default search action
Shamik Sengupta
Person information
- affiliation: University of Nevada, Reno, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j50]Suman Rath, Tapadhir Das, Shamik Sengupta:
Improvise, Adapt, Overcome: Dynamic Resiliency Against Unknown Attack Vectors in Microgrid Cybersecurity Games. IEEE Trans. Smart Grid 15(4): 4245-4258 (2024) - [c123]Ignacio Astaburuaga, Shamik Sengupta:
Introduction to Quantum Systems and Security Vulnerabilities. CCNC 2024: 345-351 - [c122]Nathan Thom, Jay Thom, Batyr Charyyev, Emily M. Hand, Shamik Sengupta:
FlexHash - Hybrid Locality Sensitive Hashing for IoT Device Identification. CCNC 2024: 368-371 - [c121]Ignacio Astaburuaga, Shamik Sengupta:
Game Theory for Privacy-Preserving Cybersecurity Information Exchange Framework. CCNC 2024: 730-735 - [c120]Ayesh Meepaganithage, Suman Rath, Mircea Nicolescu, Monica N. Nicolescu, Shamik Sengupta:
Feature Selection Using the Advanced Shapley Value. CCWC 2024: 207-213 - [c119]Rita Olla, Emily M. Hand, Sushil J. Louis, Ramona Houmanfar, Shamik Sengupta:
A Cybersecurity Game to Probe Human-AI Teaming. CoG 2024: 1-5 - [c118]Tapadhir Das, Suman Rath, Shamik Sengupta:
Telling Apart: ML Framework Towards Cyber Attack and Fault Differentiation in Microgrids. ICPS 2024: 1-6 - [c117]Ayesh Meepaganithage, Suman Rath, Mircea Nicolescu, Monica N. Nicolescu, Shamik Sengupta:
Image Forgery Detection Using Convolutional Neural Networks. ISDFS 2024: 1-6 - [i12]Nowfel Mashnoor, Jay Thom, Abdur Rouf, Shamik Sengupta, Batyr Charyyev:
Locality Sensitive Hashing for Network Traffic Fingerprinting. CoRR abs/2402.08063 (2024) - 2023
- [j49]Tapadhir Das, Raj Mani Shukla, Shamik Sengupta:
What Could Possibly Go Wrong? Identification of Current Challenges and Prospective Opportunities for Anomaly Detection in Internet of Things. IEEE Netw. 37(3): 194-200 (2023) - [j48]Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Mohammed Atiquzzaman:
An Intelligent Privacy Preservation Scheme for EV Charging Infrastructure. IEEE Trans. Ind. Informatics 19(2): 1238-1247 (2023) - [c116]Tapadhir Das, Osama Abu Hamdan, Raj Mani Shukla, Shamik Sengupta, Engin Arslan:
UNR-IDD: Intrusion Detection Dataset using Network Port Statistics. CCNC 2023: 497-500 - [c115]Amber Hankins, Tapadhir Das, Shamik Sengupta, David Feil-Seifer:
Eyes on the Road: A Survey on Cyber Attacks and Defense Solutions for Vehicular Ad-Hoc Networks. CCWC 2023: 585-592 - [c114]Sara R. Davis, Bryson Lingenfelter, Kevin McElhinney, Shamik Sengupta, Emily M. Hand:
CarVer: Setting the Standard for Face Verification with Caricatures. IJCB 2023: 1-10 - [c113]Suman Rath, Tapadhir Das, Ignacio Astaburuaga, Shamik Sengupta:
Less is More: Deep Learning Framework for Digital Forensics in Resource-Constrained Environments. ISDFS 2023: 1-6 - [c112]Nowfel Mashnoor, Jay Thom, Abdur Rouf, Shamik Sengupta, Batyr Charyyev:
Locality Sensitive Hashing for Network Traffic Fingerprinting. LANMAN 2023: 1-6 - [c111]Aaron Walker, Raj Mani Shukla, Tapadhir Das, Shamik Sengupta:
Runs in the Family: Malware Family Variants Identification through API Sequence and Frequency Analysis. MCNA 2023: 55-61 - [c110]Lochana Telugu Rajesh, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta:
Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection. TrustCom 2023: 2365-2371 - [i11]Suman Rath, Andres Intriago, Shamik Sengupta, Charalambos Konstantinou:
Lost at Sea: Assessment and Evaluation of Rootkit Attacks on Shipboard Microgrids. CoRR abs/2305.18667 (2023) - [i10]Suman Rath, Tapadhir Das, Shamik Sengupta:
Improvise, Adapt, Overcome: Dynamic Resiliency Against Unknown Attack Vectors in Microgrid Cybersecurity Games. CoRR abs/2306.15106 (2023) - [i9]Suman Rath, Subham Sahoo, Shamik Sengupta:
Digital Twins for Moving Target Defense Validation in AC Microgrids. CoRR abs/2307.13152 (2023) - [i8]Lochana Telugu Rajesh, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta:
Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection. CoRR abs/2310.07354 (2023) - 2022
- [j47]AbdelRahman Eldosouky, Tapadhir Das, Anuraag Kotra, Shamik Sengupta:
Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective. IEEE Access 10: 103718-103732 (2022) - [j46]Farhan Sadique, Shamik Sengupta:
Modeling and analyzing attacker behavior in IoT botnet using temporal convolution network (TCN). Comput. Secur. 117: 102714 (2022) - [j45]Raj Mani Shukla, Shamik Sengupta:
A novel machine learning pipeline to detect malicious anomalies for the Internet of Things. Internet Things 20: 100603 (2022) - [c109]Aaron Walker, Raj Mani Shukla, Tapadhir Das, Shamik Sengupta:
Ohana Means Family: Malware Family Classification using Extreme Learning Machines. CCNC 2022: 534-542 - [c108]Jay Thom, Nathan Thom, Shamik Sengupta, Emily M. Hand:
Smart Recon: Network Traffic Fingerprinting for IoT Device Identification. CCWC 2022: 72-79 - [c107]Ben Lupton, Mackenzie Zappe, Jay Thom, Shamik Sengupta, Dave Feil-Seifer:
Analysis and Prevention of Security Vulnerabilities in a Smart City. CCWC 2022: 702-708 - [c106]Tapadhir Das, Osama Abu Hamdan, Shamik Sengupta, Engin Arslan:
Flood Control: TCP-SYN Flood Detection for Software-Defined Networks using OpenFlow Port Statistics. CSR 2022: 1-8 - [c105]William Toledo, Sushil J. Louis, Shamik Sengupta:
NetDefense: A Tower Defense Cybersecurity Game for Middle and High School Students. FIE 2022: 1-6 - [c104]Khondker Fariha Hossain, Alireza Tavakkoli, Shamik Sengupta:
A Game Theoretical Vulnerability Analysis of Adversarial Attack. ISVC (2) 2022: 369-380 - [i7]Khondker Fariha Hossain, Alireza Tavakkoli, Shamik Sengupta:
A Game Theoretical vulnerability analysis of Adversarial Attack. CoRR abs/2210.06670 (2022) - 2021
- [j44]Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil:
Reputation-Based Miner Node Selection in Blockchain-Based Vehicular Edge Computing. IEEE Consumer Electron. Mag. 10(5): 14-22 (2021) - [j43]Raj Mani Shukla, Shamik Sengupta:
Erratum to "COP: An integrated Communication, Optimization, and Prediction unit for smart Plug-in Electric Vehicle Charging" [Internet of Things, volume 9, March 2020, 100148]. Internet Things 14: 100401 (2021) - [j42]Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil:
ALICIA: Applied Intelligence in blockchain based VANET: Accident Validation as a Case Study. Inf. Process. Manag. 58(3): 102508 (2021) - [j41]Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil, Albert Y. Zomaya:
Towards secure and practical consensus for blockchain based VANET. Inf. Sci. 545: 170-187 (2021) - [j40]Sowmya Kudva, Shahriar Badsha, Shamik Sengupta, Hung Manh La, Ibrahim Khalil, Mohammed Atiquzzaman:
A scalable blockchain based trust management in VANET routing protocol. J. Parallel Distributed Comput. 152: 144-156 (2021) - [j39]Shafkat Islam, Shahriar Badsha, Shamik Sengupta, Hung M. La, Ibrahim Khalil, Mohammed Atiquzzaman:
Blockchain-Enabled Intelligent Vehicular Edge Computing. IEEE Netw. 35(3): 125-131 (2021) - [c103]Jay Thom, Yash Shah, Shamik Sengupta:
Correlation of Cyber Threat Intelligence Data Across Global Honeypots. CCWC 2021: 766-772 - [c102]Aaron Walker, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta:
Friend or Foe: Discerning Benign vs Malicious Software and Malware Family. GLOBECOM 2021: 1-6 - [c101]Farhan Sadique, Shamik Sengupta:
Analysis of Attacker Behavior in Compromised Hosts During Command and Control. ICC 2021: 1-7 - [c100]Arpan Bhattacharjee, Shahriar Badsha, Shamik Sengupta:
Personalized Privacy Preservation for Smart Grid. ISC2 2021: 1-7 - [c99]Adam Cassell, Tapadhir Das, Zachary Black, Farhan Sadique, James Schnebly, Sergiu Dascalu, Shamik Sengupta, Jeff Springer:
Sharing is Caring: Optimized Threat Visualization for a Cybersecurity Data Sharing Platform. NCA 2021: 1-8 - [c98]Tapadhir Das, Raj Mani Shukla, Shamik Sengupta:
The Devil is in the Details: Confident & Explainable Anomaly Detector for Software-Defined Networks. NCA 2021: 1-5 - [c97]Jay Thom, Tapadhir Das, Bibek Shrestha, Shamik Sengupta, Engin Arslan:
Casting a Wide Net: An Internet of Things Testbed for Cybersecurity Education and Research. SPECTS 2021: 1-8 - [c96]Paulo Alexandre Regis, Suman Bhunia, Amar Nath Patra, Shamik Sengupta:
Deep-learning assisted Cross-Layer Routing in Multi-hop Wireless Network. WF-IoT 2021: 35-39 - [c95]Tapadhir Das, Raj Mani Shukla, Shamik Sengupta:
Imposters Among Us: A Supervised Learning Approach to Anomaly Detection in IoT Sensor Data. WF-IoT 2021: 818-823 - [c94]Shafkat Islam, Shahriar Badsha, Shamik Sengupta:
Context-Aware Fine-Grained Task Scheduling at Vehicular Edges: An Extreme Reinforcement Learning based Dynamic Approach. WOWMOM 2021: 31-40 - [i6]Narayan Bhusal, Raj Mani Shukla, Mukesh Gautam, Mohammed Benidris, Shamik Sengupta:
Deep Ensemble Learning-based Approach to Real-time Power System State Estimation. CoRR abs/2101.03457 (2021) - [i5]Abdel Rahman Eldosouky, Tapadhir Das, Anuraag Kotra, Shamik Sengupta:
Finding the Sweet Spot for Data Anonymization: A Mechanism Design Perspective. CoRR abs/2101.12442 (2021) - [i4]Farhan Sadique, Ignacio Astaburuaga, Raghav Kaul, Shamik Sengupta, Shahriar Badsha, James Schnebly, Adam Cassell, Jeff Springer, Nancy Latourrette, Sergiu M. Dascalu:
Cybersecurity Information Exchange with Privacy (CYBEX-P) and TAHOE - A Cyberthreat Language. CoRR abs/2106.01632 (2021) - [i3]Farhan Sadique, Shamik Sengupta:
Analysis of Attacker Behavior in Compromised Hosts During Command and Control. CoRR abs/2106.04720 (2021) - [i2]Sharif Amit Kamran, Shamik Sengupta, Alireza Tavakkoli:
Semi-supervised Conditional GAN for Simultaneous Generation and Detection of Phishing URLs: A Game theoretic Perspective. CoRR abs/2108.01852 (2021) - [i1]Farhan Sadique, Shamik Sengupta:
Modeling and Analyzing Attacker Behavior in IoT Botnet using Temporal Convolution Network (TCN). CoRR abs/2108.12479 (2021) - 2020
- [j38]Iman Vakilinia, Shamik Sengupta:
Vulnerability market as a public-good auction with privacy preservation. Comput. Secur. 93: 101807 (2020) - [j37]Raj Mani Shukla, Shamik Sengupta:
COP: An integrated Communication, Optimization, and Prediction unit for smart Plug-in Electric Vehicle Charging. Internet Things 9: 100148 (2020) - [j36]Raj Mani Shukla, Shamik Sengupta:
Scalable and Robust Outlier Detector using Hierarchical Clustering and Long Short-Term Memory (LSTM) Neural Network for the Internet of Things. Internet Things 9: 100167 (2020) - [c93]Ankita Thakkar, Shahriar Badsha, Shamik Sengupta:
Game theoretic approach applied in cybersecurity information exchange framework. CCNC 2020: 1-7 - [c92]Shahriar Badsha, Iman Vakilinia, Shamik Sengupta:
BloCyNfo-Share: Blockchain based Cybersecurity Information Sharing with Fine Grained Access Control. CCWC 2020: 317-323 - [c91]Farhan Sadique, Raghav Kaul, Shahriar Badsha, Shamik Sengupta:
An Automated Framework for Real-time Phishing URL Detection. CCWC 2020: 335-341 - [c90]Laik Ruetten, Paulo Alexandre Regis, David Feil-Seifer, Shamik Sengupta:
Area-Optimized UAV Swarm Network for Search and Rescue Operations. CCWC 2020: 613-618 - [c89]Bryson Lingenfelter, Iman Vakilinia, Shamik Sengupta:
Analyzing Variation Among IoT Botnets Using Medium Interaction Honeypots. CCWC 2020: 761-767 - [c88]Rahul Dubey, Sushil J. Louis, Shamik Sengupta:
Evolving Dynamically Reconfiguring UAV-hosted Mesh Networks. CEC 2020: 1-8 - [c87]Tapadhir Das, Abdel Rahman Eldosouky, Shamik Sengupta:
Think Smart, Play Dumb: Analyzing Deception in Hardware Trojan Detection Using Game Theory. Cyber Security 2020: 1-8 - [c86]Sowmya Kudva, Renat Norderhaug, Shahriar Badsha, Shamik Sengupta, A. S. M. Kayes:
PEBERS: Practical Ethereum Blockchain based Efficient Ride Hailing Service. ICIoT 2020: 422-428 - [c85]Shafkat Islam, Shahriar Badsha, Shamik Sengupta:
A Light-weight Blockchain Architecture for V2V Knowledge Sharing at Vehicular Edges. ISC2 2020: 1-8 - [c84]Aaron Walker, Shamik Sengupta:
Malware Family Fingerprinting Through Behavioral Analysis. ISI 2020: 1-5 - [c83]Arpan Bhattacharjee, Shahriar Badsha, Shamik Sengupta:
Blockchain-based Secure and Reliable Manufacturing System. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 228-233 - [c82]Shirshak Raja Maskey, Shahriar Badsha, Shamik Sengupta, Ibrahim Khalil:
BITS: Blockchain based Intelligent Transportation System with Outlier Detection for Smart City. PerCom Workshops 2020: 1-6 - [c81]Michael Stepzinski, Shamik Sengupta:
Cybersecurity analysis in Dedicated Short-Range Communications in vehicular networks. UEMCON 2020: 21-27 - [c80]Yash Shah, Shamik Sengupta:
A survey on Classification of Cyber-attacks on IoT and IIoT devices. UEMCON 2020: 406-413 - [c79]Paulo Alexandre Regis, Amar Nath Patra, Shamik Sengupta:
Low-cost wireless testbed for Internet of Things ad hoc networks prototyping and evaluation. WF-IoT 2020: 1-6 - [c78]Nicholas Ceccarelli, Paulo Alexandre Regis, Shamik Sengupta, David Feil-Seifer:
Optimal UAV Positioning for a Temporary Network Using an Iterative Genetic Algorithm. WOCC 2020: 1-6
2010 – 2019
- 2019
- [j35]Suman Bhunia, Mahmudur Khan, Murat Yuksel, Shamik Sengupta:
In-band LOS discovery using highly directional transceivers. Ad Hoc Networks 91 (2019) - [j34]Amar Nath Patra, Paulo Alexandre Regis, Shamik Sengupta:
Dynamic self-reconfiguration of unmanned aerial vehicles to serve overloaded hotspot cells. Comput. Electr. Eng. 75: 77-89 (2019) - [j33]Iman Vakilinia, Shamik Sengupta:
Fair and private rewarding in a coalitional game of cybersecurity information sharing. IET Inf. Secur. 13(6): 530-540 (2019) - [j32]Amar Nath Patra, Paulo Alexandre Regis, Shamik Sengupta:
Distributed allocation and dynamic reassignment of channels in UAV networks for wireless coverage. Pervasive Mob. Comput. 54: 58-70 (2019) - [j31]Iman Vakilinia, Shamik Sengupta:
A Coalitional Cyber-Insurance Framework for a Common Platform. IEEE Trans. Inf. Forensics Secur. 14(6): 1526-1538 (2019) - [c77]Farhan Sadique, Khalid Bakhshaliyev, Jeff Springer, Shamik Sengupta:
A System Architecture of Cybersecurity Information Exchange with Privacy (CYBEX-P). CCWC 2019: 493-498 - [c76]James Schnebly, Shamik Sengupta:
Random Forest Twitter Bot Classifier. CCWC 2019: 506-512 - [c75]Ignacio Astaburuaga, Amee Lombardi, Brian La Torre, Carolyn Hughes, Shamik Sengupta:
Vulnerability Analysis of AR.Drone 2.0, an Embedded Linux System. CCWC 2019: 666-672 - [c74]Aaron Walker, Muhammad Faisal Amjad, Shamik Sengupta:
Cuckoo's Malware Threat Scoring and Classification: Friend or Foe? CCWC 2019: 678-684 - [c73]Shahriar Badsha, Iman Vakilinia, Shamik Sengupta:
Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense. CCWC 2019: 708-714 - [c72]Iman Vakilinia, Shahin Vakilinia, Shahriar Badsha, Engin Arslan, Shamik Sengupta:
Pooling Approach for Task Allocation in the Blockchain Based Decentralized Storage Network. CNSM 2019: 1-6 - [c71]Watson Jia, Raj Mani Shukla, Shamik Sengupta:
Anomaly Detection using Supervised Learning and Multiple Statistical Methods. ICMLA 2019: 1291-1297 - [c70]Aaron Walker, Shamik Sengupta:
Insights into Malware Detection via Behavioral Frequency Analysis Using Machine Learning. MILCOM 2019: 1-6 - 2018
- [j30]Suman Bhunia, Paulo Alexandre Regis, Shamik Sengupta:
Distributed adaptive beam nulling to survive against jamming in 3D UAV mesh networks. Comput. Networks 137: 83-97 (2018) - [j29]Deepak K. Tosh, Shamik Sengupta, Charles A. Kamhoua, Kevin A. Kwiat:
Establishing evolutionary game models for CYBer security information EXchange (CYBEX). J. Comput. Syst. Sci. 98: 27-52 (2018) - [j28]Suman Bhunia, Edward Miles, Shamik Sengupta, Felisa J. Vázquez-Abad:
CR-Honeynet: A Cognitive Radio Learning and Decoy-Based Sustenance Mechanism to Avoid Intelligent Jammer. IEEE Trans. Cogn. Commun. Netw. 4(3): 567-581 (2018) - [c69]Raj Mani Shukla, Shamik Sengupta, Amar Nath Patra:
Smart plug-in electric vehicle charging to reduce electric load variation at a parking place. CCWC 2018: 632-638 - [c68]Raj Mani Shukla, Shamik Sengupta, Amar Nath Patra:
Software-defined network based resource allocation in distributed servers for unmanned aerial vehicles. CCWC 2018: 796-802 - [c67]Alisha Thapaliya, Shamik Sengupta, Jeff Springer:
Wi-Fi spectrum usage analytics in University of Nevada, Reno. I2MTC 2018: 1-6 - [c66]Raj Mani Shukla, Shamik Sengupta, Mainak Chatterjee:
Software-defined network and cloud-edge collaboration for smart and connected vehicles. ICDCN Workshops 2018: 6:1-6:6 - [c65]Iman Vakilinia, Sui Cheung, Shamik Sengupta:
Sharing Susceptible Passwords as Cyber Threat Intelligence Feed. MILCOM 2018: 1-6 - [c64]Tristan Brodeur, Paulo Alexandre Regis, David Feil-Seifer, Shamik Sengupta:
Search and Rescue Operations with Mesh Networked Robots. UEMCON 2018: 6-12 - [c63]Raj Mani Shukla, Shamik Sengupta:
Analysis and Detection of Outliers due to Data Falsification Attacks in Vehicular Traffic Prediction Application. UEMCON 2018: 688-694 - [c62]Farhan Sadique, Sui Cheung, Iman Vakilinia, Shahriar Badsha, Shamik Sengupta:
Automated Structured Threat Information Expression (STIX) Document Generation with Privacy Preservation. UEMCON 2018: 847-853 - [c61]Athira Pillai, James Schnebly, Shamik Sengupta:
Development of Web-based Automated System for Cyber Analytic Applications. UEMCON 2018: 866-871 - [c60]Iman Vakilinia, Shahriar Badsha, Shamik Sengupta:
Crowdfunding the Insurance of a Cyber-Product Using Blockchain. UEMCON 2018: 964-970 - [c59]Alisha Thapaliya, James Schnebly, Shamik Sengupta:
Predicting Congestion Level in Wireless Networks Using an Integrated Approach of Supervised and Unsupervised Learning. UEMCON 2018: 977-982 - [c58]Paulo Alexandre Regis, Amar Nath Patra, Shamik Sengupta:
Unmanned Aerial Vehicles Positioning Scheme for First-Responders in a Dynamic Area of Interest. VTC Fall 2018: 1-5 - 2017
- [j27]Saad Mneimneh, Suman Bhunia, Felisa J. Vázquez-Abad, Shamik Sengupta:
A game-theoretic and stochastic survivability mechanism against induced attacks in Cognitive Radio Networks. Pervasive Mob. Comput. 40: 577-592 (2017) - [c57]Deepak K. Tosh, Sachin Shetty, Shamik Sengupta, Jay P. Kesan, Charles A. Kamhoua:
Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance. GAMENETS 2017: 154-164 - [c56]Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. GameSec 2017: 519-532 - [c55]Iman Vakilinia, Sushil J. Louis, Shamik Sengupta:
Evolving sharing strategies in cybersecurity information exchange framework. GECCO (Companion) 2017: 309-310 - [c54]Suman Bhunia, Shamik Sengupta:
Distributed adaptive beam nulling to mitigate jamming in 3D UAV mesh networks. ICNC 2017: 120-125 - [c53]Paulo Alexandre Regis, Suman Bhunia, Shamik Sengupta:
Enhancing performance and longevity of multi-radio multi-channel hetnets through dynamic path-assignment. ICNC 2017: 498-503 - [c52]Iman Vakilinia, Shamik Sengupta:
A coalitional game theory approach for cybersecurity information sharing. MILCOM 2017: 237-242 - [c51]Paulo Alexandre Regis, Shamik Sengupta:
Distributed split-path routing strategy for multi-hop mesh networks. MILCOM 2017: 575-580 - [c50]Suman Bhunia, Shamik Sengupta:
Implementation of interface agility for duplex dynamic spectrum access radio using USRP. MILCOM 2017: 762-767 - [c49]Iman Vakilinia, Deepak K. Tosh, Shamik Sengupta:
3-Way game model for privacy-preserving cybersecurity information exchange framework. MILCOM 2017: 829-834 - [c48]Raj Mani Shukla, Shamik Sengupta:
A novel software-defined network based approach for charging station allocation to plugged-in electric vehicles. NCA 2017: 437-441 - [c47]Amar Nath Patra, Shamik Sengupta:
Dynamic deployment of UAV-enabled floating access points for serving hot zones. SPECTS 2017: 1-8 - [c46]