


default search action
Sanjay K. Jha
Person information
- affiliation: University of New South Wales, School of Computer Science and Engineering, Sydney, Australia
Other persons with the same name
- Sanjay Jha — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i38]Nimesha Wickramasinghe, Arash Shaghaghi, Elena Ferrari, Sanjay K. Jha:
Less is More: Simplifying Network Traffic Classification Leveraging RFCs. CoRR abs/2502.00586 (2025) - 2024
- [j83]Wenbin Wang
, Yang Song
, Sanjay K. Jha
:
USAT: A Universal Speaker-Adaptive Text-to-Speech Approach. IEEE ACM Trans. Audio Speech Lang. Process. 32: 2590-2604 (2024) - [j82]Neel Bhaskar
, Jawad Ahmed
, Rahat Masood
, Nadeem Ahmed
, Stephen Kerr
, Sanjay K. Jha
:
A Comprehensive Threat Modelling Analysis for Distributed Energy Resources. ACM Trans. Cyber Phys. Syst. 8(4): 40:1-40:32 (2024) - [j81]Ishan Karunanayake
, Jiaojiao Jiang
, Nadeem Ahmed
, Sanjay K. Jha
:
Exploring Uncharted Waters of Website Fingerprinting. IEEE Trans. Inf. Forensics Secur. 19: 1840-1854 (2024) - [j80]Zakia Zaman
, Wanli Xue
, Praveen Gauravaram
, Wen Hu
, Jiaojiao Jiang
, Sanjay K. Jha
:
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis. IEEE Trans. Inf. Forensics Secur. 19: 9173-9187 (2024) - [j79]Ahmed S. Musleh
, Jawad Ahmed
, Nadeem Ahmed
, Hunter Xu, Guo Chen
, Stephen Kerr, Sanjay Jha
:
Experimental Cybersecurity Evaluation of Distributed Solar Inverters: Vulnerabilities and Impacts on the Australian Grid. IEEE Trans. Smart Grid 15(5): 5139-5150 (2024) - [c170]Yuvin Perera, Gustavo Batista, Wen Hu, Salil S. Kanhere, Sanjay K. Jha:
SAfER: Simplified Auto-encoder for (Anomalous) Event Recognition. DCOSS-IoT 2024: 229-233 - [c169]Marium Malik, Jiaojiao Jiang, Yang Song, Sanjay Jha:
MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction. ECIR (3) 2024: 345-353 - [c168]Aryan Sharma, Deepak Mishra, Sanjay K. Jha, Aruna Seneviratne:
An Investigation into the Non-Uniformity of Channel State Information in WiFi Sensing Systems. INFOCOM (Workshops) 2024: 1-6 - [c167]Shohreh Deldari
, Mohammad Goudarzi
, Aditya Joshi
, Arash Shaghaghi
, Simon Finn
, Flora D. Salim
, Sanjay Jha
:
AuditNet: Conversational AI Security Assistant. MobileHCI (Companion) 2024: 22:1-22:4 - [c166]Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha:
Lack of Systematic Approach to Security of IoT Context Sharing Platforms. PST 2024: 1-4 - [i37]Wenbin Wang, Yang Song, Sanjay Jha:
USAT: A Universal Speaker-Adaptive Text-to-Speech Approach. CoRR abs/2404.18094 (2024) - [i36]Wenbin Wang, Yang Song, Sanjay Jha:
GLOBE: A High-quality English Corpus with Global Accents for Zero-shot Speaker Adaptive Text-to-Speech. CoRR abs/2406.14875 (2024) - [i35]Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Sanjay Jha:
Lack of Systematic Approach to Security of IoT Context Sharing Platforms. CoRR abs/2407.05290 (2024) - [i34]Shohreh Deldari, Mohammad Goudarzi, Aditya Joshi
, Arash Shaghaghi, Simon Finn, Flora D. Salim
, Sanjay Jha:
AuditNet: A Conversational AI-based Security Assistant [DEMO]. CoRR abs/2407.14116 (2024) - [i33]Uzma Maroof, Gustavo Batista, Arash Shaghaghi, Sanjay K. Jha:
Towards Detecting IoT Event Spoofing Attacks Using Time-Series Classification. CoRR abs/2407.19662 (2024) - [i32]Mohammad Goudarzi, Arash Shaghaghi, Simon Finn, Burkhard Stiller, Sanjay K. Jha:
Towards Threat Modelling of IoT Context-Sharing Platforms. CoRR abs/2408.12081 (2024) - [i31]Ishan Karunanayake, Mashael AlSabah, Nadeem Ahmed, Sanjay K. Jha:
Examining the Rat in the Tunnel: Interpretable Multi-Label Classification of Tor-based Malware. CoRR abs/2409.16639 (2024) - [i30]Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay K. Jha:
Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning. CoRR abs/2410.11205 (2024) - 2023
- [j78]Ishan Karunanayake
, Nadeem Ahmed
, Robert A. Malaney
, Md. Rafiqul Islam
, Sanjay K. Jha
:
Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification. IEEE Access 11: 70011-70022 (2023) - [c165]Wenbin Wang
, Yang Song, Sanjay Jha:
Generalizable Zero-Shot Speaker Adaptive Speech Synthesis with Disentangled Representations. INTERSPEECH 2023: 4454-4458 - [c164]Ahmed S. Musleh, Jawad Ahmed, Nadeem Ahmed, Hunter Xu, Guo Chen, Jiankun Hu, Sanjay K. Jha:
Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems. SmartGridComm 2023: 1-6 - [i29]Wenbin Wang, Yang Song, Sanjay Jha:
Generalizable Zero-Shot Speaker Adaptive Speech Synthesis with Disentangled Representations. CoRR abs/2308.13007 (2023) - 2022
- [j77]Uzma Maroof
, Arash Shaghaghi
, Regio A. Michelin
, Sanjay K. Jha
:
iRECOVer: Patch your IoT on-the-fly. Future Gener. Comput. Syst. 132: 178-193 (2022) - [j76]Nadeem Ahmed
, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra
, Sushmita Ruj
, Salil S. Kanhere
, Sanjay K. Jha
:
DIMY: Enabling privacy-preserving contact tracing. J. Netw. Comput. Appl. 202: 103356 (2022) - [j75]Siqi Ma
, Juanru Li, Surya Nepal
, Diethelm Ostry, David Lo
, Sanjay K. Jha
, Robert H. Deng
, Elisa Bertino
:
Orchestration or Automation: Authentication Flaw Detection in Android Apps. IEEE Trans. Dependable Secur. Comput. 19(4): 2165-2178 (2022) - [j74]Rizka Widyarini Purwanto
, Arindam Pal
, Alan Blair
, Sanjay Jha
:
PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool. IEEE Trans. Inf. Forensics Secur. 17: 1497-1512 (2022) - [j73]Jiaojiao Jiang
, Shuiqiao Yang
, Sanjay Jha
:
Network Growth From Global and Local Influential Nodes. IEEE Trans. Netw. Sci. Eng. 9(4): 2549-2561 (2022) - [c163]Aryan Sharma, Wenqi Jiang, Deepak Mishra
, Sanjay K. Jha, Aruna Seneviratne:
Optimised CNN for Human Counting Using Spectrograms of Probabilistic WiFi CSI. GLOBECOM 2022: 1-6 - [c162]Yuvin Perera, Nadeem Ahmed, Salil S. Kanhere
, Wen Hu, Sanjay K. Jha
:
IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home? ICC 2022: 2954-2959 - [c161]Wenbin Wang
, Yang Song, Sanjay Jha
:
Autolv: Automatic Lecture Video Generator. ICIP 2022: 1086-1090 - [c160]Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Sanjay Jha
:
BloomXNOR-Net: privacy-preserving machine learning in IoT. S3@MobiCom 2022: 1-3 - [i28]Jin Ho Go, Alina Sari, Jiaojiao Jiang, Shuiqiao Yang, Sanjay K. Jha
:
