Select Publications

Journal articles

Jha SK; Hassan M, 2002, 'Building Agent for Rule Based Intrusion Detection System', Computer Communications, pp. 1366 - 1373

Jha SK, 2002, 'G-QoSM: Grid Service Discovery Using QoS Properties', Computing and Informatics, pp. 363 - 382

Conference Papers

Deldari S; Goudarzi M; Joshi A; Shaghaghi A; Finn S; Salim FD; Jha S, 2024, 'AuditNet: A Conversational AI-based Security Assistant', in MobileHCI 2024 Adjunct Proceedings - Publication of the 26th International Conference on Mobile Human-Computer Interaction, http://dx.doi.org/10.1145/3640471.3680444

Sharma A; Mishra D; Jha S; Seneviratne A, 2024, 'An Investigation into the Non-Uniformity of Channel State Information in WiFi Sensing Systems', in IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024, http://dx.doi.org/10.1109/INFOCOMWKSHPS61880.2024.10620749

Malik M; Jiang J; Song Y; Jha S, 2024, 'MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 345 - 353, http://dx.doi.org/10.1007/978-3-031-56063-7_26

Perera Y; Batista G; Hu W; Kanhere S; Jha S, 2024, 'SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition', in Proceedings - 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things, DCOSS-IoT 2024, pp. 229 - 233, http://dx.doi.org/10.1109/DCOSS-IoT61029.2024.00041

Musleh AS; Ahmed J; Ahmed N; Xu H; Chen G; Hu J; Jha S, 2023, 'Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems', in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, http://dx.doi.org/10.1109/SmartGridComm57358.2023.10333908

Wang W; Song Y; Jha S, 2023, 'Generalizable Zero-Shot Speaker Adaptive Speech Synthesis with Disentangled Representations', in Proceedings of the Annual Conference of the International Speech Communication Association, INTERSPEECH, pp. 4454 - 4458, http://dx.doi.org/10.21437/Interspeech.2023-368

Zaman Z; Xue W; Gauravaram P; Hu W; Jha S, 2022, 'BloomXNOR-Net: Privacy-Preserving Machine Learning in IoT', in S3 2022 - Proceedings of the 13th ACM Workshop on Wireless of the Students, by the Students, and for the Students Workshop, Part of MobiCom 2022, pp. 1 - 3, http://dx.doi.org/10.1145/3556563.3558534

Xu W; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W; Misra P, 2022, 'A Novel Emergency Light Based Smart Building Solution: Design, Implementation, and Use Cases', in Proceedings - 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2022, pp. 577 - 585, http://dx.doi.org/10.1109/MASS56207.2022.00086

Wang W; Song Y; Jha S, 2022, 'AUTOLV: AUTOMATIC LECTURE VIDEO GENERATOR', in Proceedings - International Conference on Image Processing, ICIP, pp. 1086 - 1090, http://dx.doi.org/10.1109/ICIP46576.2022.9897436

Perera Y; Ahmed N; Kanhere S; Hu W; Jha S, 2022, 'IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?', in IEEE International Conference on Communications, pp. 2954 - 2959, http://dx.doi.org/10.1109/ICC45855.2022.9839269

Sharma A; Jiang W; Mishra D; Jha S; Seneviratne A, 2022, 'Optimised CNN for Human Counting Using Spectrograms of Probabilistic WiFi CSI', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 2806 - 2811, http://dx.doi.org/10.1109/GLOBECOM48099.2022.10001169

Gao J; Xu W; Kanhere S; Jha S; Kim JY; Huang W; Hu W, 2021, 'A Novel Model-Based Security Scheme for LoRa Key Generation', in Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021), ACM, pp. 47 - 61, presented at IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, http://dx.doi.org/10.1145/3412382.3458256

Ahmed N; Michelin RA; Xue W; Putra GD; Song W; Ruj S; Kanhere SS; Jha S, 2021, 'Towards privacy-preserving digital contact tracing', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461052

Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2021, 'Health access broker: Secure, patient-controlled management of personal health records in the cloud', in Advances in Intelligent Systems and Computing, Springer Nature, pp. 111 - 121, http://dx.doi.org/10.1007/978-3-030-57805-3_11

Liu J; Gao J; Jha S; Hu W, 2021, 'Seirios: Leveraging multiple channels for LoRaWAN indoor and outdoor localization', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 656 - 669, http://dx.doi.org/10.1145/3447993.3483256

Xu W; Kim JY; Huang W; Kanhere S; Jha S; Hu W, 2020, 'EMIoT: A LoRa-enabled Smart Building Solution Based on Emergency Lights', in BuildSys 2020 - Proceedings of the 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, pp. 330 - 331, http://dx.doi.org/10.1145/3408308.3431129

Purwanto R; Pal A; Blair A; Jha S, 2020, 'PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites', in 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), IEEE, ELECTR NETWORK, presented at IEEE Conference on Communications and Network Security (CNS), ELECTR NETWORK, 28 June 2020 - 01 July 2020, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000612838300017&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Purwanto R; Paly A; Blair A; Jha S, 2020, 'PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites', in 2020 IEEE Conference on Communications and Network Security, CNS 2020, http://dx.doi.org/10.1109/CNS48642.2020.9162211

Michelin RA; Ahmed N; Kanhere SS; Seneviratne A; Jha S, 2020, 'Leveraging lightweight blockchain to establish data integrity for surveillance cameras', in 2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC), IEEE, ELECTR NETWORK, presented at IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC), ELECTR NETWORK, 02 May 2020 - 06 May 2020, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000848725400035&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Xue W; Hu W; Gauranvaram P; Seneviratne A; Jha S, 2020, 'An Efficient Privacy-preserving IoT System for Face Recognition', in Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, Institute of Electrical and Electronics Engineers (IEEE), pp. 7 - 11, presented at 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), 21 April 2020 - 21 April 2020, http://dx.doi.org/10.1109/ETSecIoT50046.2020.00006

Jha S; Zhou J; Michelin R; Ahmed N; Shaghaghi A, 2020, 'Massage from the chairs', in Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, pp. VI, http://dx.doi.org/10.1109/ETSecIoT50046.2020.00011

Gao J; Xu W; Kanhere S; Jha S; Hu W, 2020, 'Poster abstract: A novel modeling involved security approach for lora key generation', in Proceedings - 2020 19th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2020, pp. 327 - 328, http://dx.doi.org/10.1109/IPSN48710.2020.00-23

Liu J; Xu W; Jha S; Hu W, 2020, 'Nephalai: Towards LPWAN C-RAN with physical layer compression', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, Association for Computing Machinery (ACM), pp. 476 - 487, presented at Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, http://dx.doi.org/10.1145/3372224.3419193

Revadigar G; Javali C; Jha S, 2020, 'ProxiCar: Proximity-Based Secure Digital Key Solution for Cars', in 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020, pp. 282 - 289, http://dx.doi.org/10.1109/COMSNETS48256.2020.9027327

Ma S; Feng R; Li J; Liu Y; Nepal S; Ostry D; Bertino E; Deng RH; Ma Z; Jha S, 2019, 'An empirical study of SMS one-time password authentication in android apps', in ACM International Conference Proceeding Series, pp. 339 - 354, http://dx.doi.org/10.1145/3359789.3359828

Maroof U; Shaghaghi A; Jha S, 2019, 'PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices', in IoT S and P 2019 - Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, Association for Computing Machinery (ACM), ENGLAND, London, pp. 50 - 56, presented at Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, ENGLAND, London, 15 November 2019, http://dx.doi.org/10.1145/3338507.3358619

Ma S; Bertino E; Nepal S; Li J; Ostry D; Deng RH; Jha S, 2019, 'Finding Flaws from Password Authentication Code in Android Apps', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg, pp. 619 - 637, presented at European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23 September 2019, http://dx.doi.org/10.1007/978-3-030-29959-0_30

Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, 'Gwardar: Towards protecting a software-defined network from malicious network operating systems', in NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications, IEEE, Cambridge, MA, USA, presented at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Cambridge, MA, USA, 01 November 2018 - 03 November 2018, http://dx.doi.org/10.1109/NCA.2018.8548074

Xu W; Jha S; Hu W, 2018, 'Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN', in Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pp. 231 - 236, http://dx.doi.org/10.1109/TrustCom/BigDataSE.2018.00044

Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, 'Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations', in Proceedings - Conference on Local Computer Networks, LCN, pp. 553 - 561, http://dx.doi.org/10.1109/LCN.2018.8638245

Oham C; Jurdak R; Kanhere SS; Dorri A; Jha S, 2018, 'B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication', in Proceedings - IEEE 2018 International Congress on Cybermatics: 2018 IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018, pp. 1171 - 1180, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00210

Tan H; Ostry D; Jha S, 2018, 'Exploiting multiple side channels for secret key agreement in wireless networks', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3154273.3154337

Jahan M; Seneviratne S; Chu B; Seneviratne A; Jha S, 2017, 'Privacy preserving data access scheme for IoT devices', in 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171357

Abaid Z; Kaafar MA; Jha S, 2017, 'Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers', in 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171381

