


default search action
Rajan Shankaran
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Lashmi Kondoth
, Rajan Shankaran
, Quan Z. Sheng
, Richard Han
:
Wireless Network-on-Chip Security Review: Attack Taxonomy, Implications, and Countermeasures. IEEE Access 11: 122876-122892 (2023) - 2022
- [j18]Ruiye Jiang, Rajan Shankaran
, Songyan Wang, Tao Chao:
A proportional, integral and derivative differential evolution algorithm for global optimization. Expert Syst. Appl. 206: 117669 (2022) - [j17]Muhammad Sajjad Akbar, Zawar Hussain, Michael Sheng
, Rajan Shankaran
:
Wireless Body Area Sensor Networks: Survey of MAC and Routing Protocols for Patient Monitoring under IEEE 802.15.4 and IEEE 802.15.6. Sensors 22(21): 8279 (2022) - 2021
- [j16]Diya Thomas
, Rajan Shankaran
, Quan Z. Sheng
, Mehmet A. Orgun
, Michael Hitchens
, Mehedi Masud
, Wei Ni
, Subhas Chandra Mukhopadhyay
, Md. Jalil Piran
:
QoS-Aware Energy Management and Node Scheduling Schemes for Sensor Network-Based Surveillance Applications. IEEE Access 9: 3065-3096 (2021) - [j15]Diya Thomas
, Mehmet A. Orgun
, Michael Hitchens
, Rajan Shankaran
, Subhas Chandra Mukhopadhyay
, Wei Ni
:
A Graph-Based Fault-Tolerant Approach to Modeling QoS for IoT-Based Surveillance Applications. IEEE Internet Things J. 8(5): 3587-3604 (2021) - [j14]Fa Zhu
, Rajan Shankaran
, Bin Zhao, Yongbin Zhao, Yining Gang, Xingchi Chen:
Anomaly detection-based intelligent computing in internet of things and network applications. Internet Technol. Lett. 4(3) (2021) - [j13]Diya Thomas
, Rajan Shankaran
, Mehmet A. Orgun
, Subhas Chandra Mukhopadhyay
:
SEC2: A Secure and Energy Efficient Barrier Coverage Scheduling for WSN-Based IoT Applications. IEEE Trans. Green Commun. Netw. 5(2): 622-634 (2021) - [c32]Diya Thomas, Rajan Shankaran:
Poster: A Neural Network based Cluster Ensemble Approach for Anomaly Detection in DynamicWeighted Graphs. EWSN 2021: 177-178 - 2020
- [j12]Xiaoshuai Li
, Lin Ma
, Yubin Xu
, Rajan Shankaran
:
Resource Allocation for D2D-Based V2X Communication With Imperfect CSI. IEEE Internet Things J. 7(4): 3545-3558 (2020) - [c31]Qianwen Ye
, Xiaochen Fan, Gengfa Fang, Hongxia Bie, Xudong Song, Rajan Shankaran
:
CapsLoc: A Robust Indoor Localization System with WiFi Fingerprinting Using Capsule Networks. ICC 2020: 1-6 - [c30]Diya Thomas
, Rajan Shankaran
:
A Secure Barrier Coverage Scheduling Framework for WSN-based IoT Applications. MSWiM 2020: 215-224
2010 – 2019
- 2019
- [j11]Guanglou Zheng
, Wencheng Yang
, Craig Valli
, Rajan Shankaran
, Haider Abbas
, Guanghe Zhang, Gengfa Fang, Junaid Chaudhry
, Li Qiao:
Fingerprint Access Control for Wireless Insulin Pump Systems Using Cancelable Delaunay Triangulations. IEEE Access 7: 75629-75641 (2019) - [j10]Guanglou Zheng
, Wencheng Yang
, Craig Valli
, Li Qiao
, Rajan Shankaran
, Mehmet A. Orgun
, Subhas Chandra Mukhopadhyay
:
Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices. IEEE J. Biomed. Health Informatics 23(4): 1546-1557 (2019) - [j9]Xiaoshuai Li
, Lin Ma
, Rajan Shankaran
, Yubin Xu
, Mehmet A. Orgun
:
Joint Power Control and Resource Allocation Mode Selection for Safety-Related V2X Communication. IEEE Trans. Veh. Technol. 68(8): 7970-7986 (2019) - 2018
- [j8]Jalal Al-Muhtadi, Ma Qiang
, Khan Zeb, Junaid Ahsenali Chaudhry
, Kashif Saleem
, Abdelouahid Derhab, Mehmet A. Orgun
, Rajan Shankaran
, Muhammad Imran, Maruf Pasha
:
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems. IEEE Access 6: 16363-16376 (2018) - [j7]Xiaoshuai Li
, Rajan Shankaran
, Mehmet A. Orgun
, Gengfa Fang, Yubin Xu
:
Resource Allocation for Underlay D2D Communication With Proportional Fairness. IEEE Trans. Veh. Technol. 67(7): 6244-6258 (2018) - [c29]Xiaoshuai Li, Lin Ma, Yubin Xu, Rajan Shankaran
, Mehmet A. Orgun
:
Joint Distributed and Centralized Resource Scheduling for D2D-Based V2X Communication. GLOBECOM 2018: 1-6 - [c28]Mengdi Liu
, Guangquan Xu, Jun Zhang, Rajan Shankaran
, Gang Luo, Xi Zheng
, Zonghua Zhang:
Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems. ICA3PP (4) 2018: 495-510 - [c27]Xiaoshuai Li, Rajan Shankaran
, Mehmet A. Orgun
, Lin Ma, Yubin Xu:
Joint Autonomous Resource Selection and Scheduled Resource Allocation for D2D-Based V2X Communication. VTC Spring 2018: 1-5 - 2017
- [j6]Guanglou Zheng, Gengfa Fang, Rajan Shankaran
, Mehmet A. Orgun
, Jie Zhou, Li Qiao
, Kashif Saleem
:
Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks. IEEE J. Biomed. Health Informatics 21(3): 655-663 (2017) - [c26]Guanglou Zheng, Guanghe Zhang, Wencheng Yang, Craig Valli
, Rajan Shankaran
, Mehmet A. Orgun
:
From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices. ISCIT 2017: 1-5 - [c25]Xiaoshuai Li, Lin Ma, Rajan Shankaran
, Mehmet A. Orgun
, Gengfa Fang:
Joint mode selection and proportional fair scheduling for D2D communication. PIMRC 2017: 1-6 - 2016
- [j5]Ke-Bing Zhang, Mehmet A. Orgun
, Rajan Shankaran
, Du Zhang:
Classifying high dimensional data by interactive visual analysis. J. Vis. Lang. Comput. 33: 24-36 (2016) - [c24]Kashif Saleem
, Haider Abbas
, Jalal Al-Muhtadi, Mehmet A. Orgun
, Rajan Shankaran
, Guanglou Zhang:
Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform. LCN Workshops 2016: 236-240 - 2015
- [j4]Guanglou Zheng, Gengfa Fang, Rajan Shankaran
, Mehmet A. Orgun
:
Encryption for Implantable Medical Devices Using Modified One-Time Pads. IEEE Access 3: 825-836 (2015) - [j3]Mehmet A. Orgun
, Atilla Elçi, Josef Pieprzyk
, Alexander G. Chefranov
, Rajan Shankaran
, Huaxiong Wang:
Special issue on trust and security in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(15): 3791-3793 (2015) - [c23]Guanglou Zheng, Gengfa Fang, Rajan Shankaran
, Mehmet A. Orgun
:
An Improved Binary Sequence Generation for Securing Wireless Body Area Networks. DSDIS 2015: 734-735 - [c22]Guanglou Zheng, Gengfa Fang, Mehmet A. Orgun
, Rajan Shankaran
:
A comparison of key distribution schemes using fuzzy commitment and fuzzy vault within wireless body area networks. PIMRC 2015: 2120-2125 - 2014
- [c21]Guanglou Zheng, Gengfa Fang, Mehmet A. Orgun
, Rajan Shankaran
:
A non-key based security scheme supporting emergency treatment of wireless implants. ICC 2014: 647-652 - [c20]Guanglou Zheng, Gengfa Fang, Mehmet A. Orgun
, Rajan Shankaran
, Eryk Dutkiewicz
:
Securing wireless medical implants using an ECG-based secret data sharing scheme. ISCIT 2014: 373-377 - [c19]Guanglou Zheng, Gengfa Fang, Rajan Shankaran
, Mehmet A. Orgun
, Eryk Dutkiewicz
:
An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices. WPMC 2014: 624-628 - 2012
- [c18]Ke-Bing Zhang, Mehmet A. Orgun
, Rajan Shankaran
, Du Zhang:
Interactive Visual Classification of Multivariate Data. ICMLA (2) 2012: 246-251 - [c17]Ke-Bing Zhang, Mehmet A. Orgun
, Rajan Shankaran
, Du Zhang:
A Visual Approach for Classification Based on Data Projection. PRICAI 2012: 850-856 - 2011
- [e1]Mehmet A. Orgun, Atilla Elçi, Oleg B. Makarevich, Sorin A. Huss, Josef Pieprzyk, Lyudmila K. Babenko, Alexander G. Chefranov, Rajan Shankaran:
Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. ACM 2011, ISBN 978-1-4503-1020-8 [contents] - 2010
- [c16]Junqi Zhang, Rajan Shankaran
, Mehmet A. Orgun
, Vijay Varadharajan
, Abdul Sattar
:
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks. EUC 2010: 484-491 - [c15]Junqi Zhang, Rajan Shankaran
, Mehmet A. Orgun
, Vijay Varadharajan
, Abdul Sattar
:
A trust management architecture for hierarchical wireless sensor networks. LCN 2010: 264-267 - [c14]Junqi Zhang, Rajan Shankaran
, Mehmet A. Orgun
, Abdul Sattar, Vijay Varadharajan:
A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks. MobiQuitous 2010: 186-197
2000 – 2009
- 2009
- [c13]Rajan Shankaran
, Vijay Varadharajan
, Mehmet A. Orgun
, Michael Hitchens
:
Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. COMPSAC (2) 2009: 188-193 - [c12]Iyad Alsmairat, Rajan Shankaran
, Mehmet A. Orgun
, Eryk Dutkiewicz
:
Securing Session Initiation Protocol in Voice over IP Domain. DASC 2009: 78-83 - [c11]Rajan Shankaran
, Vijay Varadharajan
, Mehmet A. Orgun
, Michael Hitchens
:
Critical Issues in Trust Management for Mobile Ad-Hoc Networks. IRI 2009: 97-100 - 2004
- [j2]Vijay Varadharajan, Rajan Shankaran
, Michael Hitchens
:
Security for cluster based ad hoc networks. Comput. Commun. 27(5): 488-501 (2004) - [c10]Michael Hitchens, Rajan Shankaran, Vijay Varadharajan:
Securing the Ad-Hoc On-demand Distance Vector Protocol. PDCS 2004: 353-360 - 2003
- [c9]Rajan Shankaran
, Vijay Varadharajan, Michael Hitchens
:
A secure multicast support framework for Mobile IP. WCNC 2003: 2114-2119 - 2002
- [c8]Rajan Shankaran, Vijay Varadharajan, Michael Hitchens:
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach. IASTED PDCS 2002: 851-856 - 2001
- [c7]Pascal Molli, Hala Skaf-Molli, Claude Godart, Pradeep Ray, Rajan Shankaran, Vijay Varadharajan:
Integrating Network Services for Virtual Teams. ICEIS (2) 2001: 1034-1039 - [c6]Rajan Shankaran
, Vijay Varadharajan, Michael Hitchens
:
A Distributed Location Management Scheme for Mobile Hosts. ICPADS 2001: 297-304 - [c5]Rajan Shankaran, Vijay Varadharajan, Michael Hitchens:
Secure Distributed Location Management Scheme for Mobile Hosts. LCN 2001: 296-305
1990 – 1999
- 1999
- [j1]Vijay Varadharajan, Rajan Shankaran
, Michael Hitchens
:
On the design of secure ATM networks. Comput. Commun. 22(15-16): 1512-1525 (1999) - [c4]Rajan Shankaran, Vijay Varadharajan, Michael Hitchens:
Secure Multicast Extensions for Mobile Networks. LCN 1999: 106-116 - 1998
- [c3]Rajan Shankaran
, Vijay Varadharajan:
Secure Signaling and Access Control for ATM Networks. ACSAC 1998: 212-222 - 1997
- [c2]Vijay Varadharajan, Rajan Shankaran
, Michael Hitchens
:
Security Issues in Asynchronous Transfer Mode. ACISP 1997: 76-89 - [c1]Vijay Varadharajan, Rajan Shankaran, Michael Hitchens:
Security services and public key infrastructure for ATM networks. LCN 1997: 253-262
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint