default search action
Vireshwar Kumar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Vamshi Sunku Mohan, Sriram Sankaran, Vireshwar Kumar, Krishnashree Achuthan:
EP-CuMAC: Energy and performance-efficient integrity protection for narrow-band IoT. Internet Things 25: 101004 (2024) - [c19]Mehreen Jabbeen, Vireshwar Kumar, Rijurekha Sen:
SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms. AsiaCCS 2024 - [c18]Subrat Kumar Swain, Vireshwar Kumar, Guangdong Bai, Dan Dongseong Kim:
PANDA: Practical Adversarial Attack Against Network Intrusion Detection. DSN-S 2024: 28-32 - 2023
- [c17]Subrat Kumar Swain, Vireshwar Kumar, Dan Dongseong Kim, Guangdong Bai:
SPAT: Semantic-Preserving Adversarial Transformation for Perceptually Similar Adversarial Examples. ECAI 2023: 2266-2273 - [c16]Dipika Tanwar, Priyanka Singla, Soham Nag, Vireshwar Kumar, Smruti R. Sarangi:
SmrtComp: Intelligent and Online CAN Data Compression. ITSC 2023: 1514-1521 - [c15]Khaled Serag, Rohit Bhatia, Akram Faqih, Muslum Ozgur Ozmen, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
ZBCAN: A Zero-Byte CAN Defense System. USENIX Security Symposium 2023: 6893-6910 - 2021
- [j5]He Li, Vireshwar Kumar, Jung-Min Park, Yaling Yang:
Cumulative Message Authentication Codes for Resource-Constrained IoT Networks. IEEE Internet Things J. 8(15): 11847-11859 (2021) - [c14]Ismi Abidi, Vireshwar Kumar, Rijurekha Sen:
Practical Attestation for Edge Devices Running Compute Heavy Machine Learning Applications. ACSAC 2021: 323-336 - [c13]Rohit Bhatia, Vireshwar Kumar, Khaled Serag, Z. Berkay Celik, Mathias Payer, Dongyan Xu:
Evading Voltage-Based Intrusion Detection on Automotive CAN. NDSS 2021 - [c12]Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, Dave (Jing) Tian:
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications. USENIX Security Symposium 2021: 249-266 - [c11]Khaled Serag, Rohit Bhatia, Vireshwar Kumar, Z. Berkay Celik, Dongyan Xu:
Exposing New Vulnerabilities of Error Handling Mechanism in CAN. USENIX Security Symposium 2021: 4241-4258 - 2020
- [c10]He Li, Vireshwar Kumar, Jung-Min Jerry Park, Yaling Yang:
Cumulative Message Authentication Codes for Resource-Constrained Networks. CNS 2020: 1-9 - [c9]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Mathias Payer, Dongyan Xu:
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks. RAID 2020: 397-411 - [c8]Jianliang Wu, Yuhong Nan, Vireshwar Kumar, Dave (Jing) Tian, Antonio Bianchi, Mathias Payer, Dongyan Xu:
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy. WOOT @ USENIX Security Symposium 2020 - [i3]He Li, Vireshwar Kumar, Jung-Min Park, Yaling Yang:
Cumulative Message Authentication Codes for Resource-Constrained Networks. CoRR abs/2001.05211 (2020)
2010 – 2019
- 2019
- [j4]Vireshwar Kumar, He Li, Jung-Min Park, Kaigui Bian:
Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing. IEEE Trans. Cogn. Commun. Netw. 5(3): 625-636 (2019) - 2018
- [c7]Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati:
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System. AsiaCCS 2018: 567-574 - [c6]Vireshwar Kumar, He Li, Jung-Min "Jerry" Park, Kaigui Bian:
Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters. DySPAN 2018: 1-10 - [i2]Vireshwar Kumar, He Li, Noah Luther, Pranav Asokan, Jung-Min "Jerry" Park, Kaigui Bian, Martin B. H. Weiss, Taieb Znati:
Direct Anonymous Attestation with Efficient Verifier-Local Revocation for Subscription System. IACR Cryptol. ePrint Arch. 2018: 290 (2018) - 2017
- [j3]Vireshwar Kumar, Jung-Min Park, Kaigui Bian:
Transmitter authentication using hierarchical modulation in dynamic spectrum sharing. J. Netw. Comput. Appl. 91: 52-60 (2017) - 2016
- [j2]Vireshwar Kumar, Jung-Min "Jerry" Park, Kaigui Bian:
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement. IEEE Trans. Inf. Forensics Secur. 11(5): 1027-1038 (2016) - 2015
- [c5]Vireshwar Kumar, He Li, Jung-Min "Jerry" Park, Kaigui Bian, Yaling Yang:
Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. CCS 2015: 1334-1345 - 2014
- [j1]Jung-Min Park, Jeffrey H. Reed, A. A. (Louis) Beex, T. Charles Clancy, Vireshwar Kumar, Behnam Bahrak:
Security and Enforcement in Spectrum Sharing. Proc. IEEE 102(3): 270-281 (2014) - [c4]Vireshwar Kumar, Jung-Min Park, Kaigui Bian:
Blind Transmitter Authentication for Spectrum Security and Enforcement. CCS 2014: 787-798 - [c3]Vireshwar Kumar, Jung-Min Park, T. Charles Clancy, Kaigui Bian:
PHY-layer authentication using hierarchical modulation and duobinary signaling. ICNC 2014: 782-786 - 2013
- [c2]Vireshwar Kumar, Jung-Min Park, T. Charles Clancy, Kaigui Bian:
PHY-layer authentication by introducing controlled inter symbol interference. CNS 2013: 10-18 - 2012
- [c1]Vireshwar Kumar, Jung-Min Park, Jaeweon Kim, Ahsan Aziz:
Physical layer authentication using controlled inter symbol interference. DySPAN 2012: 286 - 2011
- [i1]Shahid Mehraj Shah, Vireshwar Kumar, Vinod Sharma:
Achievable Secrecy Sum-Rate in a Fading MAC-WT with Power Control and without CSI of Eavesdropper. CoRR abs/1107.5123 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint