Select Publications

Conference Papers

Hassan M; Jha SK, 2001, 'Implementing Bandwidth Broker using COPS-PR in Java', in IEEE Local Computer Network Conference (LCN2001), Tampa, Florida, USA, presented at IEEE Local Computer Network Conference (LCN2001), Tampa, Florida, USA, 14 November 2001 - 15 November 2001

Lau CW; Jha SK; Hassan M, 2001, 'Current Directions in Active Programmable Networks', in 9th IEEE International Conference on Networks, Bangkok, Thailand, presented at 9th IEEE International Conference on Networks, Bangkok, Thailand, 10 October 2001 - 12 October 2001

Chalmers MA; Jha SK; Hassan M, 2001, 'Internet Charging - Behind the Time', in 9th IEEE International Conference on Networks, Bangkok, Thailand, presented at 9th IEEE International Conference on Networks, Bangkok, Thailand, 10 October 2001 - 12 October 2001

Jha SK; Hassan M; Rosenbaum F, 2001, 'Experimenting with flow and service seperation using open MPLS test bed', in Quality of Service over Next-Generation Data Networks (part of ITCom, Denver, Colorado, presented at Quality of Service over Next-Generation Data Networks (part of ITCom, Denver, Colorado, 19 August 2001

Jha SK; Sabrina F; Hassan M; Samuels B, 2001, 'An Analysis of Web Server Performance With an Accelerator', in IEEE International Conference on Telecommunications ICT2001, IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001

Hassan J; Jha SK, 2001, 'Cell-Hopping: A New Model for Wireless Communications', in IEEE International Conference on Telecommunications ICT2001, IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001

Hassan M; Wu JJ; Jha SK; Breen J, 2001, 'GPS Based Infrastructure for Internet Performance Measurement', in IEEE International Conference on Telecommunications ICT2001, IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001

Jha S; Fry M, 1996, 'Continuous media playback and jitter control', in International Conference on Multimedia Computing and Systems -Proceedings, pp. 245 - 251

Jha SK; Howarth BR, 1994, 'Capacity planning of LAN using network management', in Conference on Local Computer Networks, pp. 425 - 430

Pathirana PN; Savkin AV; Jha S, 'Robust extended Kalman filter applied to location tracking and trajectory prediction for PCS networks', in Proceedings of the 2004 IEEE International Conference on Control Applications, 2004., IEEE, presented at Proceedings of the 2004 IEEE International Conference on Control Applications, http://dx.doi.org/10.1109/cca.2004.1387188

Conference Posters

Kim JY; Hu WEN; Shafagh H; Kaafar MOHAMEDALI; Jha SANJAY, 2015, 'Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things', Seoul Korea, presented at ACM Conference on Embedded Networked Sensor Systems, Seoul Korea, 01 November 2015 - 04 November 2015, http://dx.doi.org/10.1145/2809695.2817896

Li K; Yuen C; Jha S, 2015, 'Poster abstract: Fair scheduling for energy harvesting WSN in smart city', pp. 419 - 420, http://dx.doi.org/10.1145/2809695.2817893

Javali C; Revadigar G; Hu W; Jha S, 2015, 'Poster: Were you in the cafe yesterday? Location proof generation & verification for mobile users', pp. 429 - 430, http://dx.doi.org/10.1145/2809695.2817898

Rezvani M; Ignjatovic A; Jha SK, (ed.), 2013, 'Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency', Cambridge, Massachusetts, USA, presented at The IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2013), Cambridge, Massachusetts, USA, 21 May 2013 - 23 May 2013

Li K; Ahmed N; Kanhere S; Jha S, (eds.), 2012, 'Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna', Clearwater, Florida, pp. 156 - 159, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6423595

Conference Presentations

Biswas J; Liu R; Wei N; Collings IB; Jha SK, 2013, 'Joint Channel and Delay Aware User Scheduling for Multiuser MIMO system over LTE-A Network', presented at IEEE International Symposium on Quality of Service(IWQoS) 2013, Montreal, canada, 03 June 2013 - 04 June 2013

Conference Abstracts

Javali C; Revadigar G; Pletea D; Jha S, 2016, 'Demo abstract: Location fingerprint evidence and authorisation using WiFi channel characteristics', in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, http://dx.doi.org/10.1109/PERCOMW.2016.7457077

Siddiqi M; Hager G; Sivaraman V; Jha S, 2015, 'Securing the Timestamping of Sensor Data from Wearable Healthcare Devices', ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Sydney, Australia, pp. 310 - 310, presented at BodyNets '15 Proceedings of the 10th EAI International Conference on Body Area Networks, Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261552

Shaghaghi A; Hong J; Jha S, 2014, 'An SDN-based framework for detection of illegal rebroadcasting of channels in P2PTV', in VideoNEXT 2014 - Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming, pp. 47 - 49, http://dx.doi.org/10.1145/2676652.2683465

Abaidy Z; Rezvani M; Jha S, 2014, 'MalwareMonitor: An SDN-based framework for securing large networks', in CoNEXT Student Workshop 2014 - Proceedings of the 2014 Workshop, pp. 40 - 42, http://dx.doi.org/10.1145/2680821.2680829

Jha SK, (ed.), 2004, 'The REKF Localization System: Node Localization Using Mobile Robots', in International Conference on Embedded Systems, Baltimore, Maryland, USA, pp. 321 - 321, presented at International Conference on Embedded Systems, Baltimore, Maryland, USA, 03 November 2004 - 05 November 2004

Reports

Bennett Moses L; Feng R; Jha S; Liu V; Lloyd-Jones S, 2023, Vulnerability Disclosure Consultation Paper

Working Papers

Karunanayake I; Ahmed N; Malaney R; Islam R; Jha S, 2020, De-anonymisation attacks on Tor: A Survey [v3], http://dx.doi.org10.48550/arXiv.2009.13018

Michelin RA; Ahmed N; Kanhere SS; Seneviratne A; Jha S, 2020, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, Institute of Electrical and Electronics Engineers (IEEE), http://dx.doi.org10.1109/ICBC48266.2020.9169429

Karunanayake I; Ahmed N; Malaney RA; Islam R; Jha SK, 2020, Anonymity with Tor: A Survey on Tor Attacks [v1, v2], http://dx.doi.org, https://dblp.org/rec/journals/corr/abs-2009-13018.html

Preprints

Purwanto R; Pal A; Blair A; Jha S, 2022, PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool, , http://dx.doi.org/10.1109/TIFS.2022.3164212.

xue W; Ahmed N; Masood R; Hu W; Seneviratne A; Jha SK, 2022, FLAP: Federated Learning with Attack and Privacy Awareness, , http://dx.doi.org/10.36227/techrxiv.19766023

Go JH; Sari A; Jiang J; Yang S; Jha S, 2022, Fake News Quick Detection on Dynamic Heterogeneous Information Networks, , http://dx.doi.org/10.48550/arxiv.2205.07039

Ali H; Nepal S; S. Kanhere S; Jha SK, 2021, HaS-Net: A Heal and Select Mechanism to Securely Train DNNs against Backdoor Attacks, , http://dx.doi.org/10.36227/techrxiv.16571184

Purwanto R; Pal A; Blair A; Jha S, 2021, Man versus Machine: AutoML and Human Experts' Role in Phishing Detection, , http://dx.doi.org/10.48550/arxiv.2108.12193

Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2021, DIMY: Enabling Privacy-preserving Contact Tracing, , http://dx.doi.org/10.48550/arxiv.2103.05873

Abaid Z; Sarkar D; Kaafar MA; Jha S, 2021, All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks, , http://dx.doi.org/10.48550/arxiv.2102.01944

Ali H; Nepal S; Kanhere SS; Jha S, 2020, HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios, , http://dx.doi.org/10.48550/arxiv.2012.07474

Karunanayake I; Ahmed N; Malaney R; Islam R; Jha S, 2020, De-anonymisation attacks on Tor: A Survey, , http://dx.doi.org/10.48550/arxiv.2009.13018

Liu J; Xu W; Jha S; Hu W, 2020, Nephalai: Towards LPWAN C-RAN with Physical Layer Compression, , http://dx.doi.org/10.48550/arxiv.2008.02599

Xu W; Zhang J; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W; Misra P, 2020, A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases, , http://dx.doi.org/10.48550/arxiv.2007.15906

Purwanto R; Pal A; Blair A; Jha S, 2020, PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites, , http://dx.doi.org/10.48550/arxiv.2007.11955

Oham C; Michelin R; Kanhere SS; Jurdak R; Jha S, 2020, B-FERL: Blockchain based Framework for Securing Smart Vehicles, , http://dx.doi.org/10.48550/arxiv.2007.10528

Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha S, 2020, A Survey of COVID-19 Contact Tracing Apps, , http://dx.doi.org/10.48550/arxiv.2006.10306

Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud, , http://dx.doi.org/10.48550/arxiv.2005.07987

Michelin RA; Ahmed N; Kanhere SS; Seneviratne A; Jha S, 2019, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, , http://dx.doi.org/10.48550/arxiv.1912.11044

Xu W; Kim JY; Huang W; Kanhere S; Jha S; Hu W, 2019, Measurement, Characterization and Modeling of LoRa Technology in Multi-floor Buildings, , http://dx.doi.org/10.48550/arxiv.1909.03900

Oham C; Jurdak R; Jha S, 2019, Risk Analysis Study of Fully Autonomous Vehicle, , http://dx.doi.org/10.48550/arxiv.1905.10910

Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, , http://dx.doi.org/10.48550/arxiv.1809.06988

Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations, , http://dx.doi.org/10.48550/arxiv.1807.02593

Oham C; Jurdak R; Kanhere SS; Dorri A; Jha S, 2018, B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication, , http://arxiv.org/abs/1806.06169v1

Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, , http://dx.doi.org/10.48550/arxiv.1804.00262

Oham C; Kanhere SS; Jurdak R; Jha S, 2018, A Blockchain Based Liability Attribution Framework for Autonomous Vehicles, , http://dx.doi.org/10.48550/arxiv.1802.05050

Shaghaghi A; Kaafar MA; Jha S, 2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, , http://dx.doi.org/10.48550/arxiv.1708.05477

Shaghaghi A; Ali M; Kaafar ; Scott-Hayward S; Kanhere SS; Jha S, 2016, Towards Policy Enforcement Point as a Service (PEPS), , http://dx.doi.org/10.48550/arxiv.1610.02526


Back to profile page