Seguir
Devu Manikantan Shila
Devu Manikantan Shila
Founder & CEO @ Unknot.id
Dirección de correo verificada de unknot.id - Página principal
Título
Citado por
Citado por
Año
Load aware traffic engineering for mesh networks
DM Shila, T Anjali
Computer Communications 31 (7), 1460-1469, 2008
2612008
Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks
X Cao, DM Shila, Y Cheng, Z Yang, Y Zhou, J Chen
IEEE Internet of Things Journal 3 (5), 816-829, 2016
1632016
Secure key establishment for device-to-device communications
W Shen, W Hong, X Cao, B Yin, DM Shila, Y Cheng
2014 IEEE Global Communications Conference, 336-340, 2014
912014
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
DM Shila, Y Cheng, T Anjali
IEEE transactions on wireless communications 9 (5), 1661-1675, 2010
902010
AMCloud: Toward a secure autonomic mobile ad hoc cloud computing system
DM Shila, W Shen, Y Cheng, X Tian, XS Shen
IEEE Wireless Communications 24 (2), 74-81, 2016
752016
Advancing the state-of-the-art in hardware trojans detection
SK Haider, C Jin, M Ahmad, DM Shila, O Khan, M van Dijk
IEEE Transactions on Dependable and Secure Computing 16 (1), 18-32, 2017
692017
Defending selective forwarding attacks in WMNs
DM Shila, T Anjali
2008 IEEE International Conference on Electro/Information Technology, 96-101, 2008
652008
Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks
DM Shila, Y Cheng, T Anjali
2011 Proceedings IEEE INFOCOM, 1476-1484, 2011
512011
Design, implementation and security analysis of hardware Trojan threats in FPGA
DM Shila, V Venugopal
2014 IEEE International Conference on Communications (ICC), 719-724, 2014
422014
A game theoretic approach to gray hole attacks in wireless mesh networks
DM Shila, T Anjali
MILCOM 2008-2008 IEEE Military Communications Conference, 1-7, 2008
312008
High throughput implementations of cryptography algorithms on GPU and FPGA
V Venugopal, DM Shila
2013 IEEE International Instrumentation and Measurement Technology …, 2013
302013
Channel-aware detection of gray hole attacks in wireless mesh networks
DM Shila, Y Cheng, T Anjali
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
282009
Moving target defense for Internet of Things using context aware code partitioning and code diversification
K Mahmood, DM Shila
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 329-330, 2016
262016
A systematic study of maximal scheduling algorithms in multiradio multichannel wireless networks
Y Cheng, H Li, DM Shila, X Cao
IEEE/ACM Transactions on Networking 23 (4), 1342-1355, 2014
262014
Detecting data integrity attacks on correlated solar farms using multi-layer data driven algorithm
KG Lore, DM Shila, L Ren
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
252018
A multi-faceted approach to user authentication for mobile devices—using human movement, usage, and location patterns
DM Shila, K Srivastava, P O'Neill, K Reddy, V Sritapan
2016 IEEE symposium on Technologies for Homeland Security (HST), 1-6, 2016
232016
Ad hoc wireless networks meet the infrastructure: Mobility, capacity and delay
DM Shila, Y Cheng
2012 Proceedings IEEE INFOCOM, 3031-3035, 2012
232012
A systematic study of the delayed column generation method for optimizing wireless networks
Y Cheng, X Cao, X Shen, DM Shila, H Li
Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014
222014
Ctin: Robust contextual transformer network for inertial navigation
B Rao, E Kazemi, Y Ding, DM Shila, FM Tucker, L Wang
Proceedings of the AAAI Conference on Artificial Intelligence 36 (5), 5413-5421, 2022
212022
Adversarial gait detection on mobile devices using recurrent neural networks
DM Shila, E Eyisi
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
192018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20