Select Publications

Conference Papers

Hassan J; Jha SK, 2003, 'A Cell-based distributed Location Management Protocol for Cell-Hopping Networks', in IEEE ICT 2003, Papeete, French Ploynesia, presented at IEEE ICT 2003, Papeete, French Ploynesia, 24 February 2003 - 01 March 2003

Sabrina F; Jha SK, 2003, 'A Novel Architecture for Resource Management in Active Networks Using a Directory Service', in IEEE ICT 2003, Papeete, French Ploynesia, presented at IEEE ICT 2003, Papeete, French Ploynesia, 24 February 2003 - 01 March 2003

Yuen EW; Lo S; Jha SK, 2003, 'Clack: An active network platform', in IEEE ICT 2003, Papeete, French Ploynesia, presented at IEEE ICT 2003, Papeete, French Ploynesia, 24 February 2003 - 01 March 2003

Liu BH; Jha SK; Ray PK, 2003, 'Mapping Distributed Application SLA to Network QoS Parameters', in IEEE ICT 2003, Papeete, French Ploynesia, presented at IEEE ICT 2003, Papeete, French Ploynesia, 24 February 2003 - 01 March 2003

Sabrina F; Jha S, 2003, 'Fair queuing inactive and programmable networks', in Wysocki TA; Dadej A; Wysocki BJ (eds.), ADVANCED WIRED AND WIRELESS NETWORKS, SPRINGER, AUSTRALIA, Coolangatta, pp. 249 - 266, presented at 2nd Workshop on the Internet, Telecommunications and Signal Processing, AUSTRALIA, Coolangatta, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000225783800013&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1

Jha SK, 2002, 'Bandwidth broker and per domain behaviour', in WITSP 2002, Wollongong, NSW, presented at 1st Workshop on the Internet, telecommunications and Signal Prcoessing (WITSP 2004), Wollongong, NSW, 09 December 2002 - 11 December 2002

Lee KS; Jha SK; Lau CW, 2002, 'Design and Experimental Evaluation of Mobile Wireless Control Load Protocol', in Workshop of Wireless Local Networks, Tampa, Florida, USA, presented at Workshop of Wireless Local Networks, Tampa, Florida, USA, 06 November 2002 - 08 November 2002

Hassan M; Jha SK, 2002, 'Design and Performance Evaluation of a Rate Feedback Control Architecture in TCP/IP Networks', in 21st IEEE International Performance Computing and Communications Conference (IPCCC) 2002, Phoenix, Arizona, presented at 21st IEEE International Performance Computing and Communications Conference (IPCCC) 2002, Phoenix, Arizona, 03 April 2002 - 05 April 2002

Hassan M; Jha SK, 2001, 'Implementing Bandwidth Broker using COPS-PR in Java', in IEEE Local Computer Network Conference (LCN2001), Tampa, Florida, USA, presented at IEEE Local Computer Network Conference (LCN2001), Tampa, Florida, USA, 14 November 2001 - 15 November 2001

Lau CW; Jha SK; Hassan M, 2001, 'Current Directions in Active Programmable Networks', in 9th IEEE International Conference on Networks, Bangkok, Thailand, presented at 9th IEEE International Conference on Networks, Bangkok, Thailand, 10 October 2001 - 12 October 2001

Chalmers MA; Jha SK; Hassan M, 2001, 'Internet Charging - Behind the Time', in 9th IEEE International Conference on Networks, Bangkok, Thailand, presented at 9th IEEE International Conference on Networks, Bangkok, Thailand, 10 October 2001 - 12 October 2001

Jha SK; Hassan M; Rosenbaum F, 2001, 'Experimenting with flow and service seperation using open MPLS test bed', in Quality of Service over Next-Generation Data Networks (part of ITCom, Denver, Colorado, presented at Quality of Service over Next-Generation Data Networks (part of ITCom, Denver, Colorado, 19 August 2001

Jha SK; Sabrina F; Hassan M; Samuels B, 2001, 'An Analysis of Web Server Performance With an Accelerator', in IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001

Hassan J; Jha SK, 2001, 'Cell-Hopping: A New Model for Wireless Communications', in IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001

Hassan M; Wu JJ; Jha SK; Breen J, 2001, 'GPS Based Infrastructure for Internet Performance Measurement', in IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001

Jha S; Fry M, 1996, 'Continuous media playback and jitter control', in International Conference on Multimedia Computing and Systems -Proceedings, pp. 245 - 251

Jha SK; Howarth BR, 1994, 'Capacity planning of LAN using network management', in Conference on Local Computer Networks, pp. 425 - 430

Pathirana PN; Savkin AV; Jha S, 'Robust extended Kalman filter applied to location tracking and trajectory prediction for PCS networks', in Proceedings of the 2004 IEEE International Conference on Control Applications, 2004., IEEE, pp. 63 - 68, presented at Proceedings of the 2004 IEEE International Conference on Control Applications, http://dx.doi.org/10.1109/cca.2004.1387188

Conference Posters

Kim JY; Hu WEN; Shafagh H; Kaafar MOHAMEDALI; Jha SANJAY, 2015, 'Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things', Seoul Korea, presented at ACM Conference on Embedded Networked Sensor Systems, Seoul Korea, 01 November 2015 - 04 November 2015, http://dx.doi.org/10.1145/2809695.2817896

Li K; Yuen C; Jha S, 2015, 'Poster abstract: Fair scheduling for energy harvesting WSN in smart city', pp. 419 - 420, http://dx.doi.org/10.1145/2809695.2817893

Javali C; Revadigar G; Hu W; Jha S, 2015, 'Poster: Were you in the cafe yesterday? Location proof generation & verification for mobile users', pp. 429 - 430, http://dx.doi.org/10.1145/2809695.2817898

Rezvani M; Ignjatovic A; Jha SK, (ed.), 2013, 'Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency', Cambridge, Massachusetts, USA, presented at The IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2013), Cambridge, Massachusetts, USA, 21 May 2013 - 23 May 2013

Li K; Ahmed N; Kanhere S; Jha S, (eds.), 2012, 'Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna', Clearwater, Florida, pp. 156 - 159, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6423595

Conference Presentations

Biswas J; Liu R; Wei N; Collings IB; Jha SK, 2013, 'Joint Channel and Delay Aware User Scheduling for Multiuser MIMO system over LTE-A Network', presented at IEEE International Symposium on Quality of Service(IWQoS) 2013, Montreal, canada, 03 June 2013 - 04 June 2013

Conference Abstracts

Javali C; Revadigar G; Pletea D; Jha S, 2016, 'Demo abstract: Location fingerprint evidence and authorisation using WiFi channel characteristics', in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, http://dx.doi.org/10.1109/PERCOMW.2016.7457077

Siddiqi M; Hager G; Sivaraman V; Jha S, 2015, 'Securing the Timestamping of Sensor Data from Wearable Healthcare Devices', ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Sydney, Australia, pp. 310 - 310, presented at BodyNets '15 Proceedings of the 10th EAI International Conference on Body Area Networks, Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261552

Shaghaghi A; Hong J; Jha S, 2014, 'An SDN-based framework for detection of illegal rebroadcasting of channels in P2PTV', in VideoNEXT 2014 - Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming, pp. 47 - 49, http://dx.doi.org/10.1145/2676652.2683465

Abaidy Z; Rezvani M; Jha S, 2014, 'MalwareMonitor: An SDN-based framework for securing large networks', in CoNEXT Student Workshop 2014 - Proceedings of the 2014 Workshop, pp. 40 - 42, http://dx.doi.org/10.1145/2680821.2680829

Jha SK, (ed.), 2004, 'The REKF Localization System: Node Localization Using Mobile Robots', in International Conference on Embedded Systems, Baltimore, Maryland, USA, pp. 321 - 321, presented at International Conference on Embedded Systems, Baltimore, Maryland, USA, 03 November 2004 - 05 November 2004

Reports

Bennett Moses L; Gauravaram P; Heiser G; Jha S; Lloyd-Jones S; Manwaring K; Ruj S, 2024, Submission to Department of Home Affairs on the Consultation Paper 2023-2030 Australian Cyber Security Strategy: Legislative Reforms, http://dx.doi.org/10.26190/unsworks/28745

Bennett Moses L; Jha S, 2023, Submission on inquiry into the capability of law enforcement to respond to cybercrime, http://dx.doi.org/10.26190/unsworks/28700

Bennett Moses L; Feng R; Jha S; Liu V; Lloyd-Jones S, 2023, Vulnerability Disclosure Consultation Paper response, http://dx.doi.org/10.26190/unsworks/28705

Working Papers

Karunanayake I; Ahmed N; Malaney R; Islam R; Jha S, 2020, De-anonymisation attacks on Tor: A Survey [v3], http://dx.doi.org10.48550/arXiv.2009.13018

Michelin RA; Ahmed N; Kanhere SS; Seneviratne A; Jha S, 2020, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, Institute of Electrical and Electronics Engineers (IEEE), http://dx.doi.org10.1109/ICBC48266.2020.9169429

Karunanayake I; Ahmed N; Malaney RA; Islam R; Jha SK, 2020, Anonymity with Tor: A Survey on Tor Attacks [v1, v2], http://dx.doi.org, https://dblp.org/rec/journals/corr/abs-2009-13018.html

Preprints

Ali H; Nepal S; Kanhere SS; Jha S, 2024, Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning, http://arxiv.org/abs/2410.11205v1

Wang W; Song Y; Jha S, 2024, USAT: A Universal Speaker-Adaptive Text-to-Speech Approach, http://dx.doi.org/10.48550/arxiv.2404.18094

Purwanto R; Pal A; Blair A; Jha S, 2022, PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool, http://dx.doi.org/10.1109/TIFS.2022.3164212.

xue W; Ahmed N; Masood R; Hu W; Seneviratne A; Jha SK, 2022, FLAP: Federated Learning with Attack and Privacy Awareness, http://dx.doi.org/10.36227/techrxiv.19766023

Go JH; Sari A; Jiang J; Yang S; Jha S, 2022, Fake News Quick Detection on Dynamic Heterogeneous Information Networks, http://dx.doi.org/10.48550/arxiv.2205.07039

Ali H; Nepal S; S. Kanhere S; Jha SK, 2021, HaS-Net: A Heal and Select Mechanism to Securely Train DNNs against Backdoor Attacks, http://dx.doi.org/10.36227/techrxiv.16571184

Purwanto R; Pal A; Blair A; Jha S, 2021, Man versus Machine: AutoML and Human Experts' Role in Phishing Detection, http://dx.doi.org/10.48550/arxiv.2108.12193

Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2021, DIMY: Enabling Privacy-preserving Contact Tracing, http://dx.doi.org/10.48550/arxiv.2103.05873

Abaid Z; Sarkar D; Kaafar MA; Jha S, 2021, All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks, http://dx.doi.org/10.48550/arxiv.2102.01944

Ali H; Nepal S; Kanhere SS; Jha S, 2020, HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios, http://dx.doi.org/10.48550/arxiv.2012.07474

Karunanayake I; Ahmed N; Malaney R; Islam R; Jha S, 2020, De-anonymisation attacks on Tor: A Survey, http://dx.doi.org/10.48550/arxiv.2009.13018

Liu J; Xu W; Jha S; Hu W, 2020, Nephalai: Towards LPWAN C-RAN with Physical Layer Compression, http://dx.doi.org/10.48550/arxiv.2008.02599

Xu W; Zhang J; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W; Misra P, 2020, A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases, http://dx.doi.org/10.48550/arxiv.2007.15906

Purwanto R; Pal A; Blair A; Jha S, 2020, PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites, http://dx.doi.org/10.48550/arxiv.2007.11955

Oham C; Michelin R; Kanhere SS; Jurdak R; Jha S, 2020, B-FERL: Blockchain based Framework for Securing Smart Vehicles, http://dx.doi.org/10.48550/arxiv.2007.10528


Back to profile page