Z. Jin, S. Anand and K. P.
Subbalakshmi, "Robust
Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic
Spectrum Access Networks," Technical Report, 2010.
Z.
Jin, S. Anand and K. P. Subbalakshmi, ``NEAT:
A NEighbor AssisTed Spectrum Decision Protocol for Resilience against
Primary User Emulation Attacks, Technical Report 2010.
Zituo Jin, S.
Anand and K.P. Subbalakshmi, ``Mitigating
Primary User Emulation Attacks in Dynamic Spectrum Access Networks using
Hypothesis Testing",
ACM Mobile Computing and Communications Review, Special Issue on Cognitive
Radio Technologies and Systems, volume 13, number 2, pp.:
74-85,April, 2009. [bib]
Zituo Jin, S.
Anand and K.P. Subbalakshmi, ``Detecting
Primary User Emulation Attacks in Dynamic Spectrum Access Networks",
IEEE International Conference on Communications, Symposium on Selected
Areas of Communication, June 2009.
Yi Tan,
Shamik Sengupta and K.P. Subbalakshmi, ``Coordinated
Denial-of-Service Attacks in IEEE 802.22 Networks", IEEE International
Conference on Communications, 2010.Goce
Jakimoski and K.P. Subbalakshmi, ``Towards
Secure Spectrum Decision", IEEE International Conference on
Communications, Symposium on Selected Areas of Communication,
June 2009.
S.
Anand, Zituo Jin and K.P. Subbalakshmi, ``An Analytical Model for
Primary User Emulation Attacks in Cognitive Radio Networks", IEEE DySPAN,
October 2008.
Chetan Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi,
``Impact of Constraints on the Complexity of Dynamic Spectrum Assignment,
IEEE GLOBECOM - Symposium on Selected Areas of Communications,
November 2008.
Goce Jakimoski and K.P. Subbalakshmi, ``Denial-of-Service
Attacks on Dynamic Spectrum Access Networks"
IEEE CogNets Workshop, IEEE International Conference on
Communications, May 2008.
Chetan Nanjunda and K.P.
Subbalakshmi, ``Security Issues in Cognitive Networks",
Book Chapter in
Cognitive Networks:
Towards
Self-Aware Networks, Ed. Qusay H.
Mahmoud, Wiley, pp:271-292, ISBN:
978-0-470-06196-1, 2007. [bib]
Harikeshwar Kushwaha, R. Chandramouli, and K. P. Subbalakshmi,
``Erasure Tolerant Coding for Cognitive Radios", Book Chapter in Cognitive Networks: Towards Self-Aware Networks, Ed. Qusay H. Mahmoud, Wiley, Expected 2007.Yiping Xing, Harikesh Kushwaha, K.P.
Subbalakshmi and R. Chandramouli, ``Codes and Games for
Dynamic Spectrum Access'', Book Chapter in Cognitive and
Software Defined Radio, Arslan Huseyin Ed., Springer Verlag,
Expected 2007.[bib]
Yiping Xing, Chetan N. Mathur, R.
Chandramouli and K.P. Subbalakshmi, "Dynamic
Spectrum Access with QoS and Interference Temperature Constraints",
IEEE Transactions on Mobile Computing,
Vol. 6, No. 4, pp. 423-433,
April 2007.
Chetan N. Mathur and K.P. Subbalakshmi,
"Digital
Signatures for Centralized DSA Networks",
First IEEE Workshop
on Cognitive Radio Networks, Las Vegas, January 11, 2007. [invited paper]
Yiping Xing, Chetan Nanjunda Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi, “Real-Time Secondary Spectrum Sharing with QoS Provisioning”, IEEE Consumer Communications and Networking Conference 2005, Special Session on Agile Radios and Cooperative Networking for Next Generation Wireless Networks. [Best Student Paper Award Winner]
[top]
Data Hiding, Steganography, Steganalysis: [top] [By Type]
Palak Amin and K.P. Subbalakshmi, "A Robust Image Watermark Extraction Algorithm for Scaling Attacks", U.S Patent Pending.
Hafiz Malik, R. Chandramouli and K.P. Subbalakshmi, ``Steganalysis: Trends and Challenges", Book Chapter in Multimedia Forensics and Security, Ed. Chang-Tsun Li, Idea Group Publishing, ISBN: 978-1-599904-869-7,June 2008.
H. Malik, K. P. Subbalakshmi, and and R. Chandramouli, ``Nonparametric Steganalysis of QIM Data Hiding Using Approximate Entropy", Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content X, vol. 6819, San Jose, CA, USA, January 28-31, 2008.
Ning Liu, Palak Amin, Aruna Ambalavanan and K.P. Subbalakshmi, "An Overview of Digital Watermarking ", in Multimedia Security Technologies for Digital Rights Management, W. Zeng, H. Yu and C. Lin Eds., Elsevier Inc., ISBN: 0123694760, June 2006. [bib]
Ning Liu, Palak Amin and K.P. Subbalakshmi, "Security and Robustness Enhancement for Image Data Hiding", IEEE Transactions on Multimedia, Vol. 9, No. 3, pp. 466-474, April 2007.
A. Patel, M.
Shah, R. Chandramouli, K.P. Subbalakshmi, "Covert
Channel Forensics on the Internet: Issues, Approaches, and Experiences",
International Journal of Network Security,
International Journal of Network
Security,
Vol 5, no. 1, pp: 41-50, July 2007.
Hafiz Malik, K.P. Subbalakshmi and R. Chandramouli, ``Steganalysis of QIM-Based Data Hiding using Kernel Density Estimation", ACM Multimedia Security Workshop, September 2007.
Palak Amin and K.P. Subbalakshmi, ``Detecting Hidden Messages using Image Power Spectrum", IEEE International Conference on Image Processing Sept. 2007.
Ning Liu and K.P. Subbalakshmi, "Worst Case Attack on Quantization based Data Hiding", IEEE International Symposium on Multimedia, 2006.
Ning Liu and K.P. Subbalakshmi, "TCQ-based quantizer design for data hiding in images " IS&T/SPIE Electronic Imaging, Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, January 2005.
R. Chandramouli and K. P. Subbalakshmi "Active Steganalysis of Spread Spectrum Steganography'' IEEE International Symposium on Circuits and Systems, Bangkok, Thailand, Volume 3, pp 830-833, May 2003.
Wireless Security, Cryptography and Coding, cryptanalysis, joint encryption and compression: [top] [By Type]
Goce Jakimoski and K.P. Subbalakshmi, ``On Efficient Message Authentication Via Block Cipher Design Techniques", Asiacrypt, December 2007.
Goce Jakimoski and K.P. Subbalakshmi, ``Security of Compressing Encrypted Sources", Asilomar Conference on Signals and Systems, Nov. 4--7, 2007. [invited paper].
Goce Jakimoski and K.P. Subbalakshmi, ``Cryptanalysis of Some Multimedia Encryption Schemes", IEEE Transactions on Multimedia, vol 10., No 3, pp.: 330-338, April 2008.
Mohamed Haleem, Chetan N. Mathur, R. Chandramouli and K.P. Subbalakshmi , "Opportunistic Encryption: A Trade-off between Security and Throughput in Wireless Networks", IEEE Transactions on Secure and Dependable Computing, Volume 4, Issue 4, pp.:313 - 324, Oct.-Dec. 2007.
Mohamed Haleem, K.P. Subbalakshmi and R. Chandramouli, "Joint Encryption and Compression of Correlated Sources'',
EURASIP Journal on Information Security (JIS), Special Issue on The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks, Vol. 2007, Article ID 98374, 9 pages, 2007. doi:10.1155/2007/98374.[invited paper]Goce Jakimoski and K. P. Subbalakshmi, "Discrete Lyapunov Exponent and Differential Cryptanalysis", IEEE Transactions on Circuits and Systems II, pp. 499-501, June 2007. [bib]
Chetan Nanjunda Mathur and K.P. Subbalakshmi, "A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices", International Journal of Network Security, Vol.5, No.2, pp.205–212, Sept. 2007.
Chetan N. Mathur and K. P. Subbalakshmi, "Energy Efficient Wireless Encryption", IEEE GLOBECOM 2006, Symposium on Network and Information Systems Security, November 2006.
R. Chandramouli, S. Bapatla, K.P. Subbalakshmi, R.N. Uma, "Battery Power-Aware Encryption", ACM Transactions on Information Systems and Security, Volume 9, Issue 2, pp. 162-180, May 2006.
Chetan
Nanjunda Mathur, Karthik Narayan and K.P. Subbalakshmi, “High
Diffusion Codes: A Class of Maximum Distance Separable Codes for Error Resilient
Block Ciphers”, Second IEEE
International Workshop on Adaptive Wireless Networks, GLOBECOM
2005.
[top]
[By Type]
Distributed Joint Source-Channel Coding, Joint Source Channel Coding:
Kiran Sampath, R. Chandramouli and K.P. Subbalakshmi, "On Stochastic Learning in Predictive Wireless ARQ", Wiley Journal on Wireless Communications and Mobile Computing, Volume 8, Issue 7, September 2008, Pages 871 -- 883, ISSN:1530-8669.
M. A. Haleem and K. P. Subbalakshmi, "Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels", IEEE Data Compression Conference, March 27-29, 2007.
Qingyu Chen and K.P. Subbalakshmi, "Joint Source-Channel Decoder for Data Centric Network Applications", IEE Proceedings Communications, ISSN 1350-2425, vol. 153, no. 6, pp. 871-877, 2006.
Multimedia Networking: [top] [By Type]
Source coding: [top] [By Type]
K.P. Subbalakshmi, "Lossless Image Compression", in Lossless Compression Handbook, Khalid Sayood Ed., Academic Press Series in Communications, Networking, and Multimedia, 2003, ISBN 0-12-620861-1. [bib]
Siva Somasundaram and K.P. Subbalakshmi "A Novel 3D Scalable Video Compression Algorithm" IS&T/SPIE Electronic Imaging, Image and Video Communications and Processing, Santa Clara, Vol 5022, pp 966-971. January 2003.
A. Makur and K.P. Subbalakshmi, "Variable Dimension VQ Encoding and Codebook Design,"IEEE Transactions on Communications, vol 45, no 8, pp 897 - 900, August 1997. [bib]
Hafiz Malik, R.
Chandramouli and K.P. Subbalakshmi, ``Steganalysis: Trends and Challenges",
in
Multimedia Forensics and Security,
Ed.
Chang-Tsun Li, Idea Group Publishing,
Multimedia Forensics and Security, Ed. Chang-Tsun Li, Idea Group Publishing,
ISBN:
978-1-599904-869-7,June 2008.
Chetan Nanjunda and K.P.
Subbalakshmi, ``Security Issues in Cognitive Networks",
Cognitive Networks:
Towards
Self-Aware Networks, Ed. Qusay H.
Mahmoud, Wiley, pp:271-292, ISBN:
978-0-470-06196-1, 2007. [bib]
Harikeshwar Kushwaha, R. Chandramouli, and K. P. Subbalakshmi,
``Erasure Tolerant Coding for Cognitive Radios", Cognitive Networks: Towards Self-Aware Networks, Ed. Qusay H. Mahmoud, Wiley, pp:315-332, ISBN: 978-0-470-06196-1, 2007..
Yiping Xing, Harikesh Kushwaha, K.P.
Subbalakshmi and R. Chandramouli, ``Codes and Games for
Dynamic Spectrum Access'', in
Cognitive Radio, Software Defined Radio, and Adaptive
Wireless Systems, Arslan Huseyin Ed., Springer Verlag,
ISBN: 978-1-4020-
5541-6, 2007,(invited).[bib]
M.A. Haleem and K.P. Subbalakshmi, "Global
Systems for Mobile Communications", in The Handbook of Computer
Networks, Volume II, LANs, MANs, WANs, The Internet, Global, Cellular and
Wireless Networks, John Wiley and Sons Inc., In Progress.[bib]
Ning Liu, Palak Amin, Aruna Ambalavanan and K.P. Subbalakshmi, "An
Overview of Digital Watermarking ", in
Multimedia Security Technologies
for Digital Rights
Management, W. Zeng, H. Yu and C. Lin Eds., Elsevier Inc.,
ISBN: 0123694760, June 2006.
[bib]
K.P. Subbalakshmi, "Lossless Image Compression", in Lossless Compression Handbook, Khalid Sayood Ed., Academic Press Series in Communications, Networking, and Multimedia, 2003, ISBN 0-12-620861-1. [bib]
Zituo Jin, S.
Anand and K.P. Subbalakshmi, ``Mitigating
Primary User Emulation Attacks in Dynamic Spectrum Access Networks using
Hypothesis Testing",
ACM Mobile Computing and Communications Review, Special Issue on Cognitive
Radio Technologies and Systems, To Appear.
Goce Jakimoski and K.P. Subbalakshmi, ``Cryptanalysis
of Some Multimedia Encryption Schemes", IEEE Transactions on
Multimedia, vol 10., No 3, pp.: 330-338, April 2008.
Mohamed Haleem, Chetan N. Mathur, R. Chandramouli and K.P.
Subbalakshmi , "Opportunistic
Encryption: A Trade-off between Security and Throughput in Wireless
Networks",
IEEE Transactions on Secure and Dependable Computing,
pp. 313 - 324, Volume 4,
Issue 4, Oct.-Dec.
2007.
Mohamed Haleem, K.P. Subbalakshmi and R. Chandramouli, "Joint Encryption and Compression of Correlated Sources'',
EURASIP Journal on Information Security (JIS), Special Issue on The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks, Vol. 2007, Article ID 98374, 9 pages, 2007. doi:10.1155/2007/98374 [invited paper].Yi Tan, Shamik Sengupta and K.P. Subbalakshmi, ``Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks", IEEE International Conference on Communications, 2010.
Zituo Jin, S. Anand and K.P. Subbalakshmi, ``Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks", IEEE International Conference on Communications, Symposium on Selected Areas of Communication, June 2009.
Goce Jakimoski and K.P. Subbalakshmi, ``Towards Secure Spectrum Decision", IEEE International Conference on Communications, Symposium on Selected Areas of Communication, June 2009.
S. Anand, Zituo Jin and K.P. Subbalakshmi, ``An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks", IEEE DySPAN, October 2008.
Chetan Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi, ``Impact of Constraints on the Complexity of Dynamic Spectrum Assignment", IEEE GLOBECOM - Symposium on Selected Areas of Communications, 2008.
Goce Jakimoski and K.P. Subbalakshmi, ``Denial-of-Service Attacks on Dynamic Spectrum Access Networks" IEEE CogNets Workshop, IEEE International Conference on Communications, May 2008.
H. Malik, K. P. Subbalakshmi, and and R. Chandramouli, ``Nonparametric Steganalysis of QIM Data Hiding Using Approximate Entropy", Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content X, vol. 6819, San Jose, CA, USA, January 28-31, 2008.
Goce Jakimoski and K.P. Subbalakshmi, ``On Efficient Message Authentication Via Block Cipher Design Techniques", Asiacrypt, December 2007.
Hafiz Malik, K.P. Subbalakshmi and R. Chandramouli, ``Steganalysis of QIM-Based Data Hiding using Kernel Density Estimation", ACM Multimedia Security Workshop, September 2007.
Goce Jakimoski and K.P. Subbalakshmi, ``Security of Compressing Encrypted Sources", Asilomar Conference on Signals and Systems, Nov. 4--7, 2007. [invited paper]
Palak Amin and K.P. Subbalakshmi, ``Detecting Hidden Messages using Image Power Spectrum", IEEE International Conference on Image Processing Sept. 2007.
M. A. Haleem and K. P. Subbalakshmi, "Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels", IEEE Data Compression Conference, March 27-29, 2007.
Chetan N. Mathur and K.P. Subbalakshmi, "Digital Signatures for Centralized DSA Networks", First IEEE Workshop on Cognitive Radio Networks, Las Vegas, January 11, 2007. [invited paper]
Ning Liu and K.P. Subbalakshmi, "Worst Case Attack on Quantization based Data Hiding", IEEE International Symposium on Multimedia, 2006.
Chetan N. Mathur and K. P. Subbalakshmi, "Energy Efficient Wireless Encryption", IEEE GLOBECOM 2006, Symposium on Network and Information Systems Security, November 2006.
theses supervised [top] [By Area]
R. Chandramouli, Ananthram Swami, John Chapin and K. P. Subbalakshmi,
K.P. Subbalakshmi, "
R. Chandramouli and K.P. Subbalakshmi, "Wireless LAN: Issues and Challenges", in Ticker, Wall Street Technology Association Magazine, 2001.
@ARTICLE{JinAnaSub09-MC2R,
author={Z. Jin and S. Anand and K. P. Subbalakshmi},
title={Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access
Networks using Hypothesis Testing},
journal={ACM SIGMOBILE Mobile Computing and
Communications Review (MC2R), Special Issue on Cognitive Radio Technologies and
Systems},
volume={13},
number={2},
pages={74-85},
year={2009},
month={April}
}
@INBOOK{CogNetSec-07,
AUTHOR = {Chetan Nanjunda and K.P. Subbalakshmi},
editor = {Qusay H. Mahmoud},
TITLE = {Cognitive Networks: Towards Self-Aware Networks},
CHAPTER = {Security Issues in Cognitive Networks},
PUBLISHER = {Wiley},
YEAR = {2007}
}[top]
@INBOOK{CogNetCodes-07,
AUTHOR = {Harikeshwar Kushwaha and R. Chandramouli, and K. P. Subbalakshmi},
editor = {Qusay H. Mahmoud},
TITLE = {Cognitive Networks: Towards Self-Aware Networks},
CHAPTER = {Erasure Tolerant Coding for Cognitive Radios},
PUBLISHER = {Wiley},
YEAR = {2007}
}[top]
@INBOOK{DySpAcCodes-07,
AUTHOR = {Yiping Xing, Harikeshwar Kushwaha and R. Chandramouli and K. P.
Subbalakshmi},
editor = {Arslan Huseyin},
TITLE = {Cognitive and Software Defined Radio},
CHAPTER = {Codes and Games for Dynamic Spectrum Access},
PUBLISHER = {Springer Verlag},
YEAR = {2007}
}[top]
@INBOOK{GSM,
AUTHOR = {M.A. Haleem and K.P. Subbalakshmi},
editor = {Arslan Huseyin},
TITLE = {The Handbook of Computer Networks,Volume II, {LANs, MANs, WANs,} The
Internet, Global, Cellular and Wireless Networks},
CHAPTER = {Global Systems for Mobile Communications},
PUBLISHER = {John Wiley and Sons}
}[top]
@INBOOK{DRM-06,
AUTHOR = {Ning Liu and Palak Amin and Aruna Ambalavanan and K.P. Subbalakshmi},
editor = {W. Zeng and H. Yu and C. Lin},
TITLE = {Multimedia Security Technologies for Digital Rights Management},
CHAPTER = {An Overview of Digital Watermarking},
PUBLISHER = {Elsevier Inc.},
Year = {2006},
Month = {June},
Number = {ISBN: 0123694760}
}[top]
@INBOOK{kps-lossless-03,
AUTHOR = {K.P. Subbalakshmi},
editor = {Khalid Sayood},
TITLE = {Lossless Compression Handbook},
CHAPTER = {Lossless Image Compression},
PUBLISHER = {Academic Press},
series = {Communications, Networking, and Multimedia},
Year = {2003},
Number = {ISBN 0-12-620861-1}
}[top]
@ARTICLE{JakSub, AUTHOR = {G. Jakimoski and K. Subbalakshmi}, TITLE = {Discrete Lyapunov Exponent and Differential Cryptanalysis}, JOURNAL = {IEEE Transactions on Circuits and Systems II} }[top]
@ARTICLE{MakSub97, AUTHOR = {A. Makur and K. Subbalakshmi}, TITLE = {Variable Dimension Vector Quantization}, JOURNAL = {IEEE Transactions on Communications}, YEAR = {1997}, volume = {45}, pages = {897-899}, month = {August} }[top]