default search action
Swastik Brahma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Abhinav Kumar, Swastik Brahma, Baocheng Geng, Charles A. Kamhoua, Pramod K. Varshney:
A Hypothesis Testing-based Framework for Cyber Deception with Sludging. Allerton 2024: 1-8 - [c42]Satyaki Nan, Swastik Brahma:
Hardware Trojan Testing with Hierarchical Trojan Types Under Cognitive Biases. CISS 2024: 1-6 - [c41]Cariappa K. S, Swastik Brahma, Anthony Macera:
Spectrum Overselling: An Optimal Auction Design Perspective. ICC Workshops 2024: 2089-2094 - 2023
- [c40]Satyaki Nan, Laurent Njilla, Swastik Brahma, Charles A. Kamhoua:
Game and Prospect Theoretic Hardware Trojan Testing. CISS 2023: 1-6 - [c39]Satyaki Nan, Swastik Brahma:
Cyber Deception under Strategic and Irrationality Considerations. PIMRC 2023: 1-6 - 2022
- [j17]Baocheng Geng, Xiancheng Cheng, Swastik Brahma, David Kellen, Pramod K. Varshney:
Collaborative Human Decision Making With Heterogeneous Agents. IEEE Trans. Comput. Soc. Syst. 9(2): 469-479 (2022) - [c38]Mohammad Rahman, Laurent Njilla, Swastik Brahma:
Optimization of Survivability of a Mission Critical System in the Presence of Hardware Trojans. CCWC 2022: 948-952 - [c37]Wael A. Hashlamoun, Swastik Brahma, Pramod K. Varshney:
Distributed Detection with Multiple Sensors in the Presence of Sybil Attacks. GLOBECOM 2022: 2770-2775 - [c36]Swastik Brahma, Laurent Njilla, Satyaki Nan:
Optimal Auction Design with Malicious Sellers. PerCom Workshops 2022: 661-666 - 2021
- [c35]Swastik Brahma, Satyaki Nan, Laurent Njilla:
Strategic Hardware Trojan Testing with Hierarchical Trojan Types. CISS 2021: 1-6 - [c34]Swastik Brahma, Laurent Njilla, Satyaki Nan:
Game Theoretic Hardware Trojan Testing Under Cost Considerations. GameSec 2021: 251-270 - 2020
- [j16]Pranay Sharma, Donald J. Bucci, Swastik K. Brahma, Pramod K. Varshney:
Communication Network Topology Inference via Transfer Entropy. IEEE Trans. Netw. Sci. Eng. 7(1): 562-575 (2020) - [j15]Baocheng Geng, Swastik Brahma, Thakshila Wimalajeewa, Pramod K. Varshney, Muralidhar Rangaswamy:
Prospect Theoretic Utility Based Human Decision Making in Multi-Agent Systems. IEEE Trans. Signal Process. 68: 1091-1104 (2020) - [c33]Satyaki Nan, Swastik Brahma:
Redundancy-based Mitigation of Jamming Attacks. CISS 2020: 1-6 - [c32]Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie:
Mitigation of Jamming Attacks via Deception. PIMRC 2020: 1-6
2010 – 2019
- 2019
- [j14]Nianxia Cao, Swastik Brahma, Baocheng Geng, Pramod K. Varshney:
Optimal Auction Design With Quantized Bids for Target Tracking via Crowdsensing. IEEE Trans. Comput. Soc. Syst. 6(5): 847-857 (2019) - [c31]Baocheng Geng, Swastik Brahma, Pramod K. Varshney:
A Truthful Mechanism For Mobility Management In Unmanned Aerial Vehicles Networks. ACSSC 2019: 401-405 - [c30]Qasem Abu Al-Haija, Swastik Brahma:
Optimization of Cyber System Survivability Under Attacks Using Redundancy of Components. CISS 2019: 1-6 - [c29]Satyaki Nan, Swastik Brahma, Charles A. Kamhoua, Nandi O. Leslie:
Behavioral Cyber Deception: A Game and Prospect Theoretic Approach. GLOBECOM 2019: 1-6 - 2018
- [j13]Wael A. Hashlamoun, Swastik Brahma, Pramod K. Varshney:
Mitigation of Byzantine Attacks on Distributed Detection Systems Using Audit Bits. IEEE Trans. Signal Inf. Process. over Networks 4(1): 18-32 (2018) - [j12]Wael A. Hashlamoun, Swastik Brahma, Pramod K. Varshney:
Audit Bit Based Distributed Bayesian Detection in the Presence of Byzantines. IEEE Trans. Signal Inf. Process. over Networks 4(4): 643-655 (2018) - [c28]Swastik Brahma, Eunice Michael:
On Sybil-proof Optimal Auction Design for Crowdsensing. APSIPA 2018: 1174-1178 - 2017
- [j11]V. Sriram Siddhardh Nadendla, Swastik K. Brahma, Pramod K. Varshney:
Optimal Spectrum Auction Design With 2-D Truthful Revelations Under Uncertain Spectrum Availability. IEEE/ACM Trans. Netw. 25(1): 420-433 (2017) - [j10]Bhavya Kailkhura, Swastik Brahma, Pramod K. Varshney:
Data Falsification Attacks on Consensus-Based Detection Systems. IEEE Trans. Signal Inf. Process. over Networks 3(1): 145-158 (2017) - 2016
- [j9]Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Optimal Auction Design With Quantized Bids. IEEE Signal Process. Lett. 23(11): 1518-1522 (2016) - [j8]Raghed El-Bardan, Swastik Brahma, Pramod K. Varshney:
Strategic Power Allocation With Incomplete Information in the Presence of a Jammer. IEEE Trans. Commun. 64(8): 3467-3479 (2016) - [c27]V. Sriram Siddhardh Nadendla, Swastik Brahma, Pramod K. Varshney:
Towards the design of prospect-theory based human decision rules for hypothesis testing. Allerton 2016: 766-773 - [c26]Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Portfolio theory based sensor selection in Wireless Sensor Networks with unreliable observations. CISS 2016: 454-459 - [c25]Raghed El-Bardan, Walid Saad, Swastik Brahma, Pramod K. Varshney:
Matching theory for cognitive spectrum allocation in wireless networks. CISS 2016: 466-471 - [c24]Nianxia Cao, Yanzhi Wang, Swastik Brahma, Pramod K. Varshney:
Charging state aware optimal auction design for sensor selection in crowdsourcing based sensor networks. FUSION 2016: 626-633 - [c23]Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
CSRS: Cyber Survive and Recover Simulator. HASE 2016: 110-113 - [i10]V. Sriram Siddhardh Nadendla, Swastik Brahma, Pramod K. Varshney:
Towards the Design of Prospect-Theory based Human Decision Rules for Hypothesis Testing. CoRR abs/1610.01085 (2016) - 2015
- [j7]Bhavya Kailkhura, Yunghsiang Sam Han, Swastik Brahma, Pramod K. Varshney:
Asymptotic Analysis of Distributed Bayesian Detection with Byzantine Data. IEEE Signal Process. Lett. 22(5): 608-612 (2015) - [j6]Swastik Brahma, Mainak Chatterjee:
Spectrum Bargaining: A Model for Competitive Sharing of Unlicensed Radio Spectrum. IEEE Trans. Cogn. Commun. Netw. 1(3): 257-272 (2015) - [j5]Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Target Tracking via Crowdsourcing: A Mechanism Design Approach. IEEE Trans. Signal Process. 63(6): 1464-1476 (2015) - [j4]Bhavya Kailkhura, Yunghsiang Sam Han, Swastik Brahma, Pramod K. Varshney:
Distributed Bayesian Detection in the Presence of Byzantine Data. IEEE Trans. Signal Process. 63(19): 5250-5263 (2015) - [i9]Bhavya Kailkhura, Swastik Brahma, Pramod K. Varshney:
Consensus based Detection in the Presence of Data Falsification Attacks. CoRR abs/1504.03413 (2015) - [i8]Raghed El-Bardan, Walid Saad, Swastik Brahma, Pramod K. Varshney:
Matching-based Spectrum Allocation in Cognitive Radio Networks. CoRR abs/1508.03011 (2015) - [i7]Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Optimal Auction Design with Quantized Bids. CoRR abs/1509.08496 (2015) - 2014
- [j3]Bhavya Kailkhura, Swastik Brahma, Yunghsiang S. Han, Pramod K. Varshney:
Distributed Detection in Tree Topologies With Byzantines. IEEE Trans. Signal Process. 62(12): 3208-3219 (2014) - [c22]Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Market based sensor mobility management for target localization. ACSSC 2014: 1428-1432 - [c21]Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Towards cloud sensing enabled target localization. Allerton 2014: 537-544 - [c20]Raghed El-Bardan, Swastik Brahma, Pramod K. Varshney:
Power control with jammer location uncertainty: A Game Theoretic perspective. CISS 2014: 1-6 - [c19]Raghed El-Bardan, V. Sriram Siddhardh Nadendla, Swastik Brahma, Pramod K. Varshney:
On ARQ-based wireless communication systems in the presence of a strategic jammer. GlobalSIP 2014: 273-277 - [c18]Bhavya Kailkhura, Swastik Brahma, Pramod K. Varshney:
On the performance analysis of data fusion schemes with Byzantines. ICASSP 2014: 7411-7415 - [c17]Swastik Brahma, Kevin A. Kwiat, Pramod K. Varshney, Charles A. Kamhoua:
Diversity and System Security: A Game Theoretic Perspective. MILCOM 2014: 146-151 - [i6]V. Sriram Siddhardh Nadendla, Swastik Brahma, Pramod K. Varshney:
Optimal Auction Mechanism for Spectrum Allocation in Cognitive Radio Networks under Uncertain Spectrum Availability. CoRR abs/1403.6807 (2014) - [i5]Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
Target Tracking via Crowdsourcing: A Mechanism Design Approach. CoRR abs/1405.5543 (2014) - [i4]Bhavya Kailkhura, Yunghsiang S. Han, Swastik Brahma, Pramod K. Varshney:
Asymptotic Analysis of Distributed Bayesian Detection with Byzantine Data. CoRR abs/1408.3434 (2014) - [i3]Bhavya Kailkhura, Swastik Brahma, Berkan Dulek, Yunghsiang S. Han, Pramod K. Varshney:
Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques. CoRR abs/1410.5904 (2014) - 2013
- [j2]Shamik Sengupta, Swastik Brahma, Mainak Chatterjee, Sai Shankar Nandagopalan:
Self-coexistence among interference-aware IEEE 802.22 networks with enhanced air-interface. Pervasive Mob. Comput. 9(4): 454-471 (2013) - [c16]Raghed El-Bardan, Swastik Brahma, Pramod K. Varshney:
A Game Theoretic power control framework for spectrum sharing in competitive environments. ACSSC 2013: 1493-1497 - [c15]V. Sriram Siddhardh Nadendla, Swastik Brahma, Pramod K. Varshney:
A bilateral-market based mechanism for spectrum allocation in cognitive radio networks. CAMSAP 2013: 444-447 - [c14]Nianxia Cao, Swastik Brahma, Pramod K. Varshney:
An incentive-based mechanism for location estimation in wireless sensor networks. GlobalSIP 2013: 157-160 - [c13]Bhavya Kailkhura, Swastik Brahma, Yunghsiang S. Han, Pramod K. Varshney:
Optimal distributed detection in the presence of Byzantines. ICASSP 2013: 2925-2929 - [c12]Swastik Brahma, Mainak Chatterjee:
Multi-path routing in dynamic spectrum access networks: A mechanism design approach. ICC 2013: 2905-2909 - [c11]Bhavya Kailkhura, Swastik Brahma, Pramod K. Varshney:
Optimal Byzantine attacks on distributed detection in tree-based topologies. ICNC 2013: 227-231 - [i2]Bhavya Kailkhura, Yunghsiang S. Han, Swastik Brahma, Pramod K. Varshney:
Distributed Bayesian Detection with Byzantine Data. CoRR abs/1307.3544 (2013) - [i1]Bhavya Kailkhura, Swastik Brahma, Yunghsiang S. Han, Pramod K. Varshney:
Distributed Detection in Tree Topologies with Byzantines. CoRR abs/1309.4513 (2013) - 2012
- [j1]Swastik Brahma, Mainak Chatterjee, Kevin A. Kwiat, Pramod K. Varshney:
Traffic management in wireless sensor networks: Decoupling congestion control and fairness. Comput. Commun. 35(6): 670-681 (2012) - [c10]V. Sriram Siddhardh Nadendla, Swastik Brahma, Pramod K. Varshney:
An auction-based mechanism for dynamic spectrum allocation in participatory cognitive radio networks. Allerton Conference 2012: 2120-2126 - [c9]Swastik Brahma, Pramod K. Varshney, Mainak Chatterjee, Kevin A. Kwiat:
Optimal content delivery in DSA networks: A path auction based framework. ICC 2012: 1843-1847 - [c8]Swastik Brahma, Mainak Chatterjee:
A bayesian based incentive-compatible routing mechanism for Dynamic Spectrum Access networks. INFOCOM 2012: 2781-2785 - [c7]Swastik Brahma, Mainak Chatterjee:
Spectrum sharing in secondary networks: A bargain theoretic approach. WCNC 2012: 1331-1336 - 2010
- [c6]Swastik Brahma, Mainak Chatterjee:
A Bargaining Game for Channel Access in Dynamic Spectrum Access Networks. GLOBECOM 2010: 1-6 - [c5]Swastik Brahma, Mainak Chatterjee, Kevin A. Kwiat:
Congestion control and fairness in wireless sensor networks. PerCom Workshops 2010: 413-418
2000 – 2009
- 2009
- [c4]Swastik Brahma, Mainak Chatterjee:
Mitigating Self-Interference Among IEEE 802.22 Networks: A Game Theoretic Perspective. GLOBECOM 2009: 1-6 - [c3]Swastik Brahma, Mainak Chatterjee:
Interference avoidance among IEEE 802.22 networks: A Game Theoretic Approach. WOWMOM 2009: 1-3 - 2008
- [c2]Shamik Sengupta, Rajarathnam Chandramouli, Swastik Brahma, Mainak Chatterjee:
A Game Theoretic Framework for Distributed Self-Coexistence Among IEEE 802.22 Networks. GLOBECOM 2008: 3117-3122 - 2007
- [c1]Shamik Sengupta, Swastik Brahma, Mainak Chatterjee, Sai Shankar N.:
Enhancements to Cognitive Radio Based IEEE 802.22 Air-Interface. ICC 2007: 5155-5160
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-30 00:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint