default search action
Ranjan Bose
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j50]Sandeep Nair Narayanan, Anupam Joshi, Ranjan Bose:
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 19(3): 1673-1686 (2022) - 2021
- [j49]Kirti Kant Sharma, Ranjan Bose:
Secure Communication With Energy-Harvesting Buffer-Aided Jammer. IEEE Open J. Commun. Soc. 2: 1799-1808 (2021) - [j48]Bhawna Ahuja, Deepak Mishra, Ranjan Bose:
Fair Subcarrier Allocation for Securing OFDMA in IoT Against Full-Duplex Hybrid Attacker. IEEE Trans. Inf. Forensics Secur. 16: 2898-2911 (2021) - [j47]Bhawna Ahuja, Deepak Mishra, Ranjan Bose:
Analyzing Secrecy Outage in Hybrid Full-Duplex Attack While Exploiting CSI of Legitimate Link. IEEE Wirel. Commun. Lett. 10(7): 1454-1458 (2021) - [j46]Sonam Jain, Ranjan Bose:
NOMA Combined With RC for Reliable and Secure Transmission in a Delay-Constrained System. IEEE Wirel. Commun. Lett. 10(12): 2639-2643 (2021) - [c35]Srishti Kulshrestha, Sarthak Agrawal, Devottam Gaurav, Manmohan Chaturvedi, Subodh Sharma, Ranjan Bose:
Development and Validation of Serious Games for Teaching Cybersecurity. JCSG 2021: 247-262 - 2020
- [j45]Sasi Vinay Pechetti, Ranjan Bose:
Precoding-Aided Secure Time-Domain Index Modulation. IEEE Commun. Lett. 24(5): 966-970 (2020) - [j44]Bhawna Ahuja, Deepak Mishra, Ranjan Bose:
QoS-aware stochastic spatial PLS model for analysing secrecy performance under eavesdropping and jamming. IET Commun. 14(21): 3735-3747 (2020) - [j43]Sonam Jain, Ranjan Bose:
Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT. IEEE Internet Things J. 7(7): 6550-6565 (2020) - [j42]Sasi Vinay Pechetti, Ranjan Bose:
Precoding-Aided Spatial Modulation Assisted Joint Two-Tier Downlink Reception. IEEE Trans. Wirel. Commun. 19(5): 3332-3345 (2020) - [j41]Bhawna Ahuja, Deepak Mishra, Ranjan Bose:
Optimal Green Hybrid Attacks in Secure IoT. IEEE Wirel. Commun. Lett. 9(4): 457-460 (2020) - [c34]Sonam Jain, Ranjan Bose:
PAPR Minimization Technique in MIMO V2V Transmission using SVM-based Channel Estimation. IEEE ANTS 2020: 1-5 - [c33]Wei Shi, Tianhao Gao, Srishti Kulshrestha, Ranjan Bose, Akira Haga, Yoshihiro Okada:
A Framework for Automatically Generating IoT Security Quizzes in 360VR Images/Videos Based on Linked Data. EIDWT 2020: 259-267 - [c32]Bhawna Ahuja, Deepak Mishra, Ranjan Bose:
Fairness-aware Subcarrier Allocation to Combat full duplex Eavesdropping and Jamming attacks in IoT. ICC 2020: 1-6 - [i5]Bhawna Ahuja, Deepak Mishra, Ranjan Bose:
QoS-aware Stochastic Spatial PLS Model for Analysing Secrecy Performance under Eavesdropping and Jamming. CoRR abs/2001.11664 (2020)
2010 – 2019
- 2019
- [j40]Sasi Vinay Pechetti, Ranjan Bose:
Channel-Aware Artificial Intersymbol Interference for Enhancing Physical Layer Security. IEEE Commun. Lett. 23(7): 1182-1185 (2019) - [j39]Sonam Jain, Ranjan Bose:
QVP-based relay selection to improve secrecy for rateless-codes in delay-constrained systems. IET Commun. 13(1): 26-35 (2019) - [j38]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Stackelberg game for price and power control in secure cooperative relay network. IET Cyper-Phys. Syst.: Theory & Appl. 4(1): 58-67 (2019) - [j37]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Energy theft detection for AMI using principal component analysis based reconstructed data. IET Cyper-Phys. Syst.: Theory & Appl. 4(2): 179-185 (2019) - [j36]Sasi Vinay Pechetti, Abhishek Jindal, Ranjan Bose:
Exploiting Mapping Diversity for Enhancing Security at Physical Layer in the Internet of Things. IEEE Internet Things J. 6(1): 532-544 (2019) - [j35]Sonam Jain, Ranjan Bose:
Secure Cooperative Transmission in Rateless-Coded Environment Using TAS and Artificial Noise. IEEE Trans. Veh. Technol. 68(12): 12416-12421 (2019) - [c31]Sonam Jain, Ranjan Bose:
Rateless Code-Aided Transmission Scheme to Achieve Secrecy in a Delay-Constraint Environment. ANTS 2019: 1-6 - [c30]Wei Shi, Chenguang Ma, Srishti Kulshrestha, Ranjan Bose, Yoshihiro Okada:
A Framework for Automatically Generating IoT Security Quizzes in a Virtual 3D Environment Based on Linked Data. EIDWT 2019: 103-113 - [c29]Yoshihiro Okada, Akira Haga, Wei Shi, Chenguang Ma, Srishti Kulshrestha, Ranjan Bose:
E-Learning Material Development Framework Supporting 360VR Images/Videos Based on Linked Data for IoT Security Education. EIDWT 2019: 148-160 - [c28]Bhawna Ahuja, Deepak Mishra, Ranjan Bose:
Novel QoS-Aware Physical Layer Security Analysis Considering Random Inter-Node Distances. ICC 2019: 1-6 - [c27]Yiyi Wang, Alaa M. Allakany, Srishti Kulshrestha, Wei Shi, Ranjan Bose, Koji Okamura:
Automatically Generate E-Learning Quizzes from IoT Security Ontology. IIAI-AAI 2019: 166-171 - [c26]Kirti Kant Sharma, Ranjan Bose:
Secure Energy Efficiency with Poisson Point Process Distributed Jammers. WF-IoT 2019: 19-23 - [i4]Bhawna Ahuja, Deepak Mishra, Ranjan Bose:
Optimal Green Hybrid Attacks in Secure IoT. CoRR abs/1912.02097 (2019) - 2018
- [j34]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy outage of threshold-based cooperative relay network with and without direct links. EURASIP J. Inf. Secur. 2018: 7 (2018) - [j33]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Entropy-based electricity theft detection in AMI network. IET Cyper-Phys. Syst.: Theory & Appl. 3(2): 99-105 (2018) - [j32]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy performance of threshold-based cognitive relay network with diversity combining. J. Commun. Networks 20(4): 383-395 (2018) - [j31]Sandeep Kumar Singh, Kush Khanna, Ranjan Bose, Bijaya Ketan Panigrahi, Anupam Joshi:
Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid. IEEE Trans. Ind. Informatics 14(1): 89-97 (2018) - [c25]Adya Joshi, Madan Oberoi, Ranjan Bose:
Analyzing CDR/IPDR Data to Find People Network from Encrypted Messaging Services. CIC 2018: 480-486 - [c24]Chenguang Ma, Srishti Kulshrestha, Wei Shi, Yoshihiro Okada, Ranjan Bose:
E-learning Material Development Framework Supporting VR/AR Based on Linked Data for IoT Security Education. EIDWT 2018: 479-491 - [c23]Pradeep Subhash Paikrao, Ranjan Bose:
Anomaly Detection Algorithms for Smart Metering using Swarm Intelligence. FICN@MOBICOM 2018: 3-8 - [c22]Kirti Kant Sharma, Ranjan Bose:
Jammer Assisted SEE Maximization in Decode-and-Forward Relay Network. SPCOM 2018: 347-351 - [c21]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Energy theft detection in advanced metering infrastructure. WF-IoT 2018: 529-534 - [i3]Chinmoy Kundu, Sarbani Ghose, Telex Magloire Nkouatchah Ngatched, Octavia A. Dobre, Trung Quang Duong, Ranjan Bose:
Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying. CoRR abs/1803.00621 (2018) - [i2]Adya Joshi, Ranjan Bose, Madan Oberoi:
Analyzing CDR/IPDR data to find People Network from Encrypted Messaging Services. CoRR abs/1809.09747 (2018) - 2017
- [j30]Chinmoy Kundu, Sarbani Ghose, Telex Magloire Nkouatchah Ngatched, Octavia A. Dobre, Trung Quang Duong, Ranjan Bose:
Effects of CSI Knowledge on Secrecy of Threshold-Selection Decode-and-Forward Relaying. IEEE Access 5: 19393-19408 (2017) - [j29]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network. IET Commun. 11(9): 1396-1406 (2017) - [j28]Sabyasachi Gupta, Ranjan Bose:
Partner Selection Based on Optimal Power Allocation for Lifetime Maximization in Cooperative Networks. IEEE Trans. Veh. Technol. 66(4): 3088-3102 (2017) - [j27]Abhishek Jindal, Ranjan Bose:
Resource Allocation in Secure Multicarrier AF Relay System Under Individual Power Constraints. IEEE Trans. Veh. Technol. 66(6): 5070-5085 (2017) - [j26]Anshu Mittal, Chinmoy Kundu, Ranjan Bose, R. K. Shevgaonkar:
Entropy Based Image Segmentation for Energy Efficient LTE System with Cloud. Wirel. Pers. Commun. 92(3): 1145-1162 (2017) - [j25]Chinmoy Kundu, Abhishek Jindal, Ranjan Bose:
Secrecy Outage of Dual-Hop Amplify-and-Forward Relay System with Diversity Combining at the Eavesdropper. Wirel. Pers. Commun. 97(1): 539-563 (2017) - [c20]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy outage of cooperative relay network with and without eavesdropper's direct link. NCC 2017: 1-6 - [c19]Sonam Jain, Sarbani Ghose, Ranjan Bose:
Analyzing secrecy of delay-constrained system in cooperative relay environment using rateless codes. NCC 2017: 1-6 - [c18]Sasi Vinay Pechetti, Abhishek Jindal, Ranjan Bose:
Channel-based mapping diversity for enhancing the physical layer security in the Internet of Things. PIMRC 2017: 1-6 - 2016
- [j24]Sarbani Ghose, Chinmoy Kundu, Ranjan Bose:
Secrecy performance of dual-hop decode-and-forward relay system with diversity combining at the eavesdropper. IET Commun. 10(8): 904-914 (2016) - [j23]Rashi Mehrotra, Chinmoy Kundu, Ranjan Bose:
Joint constellation size, energy allocation and relay location optimisation for energy-efficient DF relaying. IET Commun. 10(11): 1282-1293 (2016) - [c17]Anshu Mittal, Chinmoy Kundu, Ranjan Bose, R. K. Shevgaonkar:
Entropy based image segmentation with wavelet compression for energy efficient LTE systems. ICT 2016: 1-6 - [c16]Sabyasachi Gupta, Ranjan Bose:
Energy-aware relay selection and power allocation for multiple-user cooperative networks. WCNC 2016: 1-7 - [i1]Sabyasachi Gupta, Ranjan Bose:
Energy-Aware Relay Selection and Power Allocation for Multiple-User Cooperative Networks. CoRR abs/1606.02213 (2016) - 2015
- [j22]Abhishek Jindal, Ranjan Bose:
Resource Allocation for Secure Multicarrier AF Relay System Under Total Power Constraint. IEEE Commun. Lett. 19(2): 231-234 (2015) - [j21]Sabyasachi Gupta, Ranjan Bose:
Energy-efficient joint routing and power allocation optimisation in bit error rate constrained multihop wireless networks. IET Commun. 9(9): 1174-1181 (2015) - [j20]Chinmoy Kundu, Ranjan Bose:
Joint optimal power allocation and relay location for decode-and-forward multi-hop relaying over log-normal channel. IET Commun. 9(18): 2197-2207 (2015) - [j19]Rashi Mehrotra, Ranjan Bose:
Energy-Efficient Joint Power Allocation and Relay Selection in Bit Error Rate Constrained Two-Way Relay Network. Int. J. Interdiscip. Telecommun. Netw. 7(4): 1-14 (2015) - [j18]Chinmoy Kundu, Sarbani Ghose, Ranjan Bose:
Secrecy Outage of Dual-Hop Regenerative Multi-Relay System With Relay Selection. IEEE Trans. Wirel. Commun. 14(8): 4614-4625 (2015) - [c15]Rashi Mehrotra, Ranjan Bose:
Green design for smart antenna system using iterative beamforming algorithms. ICNC 2015: 525-529 - 2014
- [j17]Abhishek Jindal, Chinmoy Kundu, Ranjan Bose:
Secrecy Outage of Dual-Hop AF Relay System With Relay Selection Without Eavesdropper's CSI. IEEE Commun. Lett. 18(10): 1759-1762 (2014) - [j16]Ranjan Bose:
An information-theoretic approach to analyzing CLEAN. IEEE Trans. Aerosp. Electron. Syst. 50(3): 1673-1679 (2014) - [j15]Raghu Raman, Krishnashree Achuthan, Prema Nedungadi, Shyam Diwakar, Ranjan Bose:
The VLAB OER Experience: Modeling Potential-Adopter Student Acceptance. IEEE Trans. Educ. 57(4): 235-241 (2014) - [j14]Chinmoy Kundu, Ranjan Bose:
Performance of a Multi-hop UWB Transmitted Reference System using Decode-and-Forward Relays. Wirel. Pers. Commun. 77(3): 1801-1814 (2014) - [c14]Rashi Mehrotra, Ranjan Bose:
An integrated framework for optimizing power consumption of Smart Antennas. NCC 2014: 1-5 - [c13]Anshu Mittal, Ranjan Bose, R. K. Shevgaonkar:
Power analysis of LTE system for uplink scenario. NCC 2014: 1-4 - [c12]Sarbani Ghose, Ranjan Bose:
Outage optimal relay selection strategy using destination-based jamming for secure communication in amplify-and-forward relay networks. SSP 2014: 404-407 - [c11]Abhishek Jindal, Chinmoy Kundu, Ranjan Bose:
Secrecy Outage of Dual-Hop Amplify-and-Forward System and Its Application to Relay Selection. VTC Spring 2014: 1-5 - 2013
- [j13]Ranjan Bose:
Virtual Labs Project: A Paradigm Shift in Internet-Based Remote Experimentation. IEEE Access 1: 718-725 (2013) - [c10]Sabyasachi Gupta, Ranjan Bose:
Joint routing and power allocation optimization in outage constrained multihop wireless networks. PIMRC 2013: 2245-2249 - [c9]Chinmoy Kundu, Ranjan Bose:
Joint Optimal Power Allocation and Relay Location for Amplify-and-Forward Multihop Relaying over Lognormal Channel. VTC Spring 2013: 1-5 - 2012
- [j12]Ranjan Bose:
Active CLEAN: A Modified CLEAN Algorithm for HRRPs of Contiguous Targets with Thinned Spectrum. IEEE Trans. Aerosp. Electron. Syst. 48(2): 930-939 (2012) - [j11]Sonali Chouhan, M. Balakrishnan, Ranjan Bose:
System-Level Design Space Exploration Methodology for Energy-Efficient Sensor Node Configurations: An Experimental Validation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 31(4): 586-596 (2012) - 2011
- [j10]Ranjan Bose:
Lean CLEAN: Deconvolution Algorithm for Radar Imaging of Contiguous Targets. IEEE Trans. Aerosp. Electron. Syst. 47(3): 2190-2199 (2011) - [j9]Venkata Vakamulla Mani, Ranjan Bose:
Direction of Arrival Estimation of Multiple UWB Signals. Wirel. Pers. Commun. 57(2): 277-289 (2011) - 2010
- [j8]Manav R. Bhatnagar, M. K. Arti, Are Hjørungnes, Ranjan Bose, Lingyang Song:
Multi-User Relaying of High-Rate Space-Time Code in Cooperative Networks. Wirel. Pers. Commun. 54(1): 69-81 (2010) - [c8]Venkata Vakamulla Mani, Ranjan Bose:
Direction of Arrival Estimation and Beamforming of Multiple Coherent UWB Signals. ICC 2010: 1-5
2000 – 2009
- 2009
- [j7]Sonali Chouhan, Ranjan Bose, M. Balakrishnan:
A Framework for Energy-Consumption-Based Design Space Exploration for Wireless Sensor Nodes. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 28(7): 1017-1024 (2009) - [j6]Sonali Chouhan, Ranjan Bose, M. Balakrishnan:
Integrated energy analysis of error correcting codes and modulation for energy efficient wireless sensor nodes. IEEE Trans. Wirel. Commun. 8(10): 5348-5355 (2009) - [c7]Sonali Chouhan, M. Balakrishnan, Ranjan Bose:
An experimental validation of system level design space exploration methodology for energy efficient sensor nodes. ISLPED 2009: 355-358 - [c6]Ninoslav Marina, Ranjan Bose, Are Hjørungnes:
Increasing the secrecy capacity by cooperation in wireless networks. PIMRC 2009: 1978-1982 - 2008
- [j5]Anshul Tyagi, Ranjan Bose:
Pulse position modulated space-time trellis coding for ultra-wideband impulse radio multiple-input multiple-output communication systems. IET Commun. 2(2): 366-371 (2008) - [j4]Anshul Tyagi, Ranjan Bose:
M-PAM space - time trellis codes for ultra-wideband multiple-input multiple-output communications. IET Commun. 2(4): 514-522 (2008) - [c5]Manav R. Bhatnagar, Are Hjørungnes, Ranjan Bose:
Precoded DDOSTBC with non-unitary constellations over correlated Rayleigh channels with carrier offsets. ISIT 2008: 1283-1287 - [c4]Sonali Chouhan, M. Balakrishnan, Ranjan Bose:
A framework for energy consumption based design space exploration for wireless sensor nodes. ISLPED 2008: 329-334 - [c3]Venkata Vakamulla Mani, Ranjan Bose:
Smart antenna design for beamforming of UWB signals in Gaussian noise. WSA 2008: 311-316 - 2007
- [j3]Anshul Tyagi, Ranjan Bose:
A New Distance Notion for PPAM Space--Time Trellis Codes for UWB MIMO Communications. IEEE Trans. Commun. 55(7): 1279-1282 (2007) - [c2]M. K. Arti, Ranjan Bose, Manav R. Bhatnagar, Are Hjørungnes:
Relay Strategies for High Rate Space-Time Code in Cooperative MIMO Networks. ISWCS 2007: 696-700 - 2006
- [j2]Ranjan Bose, Saumitr Pathak:
A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system. IEEE Trans. Circuits Syst. I Regul. Pap. 53-I(4): 848-857 (2006) - 2004
- [j1]Ranjan Bose:
Improving Capacity in LMDS Networks Using Trellis-Coded Modulation. EURASIP J. Wirel. Commun. Netw. 2004(2): 365-373 (2004) - [c1]Ranjan Bose:
Kola codes: a constructive technique for trellis codes with large dfree. ICC 2004: 782-786
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint