371, http://dx.doi.org/10.1016/j.pmcj.2013.01.003
,2012, 'On the characterisation of vehicular mobility in a large-scale public transport network', International Journal of Ad Hoc and Ubiquitous Computing, 11, pp. 68 - 81, http://dx.doi.org/10.1504/IJAHUC.2012.050269
,2011, 'A pragmatic approach to area coverage in hybrid wireless sensor networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.1002/wcm.913
,2011, 'A survey on privacy in mobile participatory sensing applications', Journal of Systems and Software, 84, pp. 1928 - 1946, http://dx.doi.org/10.1016/j.jss.2011.06.073
,2010, 'Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks', IEEE Transactions on Mobile Computing, 9, pp. 1332 - 1345, http://dx.doi.org/10.1109/TMC.2010.83
,2010, 'Safety Assurance and Rescue Communication Systems in High-Stress Environments - A Mining Case Study', IEEE Communications Magazine, 48, pp. 66 - 73, http://dx.doi.org/10.1109/MCOM.2010.5439078
,2009, 'Analysis of per-node traffic load in multi-hop wireless sensor networks', IEEE Transactions on Wireless Communications, 8, pp. 958 - 967
,2007, 'Cluster-based forwarding in delay tolerant Public Transport Networks', Proceedings - Conference on Local Computer Networks, LCN, pp. 625 - 632, http://dx.doi.org/10.1109/LCN.2007.44
,2007, 'Design, analysis, and implementation of a novel low complexity scheduler for joint resource allocation', IEEE Transactions on Parallel and Distributed Systems, 18, pp. 749 - 762, http://dx.doi.org/10.1109/TPDS.2007.1045
,2007, 'Design, analysis, and implementation of a novel multiple resource scheduler', IEEE Transactions on Computers, 56, pp. 1071 - 1086, http://dx.doi.org/10.1109/TC.2007.1062
,2006, 'QoS Driven Parallelization of Resources to Reduce File Download Delay', IEEE Transactions on Parallel and Distributed Systems, 17, pp. 1204 - 1215, http://dx.doi.org/10.1109/TPDS.2006.144
,2005, 'An evaluation of fair packet schedules using a novel measure of instantaneous fairness', Computer Communications, 28, pp. 1925 - 1937, http://dx.doi.org/10.1016/j.comcom.2005.04.002
,2005, 'The holes problem in wireless sensor networks', ACM Sigmobile Mobile Computing and Communications Review, 9, pp. 4 - 18, http://dx.doi.org/10.1145/1072989.1072992
,2004, 'On the Latency and Fairness Characteristics of Pre-order Deficit Round Robin', Computer Communications, 27, pp. 664 - 678, http://dx.doi.org/10.1016/j.comcom.2003.12.006
,2003, 'Prioritized Elastic Round Robin: An Efficient and Low-Latency Packet Scheduler with Improved Fairness', , http://dx.doi.org/10.21236/ada461973
,2003, 'Anchored Opportunity Queuing: A Low-Latency Scheduler for Fair Arbitration among Virtual Lanes', Journal of Parallel and Distributed Computing, 63, pp. 1288 - 1299, http://dx.doi.org/10.1016/j.jpdc.2003.08.002
,2002, 'Low-latency guaranteed-rate scheduling using Elastic Round Robin', Computer Communications, 25, pp. 1315 - 1322, http://dx.doi.org/10.1016/S0140-3664(02)00009-9
,2002, 'Fair and efficient packet scheduling using Elastic Round Robin', IEEE Transactions on Parallel and Distributed Systems, 13, pp. 324 - 336, http://dx.doi.org/10.1109/71.993210
,2000, 'Fair and efficient packet scheduling in wormhole networks', Proceedings of the International Parallel Processing Symposium, IPPS, pp. 623 - 631
,'On the need for a reputation system in mobile phone based sensing', Ad Hoc Networks, http://dx.doi.org/10.1016/j.adhoc.2011.12.002
,'Performance analysis of geography-limited broadcasting in multihop wireless networks', Wireless Communications and Mobile Computing, http://dx.doi.org/10.1002/wcm.1188
,Conference Papers
2024, 'Passive Identification of WiFi Devices At-Scale: A Data-Driven Approach', in 2024 IEEE 49th Conference on Local Computer Networks (LCN), IEEE, pp. 1 - 9, presented at 2024 IEEE 49th Conference on Local Computer Networks (LCN), 08 October 2024 - 10 October 2024, http://dx.doi.org/10.1109/lcn60385.2024.10639764
,2024, 'DEMO : Passive Identification of WiFi Devices in Real-Time', in SIGCOMM Posters and Demos 2024 - Proceedings of the 2024 SIGCOMM Poster and Demo Sessions, Part of: SIGCOMM 2024, pp. 92 - 94, http://dx.doi.org/10.1145/3672202.3673716
,2024, 'Demo: P4Xtnd: P4 Programmability on Resource Constrained Environments with Extended Network Functionalities', in SIGCOMM Posters and Demos 2024 - Proceedings of the 2024 SIGCOMM Poster and Demo Sessions, Part of: SIGCOMM 2024, pp. 104 - 106, http://dx.doi.org/10.1145/3672202.3673731
,2024, 'Poster: Zero Trust Driven Architecture for Blockchain-Based Access Control Delegation', in SIGCOMM Posters and Demos 2024 - Proceedings of the 2024 SIGCOMM Poster and Demo Sessions, Part of: SIGCOMM 2024, pp. 48 - 50, http://dx.doi.org/10.1145/3672202.3673737
,2024, 'Honeyfile Camouflage: Hiding Fake Files in Plain Sight', in ACM WDC 2024 - Proceedings of the 3rd ACM Workshop on Security Implications of Deepfakes and Cheapfakes, pp. 1 - 7, http://dx.doi.org/10.1145/3660354.3660355
,2024, 'Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler', in ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1463 - 1479, http://dx.doi.org/10.1145/3634737.3637639
,2024, 'Mitigating Distributed Backdoor Attack in Federated Learning Through Mode Connectivity', in ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1287 - 1298, http://dx.doi.org/10.1145/3634737.3637682
,2024, 'SoK: False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations', in ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1784 - 1800, http://dx.doi.org/10.1145/3634737.3644998
,2024, 'VLIA: Navigating Shadows with Proximity for Highly Accurate Visited Location Inference Attack against Federated Recommendation Models', in ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp. 1261 - 1271, http://dx.doi.org/10.1145/3634737.3657019
,2024, 'BRAIN 2024: Fifth Workshop on Blockchain theoRy and ApplicatIoNs - Welcome and Committees', in 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2024, pp. 12 - 13, http://dx.doi.org/10.1109/PerComWorkshops59983.2024.10502510
,2024, 'CredAct: Privacy-Preserving Activity Verification for Benefits Schemes in Self-Sovereign Identity', in 2024 IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2024, pp. 425 - 433, http://dx.doi.org/10.1109/ICBC59979.2024.10634429
,2024, 'CypherChain: A Privacy-Preserving Data Aggregation Framework for Blockchain-Based DR Programs', in 2024 IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2024, pp. 362 - 364, http://dx.doi.org/10.1109/ICBC59979.2024.10634420
,2024, 'Demo: P4 Based In-network ML with Federated Learning to Secure and Slice IoT Networks', in Proceedings - 2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2024, pp. 304 - 306, http://dx.doi.org/10.1109/WoWMoM60985.2024.00056
,2024, 'Discretization-Based Ensemble Model for Robust Learning in IoT', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 353 - 367, http://dx.doi.org/10.1007/978-3-031-63992-0_23
,2024, 'Domain Invariant Driving Behaviour Prediction Based on Autoencoder Anomaly Detection', in 2024 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2024, pp. 449 - 452, http://dx.doi.org/10.1109/PerComWorkshops59983.2024.10502834
,2024, 'Local Differential Privacy for Smart Meter Data Sharing with Energy Disaggregation', in Proceedings - 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2024, pp. 1 - 10, http://dx.doi.org/10.1109/DCOSS-IoT61029.2024.00012
,2024, 'Multi-MedChain: Multi-Party Multi-Blockchain Medical Supply Chain Management System', in Proceedings - 2024 IEEE Annual Congress on Artificial Intelligence of Things, AIoT 2024, pp. 153 - 159, http://dx.doi.org/10.1109/AIoT63253.2024.00038
,2024, 'Poster: Towards Privacy-Preserving Federated Recommendation via Synthetic Interactions', in Proceedings - 45th IEEE Symposium on Security and Privacy Workshops, SPW 2024, pp. 297, http://dx.doi.org/10.1109/SPW63631.2024.00037
,2024, 'ProfitMax: Optimizing Blockchain Mining for Energy Efficiency and Profitability', in Proceedings - 2024 IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2024, pp. 25 - 30, http://dx.doi.org/10.1109/DAPPS61106.2024.00011
,2024, 'SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition', in Proceedings - 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2024, pp. 229 - 233, http://dx.doi.org/10.1109/DCOSS-IoT61029.2024.00041
,