default search action
Radha Poovendran
Person information
- affiliation: University of Washington, Department of Electrical and Computer Engineering, Seattle, WA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j69]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats. Autom. 159: 111353 (2024) - [j68]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach. IEEE Trans. Autom. Control. 69(10): 6684-6699 (2024) - [j67]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
RL-ARNE: A Reinforcement Learning Algorithm for Computing Average Reward Nash Equilibrium of Nonzero-Sum Stochastic Games. IEEE Trans. Autom. Control. 69(11): 7824-7831 (2024) - [c168]Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bill Yuchen Lin, Radha Poovendran:
SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding. ACL (1) 2024: 5587-5605 - [c167]Fengqing Jiang, Zhangchen Xu, Luyao Niu, Zhen Xiang, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran:
ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs. ACL (1) 2024: 15157-15173 - [c166]Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran:
Risk-Aware Distributed Multi-Agent Reinforcement Learning. ACC 2024: 4012-4019 - [c165]Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran:
POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications. AsiaCCS 2024 - [c164]Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran:
POSTER: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization. AsiaCCS 2024 - [c163]Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran:
POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors. AsiaCCS 2024 - [c162]Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran:
Poster: Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning. AsiaCCS 2024 - [c161]Yuetai Li, Zhangchen Xu, Fengqing Jiang, Luyao Niu, Dinuka Sahabandu, Bhaskar Ramasubramanian, Radha Poovendran:
CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models. EMNLP 2024: 9101-9118 - [c160]Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li:
BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models. ICLR 2024 - [c159]Hongchao Zhang, Luyao Niu, Andrew Clark, Radha Poovendran:
Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks. ICRA 2024: 9901-9907 - [c158]Qifan Lu, Bhaskar Ramasubramanian, Radha Poovendran:
EDC: Effective and Efficient Dialog Comprehension For Dialog State Tracking. NAACL-HLT 2024: 4151-4165 - [c157]Kavya Balasubramanian, Adithya Gowda Baragur, Denis Donadel, Dinuka Sahabandu, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran:
CANLP: NLP-Based Intrusion Detection System for CAN. SAC 2024: 212-214 - [c156]Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran:
ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning. USENIX Security Symposium 2024 - [i88]Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran:
Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning. CoRR abs/2401.05562 (2024) - [i87]Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li:
BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models. CoRR abs/2401.12242 (2024) - [i86]Arezoo Rajabi, Reeya Pimple, Aiswarya Janardhanan, Surudhi Asokraj, Bhaskar Ramasubramanian, Radha Poovendran:
Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization. CoRR abs/2402.01114 (2024) - [i85]Dinuka Sahabandu, Xiaojun Xu, Arezoo Rajabi, Luyao Niu, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran:
Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors. CoRR abs/2402.08695 (2024) - [i84]Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bill Yuchen Lin, Radha Poovendran:
SafeDecoding: Defending against Jailbreak Attacks via Safety-Aware Decoding. CoRR abs/2402.08983 (2024) - [i83]Fengqing Jiang, Zhangchen Xu, Luyao Niu, Zhen Xiang, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran:
ArtPrompt: ASCII Art-based Jailbreak Attacks against Aligned LLMs. CoRR abs/2402.11753 (2024) - [i82]Hongchao Zhang, Luyao Niu, Andrew Clark, Radha Poovendran:
Fault Tolerant Neural Control Barrier Functions for Robotic Systems under Sensor Faults and Attacks. CoRR abs/2402.18677 (2024) - [i81]Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran:
ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning. CoRR abs/2405.20975 (2024) - [i80]Zhangchen Xu, Fengqing Jiang, Luyao Niu, Yuntian Deng, Radha Poovendran, Yejin Choi, Bill Yuchen Lin:
Magpie: Alignment Data Synthesis from Scratch by Prompting Aligned LLMs with Nothing. CoRR abs/2406.08464 (2024) - [i79]Yuetai Li, Zhangchen Xu, Fengqing Jiang, Luyao Niu, Dinuka Sahabandu, Bhaskar Ramasubramanian, Radha Poovendran:
CleanGen: Mitigating Backdoor Attacks for Generation Tasks in Large Language Models. CoRR abs/2406.12257 (2024) - [i78]Fengqing Jiang, Zhangchen Xu, Luyao Niu, Bill Yuchen Lin, Radha Poovendran:
ChatBug: A Common Vulnerability of Aligned LLMs Induced by Chat Templates. CoRR abs/2406.12935 (2024) - [i77]Dinuka Sahabandu, Bhaskar Ramasubramanian, Michail S. Alexiou, J. Sukarno Mertoguno, Linda Bushnell, Radha Poovendran:
A Method for Fast Autonomy Transfer in Reinforcement Learning. CoRR abs/2407.20466 (2024) - 2023
- [j66]Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran:
Robust Satisfaction of Metric Interval Temporal Logic Objectives in Adversarial Environments. Games 14(2): 30 (2023) - [j65]Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint. ACM Trans. Cyber Phys. Syst. 7(3): 19:1-19:25 (2023) - [j64]Dinuka Sahabandu, J. Sukarno Mertoguno, Radha Poovendran:
A Natural Language Processing Approach for Instruction Set Architecture Identification. IEEE Trans. Inf. Forensics Secur. 18: 4086-4099 (2023) - [j63]Alessandro Brighente, Mauro Conti, Radha Poovendran, Jianying Zhou:
Guest Editorial: Cyber-Physical Threats and Solutions for Autonomous Transportation Systems. IEEE Trans. Ind. Informatics 19(6): 7801 (2023) - [c155]Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran:
LDL: A Defense for Label-Based Membership Inference Attacks. AsiaCCS 2023: 95-108 - [c154]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design. AsiaCCS 2023: 1025-1027 - [c153]Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran:
Cognitive Bias-Aware Dissemination Strategies for Opinion Dynamics with External Information Sources. AAMAS 2023: 2769-2771 - [c152]Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, James A. Ritcey, Radha Poovendran:
MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks. CCS 2023: 2232-2246 - [c151]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems. CDC 2023: 7554-7561 - [c150]Shiyu Cheng, Luyao Niu, Andrew Clark, Radha Poovendran:
A Submodular Energy Function Approach to Controlled Islanding with Provable Stability. CDC 2023: 7635-7642 - [c149]Luyao Niu, Andrew Clark, Radha Poovendran:
Necessary and Sufficient Conditions for Satisfying Linear Temporal Logic Constraints Using Control Barrier Certificates. CDC 2023: 8589-8595 - [c148]Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran:
Learning Dissemination Strategies for External Sources in Opinion Dynamic Models with Cognitive Biases. IJCAI 2023: 3-11 - [c147]Jinyuan Jia, Zhuowen Yuan, Dinuka Sahabandu, Luyao Niu, Arezoo Rajabi, Bhaskar Ramasubramanian, Bo Li, Radha Poovendran:
FedGame: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning. NeurIPS 2023 - [c146]Tommaso Bianchi, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran:
QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer. VTC2023-Spring 2023: 1-6 - [c145]Alessandro Lotto, Vaibhav Singh, Bhaskar Ramasubramanian, Alessandro Brighente, Mauro Conti, Radha Poovendran:
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks. WISEC 2023: 133-144 - [i76]Alessandro Brighente, Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin, Jianying Zhou:
Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs. CoRR abs/2301.04587 (2023) - [i75]Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran:
A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees. CoRR abs/2302.10308 (2023) - [i74]Abdullah Al Maruf, Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Radha Poovendran:
Risk-Aware Distributed Multi-Agent Reinforcement Learning. CoRR abs/2304.02005 (2023) - [i73]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems. CoRR abs/2304.02058 (2023) - [i72]Arezoo Rajabi, Surudhi Asokraj, Fengqing Jiang, Luyao Niu, Bhaskar Ramasubramanian, James A. Ritcey, Radha Poovendran:
MDTD: A Multi Domain Trojan Detector for Deep Neural Networks. CoRR abs/2308.15673 (2023) - [i71]Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran:
Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications. CoRR abs/2311.16153 (2023) - 2022
- [j62]Mauro Conti, Eleonora Losiouk, Radha Poovendran, Riccardo Spolaor:
Side-channel attacks on mobile and IoT devices for Cyber-Physical systems. Comput. Networks 207: 108858 (2022) - [j61]Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. IEEE Trans. Dependable Secur. Comput. 19(4): 2665-2679 (2022) - [c144]Dinuka Sahabandu, Luyao Niu, Andrew Clark, Radha Poovendran:
A Submodular Optimization Approach to Stable and Minimally Disruptive Controlled Islanding in Power Systems. ACC 2022: 4587-4594 - [c143]Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran:
Agent-Temporal Attention for Reward Redistribution in Episodic Multi-Agent Reinforcement Learning. AAMAS 2022: 1391-1399 - [c142]Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics. CDC 2022: 910-917 - [c141]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee. CDC 2022: 1533-1540 - [c140]Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran:
Privacy-Preserving Reinforcement Learning Beyond Expectation. CDC 2022: 4706-4713 - [c139]Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin:
EVExchange: A Relay Attack on Electric Vehicle Charging System. ESORICS (1) 2022: 488-508 - [c138]Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran:
Verifying Safety for Resilient Cyber-Physical Systems via Reactive Software Restart. ICCPS 2022: 104-115 - [c137]Dinuka Sahabandu, Luyao Niu, Andrew Clark, Radha Poovendran:
A Hybrid Submodular Optimization Approach to Controlled Islanding with Heterogeneous Loads. SmartGridComm 2022: 252-258 - [i70]Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran:
Agent-Temporal Attention for Reward Redistribution in Episodic Multi-Agent Reinforcement Learning. CoRR abs/2201.04612 (2022) - [i69]Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran:
Shaping Advice in Deep Reinforcement Learning. CoRR abs/2202.09489 (2022) - [i68]Mauro Conti, Denis Donadel, Radha Poovendran, Federico Turrin:
EVExchange: A Relay Attack on Electric Vehicle Charging System. CoRR abs/2203.05266 (2022) - [i67]Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran:
Privacy-Preserving Reinforcement Learning Beyond Expectation. CoRR abs/2203.10165 (2022) - [i66]Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran:
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning. CoRR abs/2203.15506 (2022) - [i65]Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics. CoRR abs/2204.00512 (2022) - [i64]Luyao Niu, Abdullah Al Maruf, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee. CoRR abs/2204.00514 (2022) - [i63]Dinuka Sahabandu, J. Sukarno Mertoguno, Radha Poovendran:
A Natural Language Processing Approach for Instruction Set Architecture Identification. CoRR abs/2204.06624 (2022) - [i62]Tommaso Bianchi, Surudhi Asokraj, Alessandro Brighente, Mauro Conti, Radha Poovendran:
Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems. CoRR abs/2205.10292 (2022) - [i61]Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran:
Game of Trojans: A Submodular Byzantine Approach. CoRR abs/2207.05937 (2022) - [i60]Surudhi Asokraj, Tommaso Bianchi, Alessandro Brighente, Mauro Conti, Radha Poovendran:
Identity-Based Authentication for On-Demand Charging of Electric Vehicles. CoRR abs/2208.02857 (2022) - [i59]Abdullah Al Maruf, Luyao Niu, Andrew Clark, J. Sukarno Mertoguno, Radha Poovendran:
A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint. CoRR abs/2208.14282 (2022) - [i58]Arezoo Rajabi, Dinuka Sahabandu, Luyao Niu, Bhaskar Ramasubramanian, Radha Poovendran:
LDL: A Defense for Label-Based Membership Inference Attacks. CoRR abs/2212.01688 (2022) - 2021
- [j60]Amrita Ghosal, Sang Uk Sagong, Subir Halder, Kalana Sahabandu, Mauro Conti, Radha Poovendran, Linda Bushnell:
Truck platoon security: State-of-the-art and road ahead. Comput. Networks 185: 107658 (2021) - [j59]Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Secure Control in Partially Observable Environments to Satisfy LTL Specifications. IEEE Trans. Autom. Control. 66(12): 5665-5679 (2021) - [c136]Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Radha Poovendran:
Reinforcement Learning Beyond Expectation. CDC 2021: 1528-1535 - [c135]Dinuka Sahabandu, Luyao Niu, Andrew Clark, Radha Poovendran:
Scalable Planning in Multi-Agent MDPs. CDC 2021: 5932-5939 - [c134]Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran:
A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries. GameSec 2021: 231-250 - [c133]Mantas Mazeika, Dan Hendrycks, Huichen Li, Xiaojun Xu, Sidney Q. Hough, Andy Zou, Arezoo Rajabi, Qi Yao, Zihao Wang, Jian Tian, Yao Tang, Di Tang, Roman Smirnov, Pavel Pleskov, Nikita Benkovich, Dawn Song, Radha Poovendran, Bo Li, David A. Forsyth:
The Trojan Detection Challenge. NeurIPS (Competition and Demos) 2021: 279-291 - [e9]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 398, Springer 2021, ISBN 978-3-030-90018-2 [contents] - [e8]Joaquín García-Alfaro, Shujun Li, Radha Poovendran, Hervé Debar, Moti Yung:
Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 399, Springer 2021, ISBN 978-3-030-90021-2 [contents] - [i57]Guosong Yang, Radha Poovendran, João P. Hespanha:
Adaptive Learning in Two-Player Stackelberg Games with Application to Network Security. CoRR abs/2101.03253 (2021) - [i56]Dinuka Sahabandu, Luyao Niu, Andrew Clark, Radha Poovendran:
Scalable Planning in Multi-Agent MDPs. CoRR abs/2103.15894 (2021) - [i55]Baicen Xiao, Bhaskar Ramasubramanian, Radha Poovendran:
Shaping Advice in Deep Multi-Agent Reinforcement Learning. CoRR abs/2103.15941 (2021) - [i54]Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Radha Poovendran:
Reinforcement Learning Beyond Expectation. CoRR abs/2104.00540 (2021) - [i53]Luyao Niu, Dinuka Sahabandu, Andrew Clark, Radha Poovendran:
A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries. CoRR abs/2108.01628 (2021) - 2020
- [j58]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats. IEEE Trans. Autom. Control. 65(12): 5248-5263 (2020) - [c132]Baicen Xiao, Qifan Lu, Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran:
FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback. AAMAS 2020: 1512-1520 - [c131]Bhaskar Ramasubramanian, Baicen Xiao, Linda Bushnell, Radha Poovendran:
Safety-Critical Online Control with Adversarial Disturbances. CDC 2020: 3731-3738 - [c130]Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries. CDC 2020: 3785-3792 - [c129]Dinuka Sahabandu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Submodular Input Selection for Synchronization in Kuramoto Networks. CDC 2020: 5840-5847 - [c128]Dinuka Sahabandu, Joey Allen, Shana Moothedath, Linda Bushnell, Wenke Lee, Radha Poovendran:
Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach. ICCPS 2020: 9-19 - [c127]Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran:
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks. ICCPS 2020: 162-173 - [e7]Quanyan Zhu, John S. Baras, Radha Poovendran, Juntao Chen:
Decision and Game Theory for Security - 11th International Conference, GameSec 2020, College Park, MD, USA, October 28-30, 2020, Proceedings. Lecture Notes in Computer Science 12513, Springer 2020, ISBN 978-3-030-64792-6 [contents] - [i52]Baicen Xiao, Qifan Lu, Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran:
FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback. CoRR abs/2001.06781 (2020) - [i51]Luyao Niu, Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran:
Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks. CoRR abs/2001.09978 (2020) - [i50]Dinuka Sahabandu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Submodular Input Selection for Synchronization in Kuramoto Networks. CoRR abs/2003.12733 (2020) - [i49]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach. CoRR abs/2006.12327 (2020) - [i48]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats. CoRR abs/2007.00076 (2020) - [i47]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats. CoRR abs/2007.12327 (2020) - [i46]Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Secure Control in Partially Observable Environments to Satisfy LTL Specifications. CoRR abs/2007.12501 (2020) - [i45]Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries. CoRR abs/2007.13272 (2020) - [i44]Bhaskar Ramasubramanian, Baicen Xiao, Linda Bushnell, Radha Poovendran:
Safety-Critical Online Control with Adversarial Disturbances. CoRR abs/2009.09511 (2020)
2010 – 2019
- 2019
- [j57]Zhipeng Liu, Yao Long, Andrew Clark, Linda Bushnell, Daniel S. Kirschen, Radha Poovendran:
Minimal Input and Output Selection for Stability of Systems With Uncertainties. IEEE Trans. Autom. Control. 64(4): 1456-1471 (2019) - [j56]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
On the Structure and Computation of Random Walk Times in Finite Graphs. IEEE Trans. Autom. Control. 64(11): 4470-4483 (2019) - [j55]Xuhang Ying, Sang Uk Sagong, Andrew Clark, Linda Bushnell, Radha Poovendran:
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks. IEEE Trans. Inf. Forensics Secur. 14(9): 2300-2314 (2019) - [c126]Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran:
Secure Control under Partial Observability with Temporal Logic Constraints. ACC 2019: 1181-1188 - [c125]Dinuka Sahabandu, Shana Moothedath, Linda Bushnell, Radha Poovendran, Joey Allen, Wenke Lee, Andrew Clark:
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching. ACC 2019: 2289-2296 - [c124]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers. CDC 2019: 567-574 - [c123]Baicen Xiao, Bhaskar Ramasubramanian, Andrew Clark, Hannaneh Hajishirzi, Linda Bushnell, Radha Poovendran:
Potential-Based Advice for Stochastic Policy Learning. CDC 2019: 1842-1849 - [c122]Shruti Misra, Shana Moothedath, Hossein Hosseini, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge. CDC 2019: 4053-4060 - [c121]Guosong Yang, Radha Poovendran, João P. Hespanha:
Adaptive learning in two-player Stackelberg games with continuous action sets. CDC 2019: 6905-6911 - [c120]Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran:
Detecting ADS-B Spoofing Attacks Using Deep Neural Networks. CNS 2019: 187-195 - [c119]Hossein Hosseini, Sreeram Kannan, Radha Poovendran:
Dropping Pixels for Adversarial Robustness. CVPR Workshops 2019: 91-97 - [c118]Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates. GameSec 2019: 385-403 - [c117]Dinuka Sahabandu, Shana Moothedath, Joey Allen, Linda Bushnell, Wenke Lee, Radha Poovendran:
Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning. GameSec 2019: 417-438 - [c116]Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Radha Poovendran:
TACAN: transmitter authentication through covert channels in controller area networks. ICCPS 2019: 23-34 - [i43]Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Radha Poovendran:
TACAN: Transmitter Authentication through Covert Channels in Controller Area Networks. CoRR abs/1903.05231 (2019) - [i42]Bhaskar Ramasubramanian, Andrew Clark, Linda Bushnell, Radha Poovendran:
Secure Control under Partial Observability with Temporal Logic Constraints. CoRR abs/1903.06873 (2019) - [i41]Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran:
Detecting ADS-B Spoofing Attacks using Deep Neural Networks. CoRR abs/1904.09969 (2019) - [i40]Hossein Hosseini, Sreeram Kannan, Radha Poovendran:
Dropping Pixels for Adversarial Robustness. CoRR abs/1905.00180 (2019) - [i39]Baicen Xiao, Bhaskar Ramasubramanian, Andrew Clark, Hannaneh Hajishirzi, Linda Bushnell, Radha Poovendran:
Potential-Based Advice for Stochastic Policy Learning. CoRR abs/1907.08823 (2019) - [i38]Sang Uk Sagong, Radha Poovendran, Linda Bushnell:
Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks. CoRR abs/1907.10783 (2019) - [i37]Hossein Hosseini, Sreeram Kannan, Radha Poovendran:
Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples. CoRR abs/1907.12138 (2019) - [i36]Bhaskar Ramasubramanian, Luyao Niu, Andrew Clark, Linda Bushnell, Radha Poovendran:
Linear Temporal Logic Satisfaction in Adversarial Environments using Secure Control Barrier Certificates. CoRR abs/1910.12282 (2019) - [i35]Xuhang Ying, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran:
Covert Channel-Based Transmitter Authentication in Controller Area Networks. CoRR abs/1912.04735 (2019) - 2018
- [j54]Andrew Clark, Qiqiang Hou, Linda Bushnell, Radha Poovendran:
Maximizing the smallest eigenvalue of a symmetric matrix: A submodular optimization approach. Autom. 95: 446-454 (2018) - [j53]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach. IEEE Trans. Control. Netw. Syst. 5(1): 583-596 (2018) - [j52]Andrew Clark, Phillip Lee, Basel Alomair, Linda Bushnell, Radha Poovendran:
Combinatorial Algorithms for Control of Biological Regulatory Networks. IEEE Trans. Control. Netw. Syst. 5(2): 748-759 (2018) - [c115]Guosong Yang, Hossein Hosseini, Dinuka Sahabandu, Andrew Clark, João P. Hespanha, Radha Poovendran:
Modeling and Mitigating the Coremelt Attack. ACC 2018: 3410-3416 - [c114]Radha Poovendran:
Dynamic Defense against Adaptive and Persistent Adversaries. MTD@CCS 2018: 57-58 - [c113]Dinuka Sahabandu, Baicen Xiao, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran:
DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats. CDC 2018: 1136-1143 - [c112]Andrew Clark, Linda Bushnell, Radha Poovendran:
Input Selection for Performance, Stabilizability, and Controllability of Structured Linear Descriptor Systems. CDC 2018: 6918-6925 - [c111]Hossein Hosseini, Radha Poovendran:
Semantic Adversarial Examples. CVPR Workshops 2018: 1614-1619 - [c110]Hossein Hosseini, Baicen Xiao, Mayoore Jaiswal, Radha Poovendran:
Assessing Shape Bias Property of Convolutional Neural Networks. CVPR Workshops 2018: 1923-1931 - [c109]Shana Moothedath, Dinuka Sahabandu, Andrew Clark, Sangho Lee, Wenke Lee, Radha Poovendran:
Multi-stage Dynamic Information Flow Tracking Game. GameSec 2018: 80-101 - [c108]Muhammed O. Sayin, Hossein Hosseini, Radha Poovendran, Tamer Basar:
A Game Theoretical Framework for Inter-process Adversarial Intervention Detection. GameSec 2018: 486-507 - [c107]Erik Miehling, Baicen Xiao, Radha Poovendran, Tamer Basar:
A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities. GameSec 2018: 521-539 - [c106]Sang Uk Sagong, Xuhang Ying, Andrew Clark, Linda Bushnell, Radha Poovendran:
Cloaking the clock: emulating clock skew in controller area networks. ICCPS 2018: 32-42 - [e6]Linda Bushnell, Radha Poovendran, Tamer Basar:
Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Seattle, WA, USA, October 29-31, 2018, Proceedings. Lecture Notes in Computer Science 11199, Springer 2018, ISBN 978-3-030-01553-4 [contents] - [i34]Hossein Hosseini, Baicen Xiao, Mayoore Jaiswal, Radha Poovendran:
Assessing Shape Bias Property of Convolutional Neural Networks. CoRR abs/1803.07739 (2018) - [i33]Hossein Hosseini, Radha Poovendran:
Semantic Adversarial Examples. CoRR abs/1804.00499 (2018) - [i32]Xuhang Ying, Sang Uk Sagong, Andrew Clark, Linda Bushnell, Radha Poovendran:
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks. CoRR abs/1807.09432 (2018) - [i31]Shana Moothedath, Dinuka Sahabandu, Joey Allen, Andrew Clark, Linda Bushnell, Wenke Lee, Radha Poovendran:
A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats. CoRR abs/1811.05622 (2018) - 2017
- [j51]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Input Selection for Performance and Controllability of Structured Linear Descriptor Systems. SIAM J. Control. Optim. 55(1): 457-485 (2017) - [j50]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework. IEEE Trans. Autom. Control. 62(10): 5055-5068 (2017) - [j49]Xuhang Ying, Sumit Roy, Radha Poovendran:
Pricing Mechanisms for Crowd-Sensed Spatial-Statistics-Based Radio Mapping. IEEE Trans. Cogn. Commun. Netw. 3(2): 242-254 (2017) - [j48]Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran:
LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking. IEEE/ACM Trans. Netw. 25(2): 1206-1219 (2017) - [c105]Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran:
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices. ACNS 2017: 83-102 - [c104]Andrew Clark, Qiqiang Hou, Linda Bushnell, Radha Poovendran:
A submodular optimization approach to leader-follower consensus in networks with negative edges. ACC 2017: 1346-1352 - [c103]Hossein Hosseini, Baicen Xiao, Andrew Clark, Radha Poovendran:
Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API. MPS@CCS 2017: 21-32 - [c102]Zhipeng Liu, Yao Long, Andrew Clark, Phillip Lee, Linda Bushnell, Daniel S. Kirschen, Radha Poovendran:
Minimal input selection for robust control. CDC 2017: 2659-2966 - [c101]Hossein Hosseini, Baicen Xiao, Radha Poovendran:
Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos. CVPR Workshops 2017: 1305-1309 - [c100]Zhipeng Liu, Andrew Clark, Phillip Lee, Linda Bushnell, Daniel S. Kirschen, Radha Poovendran:
A submodular optimization approach to controlled islanding under cascading failure. ICCPS 2017: 187-196 - [c99]Hossein Hosseini, Baicen Xiao, Radha Poovendran:
Google's Cloud Vision API is Not Robust to Noise. ICMLA 2017: 101-105 - [c98]Hossein Hosseini, Baicen Xiao, Mayoore Jaiswal, Radha Poovendran:
On the Limitation of Convolutional Neural Networks in Recognizing Negative Images. ICMLA 2017: 352-358 - [c97]Xuhang Ying, Radha Poovendran, Sumit Roy:
Detecting LTE-U duty cycling misbehavior for fair sharing with Wi-Fi in shared bands. PIMRC 2017: 1-7 - [i30]Andrew Clark, Phillip Lee, Basel Alomair, Linda Bushnell, Radha Poovendran:
Combinatorial Algorithms for Control of Biological Regulatory Networks. CoRR abs/1701.05273 (2017) - [i29]Hossein Hosseini, Sreeram Kannan, Baosen Zhang, Radha Poovendran:
Deceiving Google's Perspective API Built for Detecting Toxic Comments. CoRR abs/1702.08138 (2017) - [i28]Hossein Hosseini, Yize Chen, Sreeram Kannan, Baosen Zhang, Radha Poovendran:
Blocking Transferability of Adversarial Examples in Black-Box Learning Systems. CoRR abs/1703.04318 (2017) - [i27]Hossein Hosseini, Radha Poovendran:
Deep Neural Networks Do Not Recognize Negative Images. CoRR abs/1703.06857 (2017) - [i26]Hossein Hosseini, Baicen Xiao, Radha Poovendran:
Deceiving Google's Cloud Video Intelligence API Built for Summarizing Videos. CoRR abs/1703.09793 (2017) - [i25]Hossein Hosseini, Baicen Xiao, Radha Poovendran:
Google's Cloud Vision API Is Not Robust To Noise. CoRR abs/1704.05051 (2017) - [i24]Kevin Fu, Ann W. Drobnis, Greg Morrisett, Elizabeth D. Mynatt, Shwetak N. Patel, Radha Poovendran, Benjamin G. Zorn:
Safety and Security for Intelligent Infrastructure. CoRR abs/1705.02002 (2017) - [i23]Hossein Hosseini, Baicen Xiao, Andrew Clark, Radha Poovendran:
Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API. CoRR abs/1708.04301 (2017) - [i22]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
On the Structure and Computation of Random Walk Times in Finite Graphs. CoRR abs/1709.01633 (2017) - [i21]Andrew Clark, Qiqiang Hou, Linda Bushnell, Radha Poovendran:
Maximizing the Smallest Eigenvalue of a Symmetric Matrix: A Submodular Optimization Approach. CoRR abs/1709.02212 (2017) - [i20]Xuhang Ying, Radha Poovendran, Sumit Roy:
Detecting LTE-U Duty Cycling Misbehavior for Fair Sharing with Wi-Fi in Shared Bands. CoRR abs/1710.01705 (2017) - [i19]Sang Uk Sagong, Xuhang Ying, Andrew Clark, Linda Bushnell, Radha Poovendran:
Cloaking the Clock: Emulating Clock Skew in Controller Area Networks. CoRR abs/1710.02692 (2017) - 2016
- [c96]Kalikinkar Mandal, Basel Alomair, Radha Poovendran:
Secure Error-Tolerant Graph Matching Protocols. CANS 2016: 265-283 - [c95]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Distributed adaptive patching strategies against malware propagation: A passivity approach. CDC 2016: 2587-2594 - [c94]Zhipeng Liu, Andrew Clark, Phillip Lee, Linda Bushnell, Daniel S. Kirschen, Radha Poovendran:
MinGen: Minimal generator set selection for small signal stability in power systems: A submodular framework. CDC 2016: 4122-4129 - [c93]Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran:
Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters. CNS 2016: 163-171 - [c92]Hossein Hosseini, Sreeram Kannan, Baosen Zhang, Radha Poovendran:
Learning Temporal Dependence from Time-Series Data with Latent Variables. DSAA 2016: 253-262 - [c91]Xuhang Ying, Sumit Roy, Radha Poovendran:
Pricing Mechanism for Quality-Based Radio Mapping via Crowdsourcing. GLOBECOM 2016: 1-6 - [c90]Zhipeng Liu, Andrew Clark, Phillip Lee, Linda Bushnell, Daniel S. Kirschen, Radha Poovendran:
Towards Scalable Voltage Control in Smart Grid: A Submodular Optimization Approach. ICCPS 2016: 20:1-20:10 - [i18]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach. CoRR abs/1603.04374 (2016) - [i17]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Submodularity in Input Node Selection for Networked Systems. CoRR abs/1605.09465 (2016) - [i16]Hossein Hosseini, Sreeram Kannan, Baosen Zhang, Radha Poovendran:
Learning Temporal Dependence from Time-Series Data with Latent Variables. CoRR abs/1608.07636 (2016) - [i15]Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran:
No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices. CoRR abs/1609.02750 (2016) - [i14]Xuhang Ying, Sumit Roy, Radha Poovendran:
Pricing Mechanisms for Crowd-Sensed Spatial-Statistics-Based Radio Mapping. CoRR abs/1611.07580 (2016) - [i13]Kalikinkar Mandal, Basel Alomair, Radha Poovendran:
Secure Error-Tolerant Graph Matching Protocols. IACR Cryptol. ePrint Arch. 2016: 908 (2016) - 2015
- [j47]Wade Trappe, Lalitha Sankar, Radha Poovendran, Heejo Lee, Srdjan Capkun:
Introduction to the Issue on Signal and Information Processing for Privacy. IEEE J. Sel. Top. Signal Process. 9(7): 1173-1175 (2015) - [c89]Phillip Lee, Andrew Clark, Linda Bushnell, Radha Poovendran:
Passivity framework for composition and mitigation of multi-virus propagation in networked systems. ACC 2015: 2453-2460 - [c88]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Jamming-based adversarial control of network flow allocation: A passivity approach. ACC 2015: 4710-4716 - [c87]Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran:
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks. AsiaCCS 2015: 639-644 - [c86]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Input selection for disturbance rejection in networked cyber-physical systems. CDC 2015: 954-961 - [c85]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
A host takeover game model for competing malware. CDC 2015: 4523-4530 - [c84]Moreno Ambrosin, Hossein Hosseini, Kalikinkar Mandal, Mauro Conti, Radha Poovendran:
Verifiable and privacy-preserving fine-grained data-collection for smart metering. CNS 2015: 655-658 - [c83]Xuhang Ying, Sumit Roy, Radha Poovendran:
Incentivizing crowdsourcing for radio environment mapping with statistical interpolation. DySPAN 2015: 365-374 - [c82]Andrew Clark, Kun Sun, Linda Bushnell, Radha Poovendran:
A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense. GameSec 2015: 3-21 - [c81]Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games. GameSec 2015: 113-129 - [c80]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Scalable and distributed submodular maximization with matroid constraints. WiOpt 2015: 435-442 - [i12]Moreno Ambrosin, Mauro Conti, Fabio De Gaspari, Radha Poovendran:
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks. CoRR abs/1502.02234 (2015) - [i11]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang:
Activity Recognition Using A Combination of Category Components And Local Models for Video Surveillance. CoRR abs/1503.00081 (2015) - [i10]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang:
Group Event Detection with a Varying Number of Group Members for Video Surveillance. CoRR abs/1503.00082 (2015) - 2014
- [j46]Andrew Clark, Linda Bushnell, Radha Poovendran:
A Supermodular Optimization Framework for Leader Selection Under Link Noise in Linear Multi-Agent Systems. IEEE Trans. Autom. Control. 59(2): 283-296 (2014) - [j45]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach. IEEE Trans. Autom. Control. 59(6): 1480-1494 (2014) - [j44]Phillip Lee, Andrew Clark, Linda Bushnell, Radha Poovendran:
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems. IEEE Trans. Autom. Control. 59(12): 3224-3237 (2014) - [j43]Basel Alomair, Radha Poovendran:
E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels. IEEE Trans. Computers 63(1): 204-217 (2014) - [j42]Basel Alomair, Radha Poovendran:
Efficient Authentication for Mobile and Pervasive Computing. IEEE Trans. Mob. Comput. 13(3): 469-481 (2014) - [j41]Zhenfu Cao, Keqiu Li, Xu Li, Patrick D. McDaniel, Radha Poovendran, Guojun Wang, Yang Xiang:
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(2): 279-282 (2014) - [c79]Radha Poovendran:
Passivity framework for modeling, mitigating, and composing attacks on networked systems. HiCoNS 2014: 29-30 - [c78]Phillip Lee, Omar Saleh, Basel Alomair, Linda Bushnell, Radha Poovendran:
Graph-based verification and misbehavior detection in multi-agent networks. HiCoNS 2014: 77-84 - [c77]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Distributed online submodular maximization in resource-constrained networks. WiOpt 2014: 397-404 - [e5]Radha Poovendran, Walid Saad:
Decision and Game Theory for Security - 5th International Conference, GameSec 2014, Los Angeles, CA, USA, November 6-7, 2014. Proceedings. Lecture Notes in Computer Science 8840, Springer 2014, ISBN 978-3-319-12600-5 [contents] - [i9]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework. CoRR abs/1411.5797 (2014) - 2013
- [j40]Kui Ren, Haojin Zhu, Zhu Han, Radha Poovendran:
Security in cognitive radio networks [Guest Editorial]. IEEE Netw. 27(3): 2 (2013) - [j39]Tamara Bonaci, Phillip Lee, Linda Bushnell, Radha Poovendran:
A convex optimization approach for clone detection in wireless sensor networks. Pervasive Mob. Comput. 9(4): 528-545 (2013) - [j38]Krishna Sampigethaya, Radha Poovendran:
Aviation Cyber-Physical Systems: Foundations for Future Aircraft and Air Transport. Proc. IEEE 101(8): 1834-1855 (2013) - [j37]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran:
Toward a Statistical Framework for Source Anonymity in Sensor Networks. IEEE Trans. Mob. Comput. 12(2): 248-260 (2013) - [c76]Andrew Clark, Linda Bushnell, Radha Poovendran:
Joint leader and link weight selection for fast convergence in multi-agent systems. ACC 2013: 3814-3820 - [c75]Andrew Clark, Quanyan Zhu, Radha Poovendran, Tamer Basar:
An impact-aware defense against Stuxnet. ACC 2013: 4140-4147 - [c74]Quanyan Zhu, Andrew Clark, Radha Poovendran, Tamer Basar:
Deployment and exploitation of deceptive honeybots in social networks. CDC 2013: 212-219 - [c73]Andrew Clark, Kun Sun, Radha Poovendran:
Effectiveness of IP address randomization in decoy-based moving target defense. CDC 2013: 678-685 - [c72]Phillip Lee, Andrew Clark, Linda Bushnell, Radha Poovendran:
Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach. CPSW@CISS 2013: 161-175 - [c71]Roshanak Roshandel, Payman Arabshahi, Radha Poovendran:
LIDAR: a layered intrusion detection and remediationframework for smartphones. ISARCS 2013: 27-32 - [c70]Chouchang Yang, Basel Alomair, Radha Poovendran:
Optimized relay-route assignment for anonymity in wireless networks. ISIT 2013: 76-80 - [c69]Fei Huo, Chouchang Yang, Guang Gong, Radha Poovendran:
A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power. RFIDSec Asia 2013: 57-68 - [i8]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Minimizing Convergence Error in Multi-Agent Systems via Leader Selection: A Supermodular Optimization Approach. CoRR abs/1306.4949 (2013) - [i7]Andrew Clark, Amit Pande, Kannan Govindan, Radha Poovendran, Prasant Mohapatra:
Using Social Information for Flow Allocation in MANETs. CoRR abs/1311.3226 (2013) - [i6]Phillip Lee, Andrew Clark, Linda Bushnell, Radha Poovendran:
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems. CoRR abs/1312.1397 (2013) - 2012
- [j36]Radha Poovendran, Krishna Sampigethaya, Sandeep K. S. Gupta, Insup Lee, K. Venkatesh Prasad, David Corman, James L. Paunicka:
Special Issue on Cyber-Physical Systems [Scanning the Issue]. Proc. IEEE 100(1): 6-12 (2012) - [j35]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran:
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification. IEEE Trans. Parallel Distributed Syst. 23(8): 1536-1550 (2012) - [c68]Chouchang Yang, Basel Alomair, Radha Poovendran:
Multipath flow allocation in anonymous wireless networks with dependent sources. Allerton Conference 2012: 1395-1400 - [c67]Andrew Clark, Linda Bushnell, Radha Poovendran:
A passivity-based framework for composing attacks on networked control systems. Allerton Conference 2012: 1814-1821 - [c66]Mauro Conti, Radha Poovendran, Marco Secchiero:
FakeBook: Detecting Fake Profiles in On-Line Social Networks. ASONAM 2012: 1071-1078 - [c65]Andrew Clark, Linda Bushnell, Radha Poovendran:
On leader selection for performance and controllability in multi-agent systems. CDC 2012: 86-93 - [c64]Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran:
Leader selection in multi-agent systems for smooth convergence via fast mixing. CDC 2012: 818-824 - [c63]Quanyan Zhu, Andrew Clark, Radha Poovendran, Tamer Basar:
Deceptive routing games. CDC 2012: 2704-2711 - [c62]Andrew Clark, Quanyan Zhu, Radha Poovendran, Tamer Basar:
Deceptive Routing in Relay Networks. GameSec 2012: 171-185 - [c61]Andrew Clark, Linda Bushnell, Radha Poovendran:
Leader selection games under link noise injection attacks. HiCoNS 2012: 31-40 - [c60]Chouchang Yang, Basel Alomair, Radha Poovendran:
Optimized flow allocation for anonymous communication in multipath wireless networks. ISIT 2012: 219-223 - [c59]Radhakrishna G. Sampigethaya, Radha Poovendran:
Enhancing ADS-B for Future UAV Operations. Infotech@Aerospace 2012 - [c58]Andrew Clark, Linda Bushnell, Radha Poovendran:
Leader selection for minimizing convergence error in leader-follower systems: A supermodular optimization approach. WiOpt 2012: 111-115 - [c57]Sajal K. Das, Krishna Sampigethaya, Guevara Noubir, Radha Poovendran:
Message from the workshop chairs. WOWMOM 2012: 1 - [i5]Quanyan Zhu, Andrew Clark, Radha Poovendran, Tamer Basar:
SODEXO: A System Framework for Deployment and Exploitation of Deceptive Honeybots in Social Networks. CoRR abs/1207.5844 (2012) - [i4]Andrew Clark, Linda Bushnell, Radha Poovendran:
A Supermodular Optimization Framework for Leader Selection under Link Noise in Linear Multi-Agent Systems. CoRR abs/1208.0946 (2012) - 2011
- [j34]Basel Alomair, Loukas Lazos, Radha Poovendran:
Securing low-cost RFID systems: An unconditionally secure approach. J. Comput. Secur. 19(2): 229-257 (2011) - [j33]Krishna Sampigethaya, Radha Poovendran, Sudhakar Shetty, Terry Davis, Chuck Royalty:
Future E-Enabled Aircraft Communications and Security: The Next 20 Years and Beyond. Proc. IEEE 99(11): 2040-2055 (2011) - [j32]Patrick Tague, Sidharth Nabar, James A. Ritcey, Radha Poovendran:
Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans. Netw. 19(1): 184-194 (2011) - [c56]Sidharth Nabar, Ayan Banerjee, Sandeep K. S. Gupta, Radha Poovendran:
GeM-REM: Generative Model-Driven Resource Efficient ECG Monitoring in Body Sensor Networks. BSN 2011: 1-6 - [c55]Andrew Clark, Radha Poovendran:
A submodular optimization framework for leader selection in linear multi-agent systems. CDC/ECC 2011: 3614-3621 - [c54]Krishna Sampigethaya, Radha Poovendran:
Security and privacy of future aircraft wireless communications with offboard systems. COMSNETS 2011: 1-6 - [c53]Andrew Clark, Radha Poovendran:
Maximizing Influence in Competitive Environments: A Game-Theoretic Approach. GameSec 2011: 151-162 - [c52]He Wu, Sidharth Nabar, Radha Poovendran:
An energy framework for the network simulator 3 (NS-3). SimuTools 2011: 222-230 - [c51]Sidharth Nabar, Ayan Banerjee, Sandeep K. S. Gupta, Radha Poovendran:
Resource-efficient and reliable long term wireless monitoring of the photoplethysmographic signal. Wireless Health 2011: 9 - [c50]Ayan Banerjee, Sidharth Nabar, Sandeep K. S. Gupta, Radha Poovendran:
Energy-efficient long term physiological monitoring. Wireless Health 2011: 17 - [c49]Tamara Bonaci, Phillip Lee, Linda Bushnell, Radha Poovendran:
Distributed clone detection in wireless sensor networks: An optimization approach. WOWMOM 2011: 1-6 - 2010
- [j31]Basel Alomair, Radha Poovendran:
Privacy versus scalability in radio frequency identification systems. Comput. Commun. 33(18): 2155-2163 (2010) - [j30]Basel Alomair, Andrew Clark, Radha Poovendran:
The power of primes: security of authentication based on a universal hash-function family. J. Math. Cryptol. 4(2): 121-148 (2010) - [j29]Radha Poovendran:
Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View]. Proc. IEEE 98(8): 1363-1366 (2010) - [j28]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang:
Group Event Detection With a Varying Number of Group Members for Video Surveillance. IEEE Trans. Circuits Syst. Video Technol. 20(8): 1057-1067 (2010) - [j27]Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran:
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 9(8): 1119-1133 (2010) - [c48]Sidharth Nabar, Jeffrey S. Walling, Radha Poovendran:
Minimizing Energy Consumption in Body Sensor Networks via Convex Optimization. BSN 2010: 62-67 - [c47]Tamara Bonaci, Linda Bushnell, Radha Poovendran:
Node capture attacks in wireless sensor networks: A system theoretic approach. CDC 2010: 6765-6772 - [c46]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran:
Scalable RFID systems: a privacy-preserving protocol with constant-time identification. DSN 2010: 1-10 - [c45]Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran:
Statistical Framework for Source Anonymity in Sensor Networks. GLOBECOM 2010: 1-6 - [c44]Basel Alomair, Radha Poovendran:
Efficient Authentication for Mobile and Pervasive Computing. ICICS 2010: 186-202 - [c43]Basel Alomair, Radha Poovendran:
$\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels. ICISC 2010: 292-310 - [c42]Apaporn Boonyarattaphan, Yan Bai, Sam Chung, Radha Poovendran:
Spatial-Temporal Access Control for E-health Services. NAS 2010: 269-276 - [c41]Andrew Clark, Radha Poovendran:
A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks. WCNC 2010: 1-6 - [c40]Sidharth Nabar, Ayan Banerjee, Sandeep K. S. Gupta, Radha Poovendran:
Evaluation of body sensor network platforms: a design space and benchmarking analysis. Wireless Health 2010: 118-127
2000 – 2009
- 2009
- [j26]Adrian Perrig, Wade Trappe, Virgil D. Gligor, Radha Poovendran, Heejo Lee:
Secure wireless networking. J. Commun. Networks 11(6): 323-327 (2009) - [j25]Basel Alomair, Radha Poovendran:
Information Theoretically Secure Encryption with Almost Free Authentication. J. Univers. Comput. Sci. 15(15): 2937-2956 (2009) - [j24]David Slater, Radha Poovendran, Patrick Tague, Brian J. Matt:
Tradeoffs between jamming resilience and communication efficiency in key establishment. ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(1): 14-25 (2009) - [j23]Patrick Tague, David Slater, Jason Rogers, Radha Poovendran:
Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis. IEEE Trans. Dependable Secur. Comput. 6(2): 111-123 (2009) - [j22]Patrick Tague, Mingyan Li, Radha Poovendran:
Mitigation of Control Channel Jamming under Node Capture Attacks. IEEE Trans. Mob. Comput. 8(9): 1221-1234 (2009) - [j21]Loukas Lazos, Radha Poovendran, James A. Ritcey:
Analytic evaluation of target detection in heterogeneous wireless sensor networks. ACM Trans. Sens. Networks 5(2): 18:1-18:38 (2009) - [j20]Loukas Lazos, Radha Poovendran, James A. Ritcey:
Detection of mobile targets on the plane and in space using heterogeneous sensor networks. Wirel. Networks 15(5): 667-690 (2009) - [c39]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang:
Group Event Detection for Video Surveillance. ISCAS 2009: 2830-2833 - [c38]Basel Alomair, Radha Poovendran:
Unconditionally Secure Authenticated Encryption with Shorter Keys. WOSIS 2009: 5-15 - [c37]David Slater, Patrick Tague, Radha Poovendran, Brian J. Matt:
A coding-theoretic approach for efficient message verification over insecure channels. WISEC 2009: 151-160 - 2008
- [j19]Krishna Sampigethaya, Radha Poovendran, Linda Bushnell:
Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes. Proc. IEEE 96(12): 1992-2007 (2008) - [j18]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang:
Activity Recognition Using a Combination of Category Components and Local Models for Video Surveillance. IEEE Trans. Circuits Syst. Video Technol. 18(8): 1128-1139 (2008) - [c36]Patrick Tague, Radha Poovendran:
Modeling node capture attacks in wireless sensor networks. Allerton 2008: 1221-1224 - [c35]Basel Alomair, Krishna Sampigethaya, Radha Poovendran:
Efficient Generic Forward-Secure Signatures and Proxy Signatures. EuroPKI 2008: 166-181 - [c34]Patrick Tague, David Slater, Jason Rogers, Radha Poovendran:
Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis. INFOCOM 2008: 161-165 - [c33]Weiyao Lin, Ming-Ting Sun, Radha Poovendran, Zhengyou Zhang:
Human activity recognition for video surveillance. ISCAS 2008: 2737-2740 - [c32]Mingyan Li, Casey K. Fung, Krishna Sampigethaya, Richard Robinson, Radha Poovendran, Rainer Falk, Florian Kohlmayer, Andreas Koepf:
Public key based authentication for secure integration of sensor data and RFID. HeterSanet 2008: 61-66 - [c31]Basel Alomair, Radha Poovendran:
On the Authentication of RFID Systems with Bitwise Operations. NTMS 2008: 1-6 - [c30]Patrick Tague, Sidharth Nabar, James A. Ritcey, David Slater, Radha Poovendran:
Throughput optimization for multipath unicast routing under probabilistic jamming. PIMRC 2008: 1-5 - [c29]Patrick Tague, David Slater, Radha Poovendran, Guevara Noubir:
Linear programming models for jamming attacks on network traffic flows. WiOpt 2008: 207-216 - [e4]Virgil D. Gligor, Jean-Pierre Hubaux, Radha Poovendran:
Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM 2008, ISBN 978-1-59593-814-5 [contents] - 2007
- [j17]Patrick Tague, Radha Poovendran:
Modeling adaptive node capture attacks in multi-hop wireless networks. Ad Hoc Networks 5(6): 801-814 (2007) - [j16]Krishna Sampigethaya, Mingyan Li, Leping Huang, Radha Poovendran:
AMOEBA: Robust Location Privacy Scheme for VANET. IEEE J. Sel. Areas Commun. 25(8): 1569-1589 (2007) - [j15]Javier Salido, Loukas Lazos, Radha Poovendran:
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach. IEEE/ACM Trans. Netw. 15(6): 1527-1540 (2007) - [j14]Patrick Tague, Radha Poovendran:
A canonical seed assignment model for key predistribution in wireless sensor networks. ACM Trans. Sens. Networks 3(4): 19 (2007) - [j13]Radha Poovendran, Loukas Lazos:
A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Networks 13(1): 27-59 (2007) - [j12]Loukas Lazos, Radha Poovendran:
Power proximity based key management for secure multicast in ad hoc networks. Wirel. Networks 13(1): 127-148 (2007) - [c28]Basel Alomair, Loukas Lazos, Radha Poovendran:
Passive Attacks on a Class of Authentication Protocols for RFID. ICISC 2007: 102-115 - [c27]Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran:
