default search action
Search dblp for Publications
export results for "Sudipta Chattopadhyay"
@article{DBLP:journals/jss/RajanSTC24, author = {Sai Sathiesh Rajan and Ezekiel O. Soremekun and Yves Le Traon and Sudipta Chattopadhyay}, title = {Distribution-aware fairness test generation}, journal = {J. Syst. Softw.}, volume = {215}, pages = {112090}, year = {2024}, url = {https://doi.org/10.1016/j.jss.2024.112090}, doi = {10.1016/J.JSS.2024.112090}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/RajanSTC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/SambangiMGCM24, author = {Ramesh Sambangi and Kanchan Manna and Vinay Chakravarthi Gogineni and Santanu Chattopadhyay and Sudipta Mahapatra}, title = {Congestion-Aware Vertical Link Placement and Application Mapping Onto 3-D Network-on-Chip Architectures}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {43}, number = {8}, pages = {2249--2262}, year = {2024}, url = {https://doi.org/10.1109/TCAD.2024.3371255}, doi = {10.1109/TCAD.2024.3371255}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/SambangiMGCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiYGZC24, author = {Meixuan Li and Awais Yousaf and Mark Goh and Jianying Zhou and Sudipta Chattopadhyay}, editor = {Martin Andreoni}, title = {Guidelines for Cyber Risk Management in Autonomous Shipping}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2024 Satellite Workshops, AIBlock, AIHWS, AIoTS, SCI, AAC, SiMLA, LLE, and CIMSS, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14587}, pages = {143--161}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-61489-7\_9}, doi = {10.1007/978-3-031-61489-7\_9}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/LiYGZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/ShangGC24, author = {Zewen Shang and Matheus E. Garbelini and Sudipta Chattopadhyay}, title = {U-Fuzz: Stateful Fuzzing of IoT Protocols on {COTS} Devices}, booktitle = {{IEEE} Conference on Software Testing, Verification and Validation, {ICST} 2024, Toronto, ON, Canada, May 27-31, 2024}, pages = {209--220}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICST60714.2024.00027}, doi = {10.1109/ICST60714.2024.00027}, timestamp = {Thu, 05 Sep 2024 16:02:12 +0200}, biburl = {https://dblp.org/rec/conf/icst/ShangGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/ShangGC24a, author = {Zewen Shang and Matheus E. Garbelini and Sudipta Chattopadhyay}, title = {U-Fuzz: {A} Tool Prototype for Stateful Fuzzing of IoT Protocols on {COTS} Devices}, booktitle = {{IEEE} Conference on Software Testing, Verification and Validation, {ICST} 2024, Toronto, ON, Canada, May 27-31, 2024}, pages = {448--450}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICST60714.2024.00051}, doi = {10.1109/ICST60714.2024.00051}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icst/ShangGC24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cpss/2024, editor = {Jianying Zhou and Sudipta Chattopadhyay}, title = {Proceedings of the 10th {ACM} Cyber-Physical System Security Workshop, {CPSS} 2024, Singapore, 2 July 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3626205}, doi = {10.1145/3626205}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpss/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-11440, author = {Yustynn Panicker and Ezekiel O. Soremekun and Sumei Sun and Sudipta Chattopadhyay}, title = {End-user Comprehension of Transfer Risks in Smart Contracts}, journal = {CoRR}, volume = {abs/2407.11440}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.11440}, doi = {10.48550/ARXIV.2407.11440}, eprinttype = {arXiv}, eprint = {2407.11440}, timestamp = {Mon, 26 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-11440.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-12830, author = {Sai Sathiesh Rajan and Ezekiel O. Soremekun and Sudipta Chattopadhyay}, title = {Knowledge-based Consistency Testing of Large Language Models}, journal = {CoRR}, volume = {abs/2407.12830}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.12830}, doi = {10.48550/ARXIV.2407.12830}, eprinttype = {arXiv}, eprint = {2407.12830}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-12830.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2408-02023, author = {Yee Ching Tok and Davis Zheng Yang and Sudipta Chattopadhyay}, title = {A Smart City Infrastructure Ontology for Threats, Cybercrime, and Digital Forensic Investigation}, journal = {CoRR}, volume = {abs/2408.02023}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2408.02023}, doi = {10.48550/ARXIV.2408.02023}, eprinttype = {arXiv}, eprint = {2408.02023}, timestamp = {Wed, 11 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2408-02023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SoremekunUC23, author = {Ezekiel O. Soremekun and Sakshi Udeshi and Sudipta Chattopadhyay}, title = {Towards Backdoor Attacks and Defense in Robust Machine Learning Models}, journal = {Comput. Secur.}, volume = {127}, pages = {103101}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103101}, doi = {10.1016/J.COSE.2023.103101}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SoremekunUC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TokC23, author = {Yee Ching Tok and Sudipta Chattopadhyay}, title = {Identifying threats, cybercrime and digital forensic opportunities in Smart City Infrastructure via threat modeling}, journal = {Forensic Sci. Int. Digit. Investig.}, volume = {45}, pages = {301540}, year = {2023}, url = {https://doi.org/10.1016/j.fsidi.2023.301540}, doi = {10.1016/J.FSIDI.2023.301540}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/TokC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/MajumdarTC23, author = {Suvaditya Majumdar and Chandrima Thakur and Sudipta Chattopadhyay}, title = {A novel relay-aided centralized cooperative spectrum sensing scheme using radio frequency energy harvesting}, journal = {Int. J. Commun. Syst.}, volume = {36}, number = {1}, year = {2023}, url = {https://doi.org/10.1002/dac.5356}, doi = {10.1002/DAC.5356}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcomsys/MajumdarTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ral/JiaPZWSC23, author = {Yifan Jia and Christopher M. Poskitt and Peixin Zhang and Jingyi Wang and Jun Sun and Sudipta Chattopadhyay}, title = {Boosting Adversarial Training in Safety-Critical Systems Through Boundary Data Selection}, journal = {{IEEE} Robotics Autom. Lett.}, volume = {8}, number = {12}, pages = {8350--8357}, year = {2023}, url = {https://doi.org/10.1109/LRA.2023.3327934}, doi = {10.1109/LRA.2023.3327934}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ral/JiaPZWSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/ChowdhurySTC23, author = {Ritesh Sur Chowdhury and Jayant Kumar Sadhu and Chandrima Thakur and Sudipta Chattopadhyay}, title = {Performance analysis and optimization of a hybrid {TSR-PSR} protocol for AF, {DF} and hybrid {AF-DF} relaying under Weibull fading}, journal = {Telecommun. Syst.}, volume = {82}, number = {1}, pages = {61--90}, year = {2023}, url = {https://doi.org/10.1007/s11235-022-00967-2}, doi = {10.1007/S11235-022-00967-2}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/ChowdhurySTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/SambangiPMMC23, author = {Ramesh Sambangi and Arun Sammit Pandey and Kanchan Manna and Sudipta Mahapatra and Santanu Chattopadhyay}, title = {Application Mapping Onto Manycore Processor Architectures Using Active Search Framework}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {31}, number = {6}, pages = {789--801}, year = {2023}, url = {https://doi.org/10.1109/TVLSI.2023.3239850}, doi = {10.1109/TVLSI.2023.3239850}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/SambangiPMMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/YeoGCZ23, author = {Anthony Kee Teck Yeo and Matheus E. Garbelini and Sudipta Chattopadhyay and Jianying Zhou}, title = {VitroBench: Manipulating in-vehicle networks and {COTS} ECUs on your bench: {A} comprehensive test platform for automotive cybersecurity research}, journal = {Veh. Commun.}, volume = {43}, pages = {100649}, year = {2023}, url = {https://doi.org/10.1016/j.vehcom.2023.100649}, doi = {10.1016/J.VEHCOM.2023.100649}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/YeoGCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/TengLTA00C23, author = {Ko Zheng Teng and Trupil Limbasiya and Federico Turrin and Yan Lin Aung and Sudipta Chattopadhyay and Jianying Zhou and Mauro Conti}, editor = {Rodrigo Roman and Mujeeb Ahmed}, title = {{PAID:} Perturbed Image Attacks Analysis and Intrusion Detection Mechanism for Autonomous Driving Systems}, booktitle = {Proceedings of the 9th {ACM} Cyber-Physical System Security Workshop, {CPSS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {3--13}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3592538.3594273}, doi = {10.1145/3592538.3594273}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpss/TengLTA00C23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dihu/YokoyamaRC23, author = {Setsuko Yokoyama and Sai Sathiesh Rajan and Sudipta Chattopadhyay}, editor = {Anne Baillot and Toma Tasovac and Walter Scholger and Georg Vogeler}, title = {Accented {DH:} Assessing Fairness of Multilingual Speech Recognition Systems}, booktitle = {Annual International Conference of the Alliance of Digital Humanities Organizations, {DH} 2022, Graz, Austria, July 10-14, 2023, Conference Abstracts}, year = {2023}, url = {https://doi.org/10.5281/zenodo.8107519}, doi = {10.5281/ZENODO.8107519}, timestamp = {Wed, 02 Aug 2023 10:13:00 +0200}, biburl = {https://dblp.org/rec/conf/dihu/YokoyamaRC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/RajanS0T23, author = {Sai Sathiesh Rajan and Ezekiel O. Soremekun and Sudipta Chattopadhyay and Yves Le Traon}, title = {Poster: Distribution-aware Fairness Test Generation}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering: {ICSE} 2023 Companion Proceedings, Melbourne, Australia, May 14-20, 2023}, pages = {322--323}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE-Companion58688.2023.00088}, doi = {10.1109/ICSE-COMPANION58688.2023.00088}, timestamp = {Tue, 18 Jul 2023 09:25:31 +0200}, biburl = {https://dblp.org/rec/conf/icse/RajanS0T23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AungWCCZC23, author = {Yan Lin Aung and Shanshan Wang and Wang Cheng and Sudipta Chattopadhyay and Jianying Zhou and Anyu Cheng}, editor = {Elias Athanasopoulos and Bart Mennink}, title = {VNGuard: Intrusion Detection System for In-Vehicle Networks}, booktitle = {Information Security - 26th International Conference, {ISC} 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14411}, pages = {79--98}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49187-0\_5}, doi = {10.1007/978-3-031-49187-0\_5}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/AungWCCZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-11868, author = {Sudipta Chattopadhyay and Srikant Sukumar and Vivek Natarajan}, title = {Adaptive identification of {SISO} linear infinite-dimensional systems}, journal = {CoRR}, volume = {abs/2305.11868}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.11868}, doi = {10.48550/ARXIV.2305.11868}, eprinttype = {arXiv}, eprint = {2305.11868}, timestamp = {Thu, 25 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-11868.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-13935, author = {Sai Sathiesh Rajan and Ezekiel O. Soremekun and Yves Le Traon and Sudipta Chattopadhyay}, title = {Distribution-aware Fairness Test Generation}, journal = {CoRR}, volume = {abs/2305.13935}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.13935}, doi = {10.48550/ARXIV.2305.13935}, eprinttype = {arXiv}, eprint = {2305.13935}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-13935.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-12170, author = {Sudipta Chattopadhyay and Srikant Sukumar and Vivek Natarajan}, title = {Model reference adaptive control for state and input constrained linear systems}, journal = {CoRR}, volume = {abs/2308.12170}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.12170}, doi = {10.48550/ARXIV.2308.12170}, eprinttype = {arXiv}, eprint = {2308.12170}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-12170.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZonunmawiiGSC22, author = {Zonunmawii and Abhijyoti Ghosh and Lourembam Lolit Kumar Singh and Sudipta Chattopadhyay}, title = {Cavity Field Modulation With Modulating Circular Patch Antenna Surface: {A} Key to Realize Reduced Horizontal Radiation and Omni-Present Improvement in Radiation Performance}, journal = {{IEEE} Access}, volume = {10}, pages = {18434--18444}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2021.3130914}, doi = {10.1109/ACCESS.2021.3130914}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZonunmawiiGSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PandaC22, author = {Prabhat Kumar Panda and Sudipta Chattopadhyay}, title = {An enhanced mutual authentication and security protocol for IoT and cloud server}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {31}, number = {2}, pages = {144--156}, year = {2022}, url = {https://doi.org/10.1080/19393555.2020.1871534}, doi = {10.1080/19393555.2020.1871534}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/PandaC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/ThakurC22, author = {Chandrima Thakur and Sudipta Chattopadhyay}, title = {Secrecy performance of a novel energy efficient hybrid CIoT network with beacon-aided {RF} energy harvesting under dissimilar fading environments}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {13}, number = {8}, pages = {4057--4075}, year = {2022}, url = {https://doi.org/10.1007/s12652-021-03589-9}, doi = {10.1007/S12652-021-03589-9}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/ThakurC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/HorgaRCEP22, author = {Adrian Horga and Ahmed Rezine and Sudipta Chattopadhyay and Petru Eles and Zebo Peng}, title = {Symbolic identification of shared memory based bank conflicts for GPUs}, journal = {J. Syst. Archit.}, volume = {127}, pages = {102518}, year = {2022}, url = {https://doi.org/10.1016/j.sysarc.2022.102518}, doi = {10.1016/J.SYSARC.2022.102518}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/HorgaRCEP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ral/JiaPSC22, author = {Yifan Jia and Christopher M. Poskitt and Jun Sun and Sudipta Chattopadhyay}, title = {Physical Adversarial Attack on a Robotic Arm}, journal = {{IEEE} Robotics Autom. Lett.}, volume = {7}, number = {4}, pages = {9334--9341}, year = {2022}, url = {https://doi.org/10.1109/LRA.2022.3189783}, doi = {10.1109/LRA.2022.3189783}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ral/JiaPSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/WangBJC22, author = {Chundong Wang and Gunavaran Brihadiswarn and Xingbin Jiang and Sudipta Chattopadhyay}, title = {Circ-Tree: {A} B+-Tree Variant With Circular Design for Persistent Memory}, journal = {{IEEE} Trans. Computers}, volume = {71}, number = {2}, pages = {296--308}, year = {2022}, url = {https://doi.org/10.1109/TC.2020.3047972}, doi = {10.1109/TC.2020.3047972}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/WangBJC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GarbeliniWC22, author = {Matheus E. Garbelini and Chundong Wang and Sudipta Chattopadhyay}, title = {Greyhound: Directed Greybox Wi-Fi Fuzzing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {817--834}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3014624}, doi = {10.1109/TDSC.2020.3014624}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GarbeliniWC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/UdeshiPWLRC22, author = {Sakshi Udeshi and Shanshan Peng and Gerald Woo and Lionell Loh and Louth Rawshan and Sudipta Chattopadhyay}, title = {Model Agnostic Defence Against Backdoor Attacks in Machine Learning}, journal = {{IEEE} Trans. Reliab.}, volume = {71}, number = {2}, pages = {880--895}, year = {2022}, url = {https://doi.org/10.1109/TR.2022.3159784}, doi = {10.1109/TR.2022.3159784}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/UdeshiPWLRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/SoremekunUC22, author = {Ezekiel O. Soremekun and Sakshi Udeshi and Sudipta Chattopadhyay}, title = {Astraea: Grammar-Based Fairness Testing}, journal = {{IEEE} Trans. Software Eng.}, volume = {48}, number = {12}, pages = {5188--5211}, year = {2022}, url = {https://doi.org/10.1109/TSE.2022.3141758}, doi = {10.1109/TSE.2022.3141758}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/SoremekunUC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/LimbasiyaTCZ22, author = {Trupil Limbasiya and Ko Zheng Teng and Sudipta Chattopadhyay and Jianying Zhou}, title = {A systematic survey of attack detection and prevention in Connected and Autonomous Vehicles}, journal = {Veh. Commun.}, volume = {37}, pages = {100515}, year = {2022}, url = {https://doi.org/10.1016/j.vehcom.2022.100515}, doi = {10.1016/J.VEHCOM.2022.100515}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/LimbasiyaTCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/RajanUC22, author = {Sai Sathiesh Rajan and Sakshi Udeshi and Sudipta Chattopadhyay}, editor = {Einar Broch Johnsen and Manuel Wimmer}, title = {AequeVox: Automated Fairness Testing of Speech Recognition Systems}, booktitle = {Fundamental Approaches to Software Engineering - 25th International Conference, {FASE} 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2022, Munich, Germany, April 2-7, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13241}, pages = {245--267}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-99429-7\_14}, doi = {10.1007/978-3-030-99429-7\_14}, timestamp = {Fri, 29 Apr 2022 14:50:32 +0200}, biburl = {https://dblp.org/rec/conf/fase/RajanUC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/GarbeliniS0SK22, author = {Matheus E. Garbelini and Zewen Shang and Sudipta Chattopadhyay and Sumei Sun and Ernest Kurniawan}, title = {Towards Automated Fuzzing of 4G/5G Protocol Implementations Over the Air}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2022, Rio de Janeiro, Brazil, December 4-8, 2022}, pages = {86--92}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/GLOBECOM48099.2022.10001673}, doi = {10.1109/GLOBECOM48099.2022.10001673}, timestamp = {Tue, 17 Jan 2023 08:56:31 +0100}, biburl = {https://dblp.org/rec/conf/globecom/GarbeliniS0SK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memocode/MorrisSC22, author = {Eric Rothstein Morris and Jun Sun and Sudipta Chattopadhyay}, title = {{ORIGAMI:} Folding Data Structures to Reduce Timing Side-Channel Leakage}, booktitle = {20th {ACM-IEEE} International Conference on Formal Methods and Models for System Design, {MEMOCODE} 2022, Shanghai, China, October 13-14, 2022}, pages = {1--12}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/MEMOCODE57689.2022.9954595}, doi = {10.1109/MEMOCODE57689.2022.9954595}, timestamp = {Wed, 07 Dec 2022 23:11:51 +0100}, biburl = {https://dblp.org/rec/conf/memocode/MorrisSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tase/DongWSCWDSD22, author = {Guoliang Dong and Jingyi Wang and Jun Sun and Sudipta Chattopadhyay and Xinyu Wang and Ting Dai and Jie Shi and Jin Song Dong}, editor = {Yamine A{\"{\i}}t Ameur and Florin Craciun}, title = {Repairing Adversarial Texts Through Perturbation}, booktitle = {Theoretical Aspects of Software Engineering - 16th International Symposium, {TASE} 2022, Cluj-Napoca, Romania, July 8-10, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13299}, pages = {29--48}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-10363-6\_3}, doi = {10.1007/978-3-031-10363-6\_3}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tase/DongWSCWDSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GarbeliniB0SK22, author = {Matheus E. Garbelini and Vaibhav Bedi and Sudipta Chattopadhyay and Sumei Sun and Ernest Kurniawan}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1025--1042}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/garbelini}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/GarbeliniB0SK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2022w, editor = {Jianying Zhou and Sridhar Adepu and Cristina Alcaraz and Lejla Batina and Emiliano Casalicchio and Sudipta Chattopadhyay and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Weizhi Meng and Stjepan Picek and Jun Shao and Chunhua Su and Cong Wang and Yury Zhauniarovich and Saman A. Zonouz}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13285}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-16815-4}, doi = {10.1007/978-3-031-16815-4}, isbn = {978-3-031-16814-7}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2022w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-02504, author = {Guoliang Dong and Jingyi Wang and Jun Sun and Sudipta Chattopadhyay and Xinyu Wang and Ting Dai and Jie Shi and Jin Song Dong}, title = {Repairing Adversarial Texts through Perturbation}, journal = {CoRR}, volume = {abs/2201.02504}, year = {2022}, url = {https://arxiv.org/abs/2201.02504}, eprinttype = {arXiv}, eprint = {2201.02504}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-02504.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-14965, author = {Trupil Limbasiya and Ko Zheng Teng and Sudipta Chattopadhyay and Jianying Zhou}, title = {A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles}, journal = {CoRR}, volume = {abs/2203.14965}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.14965}, doi = {10.48550/ARXIV.2203.14965}, eprinttype = {arXiv}, eprint = {2203.14965}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-14965.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-14692, author = {Yee Ching Tok and Sudipta Chattopadhyay}, title = {Identifying Threats, Cybercrime and Digital Forensic Opportunities in Smart City Infrastructure via Threat Modeling}, journal = {CoRR}, volume = {abs/2210.14692}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.14692}, doi = {10.48550/ARXIV.2210.14692}, eprinttype = {arXiv}, eprint = {2210.14692}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-14692.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/ChekoleOC21, author = {Eyasu Getahun Chekole and Mart{\'{\i}}n Ochoa and Sudipta Chattopadhyay}, title = {{SCOPE:} Secure Compiling of PLCs in Cyber-Physical Systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {33}, pages = {100431}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100431}, doi = {10.1016/J.IJCIP.2021.100431}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/ChekoleOC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcip/JiaWPCSC21, author = {Yifan Jia and Jingyi Wang and Christopher M. Poskitt and Sudipta Chattopadhyay and Jun Sun and Yuqi Chen}, title = {Adversarial attacks and mitigation for anomaly detectors of cyber-physical systems}, journal = {Int. J. Crit. Infrastructure Prot.}, volume = {34}, pages = {100452}, year = {2021}, url = {https://doi.org/10.1016/j.ijcip.2021.100452}, doi = {10.1016/J.IJCIP.2021.100452}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcip/JiaWPCSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/WangTPCE21, author = {Chundong Wang and Yee Ching Tok and Rohini Poolat and Sudipta Chattopadhyay and Mohan Rajesh Elara}, title = {How to secure autonomous mobile robots? An approach with fuzzing, detection and mitigation}, journal = {J. Syst. Archit.}, volume = {112}, pages = {101838}, year = {2021}, url = {https://doi.org/10.1016/j.sysarc.2020.101838}, doi = {10.1016/J.SYSARC.2020.101838}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/WangTPCE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/UdeshiC21, author = {Sakshi Udeshi and Sudipta Chattopadhyay}, title = {Grammar Based Directed Testing of Machine Learning Systems}, journal = {{IEEE} Trans. Software Eng.}, volume = {47}, number = {11}, pages = {2487--2503}, year = {2021}, url = {https://doi.org/10.1109/TSE.2019.2953066}, doi = {10.1109/TSE.2019.2953066}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/UdeshiC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/WangCGMR21, author = {Guanhua Wang and Sudipta Chattopadhyay and Ivan Gotovchits and Tulika Mitra and Abhik Roychoudhury}, title = {oo7: Low-Overhead Defense Against Spectre Attacks via Program Analysis}, journal = {{IEEE} Trans. Software Eng.}, volume = {47}, number = {11}, pages = {2504--2519}, year = {2021}, url = {https://doi.org/10.1109/TSE.2019.2953709}, doi = {10.1109/TSE.2019.2953709}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/WangCGMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2021w, editor = {Jianying Zhou and Chuadhry Mujeeb Ahmed and Lejla Batina and Sudipta Chattopadhyay and Olga Gadyatskaya and Chenglu Jin and Jingqiang Lin and Eleonora Losiouk and Bo Luo and Suryadipta Majumdar and Mihalis Maniatakos and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Masaki Shimaoka and Chunhua Su and Cong Wang}, title = {Applied Cryptography and Network Security Workshops - {ACNS} 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12809}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81645-2}, doi = {10.1007/978-3-030-81645-2}, isbn = {978-3-030-81644-5}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2021w.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-10707, author = {Yifan Jia and Jingyi Wang and Christopher M. Poskitt and Sudipta Chattopadhyay and Jun Sun and Yuqi Chen}, title = {Adversarial Attacks and Mitigation for Anomaly Detectors of Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/2105.10707}, year = {2021}, url = {https://arxiv.org/abs/2105.10707}, eprinttype = {arXiv}, eprint = {2105.10707}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-10707.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-09843, author = {Sai Sathiesh Rajan and Sakshi Udeshi and Sudipta Chattopadhyay}, title = {AequeVox: Automated Fairness Testing of Speech Recognition Systems}, journal = {CoRR}, volume = {abs/2110.09843}, year = {2021}, url = {https://arxiv.org/abs/2110.09843}, eprinttype = {arXiv}, eprint = {2110.09843}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-09843.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChekoleCOGC20, author = {Eyasu Getahun Chekole and Sudipta Chattopadhyay and Mart{\'{\i}}n Ochoa and Huaqun Guo and Unnikrishnan Cheramangalath}, title = {{CIMA:} Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems}, journal = {Comput. Secur.}, volume = {94}, pages = {101832}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101832}, doi = {10.1016/J.COSE.2020.101832}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChekoleCOGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/TokWC20, author = {Yee Ching Tok and Chundong Wang and Sudipta Chattopadhyay}, title = {Stitcher: Correlating digital forensic evidence on internet-of-things devices}, journal = {Digit. Investig.}, volume = {35}, pages = {301071}, year = {2020}, url = {https://doi.org/10.1016/j.fsidi.2020.301071}, doi = {10.1016/J.FSIDI.2020.301071}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/TokWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/PandaC20, author = {Prabhat Kumar Panda and Sudipta Chattopadhyay}, title = {An improved authentication and security scheme for {LTE/LTE-A} networks}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {11}, number = {5}, pages = {2163--2185}, year = {2020}, url = {https://doi.org/10.1007/s12652-019-01248-8}, doi = {10.1007/S12652-019-01248-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/PandaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jrie/PandaC20, author = {Prabhat Kumar Panda and Sudipta Chattopadhyay}, title = {A secure mutual authentication protocol for IoT environment}, journal = {J. Reliab. Intell. Environ.}, volume = {6}, number = {2}, pages = {79--94}, year = {2020}, url = {https://doi.org/10.1007/s40860-020-00098-y}, doi = {10.1007/S40860-020-00098-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jrie/PandaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/HorgaCEP20, author = {Adrian Horga and Sudipta Chattopadhyay and Petru Eles and Zebo Peng}, title = {Genetic algorithm based estimation of non-functional properties for {GPGPU} programs}, journal = {J. Syst. Archit.}, volume = {103}, pages = {101697}, year = {2020}, url = {https://doi.org/10.1016/j.sysarc.2019.101697}, doi = {10.1016/J.SYSARC.2019.101697}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/HorgaCEP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stvr/BasuAWC20, author = {Tiyash Basu and Kartik Aggarwal and Chundong Wang and Sudipta Chattopadhyay}, title = {An exploration of effective fuzzing for side-channel cache leakage}, journal = {Softw. Test. Verification Reliab.}, volume = {30}, number = {1}, year = {2020}, url = {https://doi.org/10.1002/stvr.1718}, doi = {10.1002/STVR.1718}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/stvr/BasuAWC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/WangCB20, author = {Chundong Wang and Sudipta Chattopadhyay and Gunavaran Brihadiswarn}, title = {Crab-tree: {A} Crash Recoverable B+-tree Variant for Persistent Memory with ARMv8 Architecture}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {19}, number = {5}, pages = {35:1--35:26}, year = {2020}, url = {https://doi.org/10.1145/3396236}, doi = {10.1145/3396236}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tecs/WangCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/JiangLC20, author = {Xingbin Jiang and Michele Lora and Sudipta Chattopadhyay}, title = {An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices}, journal = {{ACM} Trans. Internet Techn.}, volume = {20}, number = {2}, pages = {16:1--16:24}, year = {2020}, url = {https://doi.org/10.1145/3379542}, doi = {10.1145/3379542}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/JiangLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/WangCBMR20, author = {Guanhua Wang and Sudipta Chattopadhyay and Arnab Kumar Biswas and Tulika Mitra and Abhik Roychoudhury}, title = {KLEESpectre: Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {29}, number = {3}, pages = {14:1--14:31}, year = {2020}, url = {https://doi.org/10.1145/3385897}, doi = {10.1145/3385897}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosem/WangCBMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibe/GhoshCRMM20, author = {Sudipta Ghosh and Bhabani Prasad Chattopadhyay and Ram Mohan Roy and Jayanta Mukhopadhyay and Manjunatha Mahadevappa}, title = {Detection and localization of Coronary Arterial Lesion with the Aid of Impedance Cardiography and Artificial Neural Network}, booktitle = {20th {IEEE} International Conference on Bioinformatics and Bioengineering, {BIBE} 2020, Cincinnati, OH, USA, October 26-28, 2020}, pages = {667--674}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/BIBE50027.2020.00113}, doi = {10.1109/BIBE50027.2020.00113}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bibe/GhoshCRMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/PalGCSM20, author = {Poulomi Pal and Sudipta Ghosh and Bhabani Prasad Chattopadhyay and Kalyan Kumar Saha and Manjunatha Mahadevappa}, title = {Screening of Ischemic Heart Disease based on {PPG} Signals using Machine Learning Techniques}, booktitle = {42nd Annual International Conference of the {IEEE} Engineering in Medicine {\&} Biology Society, {EMBC} 2020, Montreal, QC, Canada, July 20-24, 2020}, pages = {5980--5983}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/EMBC44109.2020.9176447}, doi = {10.1109/EMBC44109.2020.9176447}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/embc/PalGCSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/glvlsi/JiangL020, author = {Xingbin Jiang and Michele Lora and Sudipta Chattopadhyay}, editor = {Tinoosh Mohsenin and Weisheng Zhao and Yiran Chen and Onur Mutlu}, title = {Efficient and Trusted Detection of Rootkit in IoT Devices via Offline Profiling and Online Monitoring}, booktitle = {{GLSVLSI} '20: Great Lakes Symposium on {VLSI} 2020, Virtual Event, China, September 7-9, 2020}, pages = {433--438}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3386263.3406939}, doi = {10.1145/3386263.3406939}, timestamp = {Mon, 04 Jul 2022 14:19:34 +0200}, biburl = {https://dblp.org/rec/conf/glvlsi/JiangL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/WangC20, author = {Chundong Wang and Sudipta Chattopadhyay}, title = {Isle-Tree: {A} B+-Tree with Intra-Cache Line Sorted Leaves for Non-volatile Memory}, booktitle = {38th {IEEE} International Conference on Computer Design, {ICCD} 2020, Hartford, CT, USA, October 18-21, 2020}, pages = {573--580}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCD50377.2020.00101}, doi = {10.1109/ICCD50377.2020.00101}, timestamp = {Mon, 11 Jan 2021 13:35:27 +0100}, biburl = {https://dblp.org/rec/conf/iccd/WangC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/Khoo0C20, author = {Teck Ping Khoo and Jun Sun and Sudipta Chattopadhyay}, editor = {Shang{-}Wei Lin and Zhe Hou and Brendan P. Mahony}, title = {Learning Fault Models of Cyber Physical Systems}, booktitle = {Formal Methods and Software Engineering - 22nd International Conference on Formal Engineering Methods, {ICFEM} 2020, Singapore, Singapore, March 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12531}, pages = {147--162}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-63406-3\_9}, doi = {10.1007/978-3-030-63406-3\_9}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfem/Khoo0C20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/UdeshiJ020, author = {Sakshi Udeshi and Xingbin Jiang and Sudipta Chattopadhyay}, title = {Callisto: Entropy-based Test Generation and Data Quality Assessment for Machine Learning Systems}, booktitle = {13th {IEEE} International Conference on Software Testing, Validation and Verification, {ICST} 2020, Porto, Portugal, October 24-28, 2020}, pages = {448--453}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICST46399.2020.00060}, doi = {10.1109/ICST46399.2020.00060}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icst/UdeshiJ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/Garbelini00SK20, author = {Matheus E. Garbelini and Chundong Wang and Sudipta Chattopadhyay and Sumei Sun and Ernest Kurniawan}, editor = {Ada Gavrilovska and Erez Zadok}, title = {SweynTooth: Unleashing Mayhem over Bluetooth Low Energy}, booktitle = {Proceedings of the 2020 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2020, July 15-17, 2020}, pages = {911--925}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/atc20/presentation/garbelini}, timestamp = {Tue, 16 Jul 2024 09:12:32 +0200}, biburl = {https://dblp.org/rec/conf/usenix/Garbelini00SK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmcai/MorrisJC20, author = {Eric Rothstein Morris and Jun Sun and Sudipta Chattopadhyay}, editor = {Dirk Beyer and Damien Zufferey}, title = {Systematic Classification of Attackers via Bounded Model Checking}, booktitle = {Verification, Model Checking, and Abstract Interpretation - 21st International Conference, {VMCAI} 2020, New Orleans, LA, USA, January 16-21, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11990}, pages = {226--247}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-39322-9\_11}, doi = {10.1007/978-3-030-39322-9\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vmcai/MorrisJC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-00865, author = {Ezekiel O. Soremekun and Sakshi Udeshi and Sudipta Chattopadhyay and Andreas Zeller}, title = {Exposing Backdoors in Robust Machine Learning Models}, journal = {CoRR}, volume = {abs/2003.00865}, year = {2020}, url = {https://arxiv.org/abs/2003.00865}, eprinttype = {arXiv}, eprint = {2003.00865}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-00865.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-05564, author = {Chundong Wang and Yee Ching Tok and Rohini Poolat and Sudipta Chattopadhyay and Mohan Rajesh Elara}, title = {Securing Autonomous Service Robots through Fuzzing, Detection, and Mitigation}, journal = {CoRR}, volume = {abs/2003.05564}, year = {2020}, url = {https://arxiv.org/abs/2003.05564}, eprinttype = {arXiv}, eprint = {2003.05564}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-05564.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-07242, author = {Yee Ching Tok and Chundong Wang and Sudipta Chattopadhyay}, title = {{STITCHER:} Correlating Digital Forensic Evidence on Internet-of-Things Devices}, journal = {CoRR}, volume = {abs/2003.07242}, year = {2020}, url = {https://arxiv.org/abs/2003.07242}, eprinttype = {arXiv}, eprint = {2003.07242}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-07242.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-02542, author = {Ezekiel O. Soremekun and Sakshi Udeshi and Sudipta Chattopadhyay}, title = {Astraea: Grammar-based Fairness Testing}, journal = {CoRR}, volume = {abs/2010.02542}, year = {2020}, url = {https://arxiv.org/abs/2010.02542}, eprinttype = {arXiv}, eprint = {2010.02542}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-02542.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-12529, author = {Eyasu Getahun Chekole and Mart{\'{\i}}n Ochoa and Sudipta Chattopadhyay}, title = {{SCOPE:} Secure Compiling of PLCs in Cyber-Physical Systems}, journal = {CoRR}, volume = {abs/2012.12529}, year = {2020}, url = {https://arxiv.org/abs/2012.12529}, eprinttype = {arXiv}, eprint = {2012.12529}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-12529.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PawarCSGSC19, author = {Umesh Ankush Pawar and Subhradeep Chakraborty and Tanmoy Sarkar and Abhijyoti Ghosh and Lourembam Lolit Kumar Singh and Sudipta Chattopadhyay}, title = {Quasi-Planar Composite Microstrip Antenna: Symmetrical Flat-Top Radiation With High Gain and Low Cross Polarization}, journal = {{IEEE} Access}, volume = {7}, pages = {68917--68929}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2918580}, doi = {10.1109/ACCESS.2019.2918580}, timestamp = {Fri, 25 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/PawarCSGSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/artmed/GhoshCRMM19, author = {Sudipta Ghosh and Bhabani Prasad Chattopadhyay and Ram Mohan Roy and Jayanta Mukherjee and Manjunatha Mahadevappa}, title = {Estimation of echocardiogram parameters with the aid of impedance cardiography and artificial neural networks}, journal = {Artif. Intell. Medicine}, volume = {96}, pages = {45--58}, year = {2019}, url = {https://doi.org/10.1016/j.artmed.2019.02.002}, doi = {10.1016/J.ARTMED.2019.02.002}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/artmed/GhoshCRMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/PandaC19, author = {Prabhat Kumar Panda and Sudipta Chattopadhyay}, title = {A modified {PKM} environment for the security enhancement of {IEEE} 802.16e}, journal = {Comput. Stand. Interfaces}, volume = {61}, pages = {107--120}, year = {2019}, url = {https://doi.org/10.1016/j.csi.2018.06.002}, doi = {10.1016/J.CSI.2018.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/PandaC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/BanerjeeC19, author = {Subhabrata Banerjee and Sudipta Chattopadhyay}, title = {Superposition modulation-based new structure of four-dimensional turbo code {(4D-TC)} using modified interleaver and its application in WiMAX {\&} {LTE} systems}, journal = {Pers. Ubiquitous Comput.}, volume = {23}, number = {5-6}, pages = {943--959}, year = {2019}, url = {https://doi.org/10.1007/s00779-019-01295-0}, doi = {10.1007/S00779-019-01295-0}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/BanerjeeC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/ChattopadhyayBR19, author = {Sudipta Chattopadhyay and Moritz Beck and Ahmed Rezine and Andreas Zeller}, title = {Quantifying the Information Leakage in Cache Attacks via Symbolic Execution}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {18}, number = {1}, pages = {7:1--7:27}, year = {2019}, url = {https://doi.org/10.1145/3288758}, doi = {10.1145/3288758}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/ChattopadhyayBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/SpelliniLFC19, author = {Stefano Spellini and Michele Lora and Franco Fummi and Sudipta Chattopadhyay}, title = {Compositional Design of Multi-Robot Systems Control Software on {ROS}}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {18}, number = {5s}, pages = {71:1--71:24}, year = {2019}, url = {https://doi.org/10.1145/3358197}, doi = {10.1145/3358197}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tecs/SpelliniLFC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/BanerjeeC19, author = {Subhabrata Banerjee and Sudipta Chattopadhyay}, title = {Performance Analysis of Four Dimensional Turbo Code {(4D-TC)} Using Moment Based Simplified Augmented State Diagram {(MSASD)} Approach: Extension to {LTE} System}, journal = {Wirel. Pers. Commun.}, volume = {108}, number = {4}, pages = {2077--2102}, year = {2019}, url = {https://doi.org/10.1007/s11277-019-06510-y}, doi = {10.1007/S11277-019-06510-Y}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/BanerjeeC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/Maghazeh0EP19, author = {Arian Maghazeh and Sudipta Chattopadhyay and Petru Eles and Zebo Peng}, editor = {J{\"{u}}rgen Teich and Franco Fummi}, title = {Cache-Aware Kernel Tiling: An Approach for System-Level Performance Optimization of GPU-Based Applications}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2019, Florence, Italy, March 25-29, 2019}, pages = {570--575}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.23919/DATE.2019.8714861}, doi = {10.23919/DATE.2019.8714861}, timestamp = {Mon, 30 Sep 2024 15:20:52 +0200}, biburl = {https://dblp.org/rec/conf/date/Maghazeh0EP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JiangWCZ19, author = {Jingxuan Jiang and Chundong Wang and Sudipta Chattopadhyay and Wei Zhang}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {Road Context-Aware Intrusion Detection System for Autonomous Cars}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {124--142}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_8}, doi = {10.1007/978-3-030-41579-2\_8}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/JiangWCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/WangCB19, author = {Chundong Wang and Sudipta Chattopadhyay and Gunavaran Brihadiswarn}, editor = {Jian{-}Jia Chen and Aviral Shrivastava}, title = {Crash recoverable ARMv8-oriented B+-tree for byte-addressable persistent memory}, booktitle = {Proceedings of the 20th {ACM} {SIGPLAN/SIGBED} International Conference on Languages, Compilers, and Tools for Embedded Systems, {LCTES} 2019, Phoenix, AZ, USA, June 23-23, 2019}, pages = {33--44}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3316482.3326358}, doi = {10.1145/3316482.3326358}, timestamp = {Fri, 14 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/WangCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-10027, author = {Sakshi Udeshi and Sudipta Chattopadhyay}, title = {Grammar Based Directed Testing of Machine Learning Systems}, journal = {CoRR}, volume = {abs/1902.10027}, year = {2019}, url = {http://arxiv.org/abs/1902.10027}, eprinttype = {arXiv}, eprint = {1902.10027}, timestamp = {Tue, 21 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-10027.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-00732, author = {Jingxuan Jiang and Chundong Wang and Sudipta Chattopadhyay and Wei Zhang}, title = {Road Context-aware Intrusion Detection System for Autonomous Cars}, journal = {CoRR}, volume = {abs/1908.00732}, year = {2019}, url = {http://arxiv.org/abs/1908.00732}, eprinttype = {arXiv}, eprint = {1908.00732}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-00732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-02203, author = {Sakshi Udeshi and Shanshan Peng and Gerald Woo and Lionell Loh and Louth Rawshan and Sudipta Chattopadhyay}, title = {Model Agnostic Defence against Backdoor Attacks in Machine Learning}, journal = {CoRR}, volume = {abs/1908.02203}, year = {2019}, url = {http://arxiv.org/abs/1908.02203}, eprinttype = {arXiv}, eprint = {1908.02203}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-02203.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-00647, author = {Guanhua Wang and Sudipta Chattopadhyay and Arnab Kumar Biswas and Tulika Mitra and Abhik Roychoudhury}, title = {{KLEESPECTRE:} Detecting Information Leakage through Speculative Cache Attacks via Symbolic Execution}, journal = {CoRR}, volume = {abs/1909.00647}, year = {2019}, url = {http://arxiv.org/abs/1909.00647}, eprinttype = {arXiv}, eprint = {1909.00647}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-00647.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-05808, author = {Eric Rothstein Morris and Jun Sun and Sudipta Chattopadhyay}, title = {Systematic Classification of Attackers via Bounded Model Checking}, journal = {CoRR}, volume = {abs/1911.05808}, year = {2019}, url = {http://arxiv.org/abs/1911.05808}, eprinttype = {arXiv}, eprint = {1911.05808}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-05808.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-08920, author = {Sakshi Udeshi and Xingbin Jiang and Sudipta Chattopadhyay}, title = {Callisto: Entropy based test generation and data quality assessment for Machine Learning Systems}, journal = {CoRR}, volume = {abs/1912.08920}, year = {2019}, url = {http://arxiv.org/abs/1912.08920}, eprinttype = {arXiv}, eprint = {1912.08920}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-08920.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-09783, author = {Chundong Wang and Gunavaran Brihadiswarn and Xingbin Jiang and Sudipta Chattopadhyay}, title = {Circ-Tree: {A} B+-Tree Variant with Circular Design for Persistent Memory}, journal = {CoRR}, volume = {abs/1912.09783}, year = {2019}, url = {http://arxiv.org/abs/1912.09783}, eprinttype = {arXiv}, eprint = {1912.09783}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-09783.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChattopadhyayC18, author = {Sudipta Chattopadhyay and Subhradeep Chakraborty}, title = {A Physical Insight Into the Influence of Dominant Mode of Rectangular Microstrip Antenna on Its Cross-Polarization Characteristics and Its Improvement With T-Shaped Microstrip Antenna}, journal = {{IEEE} Access}, volume = {6}, pages = {3594--3602}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2797358}, doi = {10.1109/ACCESS.2018.2797358}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChattopadhyayC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/BanerjeeC18, author = {Subhabrata Banerjee and Sudipta Chattopadhyay}, title = {Evaluation of system performance by adding a fourth dimension to turbo code}, journal = {Int. J. Commun. Syst.}, volume = {31}, number = {2}, year = {2018}, url = {https://doi.org/10.1002/dac.3450}, doi = {10.1002/DAC.3450}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/BanerjeeC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/ChattopadhyayR18, author = {Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {Symbolic Verification of Cache Side-Channel Freedom}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {37}, number = {11}, pages = {2812--2823}, year = {2018}, url = {https://doi.org/10.1109/TCAD.2018.2858402}, doi = {10.1109/TCAD.2018.2858402}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/ChattopadhyayR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codes/SpelliniLCF18, author = {Stefano Spellini and Michele Lora and Sudipta Chattopadhyay and Franco Fummi}, editor = {Aviral Shrivastava and Sudeep Pasricha}, title = {Introducing assume-guarantee contracts for verifying robotic applications: work-in-progress}, booktitle = {Proceedings of the International Conference on Hardware/Software Codesign and System Synthesis, {CODES+ISSS} 2018, part of {ESWEEK} 2018, Torino, Italy, September 30 - October 5, 2018}, pages = {4}, publisher = {{IEEE} / {ACM}}, year = {2018}, url = {https://doi.org/10.1109/CODESISSS.2018.8525885}, doi = {10.1109/CODESISSS.2018.8525885}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codes/SpelliniLCF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/WangC18, author = {Chundong Wang and Sudipta Chattopadhyay}, title = {{LAWN:} boosting the performance of {NVMM} file system through reducing write amplification}, booktitle = {Proceedings of the 55th Annual Design Automation Conference, {DAC} 2018, San Francisco, CA, USA, June 24-29, 2018}, pages = {6:1--6:6}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3195970.3196066}, doi = {10.1145/3195970.3196066}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/dac/WangC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/Horga0EP18, author = {Adrian Horga and Sudipta Chattopadhyay and Petru Eles and Zebo Peng}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {Measurement Based Execution Time Analysis of {GPGPU} Programs via {SE+GA}}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {30--37}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00021}, doi = {10.1109/DSD.2018.00021}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/Horga0EP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/embc/GhoshCRMM18, author = {Sudipta Ghosh and Bhabani Prasad Chattopadhyay and Ram Mohan Roy and Jayanta Mukhopadhyay and Manjunatha Mahadevappa}, title = {Stroke Volume, Ejection Fraction and Cardiac Health Monitoring using Impedance Cardiography}, booktitle = {40th Annual International Conference of the {IEEE} Engineering in Medicine and Biology Society, {EMBC} 2018, Honolulu, HI, USA, July 18-21, 2018}, pages = {4229--4232}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EMBC.2018.8513295}, doi = {10.1109/EMBC.2018.8513295}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/embc/GhoshCRMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emsoft/SrivastavaAW018, author = {Tanya Srivastava and Pryanshu Arora and Chundong Wang and Sudipta Chattopadhyay}, editor = {Bj{\"{o}}rn B. Brandenburg and Sriram Sankaranarayanan}, title = {Road context-aware intrusion detection system for autonomous cars: work-in-progress}, booktitle = {Proceedings of the International Conference on Embedded Software, {EMSOFT} 2018, Torino, Italy, September 30 - October 5, 2018}, pages = {8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EMSOFT.2018.8537210}, doi = {10.1109/EMSOFT.2018.8537210}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/emsoft/SrivastavaAW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/ChekoleCOG18, author = {Eyasu Getahun Chekole and Sudipta Chattopadhyay and Mart{\'{\i}}n Ochoa and Huaqun Guo}, editor = {Mathias Payer and Awais Rashid and Jose M. Such}, title = {Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems}, booktitle = {Engineering Secure Software and Systems - 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10953}, pages = {9--26}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94496-8\_2}, doi = {10.1007/978-3-319-94496-8\_2}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/ChekoleCOG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/UdeshiAC18, author = {Sakshi Udeshi and Pryanshu Arora and Sudipta Chattopadhyay}, editor = {Marianne Huchard and Christian K{\"{a}}stner and Gordon Fraser}, title = {Automated directed fairness testing}, booktitle = {Proceedings of the 33rd {ACM/IEEE} International Conference on Automated Software Engineering, {ASE} 2018, Montpellier, France, September 3-7, 2018}, pages = {98--108}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3238147.3238165}, doi = {10.1145/3238147.3238165}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/kbse/UdeshiAC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/se/BohmeS0UZ18, author = {Marcel B{\"{o}}hme and Ezekiel Olamide Soremekun and Sudipta Chattopadhyay and Emamurho Ugherughe and Andreas Zeller}, editor = {Matthias Tichy and Eric Bodden and Marco Kuhrmann and Stefan Wagner and Jan{-}Philipp Stegh{\"{o}}fer}, title = {Wo ist der Fehler und wie wird er behoben? Ein Experiment mit Softwareentwicklern}, booktitle = {Software Engineering und Software Management 2018, Fachtagung des GI-Fachbereichs Softwaretechnik, {SE} 2018, 5.-9. M{\"{a}}rz 2018, Ulm, Germany}, series = {{LNI}}, volume = {{P-279}}, pages = {101--102}, publisher = {Gesellschaft f{\"{u}}r Informatik}, year = {2018}, url = {https://dl.gi.de/handle/20.500.12116/16325}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/se/BohmeS0UZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-00468, author = {Sakshi Udeshi and Pryanshu Arora and Sudipta Chattopadhyay}, title = {Automated Directed Fairness Testing}, journal = {CoRR}, volume = {abs/1807.00468}, year = {2018}, url = {http://arxiv.org/abs/1807.00468}, eprinttype = {arXiv}, eprint = {1807.00468}, timestamp = {Wed, 10 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-00468.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-04701, author = {Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {Symbolic Verification of Cache Side-channel Freedom}, journal = {CoRR}, volume = {abs/1807.04701}, year = {2018}, url = {http://arxiv.org/abs/1807.04701}, eprinttype = {arXiv}, eprint = {1807.04701}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-04701.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-05843, author = {Guanhua Wang and Sudipta Chattopadhyay and Ivan Gotovchits and Tulika Mitra and Abhik Roychoudhury}, title = {oo7: Low-overhead Defense against Spectre Attacks via Binary Analysis}, journal = {CoRR}, volume = {abs/1807.05843}, year = {2018}, url = {http://arxiv.org/abs/1807.05843}, eprinttype = {arXiv}, eprint = {1807.05843}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-05843.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-07477, author = {Eyasu Getahun Chekole and Unnikrishnan Cheramangalath and Sudipta Chattopadhyay and Mart{\'{\i}}n Ochoa and Huaqun Guo}, title = {Taming the War in Memory: {A} Resilient Mitigation Strategy Against Memory Safety Attacks in {CPS}}, journal = {CoRR}, volume = {abs/1809.07477}, year = {2018}, url = {http://arxiv.org/abs/1809.07477}, eprinttype = {arXiv}, eprint = {1809.07477}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-07477.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/BanerjeeC17, author = {Subhabrata Banerjee and Sudipta Chattopadhyay}, title = {Power Optimization of Three Dimensional Turbo Code Using a Novel Modified Symbiotic Organism Search {(MSOS)} Algorithm}, journal = {Wirel. Pers. Commun.}, volume = {92}, number = {3}, pages = {941--968}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3586-0}, doi = {10.1007/S11277-016-3586-0}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/BanerjeeC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BohmeS0UZ17, author = {Marcel B{\"{o}}hme and Ezekiel O. Soremekun and Sudipta Chattopadhyay and Emamurho Ugherughe and Andreas Zeller}, editor = {Sebasti{\'{a}}n Uchitel and Alessandro Orso and Martin P. Robillard}, title = {How developers debug software the DbgBench dataset: poster}, booktitle = {Proceedings of the 39th International Conference on Software Engineering, {ICSE} 2017, Buenos Aires, Argentina, May 20-28, 2017 - Companion Volume}, pages = {244--246}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICSE-C.2017.94}, doi = {10.1109/ICSE-C.2017.94}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BohmeS0UZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/BasuC17, author = {Tiyash Basu and Sudipta Chattopadhyay}, title = {Testing Cache Side-Channel Leakage}, booktitle = {2017 {IEEE} International Conference on Software Testing, Verification and Validation Workshops, {ICST} Workshops 2017, Tokyo, Japan, March 13-17, 2017}, pages = {51--60}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICSTW.2017.16}, doi = {10.1109/ICSTW.2017.16}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icst/BasuC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/memocode/ChattopadhyayBR17, author = {Sudipta Chattopadhyay and Moritz Beck and Ahmed Rezine and Andreas Zeller}, editor = {Jean{-}Pierre Talpin and Patricia Derler and Klaus Schneider}, title = {Quantifying the information leak in cache attacks via symbolic execution}, booktitle = {Proceedings of the 15th {ACM-IEEE} International Conference on Formal Methods and Models for System Design, {MEMOCODE} 2017, Vienna, Austria, September 29 - October 02, 2017}, pages = {25--35}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3127041.3127044}, doi = {10.1145/3127041.3127044}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/memocode/ChattopadhyayBR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/BohmeS0UZ17, author = {Marcel B{\"{o}}hme and Ezekiel O. Soremekun and Sudipta Chattopadhyay and Emamurho Ugherughe and Andreas Zeller}, editor = {Eric Bodden and Wilhelm Sch{\"{a}}fer and Arie van Deursen and Andrea Zisman}, title = {Where is the bug and how is it fixed? an experiment with practitioners}, booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017}, pages = {117--128}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3106237.3106255}, doi = {10.1145/3106237.3106255}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/BohmeS0UZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/Chattopadhyay17, author = {Sudipta Chattopadhyay}, editor = {Axel Legay and Tiziana Margaria}, title = {Directed Automated Memory Performance Testing}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 23rd International Conference, {TACAS} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10206}, pages = {38--55}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54580-5\_3}, doi = {10.1007/978-3-662-54580-5\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/Chattopadhyay17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Banerjee0R16, author = {Abhijeet Banerjee and Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {On Testing Embedded Software}, journal = {Adv. Comput.}, volume = {101}, pages = {121--153}, year = {2016}, url = {https://doi.org/10.1016/bs.adcom.2015.11.005}, doi = {10.1016/BS.ADCOM.2015.11.005}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Banerjee0R16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/HorgaCEP16, author = {Adrian Horga and Sudipta Chattopadhyay and Petru Eles and Zebo Peng}, title = {Systematic detection of memory related performance bottlenecks in {GPGPU} programs}, journal = {J. Syst. Archit.}, volume = {71}, pages = {73--87}, year = {2016}, url = {https://doi.org/10.1016/j.sysarc.2016.08.002}, doi = {10.1016/J.SYSARC.2016.08.002}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/HorgaCEP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/Chandra016, author = {Abhijit Chandra and Sudipta Chattopadhyay}, title = {A new strategy of image denoising using multiplier-less {FIR} filter designed with the aid of differential evolution algorithm}, journal = {Multim. Tools Appl.}, volume = {75}, number = {2}, pages = {1079--1098}, year = {2016}, url = {https://doi.org/10.1007/s11042-014-2358-7}, doi = {10.1007/S11042-014-2358-7}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/Chandra016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aspdac/JiangEP0B16, author = {Ke Jiang and Petru Eles and Zebo Peng and Sudipta Chattopadhyay and Lejla Batina}, title = {{SPARTA:} {A} scheduling policy for thwarting differential power analysis attacks}, booktitle = {21st Asia and South Pacific Design Automation Conference, {ASP-DAC} 2016, Macao, Macao, January 25-28, 2016}, pages = {667--672}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ASPDAC.2016.7428088}, doi = {10.1109/ASPDAC.2016.7428088}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/aspdac/JiangEP0B16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChattopadhyayBR16, author = {Sudipta Chattopadhyay and Moritz Beck and Ahmed Rezine and Andreas Zeller}, title = {Quantifying the Information Leak in Cache Attacks through Symbolic Execution}, journal = {CoRR}, volume = {abs/1611.04426}, year = {2016}, url = {http://arxiv.org/abs/1611.04426}, eprinttype = {arXiv}, eprint = {1611.04426}, timestamp = {Thu, 28 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ChattopadhyayBR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spin/000115, author = {Sudipta Chattopadhyay}, editor = {Bernd Fischer and Jaco Geldenhuys}, title = {{MESS:} Memory Performance Debugging on Embedded Multi-core Systems}, booktitle = {Model Checking Software - 22nd International Symposium, {SPIN} 2015, Stellenbosch, South Africa, August 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9232}, pages = {105--125}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23404-5\_8}, doi = {10.1007/978-3-319-23404-5\_8}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/spin/000115.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fteda/ChattopadhyayRREP14, author = {Sudipta Chattopadhyay and Abhik Roychoudhury and Jakob Rosen and Petru Eles and Zebo Peng}, title = {Time-Predictable Embedded Software on Multi-Core Platforms: Analysis and Optimization}, journal = {Found. Trends Electron. Des. Autom.}, volume = {8}, number = {3-4}, pages = {199--356}, year = {2014}, url = {https://doi.org/10.1561/1000000037}, doi = {10.1561/1000000037}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fteda/ChattopadhyayRREP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rts/KelterFMCR14, author = {Timon Kelter and Heiko Falk and Peter Marwedel and Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {Static analysis of multi-core {TDMA} resource arbitration delays}, journal = {Real Time Syst.}, volume = {50}, number = {2}, pages = {185--229}, year = {2014}, url = {https://doi.org/10.1007/s11241-013-9189-x}, doi = {10.1007/S11241-013-9189-X}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rts/KelterFMCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sivp/Chandra014, author = {Abhijit Chandra and Sudipta Chattopadhyay}, title = {A novel approach for coefficient quantization of low-pass finite impulse response filter using differential evolution algorithm}, journal = {Signal Image Video Process.}, volume = {8}, number = {7}, pages = {1307--1321}, year = {2014}, url = {https://doi.org/10.1007/s11760-012-0359-4}, doi = {10.1007/S11760-012-0359-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sivp/Chandra014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sivp/ChandraC14, author = {Abhijit Chandra and Sudipta Chattopadhyay}, title = {Novel design strategy of multiplier-less low-pass finite impulse response filter using self-organizing random immigrants genetic algorithm}, journal = {Signal Image Video Process.}, volume = {8}, number = {3}, pages = {507--522}, year = {2014}, url = {https://doi.org/10.1007/s11760-013-0494-6}, doi = {10.1007/S11760-013-0494-6}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sivp/ChandraC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/0001CRKMF14, author = {Sudipta Chattopadhyay and Lee Kee Chong and Abhik Roychoudhury and Timon Kelter and Peter Marwedel and Heiko Falk}, title = {A Unified {WCET} analysis framework for multicore platforms}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {13}, number = {4s}, pages = {124:1--124:29}, year = {2014}, url = {https://doi.org/10.1145/2584654}, doi = {10.1145/2584654}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/0001CRKMF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/0001R14, author = {Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {Cache-Related Preemption Delay Analysis for Multilevel Noninclusive Caches}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {13}, number = {5s}, pages = {147:1--147:29}, year = {2014}, url = {https://doi.org/10.1145/2632156}, doi = {10.1145/2632156}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/0001R14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emsoft/0001EP14, author = {Sudipta Chattopadhyay and Petru Eles and Zebo Peng}, editor = {Tulika Mitra and Jan Reineke}, title = {Automated software testing of memory performance in embedded GPUs}, booktitle = {2014 International Conference on Embedded Software, {EMSOFT} 2014, New Delhi, India, October 12-17, 2014}, pages = {17:1--17:10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2656045.2656047}, doi = {10.1145/2656045.2656047}, timestamp = {Wed, 04 Jan 2023 16:50:45 +0100}, biburl = {https://dblp.org/rec/conf/emsoft/0001EP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/BanerjeeC0R14, author = {Abhijeet Banerjee and Lee Kee Chong and Sudipta Chattopadhyay and Abhik Roychoudhury}, editor = {Shing{-}Chi Cheung and Alessandro Orso and Margaret{-}Anne D. Storey}, title = {Detecting energy bugs and hotspots in mobile apps}, booktitle = {Proceedings of the 22nd {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16 - 22, 2014}, pages = {588--598}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2635868.2635871}, doi = {10.1145/2635868.2635871}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/BanerjeeC0R14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rts/ChattopadhyayR13, author = {Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {Scalable and precise refinement of cache timing analysis via path-sensitive verification}, journal = {Real Time Syst.}, volume = {49}, number = {4}, pages = {517--562}, year = {2013}, url = {https://doi.org/10.1007/s11241-013-9178-0}, doi = {10.1007/S11241-013-9178-0}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rts/ChattopadhyayR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/ChattopadhyayCR13, author = {Sudipta Chattopadhyay and Lee Kee Chong and Abhik Roychoudhury}, editor = {Bj{\"{o}}rn Franke and Jingling Xue}, title = {Program performance spectrum}, booktitle = {{SIGPLAN/SIGBED} Conference on Languages, Compilers and Tools for Embedded Systems 2013, {LCTES} '13, Seattle, WA, USA, June 20-21, 2013}, pages = {65--76}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2491899.2465566}, doi = {10.1145/2491899.2465566}, timestamp = {Thu, 24 Jun 2021 16:19:30 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/ChattopadhyayCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtas/BanerjeeCR13, author = {Abhijeet Banerjee and Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {Precise micro-architectural modeling for {WCET} analysis via {AI+SAT}}, booktitle = {19th {IEEE} Real-Time and Embedded Technology and Applications Symposium, {RTAS} 2013, Philadelphia, PA, USA, April 9-11, 2013}, pages = {87--96}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/RTAS.2013.6531082}, doi = {10.1109/RTAS.2013.6531082}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtas/BanerjeeCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtss/BanerjeeCR13, author = {Abhijeet Banerjee and Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {Static Analysis Driven Cache Performance Testing}, booktitle = {Proceedings of the {IEEE} 34th Real-Time Systems Symposium, {RTSS} 2013, Vancouver, BC, Canada, December 3-6, 2013}, pages = {319--329}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/RTSS.2013.39}, doi = {10.1109/RTSS.2013.39}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtss/BanerjeeCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtss/ChongBPCR13, author = {Lee Kee Chong and Cl{\'{e}}ment Ballabriga and Van{-}Thuan Pham and Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {Integrated Timing Analysis of Application and Operating Systems Code}, booktitle = {Proceedings of the {IEEE} 34th Real-Time Systems Symposium, {RTSS} 2013, Vancouver, BC, Canada, December 3-6, 2013}, pages = {128--139}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/RTSS.2013.21}, doi = {10.1109/RTSS.2013.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtss/ChongBPCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmm2/ChandraC12, author = {Abhijit Chandra and Sudipta Chattopadhyay}, title = {Role of Mutation Strategies of Differential Evolution Algorithm in Designing Hardware Efficient Multiplier-less Low-pass {FIR} Filter}, journal = {J. Multim.}, volume = {7}, number = {5}, pages = {353--363}, year = {2012}, url = {https://doi.org/10.4304/jmm.7.5.353-363}, doi = {10.4304/JMM.7.5.353-363}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmm2/ChandraC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtas/ChattopadhyayKRKMF12, author = {Sudipta Chattopadhyay and Lee Kee Chong and Abhik Roychoudhury and Timon Kelter and Peter Marwedel and Heiko Falk}, editor = {Marco Di Natale}, title = {A Unified {WCET} Analysis Framework for Multi-core Platforms}, booktitle = {2012 {IEEE} 18th Real Time and Embedded Technology and Applications Symposium, Beijing, China, April 16-19, 2012}, pages = {99--108}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/RTAS.2012.26}, doi = {10.1109/RTAS.2012.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtas/ChattopadhyayKRKMF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/ChattopadhyaySC11, author = {Sudipta Chattopadhyay and Salil Kumar Sanyal and Abhijit Chandra}, title = {Optimization of Control Parameters of Differential Evolution Technique for the Design of {FIR} Pulse-shaping Filter in {QPSK} Modulated System}, journal = {J. Commun.}, volume = {6}, number = {7}, pages = {558--570}, year = {2011}, url = {https://doi.org/10.4304/jcm.6.7.558-570}, doi = {10.4304/JCM.6.7.558-570}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/ChattopadhyaySC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrts/KelterFMCR11, author = {Timon Kelter and Heiko Falk and Peter Marwedel and Sudipta Chattopadhyay and Abhik Roychoudhury}, editor = {Karl{-}Erik {\AA}rz{\'{e}}n}, title = {Bus-Aware Multicore {WCET} Analysis through {TDMA} Offset Bounds}, booktitle = {23rd Euromicro Conference on Real-Time Systems, {ECRTS} 2011, Porto, Portugal, 5-8 July, 2011}, pages = {3--12}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ECRTS.2011.9}, doi = {10.1109/ECRTS.2011.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrts/KelterFMCR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lctrts/ChattopadhyayR11, author = {Sudipta Chattopadhyay and Abhik Roychoudhury}, editor = {Jan Vitek and Bjorn De Sutter}, title = {Static bus schedule aware scratchpad allocation in multiprocessors}, booktitle = {Proceedings of the {ACM} {SIGPLAN/SIGBED} 2011 conference on Languages, compilers, and tools for embedded systems, {LCTES} 2011, Chicago, IL, USA, April 11-14, 2011}, pages = {11--20}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1967677.1967680}, doi = {10.1145/1967677.1967680}, timestamp = {Thu, 24 Jun 2021 16:19:30 +0200}, biburl = {https://dblp.org/rec/conf/lctrts/ChattopadhyayR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtss/BlackhamSCRH11, author = {Bernard Blackham and Yao Shi and Sudipta Chattopadhyay and Abhik Roychoudhury and Gernot Heiser}, title = {Timing Analysis of a Protected Operating System Kernel}, booktitle = {Proceedings of the 32nd {IEEE} Real-Time Systems Symposium, {RTSS} 2011, Vienna, Austria, November 29 - December 2, 2011}, pages = {339--348}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/RTSS.2011.38}, doi = {10.1109/RTSS.2011.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtss/BlackhamSCRH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtss/ChattopadhyayR11, author = {Sudipta Chattopadhyay and Abhik Roychoudhury}, title = {Scalable and Precise Refinement of Cache Timing Analysis via Model Checking}, booktitle = {Proceedings of the 32nd {IEEE} Real-Time Systems Symposium, {RTSS} 2011, Vienna, Austria, November 29 - December 2, 2011}, pages = {193--203}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/RTSS.2011.25}, doi = {10.1109/RTSS.2011.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtss/ChattopadhyayR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scopes/ChattopadhyayRM10, author = {Sudipta Chattopadhyay and Abhik Roychoudhury and Tulika Mitra}, editor = {Ed F. Deprettere and Todor P. Stefanov}, title = {Modeling shared cache and bus in multi-cores for timing analysis}, booktitle = {13th International Workshop on Software and Compilers for Embedded Systems, {SCOPES} '10, St. Goar, Germany, June 29-30, 2010}, pages = {6}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1811212.1811220}, doi = {10.1145/1811212.1811220}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scopes/ChattopadhyayRM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtss/ChattopadhyayR09, author = {Sudipta Chattopadhyay and Abhik Roychoudhury}, editor = {Theodore P. Baker}, title = {Unified Cache Modeling for {WCET} Analysis and Layout Optimizations}, booktitle = {Proceedings of the 30th {IEEE} Real-Time Systems Symposium, {RTSS} 2009, Washington, DC, USA, 1-4 December 2009}, pages = {47--56}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/RTSS.2009.20}, doi = {10.1109/RTSS.2009.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtss/ChattopadhyayR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0912-0758, author = {Sudipta Chattopadhyay and Salil Kumar Sanyal}, title = {Comparison of Performance Metrics for {QPSK} and {OQPSK} Transmission Using Root Raised Cosine and Raised Cosine Pulse shaping Filters for Applications in Mobile Communication}, journal = {CoRR}, volume = {abs/0912.0758}, year = {2009}, url = {http://arxiv.org/abs/0912.0758}, eprinttype = {arXiv}, eprint = {0912.0758}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0912-0758.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.