Fake News Quick Detection on Dynamic Heterogeneous Information Networks. CoRR abs/2205.07039 (2022) - [i27]Rizka Purwanto
, Arindam Pal, Alan Blair, Sanjay K. Jha
:
PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool. CoRR abs/2207.10801 (2022) - [i26]Wenbin Wang, Yang Song, Sanjay Jha:
AutoLV: Automatic Lecture Video Generator. CoRR abs/2209.08795 (2022) - 2021
- [j72]Ishan Karunanayake
, Nadeem Ahmed
, Robert A. Malaney
, Rafiqul Islam
, Sanjay K. Jha
:
De-Anonymisation Attacks on Tor: A Survey. IEEE Commun. Surv. Tutorials 23(4): 2324-2350 (2021) - [j71]Chuka Oham
, Regio A. Michelin, Raja Jurdak
, Salil S. Kanhere
, Sanjay Jha
:
B-FERL: Blockchain based framework for securing smart vehicles. Inf. Process. Manag. 58(1): 102426 (2021) - [j70]Wanli Xue
, Chengwen Luo
, Yiran Shen
, Rajib Rana, Guohao Lan
, Sanjay Jha
, Aruna Seneviratne
, Wen Hu:
Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things. IEEE Trans. Mob. Comput. 20(10): 3049-3065 (2021) - [c159]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Wei Song, Sushmita Ruj, Salil S. Kanhere
, Sanjay K. Jha
:
Towards Privacy-preserving Digital Contact Tracing. IEEE ICBC 2021: 1-3 - [c158]Jiayao Gao, Weitao Xu
, Salil S. Kanhere
, Sanjay Jha, Jun Young Kim
, Walter Huang, Wen Hu:
A Novel Model-Based Security Scheme for LoRa Key Generation. IPSN 2021: 47-61 - [c157]Jun Liu, Jiayao Gao, Sanjay K. Jha, Wen Hu:
Seirios: leveraging multiple channels for LoRaWAN indoor and outdoor localization. MobiCom 2021: 656-669 - [i25]Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar, Sanjay K. Jha:
All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks. CoRR abs/2102.01944 (2021) - [i24]Jiaojiao Jiang, Sanjay Jha:
Network Growth From Global and Local Influential Nodes. CoRR abs/2103.00487 (2021) - [i23]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Sushmita Ruj, Salil S. Kanhere, Sanjay Jha:
DIMY: Enabling Privacy-preserving Contact Tracing. CoRR abs/2103.05873 (2021) - [i22]Jun Liu, Jiayao Gao, Sanjay Jha, Wen Hu:
Seirios: Leveraging Multiple Channels for LoRaWAN Indoor and Outdoor Localization. CoRR abs/2108.06884 (2021) - [i21]Rizka Purwanto, Arindam Pal, Alan Blair, Sanjay Jha:
Man versus Machine: AutoML and Human Experts' Role in Phishing Detection. CoRR abs/2108.12193 (2021) - 2020
- [j69]Nadeem Ahmed
, Regio A. Michelin
, Wanli Xue
, Sushmita Ruj
, Robert A. Malaney
, Salil S. Kanhere
, Aruna Seneviratne
, Wen Hu
, Helge Janicke
, Sanjay K. Jha
:
A Survey of COVID-19 Contact Tracing Apps. IEEE Access 8: 134577-134601 (2020) - [j68]Weitao Xu
, Jun Young Kim
, Walter Huang, Salil S. Kanhere
, Sanjay K. Jha
, Wen Hu
:
Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings. IEEE Internet Things J. 7(1): 298-310 (2020) - [c156]Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha
:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. CISIS 2020: 111-121 - [c155]Rizka Purwanto
, Arindam Pal, Alan Blair
, Sanjay Jha
:
PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites. CNS 2020: 1-9 - [c154]Girish Revadigar, Chitra Javali, Sanjay Jha
:
ProxiCar: Proximity-Based Secure Digital Key Solution for Cars. COMSNETS 2020: 282-289 - [c153]Regio A. Michelin, Nadeem Ahmed, Salil S. Kanhere
, Aruna Seneviratne, Sanjay K. Jha
:
Leveraging lightweight blockchain to establish data integrity for surveillance cameras. IEEE ICBC 2020: 1-3 - [c152]Jiayao Gao, Weitao Xu
, Salil S. Kanhere
, Sanjay K. Jha
, Wen Hu:
Poster Abstract: A Novel Modeling Involved Security Approach for LoRa Key Generation. IPSN 2020: 327-328 - [c151]Jun Liu, Weitao Xu
, Sanjay Jha, Wen Hu:
Nephalai: towards LPWAN C-RAN with physical layer compression. MobiCom 2020: 36:1-36:12 - [c150]Weitao Xu
, Jun Young Kim
, Walter Huang, Salil S. Kanhere
, Sanjay K. Jha
, Wen Hu:
EMIoT: A LoRa-enabled Smart Building Solution Based on Emergency Lights. BuildSys 2020: 330-331 - [p2]Arash Shaghaghi, Mohamed Ali Kâafar
, Rajkumar Buyya
, Sanjay Jha
:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. Handbook of Computer Networks and Cyber Security 2020: 341-387 - [i20]Zainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha:
Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud. CoRR abs/2005.07987 (2020) - [i19]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert A. Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay K. Jha:
A Survey of COVID-19 Contact Tracing Apps. CoRR abs/2006.10306 (2020) - [i18]Chuka Oham, Regio A. Michelin, Salil S. Kanhere, Raja Jurdak, Sanjay K. Jha:
B-FERL: Blockchain based Framework for Securing Smart Vehicles. CoRR abs/2007.10528 (2020) - [i17]Rizka Purwanto, Arindam Pal, Alan Blair, Sanjay Jha:
PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites. CoRR abs/2007.11955 (2020) - [i16]Weitao Xu, Jin Zhang, Jun Young Kim, Walter Huang, Salil S. Kanhere, Sanjay K. Jha, Wen Hu, Prasant Misra:
A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases. CoRR abs/2007.15906 (2020) - [i15]Jun Liu, Weitao Xu, Sanjay K. Jha, Wen Hu:
Nephalai: Towards LPWAN C-RAN with Physical Layer Compression. CoRR abs/2008.02599 (2020) - [i14]Ishan Karunanayake, Nadeem Ahmed, Robert A. Malaney, Rafiqul Islam, Sanjay K. Jha:
Anonymity with Tor: A Survey on Tor Attacks. CoRR abs/2009.13018 (2020) - [i13]Hassan Ali
, Surya Nepal, Salil S. Kanhere, Sanjay Jha:
HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios. CoRR abs/2012.07474 (2020)
2010 – 2019
- 2019
- [j67]Hailun Tan, Gene Tsudik
, Sanjay K. Jha
:
MTRA: Multi-Tier randomized remote attestation in IoT networks. Comput. Secur. 81: 78-93 (2019) - [j66]Mosarrat Jahan
, Suranga Seneviratne, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha
:
Light weight and fine-grained access mechanism for secure access to outsourced data. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j65]Mohsen Rezvani
, David Rajaratnam
, Aleksandar Ignjatovic, Maurice Pagnucco
, Sanjay Jha
:
Analyzing XACML policies using answer set programming. Int. J. Inf. Sec. 18(4): 465-479 (2019) - [j64]Weitao Xu
, Sanjay Jha
, Wen Hu
:
LoRa-Key: Secure Key Generation System for LoRa-Based Network. IEEE Internet Things J. 6(4): 6404-6416 (2019) - [j63]Weitao Xu
, Jin Zhang, Jun Young Kim
, Walter Huang, Salil S. Kanhere
, Sanjay K. Jha
, Wen Hu
:
The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings. IEEE Internet Things J. 6(4): 7266-7281 (2019) - [j62]Jun Young Kim
, Wen Hu
, Dilip Sarkar, Sanjay Jha
:
Long-term secure management of large scale Internet of Things applications. J. Netw. Comput. Appl. 138: 15-26 (2019) - [j61]Kai Li
, Chau Yuen
, Branislav Kusy, Raja Jurdak
, Aleksandar Ignjatovic
, Salil S. Kanhere
, Sanjay Jha
:
Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting. IEEE Trans. Mob. Comput. 18(6): 1274-1287 (2019) - [c149]Siqi Ma
, Runhan Feng, Juanru Li, Yang Liu, Surya Nepal
, Diethelm Ostry, Elisa Bertino, Robert H. Deng
, Zhuo Ma, Sanjay Jha
:
An empirical study of SMS one-time password authentication in Android apps. ACSAC 2019: 339-354 - [c148]Uzma Maroof, Arash Shaghaghi, Sanjay K. Jha
:
PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices. IoT S&P@CCS 2019: 50-57 - [c147]Siqi Ma
, Elisa Bertino, Surya Nepal
, Juanru Li, Diethelm Ostry, Robert H. Deng
, Sanjay Jha
:
Finding Flaws from Password Authentication Code in Android Apps. ESORICS (1) 2019: 619-637 - [i12]Chuka Oham, Raja Jurdak, Sanjay K. Jha:
Risk Analysis Study of Fully Autonomous Vehicle. CoRR abs/1905.10910 (2019) - [i11]Weitao Xu, Jun Young Kim, Walter Huang, Salil S. Kanhere, Sanjay Jha, Wen Hu:
Measurement, Characterization and Modeling of LoRa Technology in Multi-floor Buildings. CoRR abs/1909.03900 (2019) - [i10]Regio A. Michelin, Nadeem Ahmed, Salil S. Kanhere, Aruna Seneviratne, Sanjay Jha:
Leveraging lightweight blockchain to establish data integrity for surveillance cameras. CoRR abs/1912.11044 (2019) - 2018
- [j60]Jun Young Kim
, Wen Hu
, Hossein Shafagh, Sanjay Jha
:
SEDA: Secure Over-the-Air Code Dissemination Protocol for the Internet of Things. IEEE Trans. Dependable Secur. Comput. 15(6): 1041-1054 (2018) - [j59]Mosarrat Jahan
, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne
, Sanjay K. Jha
:
Light Weight Write Mechanism for Cloud Data. IEEE Trans. Parallel Distributed Syst. 29(5): 1131-1146 (2018) - [c146]Hailun Tan, Diet Ostry, Sanjay Jha
:
Exploiting multiple side channels for secret key agreement in Wireless Networks. ICDCN 2018: 39:1-39:10 - [c145]Chuka Oham, Raja Jurdak
, Salil S. Kanhere
, Ali Dorri, Sanjay K. Jha
:
B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication. iThings/GreenCom/CPSCom/SmartData 2018: 1171-1180 - [c144]Arash Shaghaghi, Salil S. Kanhere
, Mohamed Ali Kâafar
, Elisa Bertino, Sanjay Jha
:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. LCN 2018: 553-561 - [c143]Arash Shaghaghi, Salil S. Kanhere
, Mohamed Ali Kâafar
, Sanjay Jha
:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. NCA 2018: 1-5 - [c142]Weitao Xu
, Sanjay Jha
, Wen Hu
:
Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN. TrustCom/BigDataSE 2018: 231-236 - [i9]Chuka Oham, Salil S. Kanhere, Raja Jurdak, Sanjay K. Jha:
A Blockchain Based Liability Attribution Framework for Autonomous Vehicles. CoRR abs/1802.05050 (2018) - [i8]Arash Shaghaghi, Mohamed Ali Kâafar, Rajkumar Buyya, Sanjay Jha:
Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions. CoRR abs/1804.00262 (2018) - [i7]Chuka Oham, Raja Jurdak, Salil S. Kanhere, Ali Dorri, Sanjay K. Jha:
B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication. CoRR abs/1806.06169 (2018) - [i6]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Elisa Bertino, Sanjay Jha:
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations. CoRR abs/1807.02593 (2018) - [i5]Arash Shaghaghi, Salil S. Kanhere, Mohamed Ali Kâafar, Sanjay Jha:
Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems. CoRR abs/1809.06988 (2018) - 2017
- [j58]Girish Revadigar
, Chitra Javali, Weitao Xu
, Athanasios V. Vasilakos
, Wen Hu
, Sanjay Jha
:
Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables. IEEE Trans. Inf. Forensics Secur. 12(10): 2467-2482 (2017) - [j57]Prasant Misra
, Wen Hu
, Mingrui Yang, Marco F. Duarte, Sanjay Jha
:
Sparsity Based Efficient Cross-Correlation Techniques in Sensor Networks. IEEE Trans. Mob. Comput. 16(7): 2037-2050 (2017) - [j56]Wanqing Tu
, Cormac J. Sreenan, Sanjay Jha
, Qian Zhang
:
Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks. IEEE Trans. Mob. Comput. 16(12): 3431-3444 (2017) - [c141]Jun Young Kim
, Ralph Holz, Wen Hu
, Sanjay Jha
:
Automated Analysis of Secure Internet of Things Protocols. ACSAC 2017: 238-249 - [c140]Arash Shaghaghi, Mohamed Ali Kâafar
, Sanjay Jha
:
WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks. AsiaCCS 2017: 849-861 - [c139]Hailun Tan, Gene Tsudik, Sanjay Jha
:
MTRA: Multiple-tier remote attestation in IoT networks. CNS 2017: 1-9 - [c138]Mosarrat Jahan
, Aruna Seneviratne
, Sanjay Jha
:
Access Mechanism for Outsourced Data by Preserving Data Owner's Preference. LCN 2017: 611-614 - [c137]Mosarrat Jahan, Suranga Seneviratne, Ben Chu, Aruna Seneviratne, Sanjay K. Jha
:
Privacy preserving data access scheme for IoT devices. NCA 2017: 217-226 - [c136]Zainab Abaid, Mohamed Ali Kâafar
, Sanjay Jha
:
Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers. NCA 2017: 375-384 - [c135]Zainab Abaid, Mohamed Ali Kâafar
, Sanjay Jha
:
Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study. Networking 2017: 1-9 - [c134]Mosarrat Jahan
, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne
, Sanjay Jha
:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. TrustCom/BigDataSE/ICESS 2017: 201-209 - [c133]Jun Young Kim
, Wen Hu
, Dilip Sarkar, Sanjay Jha
:
ESIoT: enabling secure management of the internet of things. WISEC 2017: 219-229 - [i4]Arash Shaghaghi, Mohamed Ali Kâafar, Sanjay Jha:
WedgeTail 2.0: An Intrusion Prevention System for the Data Plane of Software Defined Networks. CoRR abs/1708.05477 (2017) - 2016
- [j55]Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
On the importance of link characterization for aerial wireless sensor networks. IEEE Commun. Mag. 54(5): 52-57 (2016) - [j54]Kai Li
, Nadeem Ahmed
, Salil S. Kanhere
, Sanjay K. Jha
:
Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna. Pervasive Mob. Comput. 30: 151-165 (2016) - [j53]Kai Li
, Wei Ni, Xin Wang
, Ren Ping Liu
, Salil S. Kanhere
, Sanjay K. Jha
:
Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles. IEEE Trans. Mob. Comput. 15(6): 1377-1386 (2016) - [c132]Muhammad Siddiqi, Vijay Sivaraman, Sanjay Jha
:
Timestamp integrity in wearable healthcare devices. ANTS 2016: 1-6 - [c131]Zainab Abaid, Dilip Sarkar, Mohamed Ali Kâafar
, Sanjay Jha
:
The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks. LCN 2016: 61-68 - [c130]Chitra Javali, Girish Revadigar, Kasper Bonne Rasmussen, Wen Hu
, Sanjay Jha
:
I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol. LCN 2016: 477-485 - [c129]Mohsen Rezvani, Aleksandar Ignjatovic, Maurice Pagnucco
, Sanjay K. Jha
:
Anomaly-free policy composition in software-defined networks. Networking 2016: 28-36 - [c128]Arash Shaghaghi, Mohamed Ali Kâafar
, Sandra Scott-Hayward, Salil S. Kanhere
, Sanjay K. Jha
:
Towards Policy Enforcement Point as a Service (PEPS). NFV-SDN 2016: 50-55 - [c127]Chitra Javali, Girish Revadigar, Daniel Pletea, Sanjay Jha
:
Demo abstract: Location fingerprint evidence and authorisation using WiFi channel characteristics. PerCom Workshops 2016: 1-3 - [c126]Girish Revadigar, Chitra Javali, Weitao Xu
, Wen Hu
, Sanjay Jha
:
Secure key generation and distribution protocol for wearable devices. PerCom Workshops 2016: 1-4 - [i3]Kai Li, Chau Yuen, Branislav Kusy, Raja Jurdak, Aleksandar Ignjatovic, Salil S. Kanhere, Sanjay K. Jha:
Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting. CoRR abs/1603.02476 (2016) - [i2]Arash Shaghaghi, Mohamed Ali Kâafar, Sandra Scott-Hayward, Salil S. Kanhere, Sanjay K. Jha:
Towards Policy Enforcement Point as a Service (PEPS). CoRR abs/1610.02526 (2016) - 2015
- [j52]Prasant Misra, Salil S. Kanhere
, Sanjay K. Jha
, Wen Hu
:
Sparse representation based acoustic rangefinders: from sensor platforms to mobile devices. IEEE Commun. Mag. 53(1): 249-257 (2015) - [j51]Yogita Chapre, Aleksandar Ignjatovic, Aruna Seneviratne
, Sanjay K. Jha
:
CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO. Pervasive Mob. Comput. 23: 89-103 (2015) - [j50]Hailun Tan, Wen Hu
, Sanjay Jha
:
A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks. Secur. Commun. Networks 8(13): 2171-2188 (2015) - [j49]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. IEEE Trans. Dependable Secur. Comput. 12(1): 98-110 (2015) - [j48]Mohsen Rezvani, Verica Sekulic, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
Interdependent Security Risk Analysis of Hosts and Flows. IEEE Trans. Inf. Forensics Secur. 10(11): 2325-2339 (2015) - [j47]Xin Zhao, Jun Guo
, Chun Tung Chou
, Archan Misra
, Sanjay K. Jha
:
High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks. IEEE Trans. Mob. Comput. 14(4): 728-741 (2015) - [j46]Syed Taha Ali, Vijay Sivaraman, Adam Radford, Sanjay Jha
:
A Survey of Securing Networks Using Software Defined Networking. IEEE Trans. Reliab. 64(3): 1086-1097 (2015) - [c125]Chitra Javali, Girish Revadigar, Ming Ding, Sanjay Jha
:
Secret Key Generation by Virtual Link Estimation. BODYNETS 2015 - [c124]Girish Revadigar, Chitra Javali, Hassan Jameel Asghar
, Kasper Bonne Rasmussen, Sanjay Jha
:
Mobility Independent Secret Key Generation for Wearable Health-care Devices. BODYNETS 2015 - [c123]Muhammad Siddiqi, Gerard Hager, Vijay Sivaraman, Sanjay Jha
:
Securing the Timestamping of Sensor Data from Wearable Healthcare Devices. BODYNETS 2015 - [c122]Girish Revadigar, Chitra Javali, Hassan Jameel Asghar
, Kasper Bonne Rasmussen, Sanjay Jha
:
iARC: Secret Key Generation for Resource Constrained Devices by Inducing Artificial Randomness in the Channel. AsiaCCS 2015: 669 - [c121]Kai Li
, Wei Ni, Xin Wang, Ren Ping Liu, Salil S. Kanhere
, Sanjay K. Jha
:
EPLA: Energy-balancing packets scheduling for airborne relaying networks. ICC 2015: 6246-6251 - [c120]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
A Collaborative Reputation System Based on Credibility Propagation in WSNs. ICPADS 2015: 1-8 - [c119]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
A trust assessment framework for streaming data in WSNs using iterative filtering. ISSNIP 2015: 1-6 - [c118]Girish Revadigar, Chitra Javali, Wen Hu
, Sanjay Jha
:
DLINK: Dual link based radio frequency fingerprinting for wearable devices. LCN 2015: 329-337 - [c117]Mosarrat Jahan, Mohsen Rezvani, Aruna Seneviratne
, Sanjay K. Jha
:
Method for providing secure and private fine-grained access to outsourced data. LCN 2015: 406-409 - [c116]Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay K. Jha
:
An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems. SEC 2015: 189-203 - [c115]Kai Li
, Chau Yuen, Sanjay Jha
:
Poster: Fair Scheduling for Energy Harvesting WSN in Smart City. SenSys 2015: 419-420 - [c114]Jun Young Kim
, Sanjay Jha
, Wen Hu
, Hossein Shafagh, Mohamed Ali Kâafar
:
Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things. SenSys 2015: 425-426 - [c113]Chitra Javali, Girish Revadigar, Wen Hu
, Sanjay Jha
:
Poster: Were You in the Cafe Yesterday?: Location Proof Generation & Verification for Mobile Users. SenSys 2015: 429-430 - [c112]Ghulam Murtaza
, Andreas Reinhardt, Salil S. Kanhere
, Sanjay K. Jha
:
Lightweight clustering of spatio-temporal data in resource constrained mobile sensing. WOWMOM 2015: 1-9 - [i1]Prasant Misra, Wen Hu, Mingrui Yang, Marco F. Duarte, Sanjay Jha:
Sparsity based Efficient Cross-Correlation Techniques in Sensor Networks. CoRR abs/1501.06473 (2015) - 2014
- [j45]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Gene Tsudik, Sanjay K. Jha
:
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints. IEEE Trans. Inf. Forensics Secur. 9(12): 2193-2204 (2014) - [j44]Wei Ni
, Ren Ping Liu
, Jayeta Biswas, Xin Wang
, Iain B. Collings
, Sanjay K. Jha
:
Multiuser MIMO Scheduling for Mobile Video Applications. IEEE Trans. Wirel. Commun. 13(10): 5382-5395 (2014) - [c111]Zainab Abaid, Mohsen Rezvani, Sanjay K. Jha
:
MalwareMonitor: An SDN-based Framework for Securing Large Networks. CoNEXT Student Workshop 2014: 40-42 - [c110]Arash Shaghaghi, Jaesung Hong, Sanjay Jha
:
An SDN-based Framework for Detection of Illegal Rebroadcasting of Channels in P2PTV. VideoNext@CoNEXT 2014: 47-49 - [c109]Ghulam Murtaza
, Salil S. Kanhere
, Aleksandar Ignjatovic, Raja Jurdak
, Sanjay K. Jha
:
Trajectory Approximation for Resource Constrained Mobile Sensor Networks. DCOSS 2014: 59-66 - [c108]Kai Li
, Branislav Kusy
, Raja Jurdak
, Aleksandar Ignjatovic, Salil S. Kanhere
, Sanjay K. Jha
:
κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks. EWSN 2014: 17-33 - [c107]Yogita Chapre, Aleksandar Ignjatovic, Aruna Seneviratne
, Sanjay K. Jha
:
CSI-MIMO: Indoor Wi-Fi fingerprinting system. LCN 2014: 202-209 - [c106]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
Provenance-aware security risk analysis for hosts and network flows. NOMS 2014: 1-8 - [c105]Chitra Javali, Girish Revadigar, Lavy Libman, Sanjay Jha
:
SeAK: Secure Authentication and Key Generation Protocol Based on Dual Antennas for Wireless Body Area Networks. RFIDSec 2014: 74-89 - [c104]Jayeta Biswas, Wei Ni, Ren Ping Liu, Iain B. Collings
, Sanjay K. Jha
:
Low complexity user pairing and resource allocation of heterogeneous users for uplink virtual MIMO system over LTE-A network. WCNC 2014: 1903-1908 - [c103]Kai Li
, Mustafa Ilhan Akbas
, Damla Turgut, Salil S. Kanhere
, Sanjay K. Jha
:
Reliable positioning with hybrid antenna model for aerial wireless sensor and actor networks. WCNC 2014: 2904-2909 - 2013
- [j43]Tahir Mehmood, Lavy Libman, Hooman Reisi Dehkordi, Sanjay K. Jha
:
Optimal opportunistic routing and network coding for bidirectional wireless flows. Comput. Networks 57(18): 4030-4046 (2013) - [j42]Hailun Tan, Diethelm Ostry, John Zic
, Sanjay K. Jha
:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. Comput. Secur. 32: 36-55 (2013) - [j41]Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks. IEEE J. Sel. Areas Commun. 31(8): 1639-1649 (2013) - [j40]Prasant Misra, Navinda Kottege, Branislav Kusy
, Diethelm Ostry, Sanjay K. Jha
:
Acoustical ranging techniques in embedded wireless sensor networked devices. ACM Trans. Sens. Networks 10(1): 15:1-15:38 (2013) - [c102]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha
:
Securing data provenance in body area networks using lightweight wireless link fingerprints. TrustED@CCS 2013: 65-72 - [c101]Mohsen Rezvani, Aleksandar Ignjatovic, Sanjay K. Jha
:
Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency. DCOSS 2013: 286-288 - [c100]Ghulam Murtaza
, Salil S. Kanhere
, Sanjay K. Jha
:
Priority-based coverage path planning for Aerial Wireless Sensor Networks. ISSNIP 2013: 219-224 - [c99]Jayeta Biswas, Ren Ping Liu, Wei Ni
, Iain B. Collings
, Sanjay K. Jha
:
Joint channel and delay aware user scheduling for multiuser MIMO system over LTE-A network. IWQoS 2013: 129-136 - [c98]Bipul Sen, Lavy Libman, Xin Zhao, Sanjay Jha
:
An end-to-end delay metric for multi-rate wireless mesh networks with cooperative retransmission. LCN 2013: 296-299 - [c97]Yogita Chapre, Prasant Mohapatra, Sanjay Jha
, Aruna Seneviratne
:
Received signal strength indicator and its analysis in a typical WLAN system (short paper). LCN 2013: 304-307 - [c96]Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, Sanjay K. Jha
:
A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks. SenSys 2013: 30:1-30:2 - [c95]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha
:
Securing data provenance in body area networks using lightweight wireless link fingerprints. SenSys 2013: 85:1-85:2 - 2012
- [j39]Vishwesh V. Kulkarni, Joo Ghee Lim, Sanjay K. Jha
:
Feasibility of SINR guarantees for downlink transmissions in relay-enabled OFDMA networks. Autom. 48(8): 1818-1824 (2012) - [j38]Prasant Misra, Nadeem Ahmed, Sanjay K. Jha
:
An empirical study of asymmetry in low-power wireless links. IEEE Commun. Mag. 50(7): 137-146 (2012) - [j37]Wen Hu
, Tuan Le Dinh, Peter Corke
, Sanjay Jha
:
Outdoor Sensornet Design and Deployment: Experiences from a Sugar Farm. IEEE Pervasive Comput. 11(2): 82-91 (2012) - [j36]Wanqing Tu
, Cormac J. Sreenan, Chun Tung Chou
, Archan Misra
, Sanjay K. Jha
:
Resource-Aware Video Multicasting via Access Gateways in Wireless Mesh Networks. IEEE Trans. Mob. Comput. 11(6): 881-895 (2012) - [c94]Prasant Misra, Wen Hu
, Mingrui Yang, Sanjay Jha
:
Efficient cross-correlation via sparse representation in sensor networks. IPSN 2012: 13-24 - [c93]Kai Li
, Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Reliable communications in aerial sensor networks by using a hybrid antenna. LCN 2012: 156-159 - [c92]Xin Zhao, Sanjay Jha
:
Flexible resource allocation for multicast in OFDMA based wireless networks. LCN 2012: 445-452 - [c91]Bipul Sen, Xin Zhao, Lavy Libman, Sanjay Jha
:
Relay-aided high-throughput path selection in multi-rate wireless mesh networks. MSWiM 2012: 223-228 - [c90]Prasant Misra, Mingrui Yang, Wen Hu
, Sanjay Jha
:
A fast gradient projection algorithm for efficient cross-correlation via sparse representation in sensor networks. SenSys 2012: 333-334 - [c89]Bipul Sen, Jun Guo
, Xin Zhao, Sanjay Jha
:
ECTX: A high-throughput path metric for multi-hop wireless routing exploiting MAC-layer cooperative retransmission. WOWMOM 2012: 1-9 - 2011
- [j35]Vijay Sivaraman, Diethelm Ostry, Jaleel Shaheen, Antoni Junior Hianto, Sanjay K. Jha
:
Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j34]Hailun Tan, John Zic
, Sanjay K. Jha
, Diethelm Ostry:
Secure Multihop Network Programming with Multiple One-Way Key Chains. IEEE Trans. Mob. Comput. 10(1): 16-31 (2011) - [j33]Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
A pragmatic approach to area coverage in hybrid wireless sensor networks. Wirel. Commun. Mob. Comput. 11(1): 23-45 (2011) - [c88]Vishwesh V. Kulkarni, Joo Ghee Lim, Sanjay K. Jha
:
Feasibility of SINR guarantees for downlink transmissions in relay-enabled OFDMA networks. CDC/ECC 2011: 3783-3788 - [c87]Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Link characterization for Aerial Wireless Sensor Networks. GLOBECOM Workshops 2011: 1274-1279 - [c86]Prasant Misra, Nadeem Ahmed, Diethelm Ostry, Sanjay K. Jha
:
Characterization of Asymmetry in Low-Power Wireless Links: An Empirical Study. ICDCN 2011: 340-351 - [c85]Xin Zhao, Jun Guo
, Chun Tung Chou
, Archan Misra
, Sanjay K. Jha
:
A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks. INFOCOM 2011: 2042-2050 - [c84]Hailun Tan, Wen Hu
, Sanjay K. Jha
:
A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks. PM2HW2N@MSWiM 2011: 9-16 - [c83]Prasant Misra, Diethelm Ostry, Navinda Kottege, Sanjay K. Jha
:
TWEET: an envelope detection based broadband ultrasonic ranging system. MSWiM 2011: 409-416 - [c82]Vishwesh V. Kulkarni, Jayeta Biswas, Ren Ping Liu, Iain B. Collings
, Sanjay K. Jha
:
Robust Power Allocation for MIMO Beamforming under Time Varying Channel Conditions. VTC Fall 2011: 1-5 - [c81]Prasant Misra, Sanjay K. Jha
, Diethelm Ostry:
Improving the coverage range of ultrasound-based localization systems. WCNC 2011: 605-610 - 2010
- [j32]Prasant Misra, Salil S. Kanhere
, Diethelm Ostry, Sanjay K. Jha
:
Safety assurance and rescue communication systems in high-stress environments: A mining case study. IEEE Commun. Mag. 48(4): 66-73 (2010) - [j31]Nadeem Ahmed, Mark Rutten, Travis Bessell, Salil S. Kanhere
, Neil J. Gordon
, Sanjay K. Jha
:
Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks. IEEE Trans. Mob. Comput. 9(9): 1332-1345 (2010) - [j30]Wen Hu
, Hailun Tan, Peter Corke
, Wen Chan Shih, Sanjay Jha
:
Toward trusted wireless sensor networks. ACM Trans. Sens. Networks 7(1): 5:1-5:25 (2010) - [j29]Zvi Rosberg, Ren Ping Liu
, Tuan Le Dinh, Yifei Dong
, Sanjay Jha
:
Statistical reliability for energy efficient data transport in wireless sensor networks. Wirel. Networks 16(7): 1913-1927 (2010) - [c80]Prasant Misra, Sanjay K. Jha
, Diethelm Ostry:
Long-range detection in acoustic sensor networks. IPSN 2010: 372-373 - [c79]Hailun Tan, Wen Hu
, Sanjay Jha
:
A hardware-based remote attestation protocol in wireless sensor networks. IPSN 2010: 378-379 - [c78]Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Experimental evaluation of multi-hop routing protocols for wireless sensor networks. IPSN 2010: 416-417 - [c77]Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Mitigating the effect of interference in Wireless Sensor Networks. LCN 2010: 160-167
2000 – 2009
- 2009
- [j28]Tuan Dinh Le, Wen Hu
, Peter I. Corke
, Sanjay Jha
:
ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks. Comput. Commun. 32(7-10): 1154-1171 (2009) - [j27]Ren Ping Liu, Zvi Rosberg, Iain B. Collings
, Carol Wilson, Alex Y. Dong, Sanjay Jha
:
Energy Efficient Reliable Data Collection in Wireless Sensor Networks with Asymmetric Links. Int. J. Wirel. Inf. Networks 16(3): 131-141 (2009) - [j26]Wen Hu
, Nirupama Bulusu, Chun Tung Chou
, Sanjay K. Jha
, Andrew Taylor, Van Nghia Tran:
Design and evaluation of a hybrid sensor network for cane toad monitoring. ACM Trans. Sens. Networks 5(1): 4:1-4:28 (2009) - [c76]Nadeem Ahmed, Salil S. Kanhere, Sanjay K. Jha:
Poster abstract: Multi-channel interference in wireless sensor networks. IPSN 2009: 367-368 - [c75]Joo Ghee Lim, Chun Tung Chou
, Sanjay K. Jha
:
Socially conscious channel selection in 802.11 WLANs for coexistence in a non-cooperative environment. MSWiM 2009: 155-162 - [c74]Prasant Misra, Sanjay K. Jha
, Diethelm Ostry:
Analysis of an omni-directional narrowband ultrasonic receiver and CSS-based broadband transmission. SenSys 2009: 361-362 - [c73]Nadeem Ahmed, Prasant Misra, Sanjay K. Jha
, Diethelm Ostry:
Characterization of link asymmetry in wireless sensor networks. SenSys 2009: 373-374 - [c72]Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha
:
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. WISEC 2009: 245-252 - 2008
- [j25]Bao Hua Liu, Brian P. Otis, Subhash Challa, Paul Axon, Chun Tung Chou
, Sanjay K. Jha
:
The impact of fading and shadowing on the network performance of wireless sensor networks. Int. J. Sens. Networks 3(4): 211-223 (2008) - [j24]Bao Hua Liu, Chun Tung Chou
, Archan Misra
, Sanjay K. Jha
:
Rate-Diversity and Resource-Aware Broadcast and Multicast in Multi-rate Wireless Mesh Networks. Mob. Networks Appl. 13(1-2): 38-53 (2008) - [j23]William Lau, Gustav Rosenbaum, Sanjay K. Jha:
Comments on "Dynamic routing of restorable bandwidth-guaranteed tunnels using aggregated network resource usage information". IEEE/ACM Trans. Netw. 16(1): 244-245 (2008) - [c71]Tuan Dinh Le, Yifei Dong
, Ren Ping Liu, Sanjay Jha
, Zvi Rosberg:
Implementation aspects of reliable transport protocols in wireless sensor networks. COMSWARE 2008: 574-580 - [c70]Zvi Rosberg, Ren Ping Liu
, Alex Y. Dong, Tuan Dinh Le, Sanjay Jha
:
ARQ with Implicit and Explicit ACKs in Wireless Sensor Networks. GLOBECOM 2008: 50-55 - [c69]Wanqing Tu
, Cormac J. Sreenan, Chun Tung Chou
, Archan Misra
, Sanjay K. Jha
:
Resource-aware video multicasting via access gateways in wireless mesh networks. ICNP 2008: 43-52 - [c68]Tatiana Bokareva, Nirupama Bulusu, Sanjay K. Jha
:
Graph theory based aggregation of sensor readings in wireless sensor networks. LCN 2008: 514-515 - [c67]Tuan Dinh Le, Wen Hu
, Sanjay Jha
, Peter I. Corke
:
Design and implementation of a policy-based management system for data reliability in Wireless Sensor Networks. LCN 2008: 762-769 - [c66]Nadeem Ahmed, Yifei Dong
, Salil S. Kanhere
, Sanjay K. Jha
, Mark Rutten, Travis Bessell, Neil J. Gordon
:
Performance evaluation of a wireless sensor network based tracking system. MASS 2008: 163-172 - [c65]Jun Guo
, Sanjay Jha
:
A Distributed Algorithm for Overlay Backbone Multicast Routing in Content Delivery Networks. Networking 2008: 240-251 - [c64]Jun Guo
, Sanjay Jha
:
Host-aware routing in multicast overlay backbone. NOMS 2008: 915-918 - [c63]Ren Ping Liu, Zvi Rosberg, Iain B. Collings
, Carol Wilson, Alex Y. Dong, Sanjay Jha
:
Overcoming radio link asymmetry in wireless sensor networks. PIMRC 2008: 1-5 - [c62]Ren Ping Liu, John Zic, Iain B. Collings
, Alex Y. Dong, Sanjay Jha
:
Efficient Reliable Data Collection in Wireless Sensor Networks. VTC Fall 2008: 1-5 - [c61]Hailun Tan, Sanjay K. Jha
, Diethelm Ostry, John Zic, Vijay Sivaraman:
Secure multi-hop network programming with multiple one-way key chains. WISEC 2008: 183-193 - [c60]Xin Zhao, Chun Tung Chou
, Jun Guo
, Sanjay K. Jha
, Archan Misra
:
Probabilistically reliable on-demand multicast in wireless mesh networks. WOWMOM 2008: 1-9 - 2007
- [j22]Fariza Sabrina, Salil S. Kanhere
, Sanjay K. Jha
:
Design, Analysis and Implementation of a Novel Multiple Resource Scheduler. IEEE Trans. Computers 56(8): 1071-1086 (2007) - [j21]Fariza Sabrina, Salil S. Kanhere
, Sanjay K. Jha
:
Design, Analysis, and Implementation of a Novel Low Complexity Scheduler for Joint Resource Allocation. IEEE Trans. Parallel Distributed Syst. 18(6): 749-762 (2007) - [c59]Jun Guo, Sanjay Jha:
Placing Multicast Proxies for Internet Live Media Streaming. LCN 2007: 149-156 - [c58]Xin Zhao, Chun Tung Chou, Jun Guo, Sanjay K. Jha:
A Scheme for Probabilistically Reliable Multicast Routing in Wireless Mesh Networks. LCN 2007: 213-214 - [c57]Joo Ghee Lim, Chun Tung Chou
, Sanjay K. Jha
:
Non-Cooperative Coexistence of Co-located Independent Wireless Mesh Networks. MASS 2007: 1-9 - [c56]Anjum Naveed
, Salil S. Kanhere
, Sanjay K. Jha
:
Topology Control and Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks. MASS 2007: 1-9 - [c55]Sarfraz Nawaz, Sanjay Jha
:
A Graph Drawing Approach to Sensor Network Localization. MASS 2007: 1-12 - [c54]Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Ensuring Area Coverage in Hybrid Wireless Sensor Networks. MSN 2007: 548-560 - [c53]Jun Guo, Sanjay Jha
:
Construction of a Proxy-Based Overlay Skeleton Tree for Large-Scale Real-Time Group Communications. Networking 2007: 726-737 - [c52]Jaleel Shaheen, Diethelm Ostry, Vijay Sivaraman, Sanjay K. Jha
:
Confidential and Secure Broadcast in Wireless Sensor Networks. PIMRC 2007: 1-5 - [c51]Nadeem Ahmed, Yifei Dong
, Tatiana Bokareva, Salil S. Kanhere, Sanjay K. Jha
, Travis Bessell, Mark Rutten, Branko Ristic
, Neil J. Gordon
:
Detection and tracking using wireless sensor networks. SenSys 2007: 425-426 - [c50]Joo Ghee Lim, Chun Tung Chou
, Alfandika Nyandoro, Sanjay K. Jha
:
A Cut-through MAC for Multiple Interface, Multiple Channel Wireless Mesh Networks. WCNC 2007: 2373-2378 - [p1]Pubudu N. Pathirana, Nirupama Bulusu, Andrey V. Savkin, Sanjay K. Jha
, Thanh Dang:
Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 83-103 - 2006
- [j20]Wen Hu
, Chun Tung Chou
, Sanjay K. Jha
, Nirupama Bulusu:
Deploying long-lived and cost-effective hybrid sensor networks. Ad Hoc Networks 4(6): 749-767 (2006) - [j19]Shaleeza Sohail
, Sanjay K. Jha
, Salil S. Kanhere
, Chun Tung Chou
:
QoS Driven Parallelization of Resources to Reduce File Download Delay. IEEE Trans. Parallel Distributed Syst. 17(10): 1204-1215 (2006) - [c49]Tuan Dinh Le, Nadeem Ahmed, Nandan Parameswaran, Sanjay K. Jha:
Fault repair framework for mobile sensor networks. COMSWARE 2006: 1-8 - [c48]Tuan Dinh Le, Nadeem Ahmed, Sanjay K. Jha
:
Location-free fault repair in hybrid sensor networks. InterSense 2006: 23 - [c47]Yuvraj K. Rana, Bao Hua Liu, Alfandika Nyandoro, Sanjay Jha
:
Bandwidth Aware Slot Allocation in Hybrid MAC. LCN 2006: 89-96 - [c46]Timo Zauner, Luke Haslett, Wen Hu
, Sanjay Jha
, Cormac J. Sreenan:
A Congestion-aware Medium Access Control Protocol for Multi-rate Ad-hoc Networks. LCN 2006: 97-104 - [c45]Xin Zhao, Chun Tung Chou
, Jun Guo
, Sanjay K. Jha
:
Protecting Multicast Sessions in Wireless Mesh Networks. LCN 2006: 467-474 - [c44]Bao Hua Liu, Brian P. Otis, Subhash Challa, Paul Axon, Chun Tung Chou
, Sanjay K. Jha
:
On the Fading and Shadowing Effects for Wireless Sensor Networks. MASS 2006: 51-60 - [c43]Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Efficient Boundary Estimation for Practical Deployment of Mobile Sensors in Hybrid Sensor Networks. MASS 2006: 662-667 - [c42]Tatiana Bokareva, Nirupama Bulusu, Sanjay K. Jha
:
Learning Sensor Data Characteristics in Unknown Environments. MobiQuitous 2006: 1-8 - [c41]Cormac J. Sreenan, Sarfraz Nawaz, Tuan Dinh Le, Sanjay Jha:
On the Sensitivity of Sensor Network Simulations. VTC Spring 2006: 1043-1047 - 2005
- [j18]Fariza Sabrina, Cong Duc Nguyen, Sanjay K. Jha
, Don Platt, Farzad Safaei
:
Processing resource scheduling in programmable networks. Comput. Commun. 28(6): 676-687 (2005) - [j17]Huan Pham, Sanjay Jha
:
Addressing Mobility in Wireless Sensor Media Access Protocol. Int. J. Distributed Sens. Networks 1(2): 269-280 (2005) - [j16]Wen Hu
, Nirupama Bulusu, Sanjay K. Jha
:
A Communication Paradigm for Hybrid Sensor/Actuator Networks*. Int. J. Wirel. Inf. Networks 12(1): 47-59 (2005) - [j15]Sanjay Jha
, Michael Fry:
Video Decompression Estimation and Playout Scheme Over the Internet. Multim. Tools Appl. 25(2): 305-321 (2005) - [j14]Nadeem Ahmed, Salil S. Kanhere, Sanjay K. Jha
:
The holes problem in wireless sensor networks: a survey. ACM SIGMOBILE Mob. Comput. Commun. Rev. 9(2): 4-18 (2005) - [j13]Pubudu N. Pathirana
, Nirupama Bulusu, Andrey V. Savkin, Sanjay K. Jha
:
Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks. IEEE Trans. Mob. Comput. 4(3): 285-296 (2005) - [c40]Shaleeza Sohail, Chun Tung Chou, Salil S. Kanhere
, Sanjay K. Jha
:
On large scale deployment of parallelized file transfer protocol. IPCCC 2005: 225-232 - [c39]Wen Hu
, Van Nghia Tran, Nirupama Bulusu, Chun Tung Chou
, Sanjay K. Jha
, Andrew Taylor:
The design and evaluation of a hybrid sensor network for cane-toad monitoring. IPSN 2005: 503-508 - [c38]Fariza Sabrina, Salil S. Kanhere
, Sanjay K. Jha
:
Implementation and Performance Analysis of a Packet Scheduler on a Programmable Network Processor. LCN 2005: 242-249 - [c37]Gustav Rosenbaum, Chun Tung Chou
, Sanjay K. Jha
:
Dynamic Routing of Restorable QoS Connections in MPLS Networks. LCN 2005: 418-426 - [c36]Gustav Rosenbaum, Sanjay Jha
:
Resilience Provisioning in Provider-Based Overlay Networks. LCN 2005: 427-432 - [c35]Nadeem Ahmed, Salil S. Kanhere
, Sanjay K. Jha
:
Probabilistic Coverage in Wireless Sensor Networks. LCN 2005: 672-681 - [c34]William Lau, Sanjay K. Jha
, Suman Banerjee:
Efficient Bandwidth Guaranteed Restoration Algorithms for Multicast Connections. NETWORKING 2005: 1005-1017 - [c33]Wen Hu, Nirupama Bulusu, Chun Tung Chou, Sanjay K. Jha, Andrew Taylor, Van Nghia Tran:
A hybrid sensor network for cane-toad monitoring. SenSys 2005: 305 - [c32]Bao Hua Liu, Chun Tung Chou
, Justin Lipman
, Sanjay K. Jha
:
Using frequency division to reduce MAI in DS-CDMA wireless sensor networks. WCNC 2005: 657-663 - 2004
- [j12]Pubudu N. Pathirana
, Andrey V. Savkin, Sanjay K. Jha
:
Robust extended Kalman filter based technique for location management in PCS networks. Comput. Commun. 27(5): 502-512 (2004) - [j11]Sanjay K. Jha
, Amitava Mukherjee
:
Advances in future mobile/wireless networks and services. Comput. Commun. 27(8): 695-696 (2004) - [j10]Jahan Hassan
, Sanjay Jha
:
Design and analysis of location management schemes for a new light-weight wireless network. Comput. Commun. 27(8): 743-750 (2004) - [j9]William Lau, Sanjay K. Jha
:
Failure-Oriented Path Restoration Algorithm for Survivable Networks. IEEE Trans. Netw. Serv. Manag. 1(1): 11-20 (2004) - [j8]Pubudu N. Pathirana
, Andrey V. Savkin, Sanjay K. Jha
:
Location estimation and trajectory prediction for cellular networks with mobile base stations. IEEE Trans. Veh. Technol. 53(6): 1903-1913 (2004) - [c31]Pubudu N. Pathirana, Andrey V. Savkin, Sanjay Jha:
Robust extended Kalman filter applied to location tracking and trajectory prediction for PCS networks. CCA 2004: 63-68 - [c30]Jahan Hassan, Sanjay Jha:
Optimising expanding ring search for multi-hop wireless networks. GLOBECOM 2004: 1061-1065 - [c29]Fariza Sabrina, Sanjay K. Jha
:
A composite scheduling algorithm for programmable networks. ICC 2004: 2003-2008 - [c28]William Lau, Sanjay K. Jha
:
Joint-path computation algorithms for restoration networks. ICC 2004: 2024-2029 - [c27]Filip Rosenbaum, Sanjay Jha
, Paul Boustead, Farzad Safaei:
Resilience-differentiation in programmable virtual networks. ICC 2004: 2117-2121 - [c26]Kevin Lee, Hong Wing Lee, Sanjay K. Jha
, Nirupama Bulusu:
Adaptive, distributed location management in mobile, wireless networks. ICC 2004: 4077-4081 - [c25]Jahan Hassan, Sanjay Jha
:
On the Optimization Trade-Offs of Expanding Ring Search. IWDC 2004: 489-494 - [c24]Bao Hua Liu, Yang Gao, Chun Tung Chou, Sanjay K. Jha:
An Energy Efficient Select Optimal Neighbor Protocol for Wireless Ad Hoc Networks. LCN 2004: 626-633 - [c23]Bao Hua Liu, Nirupama Bulusu, Huan Pham, Sanjay K. Jha:
A self-organizing, location-aware media access control protocol for DS-CDMA sensor networks. MASS 2004: 528-530 - [c22]William Lau, Sanjay K. Jha:
Failure-oriented path restoration algorithm for survivable networks. NOMS (1) 2004: 205-218 - [c21]Wen Hu, Nirupama Bulusu, Sanjay K. Jha:
A communication paradigm for hybrid sensor/actuator networks. PIMRC 2004: 201-205 - [c20]Xuan Thanh Dang, Budi Mulyawan, Nirupama Bulusu, Sanjay K. Jha, Pubudu N. Pathirana:
The REKF localization system: node localization using mobile robots. SenSys 2004: 321 - 2003
- [j7]Sanjay K. Jha, Mahbub Hassan:
Java implementation of policy-based bandwidth management. Int. J. Netw. Manag. 13(4): 249-258 (2003) - [j6]Gustav Rosenbaum, Sanjay K. Jha, Mahbub Hassan:
Empirical study of traffic trunking in Linux-based MPLS test-bed. Int. J. Netw. Manag. 13(4): 277-288 (2003) - [j5]Fariza Sabrina, Sanjay K. Jha
:
An Adaptive Resource Management Architecture for Active Networks. Telecommun. Syst. 24(2-4): 139-166 (2003) - [j4]Jahan Hassan
, Sanjay Jha
:
Cell hopping: a lightweight architecture for wireless communications. IEEE Wirel. Commun. 10(5): 16-21 (2003) - [c19]William Lau, Sanjay K. Jha:
APLS: active protocol label switching. ICC 2003: 641-646 - [c18]Gustav Rosenbaum, William Lau, Sanjay K. Jha
:
Recent directions in virtual private network solutions. ICON 2003: 217-223 - [c17]Fariza Sabrina, Sanjay K. Jha
:
Scheduling Resources in Programmable and Active Networks Based on Adaptive Estimations. LCN 2003: 2-11 - [c16]Bao Hua Liu, Sanjay K. Jha
, Chun Tung Chou
, Pradeep Ray
:
Optimized Allocation of Distributed Applications Across Local Area Networks. LCN 2003: 291-292 - [c15]Gustav Rosenbaum, William Lau, Sanjay K. Jha
:
An Analysis of Virtual Private Network Solutions. LCN 2003: 395- - [c14]Shaleeza Sohail
, Sanjay Jha
, Hossam A. ElGindy:
Parallelized File Transfer Protocol (P-FTP). LCN 2003: 624- - [c13]Jahan Hassan
, Sanjay Jha
:
Reducing Signalling Overhead in Cell-Hopping Mobile Wireless Networks using Location Caches. LCN 2003: 753- - [c12]Pubudu N. Pathirana, Andrey V. Savkin, Sanjay K. Jha
:
Mobility modelling and trajectory prediction for cellular networks with mobile base stations. MobiHoc 2003: 213-221 - 2002
- [b1]Sanjay K. Jha, Mahbub Hassan:
Engineering internet QoS. Artech House 2002, ISBN 978-1-58053-341-6, pp. I-XX, 1-325 - [j3]Rashid J. Al-Ali, Omer F. Rana, David W. Walker, Sanjay Jha, Shaleeza Sohail:
G-QoSM: Grid Service Discovery Using QoS Properties. Comput. Artif. Intell. 21(4) (2002) - [j2]Sanjay K. Jha
, Mahbub Hassan:
Building agents for rule-based intrusion detection system. Comput. Commun. 25(15): 1366-1373 (2002) - [c11]K. Lee, Sanjay K. Jha
, F. Duong, William Lau:
Design and Experimental Evaluation of Mobile Wireless Control Load Protoco. LCN 2002: 799-808 - 2001
- [c10]Sanjay K. Jha
, M. Chalmers, William Lau, Jahan Hassan
, S. Yap, Mahbub Hassan:
Universal Network of Small Wireless Operators (UNSWo). CCGRID 2001: 626-633 - [c9]M. Chalmers, Sanjay K. Jha
, Mahbub Hassan:
Internet charging-behind the time$. ICON 2001: 116-121 - [c8]William Lau, Sanjay K. Jha
, Mahbub Hassan:
Current directions in active programmable network. ICON 2001: 240-245 - [c7]Sanjay K. Jha, Mahbub Hassan:
Implementing Bandwidth Broker Using COPS-PR in Java. LCN 2001: 178-179 - [c6]Sanjay K. Jha, Mahbub Hassan:
SBM+: Enhanced SBM for Managing Bandwidth in Multiple Access Subnets. LCN 2001: 432-439 - 2000
- [c5]Sanjay K. Jha
, Mahbub Hassan, Priyadarsi Nanda, Nadeem Ahmed:
Intra-domain Bandwidth Management in Differentiated Services Network. LCN 2000: 326-327
1990 – 1999
- 1999
- [c4]Sanjay Jha, Aruna Seneviratne:
Synchronization Skew: A QoS Measurement Study. LCN 1999: 77-78 - 1994
- [c3]Sanjay K. Jha, Bruce R. Howarth:
Capacity Planning of LAN Using Network Management. LCN 1994: 425-430 - 1991
- [j1]Sanjay Jha, Tariq S. Durrani:
Direction of arrival estimation using artificial neural networks. IEEE Trans. Syst. Man Cybern. 21(5): 1192-1201 (1991) - 1990
- [c2]Sanjay K. Jha, Tariq S. Durrani:
Bearing estimation using neural optimisation methods. ICASSP 1990: 889-892
1980 – 1989
- 1988
- [c1]Sanjay Jha, Roy Chapman, Tariq S. Durrani:
Bearing estimation using neural networks. ICASSP 1988: 2156-2159
Coauthor Index
aka: Diet Ostry

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint