ORCID as entered in ROS

Select Publications
Bhaskar N; Ahmed J; Masood R; Ahmed N; Kerr S; Jha SK, 2024, 'A Comprehensive Threat Modelling Analysis for Distributed Energy Resources', ACM Transactions on Cyber-Physical Systems, 8, http://dx.doi.org/10.1145/3678260
Musleh AS; Ahmed J; Ahmed N; Xu H; Chen G; Kerr S; Jha S, 2024, 'Experimental Cybersecurity Evaluation of Distributed Solar Inverters: Vulnerabilities and Impacts on the Australian Grid', IEEE Transactions on Smart Grid, 15, pp. 5139 - 5150, http://dx.doi.org/10.1109/TSG.2024.3393439
Karunanayake I; Jiang J; Ahmed N; Jha SK, 2024, 'Exploring Uncharted Waters of Website Fingerprinting', IEEE Transactions on Information Forensics and Security, 19, pp. 1840 - 1854, http://dx.doi.org/10.1109/TIFS.2023.3342607
Zaman Z; Xue W; Gauravaram P; Hu W; Jiang J; Jha SK, 2024, 'Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis', IEEE Transactions on Information Forensics and Security, 19, pp. 9173 - 9187, http://dx.doi.org/10.1109/TIFS.2024.3468150
Sharma A; Li J; Mishra D; Jha S; Seneviratne A, 2024, 'Towards Energy Efficient Wireless Sensing by Leveraging Ambient Wi-Fi Traffic †', Energies, 17, http://dx.doi.org/10.3390/en17020485
Wang W; Song Y; Jha S, 2024, 'USAT: A Universal Speaker-Adaptive Text-to-Speech Approach', IEEE/ACM Transactions on Audio Speech and Language Processing, 32, pp. 2590 - 2604, http://dx.doi.org/10.1109/TASLP.2024.3393714
Karunanayake I; Ahmed N; Malaney R; Islam R; Jha SK, 2023, 'Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification', IEEE Access, 11, pp. 70011 - 70022, http://dx.doi.org/10.1109/ACCESS.2023.3293526
Maroof U; Shaghaghi A; Michelin R; Jha S, 2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, 132, pp. 178 - 193, http://dx.doi.org/10.1016/j.future.2022.02.014
Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, http://dx.doi.org/10.1016/j.jnca.2022.103356
Oham C; Michelin RA; Jurdak R; Kanhere SS; Jha S, 2022, 'WIDE: A witness-based data priority mechanism for vehicular forensics', Blockchain: Research and Applications, 3, http://dx.doi.org/10.1016/j.bcra.2021.100050
Jiang J, 2022, 'Network Growth From Global and Local Influential Nodes', IEEE Transactions on Network Science and Engineering, http://dx.doi.org/10.1109/TNSE.2022.3165528
Ma S; Li J; Nepal S; Ostry D; Lo D; Jha SK; Deng RH; Bertino E, 2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188
Purwanto RW; Pal A; Blair A; Jha S, 2022, 'PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool', IEEE Transactions on Information Forensics and Security, 17, pp. 1497 - 1512, http://dx.doi.org/10.1109/TIFS.2022.3164212
Xue W; Luo C; Shen Y; Rana R; Lan G; Jha S; Seneviratne A; Hu W, 2021, 'Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things', IEEE Transactions on Mobile Computing, 20, pp. 3049 - 3065, http://dx.doi.org/10.1109/TMC.2020.2992737
Purwanto R; Pal A; Blair A; Jha S, 2021, 'Man versus Machine: AutoML and Human Experts' Role in Phishing Detection', , http://arxiv.org/abs/2108.12193v1
Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2021, 'DIMY: Enabling Privacy-preserving Contact Tracing', , http://arxiv.org/abs/2103.05873v1
Oham C; Michelin RA; Jurdak R; Kanhere SS; Jha S, 2021, 'B-FERL: Blockchain based framework for securing smart vehicles', Information Processing and Management, 58, http://dx.doi.org/10.1016/j.ipm.2020.102426
Karunanayake I; Ahmed N; Malaney R; Islam R; Jha SK, 2021, 'De-Anonymisation Attacks on Tor: A Survey', IEEE Communications Surveys and Tutorials, 23, pp. 2324 - 2350, http://dx.doi.org/10.1109/COMST.2021.3093615
Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226
Xu W; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W, 2020, 'Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings', IEEE Internet of Things Journal, 7, pp. 298 - 310, http://dx.doi.org/10.1109/JIOT.2019.2946900
Ahmed N; Michelin RA; Xue W; Ruj S; Malaney RA; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps.', ARXIV, 2006.10306, https://arxiv.org/abs/2006.10306
Jahan M; Seneviratne S; Roy PS; Sakurai K; Seneviratne A; Jha S, 2019, 'Light weight and fine-grained access mechanism for secure access to outsourced data*', Concurrency and Computation: Practice and Experience, 31, http://dx.doi.org/10.1002/cpe.4736
Rezvani M; Rajaratnam D; Ignjatovic A; Pagnucco M; Jha S, 2019, 'Analyzing XACML policies using answer set programming', International Journal of Information Security, 18, pp. 465 - 479, http://dx.doi.org/10.1007/s10207-018-0421-5
Xu W; Jha S; Hu W, 2019, 'LoRa-Key: Secure Key Generation System for LoRa-Based Network', IEEE Internet of Things Journal, 6, pp. 6404 - 6416, http://dx.doi.org/10.1109/JIOT.2018.2888553
Xu W; Zhang J; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W, 2019, 'The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings', IEEE Internet of Things Journal, 6, pp. 7266 - 7281, http://dx.doi.org/10.1109/JIOT.2019.2915952
Kim JY; Hu W; Sarkar D; Jha S, 2019, 'Long-term secure management of large scale Internet of Things applications', Journal of Network and Computer Applications, 138, pp. 15 - 26, http://dx.doi.org/10.1016/j.jnca.2019.04.015
Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting', IEEE Transactions on Mobile Computing, 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
Tan H; Tsudik G; Jha S, 2019, 'MTRA: Multi-Tier randomized remote attestation in IoT networks', Computers and Security, 81, pp. 78 - 93, http://dx.doi.org/10.1016/j.cose.2018.10.008
Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting.', IEEE Trans. Mob. Comput., 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
Kim JY; Hu W; Shafagh H; Jha S, 2018, 'SEDA: Secure over-the-air code dissemination protocol for the internet of things', IEEE Transactions on Dependable and Secure Computing, 15, pp. 1041 - 1054, http://dx.doi.org/10.1109/TDSC.2016.2639503
Jahan M; Rezvani M; Zhao Q; Roy PS; Sakurai K; Seneviratne A; Jha S, 2018, 'Light Weight Write Mechanism for Cloud Data', IEEE Transactions on Parallel and Distributed Systems, 29, pp. 1131 - 1146, http://dx.doi.org/10.1109/TPDS.2017.2782253
Tu W; Sreenan CJ; Jha S; Zhang Q, 2017, 'Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks', IEEE Transactions on Mobile Computing, 16, pp. 3431 - 3444, http://dx.doi.org/10.1109/TMC.2017.2691706
Revadigar G; Javali C; Xu W; Vasilakos AV; Hu W; Jha S, 2017, 'Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables', IEEE Transactions on Information Forensics and Security, 12, pp. 2467 - 2482, http://dx.doi.org/10.1109/TIFS.2017.2708690
misra P; Hu W; jha S, 2016, 'Sparsity based Efficient Cross-Correlation Techniques in Sensor Networks', IEEE Transactions on Mobile Computing, http://dx.doi.org/10.1109/TMC.2016.2605689
Li K; Ahmed N; Kanhere SS; Jha S, 2016, 'Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna', Pervasive and Mobile Computing, 30, pp. 151 - 165, http://dx.doi.org/10.1016/j.pmcj.2016.01.005
Li K; Ni W; Wang X; Liu RP; Kanhere SS; Jha S, 2016, 'Energy-efficient cooperative relaying for unmanned aerial vehicles', IEEE Transactions on Mobile Computing, 15, pp. 1377 - 1386, http://dx.doi.org/10.1109/TMC.2015.2467381
Ahmed N; Kanhere SS; Jha S, 2016, 'On the importance of link characterization for aerial wireless sensor networks', IEEE Communications Magazine, 54, pp. 52 - 57, http://dx.doi.org/10.1109/MCOM.2016.7470935
Rezvani M; Sekulic V; Ignjatovic A; Bertino E; Jha S, 2015, 'Interdependent Security Risk Analysis of Hosts and Flows', IEEE Transactions on Information Forensics and Security, 10, pp. 2325 - 2339, http://dx.doi.org/10.1109/TIFS.2015.2455414
Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks', Security and Communication Networks, 8, pp. 2171 - 2188, http://dx.doi.org/10.1002/sec.1162
Ali ST; Sivaraman V; Radford A; Jha S, 2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391
Zhao X; Guo J; Chou CT; Misra A; Jha SK, 2015, 'High-throughput reliable multicast in multi-hop wireless mesh networks', IEEE Transactions on Mobile Computing, 14, pp. 728 - 741, http://dx.doi.org/10.1109/TMC.2014.2333731
Chapre Y; Ignjatovic A; Seneviratne A; Jha S, 2015, 'CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO', Pervasive and Mobile Computing, 23, pp. 89 - 103, http://dx.doi.org/10.1016/j.pmcj.2015.07.002
Rezvani M; Ignjatovic A; Bertino E; Jha S, 2015, 'Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks', IEEE Transactions on Dependable and Secure Computing, 12, pp. 98 - 110, http://dx.doi.org/10.1109/TDSC.2014.2316816
Misra P; Kanhere S; Jha S; Hu W, 2015, 'Sparse representation based acoustic rangefinders: From sensor platforms to mobile devices', IEEE Communications Magazine, 53, pp. 249 - 257, http://dx.doi.org/10.1109/MCOM.2015.7010542
Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.', Security and Communication Networks, http://dx.doi.org/10.1002/sec.1162
Ali ST; Sivaraman V; Ostry D; Tsudik G; Jha S, 2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998
Ni W; Liu RP; Biswas J; Wang X; Collings IB; Jha SK, 2014, 'Multiuser MIMO scheduling for mobile video applications', IEEE Transactions on Wireless Communications, 13, pp. 5382 - 5395, http://dx.doi.org/10.1109/TWC.2014.2347973
Javali C; Revadigar G; Libman L; Jha S, 2014, 'SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8651, pp. 74 - 89, http://dx.doi.org/10.1007/978-3-319-13066-8_5
Mehmood T; Libman L; Dehkordi HR; Jha SK, 2013, 'Optimal opportunistic routing and network coding for bidirectional wireless flows', Computer Networks, 57, pp. 4030 - 4046, http://dx.doi.org/10.1016/j.comnet.2013.10.004
Misra P; Kottege N; Kusy B; Ostry D; Jha S, 2013, 'Acoustical ranging techniques in embedded wireless sensor networked devices', ACM Transactions on Sensor Networks, 10, http://dx.doi.org/10.1145/2529981