Kim JY; Holz R; Hu W; Jha S, 2017, 'Automated analysis of secure internet of things protocols', in ACM International Conference Proceeding Series, Orlando, FL, USA, pp. 238 - 249, presented at ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 04 December 2017 - 08 December 2017, http://dx.doi.org/10.1145/3134600.3134624

Jahan M; Seneviratne S; Chu B; Seneviratne A; Jha S, 2017, 'Privacy Preserving Data Access Scheme for IoT Devices', in Gkoulalasdivanis A; Correia MP; Avresky DR (eds.), 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), IEEE, Cambridge, MA, pp. 217 - 226, presented at IEEE 16th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, 30 October 2017 - 01 November 2017, http://dx.doi.org/10.1109/NCA.2017.8171357

Abaid Z; Kaafar MA; Jha S, 2017, 'Quantifying the Impact of Adversarial Evasion Attacks on Machine Learning Based Android Malware Classifiers', in Gkoulalasdivanis A; Correia MP; Avresky DR (eds.), 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), IEEE, MA, Cambridge, pp. 375 - 384, presented at IEEE 16th International Symposium on Network Computing and Applications (NCA), MA, Cambridge, 30 October 2017 - 01 November 2017, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000426971900057&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Tan H; Tsudik G; Jha S, 2017, 'MTRA: Multiple-tier remote attestation in IoT networks', in 2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, pp. 1 - 9, presented at 2017 IEEE Conference, Las Vegas, NV, USA, 09 October 2017 - 11 October 2017, http://dx.doi.org/10.1109/CNS.2017.8228638

Jahan M; Seneviratne A; Jha S, 2017, 'Access Mechanism for Outsourced Data by Preserving Data Owner's Preference', in Proceedings - Conference on Local Computer Networks, LCN, Institute of Electrical and Electronics Engineers (IEEE), Singapore, Singapore, pp. 611 - 614, presented at 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, Singapore, 09 October 2017 - 12 October 2017, http://dx.doi.org/10.1109/LCN.2017.55

Jahan M; Roy PS; Sakurai K; Seneviratne A; Jha S, 2017, 'Secure and light weight fine-grained access mechanism for outsourced data', in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, Institute of Electrical and Electronics Engineers (IEEE), Sydney, NSW, Australia, pp. 201 - 209, presented at 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 01 August 2017 - 04 August 2017, http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.238

Kim JY; Hu W; Sarkar D; Jha S, 2017, 'ESIoT: Enabling secure management of the internet of things', in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, Massachusetts, pp. 219 - 229, presented at 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, Massachusetts, 18 July 2017 - 20 July 2017, http://dx.doi.org/10.1145/3098243.3098252

Abaid Z; Kaafar MA; Jha S, 2017, 'Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study', in 2017 IFIP Networking Conference, IFIP Networking 2017 and Workshops, pp. 1 - 9, http://dx.doi.org/10.23919/IFIPNetworking.2017.8264866

Shaghaghi A; Kaafar MA; Scott-Hayward S; Kanhere SS; Jha S, 2017, 'Towards Policy Enforcement Point as a Service (PEPS)', in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2016, pp. 50 - 55, http://dx.doi.org/10.1109/NFV-SDN.2016.7919475

Shaghaghi A; Kaafar MA; Jha S, 2017, 'WedgeTail: An intrusion prevention system for the data plane of software defined networks', in ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, pp. 849 - 861, presented at 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 02 April 2017 - 06 April 2017, http://dx.doi.org/10.1145/3052973.3053039

Javali C; Revadigar G; Rasmussen KB; Hu W; Jha S, 2016, 'I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol', in Proceedings - Conference on Local Computer Networks, LCN, pp. 477 - 485, http://dx.doi.org/10.1109/LCN.2016.126

Abaid Z; Sarkar D; Kaafar MA; Jha S, 2016, 'The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks', in Proceedings - Conference on Local Computer Networks, LCN, pp. 61 - 68, http://dx.doi.org/10.1109/LCN.2016.17

Siddiqi M; Sivaraman V; Jha S, 2016, 'Timestamp Integrity in Wearable Healthcare Devices', in 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2016, IEEE, Bangalore, India, presented at 10th IEEE International Conference on Advanced Networks and Telecommunications Systems, Bangalore, India, 06 November 2016 - 09 November 2016, http://dx.doi.org/10.1109/ANTS.2016.7947783

Rezvani M; Ignjatovic A; Pagnucco M; Jha S, 2016, 'Anomaly-free policy composition in software-defined networks', in 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016, vienna, pp. 28 - 36, presented at 2016 IFIP Networking Conference, vienna, 17 May 2016 - 19 May 2016, http://dx.doi.org/10.1109/IFIPNetworking.2016.7497226


Back to profile page