K. P. Subbalakshmi
K. P. Suba Subbalakshmi – Koduvayur P. Subbalakshmi
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2016
- [j41]Vidya Sagar, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Software defined access for HetNets. IEEE Communications Magazine 54(1): 84-89 (2016) - [j40]Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Joint-channel modeling to attack QIM steganography. Multimedia Tools Appl. 75(21): 13585-13611 (2016) - [j39]S. Eman Mahmoodi, K. P. Suba Subbalakshmi:
A Time-Adaptive Heuristic for Cognitive Cloud Offloading in Multi-RAT Enabled Wireless Devices. IEEE Trans. Cogn. Comm. & Networking 2(2): 194-207 (2016) - [c49]S. Eman Mahmoodi, K. P. Subbalakshmi, R. N. Uma:
Harnessing spectrum awareness to enhance mobile computing: poster. MobiCom 2016: 460-461 - 2015
- [j38]S. Ebrahim Safavi, K. P. Subbalakshmi:
Effective Bandwidth for Delay Tolerant Secondary User Traffic in Multi-PU, Multi-SU Dynamic Spectrum Access Networks. IEEE Trans. Cogn. Comm. & Networking 1(2): 175-184 (2015) - [j37]Santhanakrishnan Anand, Mukundan Venkataraman, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Spatio-Temporal Analysis of Passive Consumption in Internet Media. IEEE Trans. Knowl. Data Eng. 27(10): 2839-2850 (2015) - [c48]S. Ebrahim Safavi, K. P. Subbalakshmi:
Delay analysis of multi-user dynamic spectrum access networks. DySPAN 2015: 319-325 - [c47]S. Eman Mahmoodi, K. P. Subbalakshmi, Vidya Sagar:
Cloud offloading for multi-radio enabled mobile devices. ICC 2015: 5473-5478 - [i3]Alireza Louni, Santhanakrishnan Anand, K. P. Subbalakshmi:
Identification of Source of Rumors in Social Networks with Incomplete Information. CoRR abs/1509.00557 (2015) - [i2]S. Eman Mahmoodi, K. P. Subbalakshmi, Vidya Sagar:
Cloud Offloading for Multi-Radio Enabled Mobile Devices. CoRR abs/1511.03698 (2015) - [i1]S. Eman Mahmoodi, K. P. Subbalakshmi, Rajarathnam Chandramouli, Bahman Abolhassani:
Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay. CoRR abs/1511.04115 (2015) - 2014
- [j36]Mahdi Azarafrooz, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Reciprocity, fairness and learning in medium access control games. Computer Communications 46: 22-28 (2014) - [j35]S. Eman Mahmoodi, K. P. Subbalakshmi, Rajarathnam Chandramouli, Bahman Abolhassani:
Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay. EAI Endorsed Trans. Wireless Spectrum 1(1): e4 (2014) - [j34]Santhanakrishnan Anand, Shamik Sengupta, Kai Hong, K. P. Subbalakshmi, Rajarathnam Chandramouli, Hasan Cam:
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities. IEEE Trans. Vehicular Technology 63(8): 3867-3874 (2014) - [c46]Zituo Jin, J. P. Morgan, Santhanakrishnan Anand, K. P. Subbalakshmi:
NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA. CNS 2014: 44-52 - [c45]Alireza Louni, K. P. Subbalakshmi:
A two-stage algorithm to estimate the source of information diffusion in social media networks. INFOCOM Workshops 2014: 329-333 - 2013
- [j33]Shamik Sengupta, K. P. Subbalakshmi:
Open research issues in multi-hop cognitive radio networks. IEEE Communications Magazine 51(4): 168-176 (2013) - [j32]Santhanakrishnan Anand, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi, Mukundan Venkataraman:
Altruism in social networks: good guys do finish first. Social Netw. Analys. Mining 3(2): 167-177 (2013) - [j31]Santhanakrishnan Anand, K. P. Subbalakshmi, Rajarathnam Chandramouli:
A Quantitative Model and Analysis of Information Confusion in Social Networks. IEEE Trans. Multimedia 15(1): 207-223 (2013) - [c44]Alireza Louni, K. P. Subbalakshmi:
Optimizing flow control in multi-interface wireless cognitive radio networks. GLOBECOM 2013: 1227-1232 - [c43]Mahdi Azarafrooz, Ramamurti Chandramouli, Koduvayur P. Subbalakshmi:
Reciprocity and Fairness in Medium Access Control Games. ICCCN 2013: 1-5 - 2012
- [j30]Ziqian Dong, Rohan D. W. Perera, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Network measurement based modeling and optimization for IP geolocation. Computer Networks 56(1): 85-98 (2012) - [j29]Yi Tan, Shamik Sengupta, Koduvayur P. Subbalakshmi:
Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach. IET Communications 6(8): 964-973 (2012) - [j28]Zituo Jin, Santhanakrishnan Anand, Koduvayur P. Subbalakshmi:
Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks. IEEE Trans. Communications 60(9): 2635-2643 (2012) - [j27]Hafiz Malik, K. P. Subbalakshmi, Ramamurti Chandramouli:
Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy. IEEE Trans. Information Forensics and Security 7(2): 418-431 (2012) - [c42]Mukundan Venkataraman, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Measuring and quantifying the silent majority on the Internet. Sarnoff Symposium 2012: 1-5 - 2011
- [j26]Shamik Sengupta, Kai Hong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
SpiderRadio: A cognitive radio network with commodity hardware and open source software. IEEE Communications Magazine 49(3): 101-109 (2011) - [j25]Na Cheng, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Author gender identification from text. Digital Investigation 8(1): 78-88 (2011) - [j24]
- [j23]Yi Tan, Shamik Sengupta, K. P. Subbalakshmi:
Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks. IEEE Journal on Selected Areas in Communications 29(4): 890-902 (2011) - [c41]Santhanakrishnan Anand, Kai Hong, Rajarathnam Chandramouli, Shamik Sengupta, K. P. Subbalakshmi:
Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network. GLOBECOM 2011: 1-5 - [c40]Guoqi Luo, K. P. Subbalakshmi:
Zero Kullback-Liebler Divergence Image Data Hiding. GLOBECOM 2011: 1-5 - [c39]S. Ebrahim Safavi, K. P. Subbalakshmi:
Optimal Joint Power Allocation and Phase Control for DS-CDMA Cognitive Radio Networks. GLOBECOM 2011: 1-5 - [c38]Yi Tan, Kai Hong, Shamik Sengupta, K. P. Subbalakshmi:
Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks. GLOBECOM 2011: 1-5 - [c37]Yi Tan, Shamik Sengupta, K. P. Subbalakshmi:
Human Society Inspired Dynamic Spectrum Access Networks: The Effect of Parochialism. GLOBECOM 2011: 1-5 - [c36]Yi Tan, Kai Hong, Shamik Sengupta, Koduvayur P. Subbalakshmi:
Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense. ICC 2011: 1-5 - [c35]Xiaoling Chen, Peng Hao, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Authorship Similarity Detection from Email Messages. MLDM 2011: 375-386 - [c34]Peng Hao, Xiaoling Chen, Na Cheng, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Adaptive Context Modeling for Deception Detection in Emails. MLDM 2011: 458-468 - [c33]Santhanakrishnan Anand, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
Cost of Collaboration vs Individual Effort in Social Networks. SDM 2011: 403-413 - 2010
- [j22]Fabrizio Granelli, Przemyslaw Pawelczak, R. Venkatesha Prasad, K. P. Subbalakshmi, Rajarathnam Chandramouli, James A. Hoffmeyer, H. Stephen Berger:
Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities. IEEE Communications Magazine 48(1): 71-79 (2010) - [c32]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks. GLOBECOM 2010: 1-5 - [c31]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks. GLOBECOM 2010: 1-5 - [c30]Yi Tan, Shamik Sengupta, K. P. Subbalakshmi:
Competitive Spectrum Trading in Dynamic Spectrum Access Markets: A Price War. GLOBECOM 2010: 1-5 - [c29]Yi Tan, Shamik Sengupta, K. P. Subbalakshmi:
Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks. ICC 2010: 1-5 - [p1]Xiaoling Chen, Rohan D. W. Perera, Ziqian Dong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
Deception Detection on the Internet. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 334-354
2000 – 2009
- 2009
- [j21]Rajarathnam Chandramouli, Ananthram Swami, John Chapin, K. P. Subbalakshmi:
Dynamic Spectrum Access for Wireless Networking. EURASIP J. Adv. Sig. Proc. 2009 (2009) - [j20]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. Mobile Computing and Communications Review 13(2): 74-85 (2009) - [c28]Na Cheng, Xiaoling Chen, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Gender identification from E-mails. CIDM 2009: 154-158 - [c27]
- [c26]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks. ICC 2009: 1-5 - 2008
- [j19]Goce Jakimoski, K. P. Subbalakshmi:
Cryptanalysis of Some Multimedia Encryption Schemes. IEEE Trans. Multimedia 10(3): 330-338 (2008) - [j18]K. S. Kumar, Ramamurti Chandramouli, K. P. Subbalakshmi:
On stochastic learning in predictive wireless ARQ. Wireless Communications and Mobile Computing 8(7): 871-883 (2008) - [c25]Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Impact of Constraints on the Complexity of Dynamic Spectrum Assignment. GLOBECOM 2008: 3164-3169 - [c24]Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Nonparametric steganalysis of QIM data hiding using approximate entropy. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681914 - 2007
- [j17]Mohamed A. Haleem, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Joint Encryption and Compression of Correlated Sources with Side Information. EURASIP J. Information Security 2007 (2007) - [j16]Ashish Patel, M. Shah, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences. I. J. Network Security 5(1): 41-50 (2007) - [j15]Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi:
Statistical Attack Resilient Data Hiding. I. J. Network Security 5(1): 112-120 (2007) - [j14]Chetan Nanjunda Mathur, K. P. Subbalakshmi:
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices. I. J. Network Security 5(2): 205-212 (2007) - [j13]K. P. Subbalakshmi, Rajarathnam Chandramouli, Nagarajan Ranganathan:
A Sequential Distinguisher for Covert Channel Identification. I. J. Network Security 5(3): 274-282 (2007) - [j12]Pascal Frossard, Chang Wen Chen, Cormac J. Sreenan, K. P. Subbalakshmi, Dapeng Oliver Wu, Qian Zhang:
Guest Editorial Cross-layer Optimized Wireless Multimedia Communications. IEEE Journal on Selected Areas in Communications 25(4): 641-644 (2007) - [j11]Goce Jakimoski, K. P. Subbalakshmi:
Discrete Lyapunov Exponent and Differential Cryptanalysis. IEEE Trans. on Circuits and Systems 54-II(6): 499-501 (2007) - [j10]Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. IEEE Trans. Dependable Sec. Comput. 4(4): 313-324 (2007) - [j9]Yiping Xing, Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Dynamic Spectrum Access with QoS and Interference Temperature Constraints. IEEE Trans. Mob. Comput. 6(4): 423-433 (2007) - [j8]Ning Liu, Palak K. Amin, K. P. Subbalakshmi:
Security and Robustness Enhancement for Image Data Hiding. IEEE Trans. Multimedia 9(3): 466-474 (2007) - [c23]Goce Jakimoski, K. P. Subbalakshmi:
On Efficient Message Authentication Via Block Cipher Design Techniques. ASIACRYPT 2007: 232-248 - [c22]Mohamed A. Haleem, K. P. Subbalakshmi:
Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels. DCC 2007: 383 - [c21]Palak K. Amin, K. P. Subbalakshmi:
Detecting Hidden Messages Using Image Power Spectrum. ICIP (1) 2007: 421-424 - [c20]Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Steganalysis of GIM-based data hiding using kernel density estimation. MM&Sec 2007: 149-160 - 2006
- [j7]Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi:
On the Design of Error-Correcting Ciphers. EURASIP J. Wireless Comm. and Networking 2006 (2006) - [j6]Rajarathnam Chandramouli, Satish Bapatla, K. P. Subbalakshmi, R. N. Uma:
Battery power-aware encryption. ACM Trans. Inf. Syst. Secur. 9(2): 162-180 (2006) - [c19]Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi:
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. ACNS 2006: 309-324 - [c18]Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi:
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. ACNS 2006: 448-458 - [c17]
- [c16]Yiping Xing, Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints. ICC 2006: 4420-4425 - [c15]
- 2005
- [c14]Qingyu Chen, Koduvayur P. Subbalakshmi:
Distributed Joint Source-Channel Decoding for Correlated Markov Sources. DCC 2005: 453 - [c13]Palak K. Amin, Ning Liu, K. P. Subbalakshmi:
Statistically Secure Digital Image Data Hiding. MMSP 2005: 1-4 - [c12]Ning Liu, Palak K. Amin, K. P. Subbalakshmi:
Secure Quantization Based Data Embedding. MMSP 2005: 1-4 - [c11]Ning Liu, Koduvayur P. Subbalakshmi:
TCQ-based quantizer design for data hiding in images. Security, Steganography, and Watermarking of Multimedia Contents 2005: 185-193 - 2004
- [j5]Ramamurti Chandramouli, Koduvayur P. Subbalakshmi, N. Ranganathan:
Stochastic channel-adaptive rate control for wireless video transmission. Pattern Recognition Letters 25(7): 793-806 (2004) - [c10]Rajarathnam Chandramouli, K. P. Subbalakshmi:
Current trends in steganalysis: a critical survey. ICARCV 2004: 964-967 - [c9]Palak K. Amin, Koduvayur P. Subbalakshmi:
Rotation and cropping resilient data hiding with zernike moments. ICIP 2004: 2175-2178 - [c8]
- [c7]Siva Somasundaram, Koduvayur P. Subbalakshmi, R. N. Uma:
MDC and path diversity in video streaming. ICIP 2004: 3153-3156 - [c6]Ning Liu, Koduvayur P. Subbalakshmi:
Vector-quantization-based scheme for data embedding for images. Security, Steganography, and Watermarking of Multimedia Contents 2004: 548-559 - 2003
- [j4]Qingyu Chen, Koduvayur P. Subbalakshmi:
Joint source-channel decoding for MPEG-4 video transmission over wireless channels. IEEE Journal on Selected Areas in Communications 21(10): 1780-1789 (2003) - [j3]Koduvayur P. Subbalakshmi, Jacques Vaisey:
On the joint source-channel decoding of variable-length encoded sources: the additive-Markov case. IEEE Trans. Communications 51(9): 1420-1425 (2003) - [c5]Siva Somasundaram, Koduvayur P. Subbalakshmi:
3-D multiple description video coding for packet switched networks. ICME 2003: 589-592 - [c4]Ramamurti Chandramouli, Koduvayur P. Subbalakshmi:
Active steganalysis of spread spectrum image steganography. ISCAS (3) 2003: 830-833 - 2002
- [c3]Koduvayur P. Subbalakshmi, Siva Somasundaram:
Multiple description image coding framework for EBCOT. ICIP (3) 2002: 541-544 - 2001
- [j2]Koduvayur P. Subbalakshmi, Jacques Vaisey:
On the joint source-channel decoding of variable-length encoded sources: the BSC case. IEEE Trans. Communications 49(12): 2052-2055 (2001) - [c2]Koduvayur P. Subbalakshmi:
Preface to Special Sessions on Current Trends in Multimedia Communications and Computing. ITCC 2001: 249
1990 – 1999
- 1998
- [c1]Koduvayur P. Subbalakshmi, Jacques Vaisey:
Optimal Decoding of Entrophy Coded Memoryless Sources over Binary Symmetric Channels. Data Compression Conference 1998: 573 - 1997
- [j1]Anamitra Makur, K. P. Subbalakshmi:
Variable dimension VQ encoding and codebook design. IEEE Trans. Communications 45(8): 897-899 (1997)
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2017-12-10 23:06 CET by the dblp team