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. INFOCOM 2007: 1307-1315 - [c26]Loukas Lazos, Radha Poovendran, James A. Ritcey:
Probabilistic detection of mobile targets in heterogeneous sensor networks. IPSN 2007: 519-528 - [c25]Patrick Tague, Mingyan Li, Radha Poovendran:
Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution. PIMRC 2007: 1-5 - [c24]Richard Robinson, Mingyan Li, Scott Lintelman, Krishna Sampigethaya, Radha Poovendran, David von Oheimb, Jens-Uwe Bußer, Jorge Cuéllar:
Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety. SAFECOMP 2007: 28-39 - [c23]Loukas Lazos, Radha Poovendran, James A. Ritcey:
On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets. WiOpt 2007: 1-10 - [p2]Loukas Lazos, Radha Poovendran:
Secure Localization for Wireless Sensor Networks using Range-Independent Methods. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 185-214 - [p1]Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, Paul F. Syverson:
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 279-298 - [e3]Radha Poovendran, Sumit Roy, Cliff Wang:
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security 30, Springer 2007, ISBN 978-0-387-32721-1 [contents] - 2006
- [j11]Krishna Sampigethaya, Radha Poovendran:
A framework and taxonomy for comparison of electronic voting schemes. Comput. Secur. 25(2): 137-153 (2006) - [j10]Loukas Lazos, Radha Poovendran:
HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2): 233-246 (2006) - [j9]Krishna Sampigethaya, Radha Poovendran:
A Survey on Mix Networks and Their Secure Applications. Proc. IEEE 94(12): 2142-2181 (2006) - [j8]Mingyan Li, Radha Poovendran:
Disenrollment with perfect forward secrecy in threshold schemes. IEEE Trans. Inf. Theory 52(4): 1676-1682 (2006) - [j7]Loukas Lazos, Radha Poovendran:
Stochastic coverage in heterogeneous sensor networks. ACM Trans. Sens. Networks 2(3): 325-358 (2006) - [c22]Patrick Tague, Radha Poovendran:
A general probabilistic model for improving key assignment in wireless networks. WiOpt 2006: 251-259 - [c21]Loukas Lazos, Radha Poovendran:
Coverage in heterogeneous sensor networks. WiOpt 2006: 306-315 - [c20]Mingyan Li, Krishna Sampigethaya, Leping Huang, Radha Poovendran:
Swing & swap: user-centric approaches towards maximizing location privacy. WPES 2006: 19-28 - [e2]Radha Poovendran, Ari Juels:
Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006. ACM 2006, ISBN 1-59593-557-6 [contents] - [i3]JunHyuk Song, Radha Poovendran, Jicheol Lee, Tetsu Iwata:
The AES-CMAC Algorithm. RFC 4493: 1-20 (2006) - [i2]JunHyuk Song, Radha Poovendran, Jicheol Lee:
The AES-CMAC-96 Algorithm and Its Use with IPsec. RFC 4494: 1-8 (2006) - [i1]JunHyuk Song, Radha Poovendran, Jicheol Lee, Tetsu Iwata:
The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE). RFC 4615: 1-7 (2006) - 2005
- [j6]Mingyan Li, Radha Poovendran, David A. McGrew:
Minimizing center key storage in hybrid one-way function based group key management with communication constraints. Inf. Process. Lett. 93(4): 191-198 (2005) - [j5]Intae Kang, Radha Poovendran:
Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks. Mob. Networks Appl. 10(6): 879-896 (2005) - [j4]Loukas Lazos, Radha Poovendran:
SeRLoc: Robust localization for wireless sensor networks. ACM Trans. Sens. Networks 1(1): 73-100 (2005) - [c19]Siu-Ping Chan, Radha Poovendran, Ming-Ting Sun:
A key management scheme in distributed sensor networks using attack probabilities. GLOBECOM 2005: 5 - [c18]Loukas Lazos, Radha Poovendran, Srdjan Capkun:
Rope: robust position estimation in wireless sensor networks. IPSN 2005: 324-331 - [c17]Radha Poovendran:
Information assurance in manets and wireless sensor networks. SASN 2005: 32 - [c16]Loukas Lazos, Radha Poovendran, Catherine Meadows, Paul F. Syverson, LiWu Chang:
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. WCNC 2005: 1193-1199 - [c15]Intae Kang, Radha Poovendran:
Scalable power-efficient broadcast over densely deployed wireless ad hoc networks. WCNC 2005: 2063-2068 - [c14]Intae Kang, Radha Poovendran:
Iterated Local Optimization for Minimum Energy Broadcast. WiOpt 2005: 332-341 - [e1]Markus Jakobsson, Radha Poovendran:
Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005. ACM 2005, ISBN 1-59593-142-2 [contents] - 2004
- [c13]Intae Kang, Radha Poovendran:
Broadcast with heterogeneous node capability [wireless ad hoc or sensor networks]. GLOBECOM 2004: 4114-4119 - [c12]Loukas Lazos, Radha Poovendran:
Cross-layer design for energy-efficient secure multicast communications in ad hoc networks. ICC 2004: 3633-3639 - [c11]Loukas Lazos, Javier Salido, Radha Poovendran:
VP3: using vertex path and power proximity for energy efficient key distribution. VTC Fall (2) 2004: 1228-1232 - [c10]Intae Kang, Radha Poovendran:
COBRA: center-oriented broadcast routing algorithms for wireless ad hoc networks. WCNC 2004: 813-818 - [c9]Loukas Lazos, Radha Poovendran:
SeRLoc: secure range-independent localization for wireless sensor networks. Workshop on Wireless Security 2004: 21-30 - 2003
- [j3]Wade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu:
Key management and distribution for secure multimedia multicast. IEEE Trans. Multim. 5(4): 544-557 (2003) - [c8]Intae Kang, Radha Poovendran:
A comparison of power-efficient broadcast routing algorithms. GLOBECOM 2003: 387-392 - [c7]Loukas Lazos, Radha Poovendran:
Energy-aware secure multicast communication in ad-hoc networks using geographic location information. ICASSP (4) 2003: 201-204 - [c6]Intae Kang, Radha Poovendran:
Maximizing static network lifetime of wireless broadcast ad hoc networks. ICC 2003: 2256-2261 - [c5]Mingyan Li, Radha Poovendran:
Broadcast Enforced Threshold Schemes with Disenrollment. Selected Areas in Cryptography 2003: 101-116 - 2002
- [j2]Mingyan Li, Radha Poovendran, Carlos Alberto Berenstein:
Design of secure multicast key management schemes with communication budget constraint. IEEE Commun. Lett. 6(3): 108-110 (2002) - 2001
- [j1]Radha Poovendran, John S. Baras:
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Trans. Inf. Theory 47(7): 2824-2834 (2001) - [c4]Wade Trappe, Jie Song, Radha Poovendran, K. J. Ray Liu:
Key distribution for secure multimedia multicasts via data embedding. ICASSP 2001: 1449-1452 - [c3]Jie Song, Radha Poovendran, Wade Trappe, Kuo J. Ray Liu:
Dynamic key distribution scheme using data embedding for secure multimedia multicast. Security and Watermarking of Multimedia Contents 2001: 618-628 - 2000
- [c2]Radha Poovendran, Peter J. Keleher, John S. Baras:
A Decision-Process Analysis of Implicit Coscheduling. IPDPS 2000: 115-120
1990 – 1999
- 1999
- [c1]Radha Poovendran, John S. Baras:
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. CRYPTO 1999: 624-638
Coauthor Index
aka: Radhakrishna G. Sampigethaya
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint