default search action
Sanjay K. Jha
Sanjay Jha 0001
Person information
- affiliation: University of New South Wales, School of Computer Science and Engineering, Sydney, Australia
Other persons with the same name
- Sanjay Jha — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j83]Wenbin Wang, Yang Song, Sanjay K. Jha:
USAT: A Universal Speaker-Adaptive Text-to-Speech Approach. IEEE ACM Trans. Audio Speech Lang. Process. 32: 2590-2604 (2024) - [j82]Neel Bhaskar, Jawad Ahmed, Rahat Masood, Nadeem Ahmed, Stephen Kerr, Sanjay K. Jha:
A Comprehensive Threat Modelling Analysis for Distributed Energy Resources. ACM Trans. Cyber Phys. Syst. 8(4): 40:1-40:32 (2024) - [j81]Ishan Karunanayake, Jiaojiao Jiang, Nadeem Ahmed, Sanjay K. Jha:
Exploring Uncharted Waters of Website Fingerprinting. IEEE Trans. Inf. Forensics Secur. 19: 1840-1854 (2024) - [j80]Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Jiaojiao Jiang, Sanjay K. Jha:
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis. IEEE Trans. Inf. Forensics Secur. 19: 9173-9187 (2024) - [j79]Ahmed S. Musleh, Jawad Ahmed, Nadeem Ahmed, Hunter Xu, Guo Chen, Stephen Kerr, Sanjay Jha:
Experimental Cybersecurity Evaluation of Distributed Solar Inverters: Vulnerabilities and Impacts on the Australian Grid. IEEE Trans. Smart Grid 15(5): 5139-5150 (2024) - [c170]Yuvin Perera, Gustavo Batista, Wen Hu, Salil S. Kanhere, Sanjay K. Jha:
SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition. DCOSS-IoT 2024: 229-233 - [c169]Marium Malik, Jiaojiao Jiang, Yang Song, Sanjay Jha:
MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction. ECIR (3) 2024: 345-353 - [c168]Aryan Sharma, Deepak Mishra, Sanjay K. Jha, Aruna Seneviratne:
An Investigation into the Non-Uniformity of Channel State Information in WiFi Sensing Systems. INFOCOM (Workshops) 2024: 1-6 - [c167]Shohreh Deldari, Mohammad Goudarzi, Aditya Joshi, Arash Shaghaghi, Simon Finn, Flora D. Salim, Sanjay Jha:
AuditNet: Conversational AI Security Assistant. MobileHCI (Companion) 2024: 22:1-22:4 - [c166]Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha:
Lack of Systematic Approach to Security of IoT Context Sharing Platforms. PST 2024: 1-4 - [i37]Wenbin Wang, Yang Song, Sanjay Jha:
USAT: A Universal Speaker-Adaptive Text-to-Speech Approach. CoRR abs/2404.18094 (2024) - [i36]Wenbin Wang, Yang Song, Sanjay Jha:
GLOBE: A High-quality English Corpus with Global Accents for Zero-shot Speaker Adaptive Text-to-Speech. CoRR abs/2406.14875 (2024) - [i35]Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha:
Lack of Systematic Approach to Security of IoT Context Sharing Platforms. CoRR abs/2407.05290 (2024) - [i34]Shohreh Deldari, Mohammad Goudarzi, Aditya Joshi, Arash Shaghaghi, Simon Finn, Flora D. Salim, Sanjay Jha:
AuditNet: A Conversational AI-based Security Assistant [DEMO]. CoRR abs/2407.14116 (2024) - [i33]Uzma Maroof, Gustavo Batista, Arash Shaghaghi, Sanjay K. Jha:
Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification. CoRR abs/2407.19662 (2024) - [i32]Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Burkhard Stiller, Sanjay K. Jha:
Towards Threat Modelling of IoT Context-Sharing Platforms. CoRR abs/2408.12081 (2024) - [i31]Ishan Karunanayake, Mashael AlSabah, Nadeem Ahmed, Sanjay K. Jha:
Examining the Rat in the Tunnel: Interpretable Multi-Label Classification of Tor-based Malware. CoRR abs/2409.16639 (2024) - [i30]Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay K. Jha:
Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning. CoRR abs/2410.11205 (2024) - 2023
- [j78]Ishan Karunanayake, Nadeem Ahmed, Robert A. Malaney, Md. Rafiqul Islam, Sanjay K. Jha:
Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification. IEEE Access 11: 70011-70022 (2023) - [c165]Wenbin Wang, Yang Song, Sanjay Jha:
Generalizable Zero-Shot Speaker Adaptive Speech Synthesis with Disentangled Representations. INTERSPEECH 2023: 4454-4458 - [c164]Ahmed S. Musleh, Jawad Ahmed, Nadeem Ahmed, Hunter Xu, Guo Chen, Jiankun Hu, Sanjay K. Jha:
Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems. SmartGridComm 2023: 1-6 - [i29]Wenbin Wang, Yang Song, Sanjay Jha:
Generalizable Zero-Shot Speaker Adaptive Speech Synthesis with Disentangled Representations. CoRR abs/2308.13007 (2023) - 2022
- [j77]Uzma Maroof, Arash Shaghaghi, Regio A. Michelin, Sanjay K. Jha:
iRECOVer: Patch your IoT on-the-fly. Future Gener. Comput. Syst. 132: 178-193 (2022) - [j76]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Sushmita Ruj, Salil S. Kanhere, Sanjay K. Jha:
DIMY: Enabling privacy-preserving contact tracing. J. Netw. Comput. Appl. 202: 103356 (2022) - [j75]Siqi Ma, Juanru Li, Surya Nepal, Diethelm Ostry, David Lo, Sanjay K. Jha, Robert H. Deng, Elisa Bertino:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - [j74]Rizka Widyarini Purwanto, Arindam Pal, Alan Blair, Sanjay Jha:
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool. IEEE Trans. Inf. Forensics Secur. 17: 1497-1512 (2022) - [j73]Jiaojiao Jiang, Shuiqiao Yang, Sanjay Jha:
Network Growth From Global and Local Influential Nodes. IEEE Trans. Netw. Sci. Eng. 9(4): 2549-2561 (2022) - [c163]Aryan Sharma, Wenqi Jiang, Deepak Mishra, Sanjay K. Jha, Aruna Seneviratne:
Optimised CNN for Human Counting Using Spectrograms of Probabilistic WiFi CSI. GLOBECOM 2022: 1-6 - [c162]Yuvin Perera, Nadeem Ahmed, Salil S. Kanhere, Wen Hu, Sanjay K. Jha:
IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home? ICC 2022: 2954-2959 - [c161]Wenbin Wang, Yang Song, Sanjay Jha:
Autolv: Automatic Lecture Video Generator. ICIP 2022: 1086-1090 - [c160]Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Sanjay Jha:
BloomXNOR-Net: privacy-preserving machine learning in IoT. S3@MobiCom 2022: 1-3 - [i28]Jin Ho Go, Alina Sari, Jiaojiao Jiang, Shuiqiao Yang, Sanjay K. Jha:
Fake News Quick Detection on Dynamic Heterogeneous Information Networks. CoRR abs/2205.07039 (2022) - [i27]Rizka Purwanto, Arindam Pal, Alan Blair, Sanjay K. Jha:
PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool. CoRR abs/2207.10801 (2022) - [i26]Wenbin Wang, Yang Song, Sanjay Jha:
AutoLV: Automatic Lecture Video Generator. CoRR abs/2209.08795 (2022) - 2021
- [j72]Ishan Karunanayake, Nadeem Ahmed, Robert A. Malaney, Rafiqul Islam, Sanjay K. Jha:
De-Anonymisation Attacks on Tor: A Survey. IEEE Commun. Surv. Tutorials 23(4): 2324-2350 (2021) - [j71]Chuka Oham, Regio A. Michelin, Raja Jurdak, Salil S. Kanhere, Sanjay Jha:
B-FERL: Blockchain based framework for securing smart vehicles. Inf. Process. Manag. 58(1): 102426 (2021) - [j70]Wanli Xue, Chengwen Luo, Yiran Shen, Rajib Rana, Guohao Lan, Sanjay Jha, Aruna Seneviratne, Wen Hu:
Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things. IEEE Trans. Mob. Comput. 20(10): 3049-3065 (2021) - [c159]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Wei Song, Sushmita Ruj, Salil S. Kanhere, Sanjay K. Jha:
Towards Privacy-preserving Digital Contact Tracing. IEEE ICBC 2021: 1-3 - [c158]Jiayao Gao, Weitao Xu, Salil S. Kanhere, Sanjay Jha, Jun Young Kim, Walter Huang, Wen Hu:
A Novel Model-Based Security Scheme for LoRa Key Generation. IPSN 2021: 47-61 - [c157]Jun Liu, Jiayao Gao, Sanjay K. Jha, Wen Hu:
Seirios: leveraging multiple channels for LoRaWAN indoor and outdoor localization. MobiCom 2021: 656-669 - [i25]Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay K. Jha:
All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks. CoRR abs/2102.01944 (2021) - [i24]Jiaojiao Jiang, Sanjay Jha:
Network Growth From Global and Local Influential Nodes. CoRR abs/2103.00487 (2021) - [i23]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Sushmita Ruj, Salil S. Kanhere, Sanjay Jha:
DIMY: Enabling Privacy-preserving Contact Tracing. CoRR abs/2103.05873 (2021) - [i22]Jun Liu, Jiayao Gao, Sanjay Jha, Wen Hu:
Seirios: Leveraging Multiple Channels for LoRaWAN Indoor and Outdoor Localization. CoRR abs/2108.06884 (2021) - [i21]Rizka Purwanto, Arindam Pal, Alan Blair, Sanjay Jha:
Man versus Machine: AutoML and Human Experts' Role in Phishing Detection. CoRR abs/2108.12193 (2021) - 2020
- [j69]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert A. Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay K. Jha:
A Survey of COVID-19 Contact Tracing Apps. IEEE Access 8: 134577-134601 (2020) - [j68]Weitao Xu, Jun Young Kim, Walter Huang, Salil S. Kanhere, Sanjay K. Jha, Wen Hu:
Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings. IEEE Internet Things J. 7(1): 298-310 (2020) - [c156]Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. CISIS 2020: 111-121 - [c155]Rizka Purwanto, Arindam Pal, Alan Blair, Sanjay Jha:
PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites. CNS 2020: 1-9 - [c154]Girish Revadigar, Chitra Javali, Sanjay Jha:
ProxiCar: Proximity-Based Secure Digital Key Solution for Cars. COMSNETS 2020: 282-289 - [c153]Regio A. Michelin, Nadeem Ahmed, Salil S. Kanhere, Aruna Seneviratne, Sanjay K. Jha:
Leveraging lightweight blockchain to establish data integrity for surveillance cameras. IEEE ICBC 2020: 1-3 - [c152]Jiayao Gao, Weitao Xu, Salil S. Kanhere, Sanjay K. Jha, Wen Hu:
Poster Abstract: A Novel Modeling Involved Security Approach for LoRa Key Generation. IPSN 2020: 327-328 - [c151]Jun Liu, Weitao Xu, Sanjay Jha, Wen Hu:
Nephalai: towards LPWAN C-RAN with physical layer compression. MobiCom 2020: 36:1-36:12 - [c150]Weitao Xu, Jun Young Kim, Walter Huang, Salil S. Kanhere, Sanjay K. Jha, Wen Hu:
EMIoT: A LoRa-enabled Smart Building Solution Based on Emergency Lights. BuildSys 2020: 330-331 - [p2]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. Handbook of Computer Networks and Cyber Security 2020: 341-387 - [i20]Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. CoRR abs/2005.07987 (2020) - [i19]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert A. Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay K. Jha:
A Survey of COVID-19 Contact Tracing Apps. CoRR abs/2006.10306 (2020) - [i18]Chuka Oham, Regio A. Michelin, Salil S. Kanhere, Raja Jurdak, Sanjay K. Jha:
B-FERL: Blockchain based Framework for Securing Smart Vehicles. CoRR abs/2007.10528 (2020) - [i17]Rizka Purwanto, Arindam Pal, Alan Blair, Sanjay Jha:
PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites. CoRR abs/2007.11955 (2020) - [i16]Weitao Xu, Jin Zhang, Jun Young Kim, Walter Huang, Salil S. Kanhere, Sanjay K. Jha, Wen Hu, Prasant Misra:
A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases. CoRR abs/2007.15906 (2020) - [i15]Jun Liu, Weitao Xu, Sanjay K. Jha, Wen Hu:
Nephalai: Towards LPWAN C-RAN with Physical Layer Compression. CoRR abs/2008.02599 (2020) - [i14]Ishan Karunanayake, Nadeem Ahmed, Robert A. Malaney, Rafiqul Islam, Sanjay K. Jha:
Anonymity with Tor: A Survey on Tor Attacks. CoRR abs/2009.13018 (2020) - [i13]Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay Jha:
HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios. CoRR abs/2012.07474 (2020)
2010 – 2019
- 2019
- [j67]Hailun Tan, Gene Tsudik, Sanjay K. Jha:
MTRA: Multi-Tier randomized remote attestation in IoT networks. Comput. Secur. 81: 78-93 (2019) - [j66]Mosarrat Jahan, Suranga Seneviratne, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha:
Light weight and fine-grained access mechanism for secure access to outsourced data. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j65]Mohsen Rezvani, David Rajaratnam, Aleksandar Ignjatovic, Maurice Pagnucco, Sanjay Jha:
Analyzing XACML policies using answer set programming. Int. J. Inf. Sec. 18(4): 465-479 (2019) - [j64]Weitao Xu, Sanjay Jha, Wen Hu:
LoRa-Key: Secure Key Generation System for LoRa-Based Network. IEEE Internet Things J. 6(4): 6404-6416 (2019) - [j63]Weitao Xu, Jin Zhang, Jun Young Kim, Walter Huang, Salil S. Kanhere, Sanjay K. Jha, Wen Hu:
The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings. IEEE Internet Things J. 6(4): 7266-7281 (2019) - [j62]Jun Young Kim, Wen Hu, Dilip Sarkar, Sanjay Jha:
Long-term secure management of large scale Internet of Things applications. J. Netw. Comput. Appl. 138: 15-26 (2019) - [j61]Kai Li, Chau Yuen, Branislav Kusy, Raja Jurdak, Aleksandar Ignjatovic, Salil S. Kanhere, Sanjay Jha:
Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting. IEEE Trans. Mob. Comput. 18(6): 1274-1287 (2019) - [c149]Siqi Ma, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal, Diethelm Ostry, Elisa Bertino, Robert H. Deng, Zhuo Ma, Sanjay Jha:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c148]Uzma Maroof, Arash Shaghaghi, Sanjay K. Jha:
PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices. IoT S&P@CCS 2019: 50-57 - [c147]Siqi Ma, Elisa Bertino, Surya Nepal, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - [i12]Chuka Oham, Raja Jurdak, Sanjay K. Jha:
Risk Analysis Study of Fully Autonomous Vehicle. CoRR abs/1905.10910 (2019) - [i11]Weitao Xu, Jun Young Kim, Walter Huang, Salil S. Kanhere, Sanjay Jha, Wen Hu:
Measurement, Characterization and Modeling of LoRa Technology in Multi-floor Buildings. CoRR abs/1909.03900 (2019) - [i10]Regio A. Michelin, Nadeem Ahmed, Salil S. Kanhere, Aruna Seneviratne, Sanjay Jha:
Leveraging lightweight blockchain to establish data integrity for surveillance cameras. CoRR abs/1912.11044 (2019) - 2018
- [j60]Jun Young Kim, Wen Hu, Hossein Shafagh, Sanjay Jha:
SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things. IEEE Trans. Dependable Secur. Comput. 15(6): 1041-1054 (2018) - [j59]Mosarrat Jahan, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha:
Light Weight Write Mechanism for Cloud Data. IEEE Trans. Parallel Distributed Syst. 29(5): 1131-1146 (2018) - [c146]Hailun Tan, Diet Ostry, Sanjay Jha:
Exploiting multiple side channels for secret key agreement in Wireless Networks. ICDCN 2018: 39:1-39:10 - [c145]Chuka Oham, Raja Jurdak, Salil S. Kanhere, Ali Dorri, Sanjay K. Jha:
B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication. iThings/GreenCom/CPSCom/SmartData 2018: 1171-1180 - [c144]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. LCN 2018: 553-561 - [c143]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. NCA 2018: 1-5 - [c142]Weitao Xu, Sanjay Jha, Wen Hu:
Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN. TrustCom/BigDataSE 2018: 231-236 - [i9]Chuka Oham, Salil S. Kanhere, Raja Jurdak, Sanjay K. Jha:
A Blockchain Based Liability Attribution Framework for Autonomous Vehicles. CoRR abs/1802.05050 (2018) - [i8]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions. CoRR abs/1804.00262 (2018) - [i7]Chuka Oham, Raja Jurdak, Salil S. Kanhere, Ali Dorri, Sanjay K. Jha:
B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication. CoRR abs/1806.06169 (2018) - [i6]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. CoRR abs/1807.02593 (2018) - [i5]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. CoRR abs/1809.06988 (2018) - 2017
- [j58]Girish Revadigar, Chitra Javali, Weitao Xu, Athanasios V. Vasilakos, Wen Hu, Sanjay Jha:
Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables. IEEE Trans. Inf. Forensics Secur. 12(10): 2467-2482 (2017) - [j57]Prasant Misra, Wen Hu, Mingrui Yang, Marco F. Duarte, Sanjay Jha:
Sparsity Based Efficient Cross-Correlation Techniques in Sensor Networks. IEEE Trans. Mob. Comput. 16(7): 2037-2050 (2017) - [j56]Wanqing Tu, Cormac J. Sreenan, Sanjay Jha, Qian Zhang:
Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks. IEEE Trans. Mob. Comput. 16(12): 3431-3444 (2017) - [c141]Jun Young Kim, Ralph Holz, Wen Hu, Sanjay Jha:
Automated Analysis of Secure Internet of Things Protocols. ACSAC 2017: 238-249 - [c140]Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha:
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. AsiaCCS 2017: 849-861 - [c139]Hailun Tan, Gene Tsudik, Sanjay Jha:
MTRA: Multiple-tier remote attestation in IoT networks. CNS 2017: 1-9 - [c138]Mosarrat Jahan, Aruna Seneviratne, Sanjay Jha:
Access Mechanism for Outsourced Data by Preserving Data Owner's Preference. LCN 2017: 611-614 - [c137]Mosarrat Jahan, Suranga Seneviratne, Ben Chu, Aruna Seneviratne, Sanjay K. Jha:
Privacy preserving data access scheme for IoT devices. NCA 2017: 217-226 - [c136]Zainab Abaid, Mohamed Ali Kâafar, Sanjay Jha:
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers. NCA 2017: 375-384 - [c135]Zainab Abaid, Mohamed Ali Kâafar, Sanjay Jha:
Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study. Networking 2017: 1-9 - [c134]Mosarrat Jahan, Partha Sarathi Roy, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. TrustCom/BigDataSE/ICESS 2017: 201-209 - [c133]Jun Young Kim, Wen Hu, Dilip Sarkar, Sanjay Jha:
ESIoT: enabling secure management of the internet of things. WISEC 2017: 219-229 - [i4]Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha:
WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks. CoRR abs/1708.05477 (2017) - 2016
- [j55]Nadeem Ahmed, Salil S. Kanhere, Sanjay K. Jha:
On the importance of link characterization for aerial wireless sensor networks. IEEE Commun. Mag. 54(5): 52-57 (2016) - [j54]Kai Li, Nadeem Ahmed, Salil S. Kanhere, Sanjay K. Jha:
Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna. Pervasive Mob. Comput. 30: 151-165 (2016) - [j53]Kai Li, Wei Ni, Xin Wang, Ren Ping Liu, Salil S. Kanhere, Sanjay K. Jha:
Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles. IEEE Trans. Mob. Comput. 15(6): 1377-1386 (2016) - [c132]Muhammad Siddiqi, Vijay Sivaraman, Sanjay Jha:
Timestamp integrity in wearable healthcare devices. ANTS 2016: 1-6 - [c131]Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay Jha:
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks. LCN 2016: 61-68 - [c130]Chitra Javali, Girish Revadigar, Kasper Bonne Rasmussen, Wen Hu, Sanjay Jha:
I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol. LCN 2016: 477-485 - [c129]Mohsen Rezvani, Aleksandar Ignjatovic, Maurice Pagnucco, Sanjay K. Jha:
Anomaly-free policy composition in software-defined networks. Networking 2016: 28-36 - [c128]Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). NFV-SDN 2016: 50-55 - [c127]Chitra Javali, Girish Revadigar, Daniel Pletea, Sanjay Jha:
Demo abstract: Location fingerprint evidence and authorisation using WiFi channel characteristics. PerCom Workshops 2016: 1-3 - [c126]