Radha Poovendran
#153,288
Most Influential Person Now
Professor of Electrical engineering
Radha Poovendran's AcademicInfluence.com Rankings
Radha Poovendranengineering Degrees
Engineering
#6285
World Rank
#7602
Historical Rank
Electrical Engineering
#1848
World Rank
#1950
Historical Rank
Download Badge
Engineering
Radha Poovendran's Degrees
- PhD Electrical Engineering University of Maryland, College Park
- Masters Electrical Engineering University of Maryland, College Park
Why Is Radha Poovendran Influential?
(Suggest an Edit or Addition)According to Wikipedia, Radha Poovendran is a Professor of electrical engineering at the University of Washington in Seattle, where he is Chair of the Department of Electrical & Computer Engineering, and founding director of the Network Security Lab. He was named a Fellow of the Institute of Electrical and Electronics Engineers in 2015 for his contributions to security in cyber-physical systems.
Radha Poovendran's Published Works
Published Works
- SeRLoc: secure range-independent localization for wireless sensor networks (2004) (528)
- CARAVAN: Providing Location Privacy for VANET (2005) (458)
- AMOEBA: Robust Location Privacy Scheme for VANET (2007) (413)
- Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks (2007) (309)
- ROPE: robust position estimation in wireless sensor networks (2005) (306)
- SeRLoc: Robust localization for wireless sensor networks (2005) (292)
- A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks (2007) (273)
- Deceiving Google's Perspective API Built for Detecting Toxic Comments (2017) (237)
- HiRLoc: high-resolution robust localization for wireless sensor networks (2006) (223)
- Swing & swap: user-centric approaches towards maximizing location privacy (2006) (195)
- Maximizing static network lifetime of wireless broadcast ad hoc networks (2003) (193)
- Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach (2005) (181)
- Stochastic coverage in heterogeneous sensor networks (2006) (176)
- Cyber-Physical Systems: Close Encounters Between Two Parallel Worlds [Point of View] (2010) (175)
- Aviation Cyber–Physical Systems: Foundations for Future Aircraft and Air Transport (2013) (148)
- Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks (2010) (148)
- Semantic Adversarial Examples (2018) (135)
- Mitigation of Control Channel Jamming under Node Capture Attacks (2009) (135)
- Energy-aware secure multicast communication in ad-hoc networks using geographic location information (2003) (118)
- A Supermodular Optimization Framework for Leader Selection Under Link Noise in Linear Multi-Agent Systems (2012) (117)
- The AES-CMAC Algorithm (2006) (113)
- A framework and taxonomy for comparison of electronic voting schemes (2006) (110)
- Human activity recognition for video surveillance (2008) (110)
- Future E-Enabled Aircraft Communications and Security: The Next 20 Years and Beyond (2011) (109)
- Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks (2007) (105)
- An energy framework for the network simulator 3 (NS-3) (2011) (102)
- Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks (2006) (102)
- FakeBook: Detecting Fake Profiles in On-Line Social Networks (2012) (97)
- Google's Cloud Vision API is Not Robust to Noise (2017) (97)
- Maximizing Network Lifetime of Broadcasting Over Wireless Stationary Ad Hoc Networks (2005) (92)
- Probabilistic Detection of Mobile Targets in Heterogeneous Sensor Networks (2007) (91)
- Blocking Transferability of Adversarial Examples in Black-Box Learning Systems (2017) (89)
- On the Limitation of Convolutional Neural Networks in Recognizing Negative Images (2017) (88)
- Node capture attacks in wireless sensor networks: A system theoretic approach (2010) (87)
- A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems (2013) (85)
- Key management and distribution for secure multimedia multicast (2003) (83)
- LineSwitch: Tackling Control Plane Saturation Attacks in Software-Defined Networking (2017) (82)
- A Survey on Mix Networks and Their Secure Applications (2006) (82)
- Toward a Statistical Framework for Source Anonymity in Sensor Networks (2013) (82)
- Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification (2010) (80)
- An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes (2001) (80)
- Minimizing Convergence Error in Multi-Agent Systems Via Leader Selection: A Supermodular Optimization Approach (2013) (73)
- Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution (2007) (71)
- Modeling node capture attacks in wireless sensor networks (2008) (71)
- Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection (2011) (70)
- Protecting patient privacy against unauthorized release of medical images in a group communication environment. (2005) (70)
- Key distribution for secure multimedia multicasts via data embedding (2001) (69)
- Special Issue on Cyber-Physical Systems [Scanning the Issue] (2012) (68)
- Activity Recognition Using a Combination of Category Components and Local Models for Video Surveillance (2008) (67)
- Secure Operation, Control, and Maintenance of Future E-Enabled Airplanes (2008) (64)
- Linear programming models for jamming attacks on network traffic flows (2008) (64)
- Group Event Detection With a Varying Number of Group Members for Video Surveillance (2010) (63)
- Modeling adaptive node capture attacks in multi-hop wireless networks (2007) (60)
- A key management scheme in distributed sensor networks using attack probabilities (2005) (59)
- Cloaking the Clock: Emulating Clock Skew in Controller Area Networks (2017) (58)
- LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks (2015) (57)
- Design of secure multicast key management schemes with communication budget constraint (2002) (56)
- On leader selection for performance and controllability in multi-agent systems (2012) (55)
- Statistical Framework for Source Anonymity in Sensor Networks (2010) (54)
- Analytic evaluation of target detection in heterogeneous wireless sensor networks (2009) (52)
- Submodularity in Dynamics and Control of Networked Systems (2016) (50)
- A submodular optimization framework for leader selection in linear multi-agent systems (2011) (49)
- A coding-theoretic approach for efficient message verification over insecure channels (2009) (48)
- Information Theoretically Secure Encryption with Almost Free Authentication (2009) (47)
- On the lifetime extension of energy-efficient multihop broadcast networks (2002) (46)
- Deceptive routing games (2012) (44)
- Privacy versus scalability in radio frequency identification systems (2010) (42)
- Electronic Distribution of Airplane Software and the Impact of Information Security on Airplane Safety (2007) (42)
- Effectiveness of IP address randomization in decoy-based moving target defense (2013) (40)
- Impact of Public Key Enabled Applications on the Operation and Maintenance of Commercial Airplanes (2007) (40)
- Passive Attacks on a Class of Authentication Protocols for RFID (2007) (39)
- Coverage In Heterogeneous Sensor Networks (2006) (39)
- Secure Broadcast in Energy-Aware Wireless Sensor Networks (2002) (39)
- Securing low-cost RFID systems: An unconditionally secure approach (2011) (39)
- Cross-layer design for energy-efficient secure multicast communications in ad hoc networks (2004) (38)
- Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks (2018) (38)
- Evaluating the Vulnerability of Network Traffic Using Joint Security and Routing Analysis (2009) (38)
- Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis (2008) (37)
- The power of primes: security of authentication based on a universal hash-function family (2010) (37)
- A novel power-efficient broadcast routing algorithm exploiting broadcast efficiency (2003) (37)
- TACAN: transmitter authentication through covert channels in controller area networks (2019) (36)
- Visualization & assessment of ADS-B security for green ATM (2010) (36)
- Deceptive Routing in Relay Networks (2012) (35)
- Secure wireless collection and distribution of commercial airplane health data (2007) (35)
- Efficient Authentication for Mobile and Pervasive Computing (2010) (35)
- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes (1999) (34)
- Minimizing Energy Consumption in Body Sensor Networks via Convex Optimization (2010) (33)
- Submodularity in Input Node Selection for Networked Linear Systems: Efficient Algorithms for Performance and Controllability (2017) (33)
- Detecting ADS-B Spoofing Attacks Using Deep Neural Networks (2019) (33)
- Security and privacy of future aircraft wireless communications with offboard systems (2011) (33)
- Distributed clone detection in wireless sensor networks: An optimization approach (2011) (31)
- GeM-REM: Generative Model-Driven Resource Efficient ECG Monitoring in Body Sensor Networks (2011) (31)
- No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices (2016) (31)
- Cyber-physical integration in future aviation information systems (2012) (31)
- Power proximity based key management for secure multicast in ad hoc networks (2007) (31)
- Maximizing Influence in Competitive Environments: A Game-Theoretic Approach (2011) (31)
- Iterated local optimization for minimum energy broadcast (2005) (30)
- A canonical seed assignment model for key predistribution in wireless sensor networks (2007) (29)
- An impact-aware defense against Stuxnet (2013) (28)
- A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense (2015) (28)
- Power-Efficient Broadcast Routing in Adhoc Networks Using Directional Antennas : Technology Dependence and Convergence Issues (2003) (28)
- Deployment and exploitation of deceptive honeybots in social networks (2012) (27)
- On the Deployment of Heterogeneous Sensor Networks for Detection of Mobile Targets (2007) (26)
- A Framework for Securing Future e-Enabled Aircraft Navigation and Surveillance (2009) (26)
- Incentivizing crowdsourcing for radio environment mapping with statistical interpolation (2015) (25)
- Decision and Game Theory for Security (2018) (25)
- Leader selection in multi-agent systems for smooth convergence via fast mixing (2012) (25)
- Cyber-physical system framework for future aircraft and air traffic control (2012) (25)
- Minimizing center key storage in hybrid one-way function based group key management with communication constraints (2005) (23)
- Evaluation of body sensor network platforms: a design space and benchmarking analysis (2010) (23)
- Cyber Physical Security Solutions for Pervasive Health Monitoring Systems (2012) (23)
- Tracing Medical Images Using Multi-Band Watermarks (2004) (23)
- Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API (2017) (22)
- Assessing Shape Bias Property of Convolutional Neural Networks (2018) (22)
- The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE) (2006) (21)
- Broadcast with heterogeneous node capability [wireless ad hoc or sensor networks] (2004) (21)
- On Source Anonymity in Wireless Sensor Networks (2010) (20)
- Challenges for IT Infrastructure Supporting Secure Network-Enabled Commercial Airplane Operations (2007) (20)
- Efficient Generic Forward-Secure Signatures and Proxy Signatures (2008) (19)
- Leader selection for minimizing convergence error in leader-follower systems: A supermodular optimization approach (2012) (19)
- DIFT Games: Dynamic Information Flow Tracking Games for Advanced Persistent Threats (2018) (19)
- Privacy of future air traffic management broadcasts (2009) (19)
- A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats (2018) (19)
- Input Selection for Performance and Controllability of Structured Linear Descriptor Systems (2014) (18)
- Submodular Optimization for Voltage Control (2018) (18)
- Deceiving Google’s Cloud Video Intelligence API Built for Summarizing Videos (2017) (17)
- E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels (2014) (17)
- Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters (2016) (17)
- Resource-efficient and reliable long term wireless monitoring of the photoplethysmographic signal (2011) (17)
- Pricing Mechanisms for Crowd-Sensed Spatial-Statistics-Based Radio Mapping (2016) (16)
- A Scalable Extension of Group Key Management Protocol (1998) (16)
- FRESH: Interactive Reward Shaping in High-Dimensional State Spaces using Human Feedback (2020) (16)
- Broadcast with Heterogeneous Node Capability (2004) (16)
- Energy and Bandwidth-Efficient Key Distribution in Wireless Ad Hoc Networks: A Cross-Layer Approach (2007) (16)
- Controlled Islanding via Weak Submodularity (2018) (15)
- Security of Future eEnabled Aircraft Ad hoc Networks (2008) (15)
- Detection of mobile targets on the plane and in space using heterogeneous sensor networks (2009) (15)
- Are Odds Really Odd? Bypassing Statistical Detection of Adversarial Examples (2019) (15)
- A Game-Theoretic Framework for Jamming Attacks and Mitigation in Commercial Aircraft Wireless Networks (2009) (15)
- Maximizing the Smallest Eigenvalue of a Symmetric Matrix: A Submodular Optimization Approach (2017) (15)
- Assessment and mitigation of cyber exploits in future aircraft surveillance (2010) (15)
- A comparison of power-efficient broadcast routing algorithms (2003) (15)
- Throughput optimization for multipath unicast routing under probabilistic jamming (2008) (14)
- A passivity-based framework for composing attacks on networked control systems (2012) (14)
- Group event detection for video surveillance (2009) (14)
- A convex optimization approach for clone detection in wireless sensor networks (2013) (14)
- Dropping Pixels for Adversarial Robustness (2019) (13)
- Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach (2016) (13)
- Towards Scalable Voltage Control in Smart Grid: A Submodular Optimization Approach (2016) (13)
- Exploring Attack Surfaces of Voltage-Based Intrusion Detection Systems in Controller Area Networks (2018) (13)
- Design of Cost-effective Wearable Sensors with integrated Health Monitoring System (2020) (13)
- Multi-stage Dynamic Information Flow Tracking Game (2018) (13)
- Deep Neural Networks Do Not Recognize Negative Images (2017) (12)
- The AES-CMAC-96 Algorithm and Its Use with IPsec (2006) (12)
- Dynamic key distribution scheme using data embedding for secure multimedia multicast (2001) (12)
- SECURE NETWORK-ENABLED COMMERCIAL AIRPLANE OPERATIONS : IT SUPPORT INFRASTRUCTURE CHALLENGES (2007) (12)
- Key management for secure multicast communications (1999) (12)
- Quantifying the Impact of Efficient Cross-Layer Jamming Attacks via Network Traffic Flows (12)
- Scalable and distributed submodular maximization with matroid constraints (2015) (12)
- Secure wireless collection and distribution of commercial airplane health data (2009) (11)
- Minimal input selection for robust control (2017) (11)
- Truck platoon security: State-of-the-art and road ahead (2020) (11)
- A Framework to Securing RFID Transmissions by Varying Transmitted Reader's Power (2013) (11)
- A submodular optimization approach to leader-follower consensus in networks with negative edges (2017) (11)
- A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching (2019) (10)
- Design issues on broadcast routing algorithms using realistic cost-effective smart antenna models (2004) (10)
- A Submodular Optimization Approach to Controlled Islanding under Cascading Failure (2017) (10)
- Securing Wireless Sensor Networks (2009) (9)
- LIDAR: a layered intrusion detection and remediationframework for smartphones (2013) (9)
- On the Authentication of RFID Systems with Bitwise Operations (2008) (9)
- Flight privacy in the NextGen: Challenges and opportunities (2013) (9)
- Joint leader and link weight selection for fast convergence in multi-agent systems (2013) (9)
- MinGen: Minimal generator set selection for small signal stability in power systems: A submodular framework (2016) (9)
- Security Assurance for IT Infrastructure Supporting Airplane Production, Maintenance, and Operation (2006) (9)
- $\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels (2010) (9)
- VP3: using vertex path and power proximity for energy efficient key distribution (2004) (9)
- Secure Control under Partial Observability with Temporal Logic Constraints (2019) (8)
- On Lifetime Extension and Route Stabilization of Energy-Efficient Broadcast Routing over MANET (2002) (8)
- Spatial-Temporal Access Control for E-health Services (2010) (8)
- Probabilistic Analysis of Covering and Compromise in Node Capture Attacks (2010) (8)
- A distributed shared key generation procedure using fractional keys (1998) (8)
- Combinatorial Algorithms for Control of Biological Regulatory Networks (2017) (8)
- Public key based authentication for secure integration of sensor data and RFID (2008) (8)
- Guest Editorial Security in Wireless Ad Hoc Networks (2006) (8)
- A Game Theoretical Framework for Inter-process Adversarial Intervention Detection (2018) (8)
- Modeling and Designing Network Defense against Control Channel Jamming Attacks: A Passivity-Based Approach (2013) (8)
- Toward Synchronization in Networks With Nonlinear Dynamics: A Submodular Optimization Framework (2017) (8)
- Detecting LTE-U duty cycling misbehavior for fair sharing with Wi-Fi in shared bands (2017) (7)
- COBRA: center-oriented broadcast routing algorithms for wireless ad hoc networks (2004) (7)
- A Metric for Quantifying Key Exposure Vulnerability in Wireless Sensor Networks (2010) (7)
- High Assurance Aerospace CPS & Implications for the Automotive Industry (2008) (7)
- A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks (2005) (7)
- SECURITY OF WIRELESS SENSOR NETWORK ENABLED HEALTH MONITORING FOR FUTURE AIRPLANES (2008) (7)
- Verifiable and privacy-preserving fine-grained data-collection for smart metering (2015) (6)
- Modeling and Mitigating the Coremelt Attack (2018) (6)
- A host takeover game model for competing malware (2015) (6)
- Minimal Input and Output Selection for Stability of Systems With Uncertainties (2019) (6)
- Pricing Mechanism for Quality-Based Radio Mapping via Crowdsourcing (2016) (6)
- Enabling Distributed Addition of Secure Access to Patient's Records in A Tele-Referring Group (2005) (5)
- Distributed online submodular maximization in resource-constrained networks (2014) (5)
- Privacy-Preserving Resilience of Cyber-Physical Systems to Adversaries (2020) (5)
- An area‐efficient low‐power SCM topology for high performance network‐on Chip (NoC) architecture using an optimized routing design (2018) (5)
- Adaptive learning in two-player Stackelberg games with continuous action sets (2019) (5)
- An Area-Efficient FPGA Implementation of Network-on-Chip (NoC) Router Architecture for Optimized Multicore-SoC Communication (2018) (5)
- MULTI-DOMAIN RFID ACCESS CONTROL USING ASYMMETRIC KEY BASED TAG-READER MUTUAL AUTHENTICATION (2008) (5)
- EVExchange: A Relay Attack on Electric Vehicle Charging System (2022) (5)
- Potential-Based Advice for Stochastic Policy Learning * (2019) (5)
- Design and analysis of a mesh-based Adaptive Wireless Network-on Chips Architecture With Irregular Network Routing (2019) (4)
- Leader selection games under link noise injection attacks (2012) (4)
- Passivity framework for composition and mitigation of multi-virus propagation in networked systems (2015) (4)
- Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach (2020) (4)
- Enhancing ADS-B for Future UAV Operations (2012) (4)
- Global Practical Node and Edge Synchronization in Kuramoto Networks: A Submodular Optimization Framework (2014) (4)
- A Multi-Agent Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Advanced Persistent Threats (2020) (4)
- Certificate-Based Trust Establishment in eEnabled Airplane Applications: Challenges and Approaches (2010) (4)
- Verifying Safety for Resilient Cyber-Physical Systems via Reactive Software Restart (2022) (4)
- Broadcast Enforced Threshold Schemes with Disenrollment (2003) (4)
- Linear Temporal Logic Satisfaction in Adversarial Environments Using Secure Control Barrier Certificates (2019) (4)
- Disenrollment with perfect forward secrecy in threshold schemes (2006) (4)
- Unconditionally Secure Authenticated Encryption with Shorter Keys (2009) (3)
- Shaping Advice in Deep Multi-Agent Reinforcement Learning (2021) (3)
- Pedestrian detection and tracking through hierarchical clustering (2014) (3)
- Learning Equilibria in Stochastic Information Flow Tracking Games with Partial Knowledge (2019) (3)
- Towards Trustworthy Cryptographic Protection of Airplane Information Assets (2009) (3)
- Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning (2022) (3)
- Dynamic Information Flow Tracking Games for Simultaneous Detection of Multiple Attackers (2019) (3)
- Agent-Temporal Attention for Reward Redistribution in Episodic Multi-Agent Reinforcement Learning (2022) (3)
- Control Synthesis for Cyber-Physical Systems to Satisfy Metric Interval Temporal Logic Objectives under Timing and Actuator Attacks* (2020) (3)
- Joint Performance and Controllability of Networked Systems (2016) (3)
- Passivity-Based Distributed Strategies for Stochastic Stackelberg Security Games (2015) (3)
- A General Probabilistic Model for Improving Key Assignment in Wireless Networks (2006) (3)
- Distributed adaptive patching strategies against malware propagation: A passivity approach (2016) (3)
- A decision-process analysis of implicit coscheduling (2000) (3)
- Stochastic Dynamic Information Flow Tracking Game with Reinforcement Learning (2019) (3)
- Input selection for disturbance rejection in networked cyber-physical systems (2015) (3)
- Architectural exploration of heterogeneous NoC with fault tolerant capacity (2020) (3)
- Mitigating Vulnerabilities of Voltage-based Intrusion Detection Systems in Controller Area Networks (2019) (3)
- Learning Temporal Dependence from Time-Series Data with Latent Variables (2016) (3)
- Tradeoffs between jamming resilience and communication efficiency in key establishment (2009) (3)
- Secure Control in Partially Observable Environments to Satisfy LTL Specifications (2020) (3)
- Optimized flow allocation for anonymous communication in multipath wireless networks (2012) (3)
- Privacy of general aviation aircraft in the NextGen (2012) (3)
- Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach (2020) (3)
- Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems (2014) (3)
- Using Social Information for Flow Allocation in MANETs (2013) (3)
- TACAN (2019) (2)
- A joint performance-vulnerability metric framework for designing ad hoc routing protocols (2010) (2)
- Reinforcement Learning Beyond Expectation (2021) (2)
- Adaptive Learning in Two-Player Stackelberg Games with Application to Network Security (2021) (2)
- Outsourcing Graph Databases with Label-Constrain Query Verification (2015) (2)
- Secure wireless networking (2009) (2)
- On the Structure and Computation of Random Walk Times in Finite Graphs (2017) (2)
- Decision and Game Theory for Security (2014) (2)
- Enhancing Location Privacy of Future Aircraft Wireless Communications (2010) (2)
- Scalable power-efficient broadcast over densely deployed wireless ad hoc networks (2005) (2)
- A Note on Threshold Schemes with Disenrollment (2003) (2)
- Emerging Wireless Technologies and the Future Mobile Internet: Opening Up the Last Frontiers for Securing the Future Wireless Internet (2011) (2)
- An Low-Power Area-Efficient Routing Analysis and Optimization for a Fat Tree-Based Optical Network-on-Chip (ONoC) Architectures (2018) (2)
- Security in cognitive radio networks [Guest Editorial] (2013) (2)
- A Submodular Optimization Approach to Stable and Minimally Disruptive Controlled Islanding in Power Systems (2022) (2)
- Multipath flow allocation in anonymous wireless networks with dependent sources (2012) (2)
- Graph-based verification and misbehavior detection in multi-agent networks (2014) (2)
- Scalable Planning in Multi-Agent MDPs (2021) (2)
- Secure Localization for Wireless Sensor Networks using Range-Independent Methods (2007) (2)
- Stochastic Dynamic Information Flow Tracking Game using Supervised Learning for Detecting Advanced Persistent Threats (2020) (2)
- An information theoretic approach to secure multicast key management (1999) (2)
- Optimized relay-route assignment for anonymity in wireless networks (2013) (2)
- Dynamic Defense against Adaptive and Persistent Adversaries (2018) (1)
- Submodular Input Selection for Synchronization in Kuramoto Networks (2020) (1)
- A Convex Optimization Approach for Addressing Storage-CommunicationTradeoffs in Multicast Encryption (1999) (1)
- An Analytical Framework for Control Synthesis of Cyber-Physical Systems with Safety Guarantee (2022) (1)
- Privacy-Preserving Reinforcement Learning Beyond Expectation (2022) (1)
- HIGH-ASSURANCE SDR-BASED AVIONICS RFID SYSTEM (2007) (1)
- Safety and Security for Intelligent Infrastructure (2017) (1)
- Jamming-based adversarial control of network flow allocation: A passivity approach (2015) (1)
- Covert Channel-Based Transmitter Authentication in Controller Area Networks (2019) (1)
- Privacy enhanced group communication in clinical environment (2005) (1)
- Energy-efficient long term physiological monitoring (2011) (1)
- A Compositional Approach to Safety-Critical Resilient Control for Systems with Coupled Dynamics (2022) (1)
- Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008 (2008) (1)
- On Chip Implementation of Packet Switched Network (2014) (1)
- Safety-Critical Online Control with Adversarial Disturbances (2020) (1)
- Introduction to the Issue on Signal and Information Processing for Privacy (2015) (1)
- Towards authenticated and private computer and wireless communications (2011) (1)
- A Hybrid Submodular Optimization Approach to Controlled Islanding with Heterogeneous Loads (2022) (1)
- Submodularity in Input Node Selection for Networked Systems (2016) (1)
- A Game-Theoretic Framework for Controlled Islanding in the Presence of Adversaries (2021) (1)
- Session details: Wireless monitoring and denial of service (2004) (0)
- Design An Energy-Efficient Wireless Routers With Dbm Noc Architecture To Minimize The Communication Latency (2019) (0)
- Adversary Models in Wireless Networks: Research Challenges (2007) (0)
- A Reinforcement Learning Approach for Dynamic Information Flow Tracking Games for Detecting Advanced Persistent Threats (2020) (0)
- Vulnerability Analysis and Performance Enhancement of Authentication Protocol in Dynamic Wireless Power Transfer Systems (2022) (0)
- Passivity framework for modeling, mitigating, and composing attacks on networked systems (2014) (0)
- A private scheme for distributed, shared secret generation (1999) (0)
- A Timing-Based Framework for Designing Resilient Cyber-Physical Systems under Safety Constraint (2022) (0)
- A Compositional Resilience Index for Computationally Efficient Safety Analysis of Interconnected Systems (2023) (0)
- Control Input Selection for Synchronization in Kuramoto Networks (2020) (0)
- Interdiction Games for Advanced Persistent Threats using Dynamic Information Flow Tracking (2019) (0)
- Versatile Cybersecurity (2018) (0)
- A Hierarchical Standard Cell Placement Method Based On a New Cluster Placement Model (2014) (0)
- On a Recent Problem of Communication-Storage Tradeoffs for Secure Multicast for Large Networks (1999) (0)
- Identity-Based Authentication for On-Demand Charging of Electric Vehicles (2022) (0)
- Background on Control of Networked Systems (2016) (0)
- Centralized Submodular Optimization (2016) (0)
- Sender Key Storage Reduction of Secure Multicast Key Management Schemes Using One-Way Function Tree (2003) (0)
- Resilience to Link Noise Injection Attacks (2016) (0)
- Proceedings of the 2005 ACM Workshop on Wireless Security, Cologne, Germany, September 2, 2005 (2005) (0)
- Network Working Group (2006) (0)
- QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer (2022) (0)
- LDL: A Defense for Label-Based Membership Inference Attacks (2022) (0)
- Analysis and Design of Robust Key Schemes for Multicast Communications (1999) (0)
- A Metric for Quantifying Vulnerability in Wireless Sensor Networks (2009) (0)
- Input Selection for Robustness to Noise (2016) (0)
- Maximizing theSmallestEigenvalue of a SymmetricMatrix : ASubmodularOptimizationApproach (2018) (0)
- A Hybrid Submodular Optimization Approach to Controlled Islanding with Post-Disturbance Stability Guarantees (2023) (0)
- Security Analysis and Extensions of the PCB Algorithm for Distributed Key Generation (2005) (0)
- Emerging Topics: Submodularity in Energy Systems (2016) (0)
- Information assurance in manets and wireless sensor networks (2005) (0)
- Design of Nano Thermoelectric Generator for Wireless Nano-Sensor Network (2020) (0)
- Multi-Purpose Intelligent Drudgery Reducing Ecobot (2020) (0)
- Submodular Optimization for Smooth Convergence (2016) (0)
- Privacy-friendly skies: Models, metrics, & solutions (2013) (0)
- Shaping Advice in Deep Reinforcement Learning (2022) (0)
- Trust , Security , and Privacy in Parallel and Distributed Systems (2013) (0)
- A video steganography using Hamming Technique for image Processing using optimized algorithm (2020) (0)
- Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs (2023) (0)
- On the communication-storage minimization for a class of secure multicast protocols (2000) (0)
- Topology control for broadcasting over energy constrained wireless ad hoc networks (2005) (0)
- Secure Error-Tolerant Graph Matching Protocols (2016) (0)
- FOC Image Restoration Using Calculated PSFs on Parallel Architectures (1994) (0)
- Designing Robust and Resilient Tactical MANETs (2014) (0)
- Inter-Message Correlation for Intrusion Detection in Controller Area Networks (2019) (0)
- A Natural Language Processing Approach for Instruction Set Architecture Identification (2022) (0)
- Security Analysis of a Distributed Common Secret Generation Procedure (1999) (0)
- Risk-Aware Distributed Multi-Agent Reinforcement Learning (2023) (0)
- Optimal scalable security architectures in the presence of colluding mobile traitors (1999) (0)
- Dynamic ElGamal Public Key Generation with Tight Binding (1999) (0)
- Decision and Game Theory for Security: 11th International Conference, GameSec 2020, College Park, MD, USA, October 28–30, 2020, Proceedings (2020) (0)
- Selecting Catalyst Nodes for Synchronization (2016) (0)
- Side-channel attacks on mobile and IoT devices for Cyber-Physical systems (2022) (0)
- Submodular Functions and Matroids (2016) (0)
- Robust Satisfaction of Metric Interval Temporal Logic Objectives in Adversarial Environments (2023) (0)
- Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006 (2006) (0)
- Distributed Submodular Maximization (2016) (0)
- Game of Trojans: A Submodular Byzantine Approach (2022) (0)
- Input Selection for Performance, Stabilizability, and Controllability of Structured Linear Descriptor Systems (2018) (0)
- ARO PECASE: Information Assurance for Energy-Constrained Wireless Sensor Networks (2011) (0)
- Minimax Detection (MAD) for Computer Security: A Dynamic Program Characterization (2021) (0)
- mist: Multispectral Image Similarity Transformation (1997) (0)
- Generative Model-driven Resource-efficient Monitoring of ECG (2011) (0)
- Designing Robust and Resilient Tactical MANETs Report Title (2015) (0)
- Energy-Aware Secure Multicast Communication In Wireless Ad-Hoc Networks (2003) (0)
- A Bayesian Multi-armed Bandit Approach for Identifying Human Vulnerabilities (2018) (0)
- Improved accuracy performance of air for remote sensing application using multi sensor (2014) (0)
This paper list is powered by the following services:
Other Resources About Radha Poovendran
What Schools Are Affiliated With Radha Poovendran?
Radha Poovendran is affiliated with the following schools: