K.P. Subbalakshmi
Cited by
Cited by
Dynamic spectrum access with QoS and interference temperature constraints
Y Xing, CN Mathur, MA Haleem, R Chandramouli, KP Subbalakshmi
IEEE Transactions on mobile computing 6 (4), 423-433, 2007
The characteristics of cloud computing
C Gong, J Liu, Q Zhang, H Chen, Z Gong
2010 39th International Conference on Parallel Processing Workshops, 275-279, 2010
Author gender identification from text
N Cheng, R Chandramouli, KP Subbalakshmi
Digital Investigation 8 (1), 78-88, 2011
Automated detection of deception in short and multilingual electronic messages
R Chandramouli, X Chen, KP Subbalakshmi, P Hao, N Cheng, R Perera
US Patent App. 13/455,862, 2012
An analytical model for primary user emulation attacks in cognitive radio networks
S Anand, Z Jin, KP Subbalakshmi
2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks …, 2008
Detecting primary user emulation attacks in dynamic spectrum access networks
Z Jin, S Anand, KP Subbalakshmi
2009 IEEE International Conference on Communications, 1-5, 2009
Systems and methods for automatically detecting deception in human communications expressed in digital form
R Chandramouli, X Chen, KP Subbalakshmi, R Perera
US Patent 9,292,493, 2016
Cryptanalysis of some multimedia encryption schemes
G Jakimoski, KP Subbalakshmi
IEEE Transactions on Multimedia 10 (3), 330-338, 2008
Optimal joint scheduling and cloud offloading for mobile applications
SE Mahmoodi, RN Uma, KP Subbalakshmi
IEEE Transactions on Cloud Computing 7 (2), 301-313, 2016
Battery power-aware encryption
R Chandramouli, S Bapatla, KP Subbalakshmi, RN Uma
ACM Transactions on Information and System Security (TISSEC) 9 (2), 162-180, 2006
Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing
Z Jin, S Anand, KP Subbalakshmi
ACM SIGMOBILE Mobile Computing and Communications Review 13 (2), 74-85, 2009
Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities
F Granelli, P Pawelczak, RV Prasad, KP Subbalakshmi, R Chandramouli, ...
IEEE Communications Magazine 48 (1), 71-79, 2010
Open research issues in multi-hop cognitive radio networks
S Sengupta, KP Subbalakshmi
IEEE Communications Magazine 51 (4), 168-176, 2013
Digital signatures for centralized DSA networks
CN Mathur, KP Subbalakshmi
2007 4th IEEE Consumer Communications and Networking Conference, 1037-1041, 2007
Opportunistic encryption: A trade-off between security and throughput in wireless networks
M Haleem, C Mathur, R Chandramouli, K Subbalakshmi
IEEE Transactions on Dependable and secure computing 4 (4), 313-324, 2007
Security issues in cognitive radio networks
CN Mathur, KP Subbalakshmi
Cognitive Networks 25, 272-290, 2007
Gender identification from e-mails
N Cheng, X Chen, R Chandramouli, KP Subbalakshmi
2009 IEEE Symposium on Computational Intelligence and Data Mining, 154-158, 2009
Statistically secure digital image data hiding
PK Amin, N Liu, KP Subbalakshmi
2005 IEEE 7th Workshop on Multimedia Signal Processing, 1-4, 2005
Current trends in steganalysis: a critical survey
R Chandramouli, KP Subbalakshmi
ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004. 2 …, 2004
Denial-of-service attacks on dynamic spectrum access networks
G Jakimoski, KP Subbalakshmi
ICC Workshops-2008 IEEE International Conference on Communications Workshops …, 2008
The system can't perform the operation now. Try again later.
Articles 1–20