Professor Sanjay Jha

Professor Sanjay Jha

Professor
Engineering
Computer Science and Engineering

Sanjay K. Jha is a full Professor at the School of Computer Science and Engineering since 2006. He is also the Director of Research and Innovation at the School of Computer Science and Engineering.  He served as the Interim Director, Research Director and Chief Scientist of the UNSW Institute for Cybersecurity (IFCYBER). He holds a Ph.D. degree from the University of Technology, Sydney, Australia. Sanjay has published over 300 articles in high-quality journals and conferences. He is the principal author of the book Engineering Internet QoS and a co-editor of the book Wireless Sensor Networks: A Systems Perspective. He has been very active in attracting ARC Discovery and linkage grants, CRC and other industries. He leads UNSW's participation in the Cooperative Research Centre for Cyber Security (CSCRC).

His current research focuses on Cybersecurity. In particular, he is interested in research at the intersection of networking, both wired and wireless networking, and security. His research areas include:

  • Artificial Intelligence and Cybersecurity
  • Generative AI for Voice Cloning.
  • Wired and Wireless Network Security
  • Security of Mobile Devices, Body worn devices, and Internet of Things (IoT), Application security
     

Sanjay supervises a large number of graduate students (graduated 32 PhD candidates so far). He has worked as a consultant for major organisations such as Canon Research Lab (CISRA), DSTO, Lucent,  Fujitsu and Mitsubishi. In his previous job, he was a Lecturer at the School of Computing Sciences, University of Technology (UTS), Sydney. He also worked as Systems Engineer at the National Informatics Centre, New Delhi. He was a visiting scholar at the Distributed Computing and Communications Laboratory, Computer Science Department, Columbia University and a visiting professor with IIT-Bombay. In 2016, he spent his sabbatical at Oxford University and IIT-Delhi. He was also been a visiting researcher with Fujitsu Australia Ltd, Sydney and CSIRO ICT Center, Australia.

He was an editor of the IEEE Transactions on  Dependable and Secure Computing (TDSC) and the IEEE Transactions on Mobile Computing (TMC) for five years and a member of the editorial advisory board of Wiley/ACM International Journal of Network Management. Sanjay also served on the editorial board of the ACM Computer and Communication Review journal. He was a Member-at-Large, the Technical Committee on Computer Communications (TCCC), IEEE Computer Society for a number of years.

Sanjay served on program committees of several high-quality conferences:  ACM WiSec 2014 and ACM CCS'2014/19, AsiaCCS'23,  Codaspy20/21 security conferences.   He Technical Program Committee Chair of  WowMoM'2014, ICC'14 (vice chair), WPMC'14, LCN'04 and ATNAC'04. Sanjay was the General Chair of  IEEE BuildSec'24, Local Org Chair of ACM Sigcomm'24,  Industry Track chair of IEEE PST'24, ACM Sensys 2007 symposium, co-chair and general chair (founder) of the Ements-1 and Emnets-II workshops respectively. He also served on the steering committee of the ACM Sensys and Emnets. He is a senior member of IEEE and has been involved with IEEE Computer Chapter NSW, Australia as chair/secretary for number a of years.

 

 

Phone
+61 2 9385 6471
Location
Sydney
  • Books | 2002
    Jha SK; Hassan M, 2002, Engineering Internet QoS, Original, Artech House, Boston
  • Book Chapters | 2021
    Javali C; Revadigar G; Ding M; Lin Z; Jha S, 2021, 'Cooperative physical layer secret key generation by virtual link estimation', in Physical Layer Security, pp. 99 - 128, http://dx.doi.org/10.1007/978-3-030-55366-1_5
    Book Chapters | 2021
    Javali C; Revadigar G; Libman L; Ding M; Lin Z; Jha S, 2021, 'Secure device pairing protocol based on wireless channel characteristics for body area networks', in Physical Layer Security, pp. 151 - 179, http://dx.doi.org/10.1007/978-3-030-55366-1_7
    Book Chapters | 2019
    Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2019, 'Software-Defined Network (SDN) data plane security: Issues, solutions, and future directions', in Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 341 - 387, http://dx.doi.org/10.1007/978-3-030-22277-2_14
    Book Chapters | 2008
    Naveed A; Kanhere S; Jha SK, 2008, 'Attacks and Security Mechanism', in Zhang Y; Zheng J; Ma M (ed.), Security in Wireless Mesh Networks, Auerbach Publications, pp. 111 - 144, http://www.crcpress.com/product/isbn/9780849382505
    Book Chapters | 2007
    Savkin AV; Pathirana PN; Bulusu N; Jha SK; Dang TX, 2007, 'Node Localization Using Mobile Robots in delay-Tolerant Sensor Networks', in Poovendran R; Wang C; Roy S (ed.), Secure localization and time synchronization for wireless sensor and ac hoc networks, Springer Publishing Company, United States of America, pp. 83 - 102
    Book Chapters | 2004
    Jha SK, 2004, 'TCP/IP Fundamentals', in Hassan M; Jain R (ed.), High Performance TCP/IP Networking Concepts, Issues and Solutions, edn. First, Pearson Prentice Hall, New Jersey, pp. 12 - 31
    Book Chapters | 2004
    Sabrina F; Jha SK, 2004, 'Fair Queuing in Active and Programmable Networks', in Wysocki TA; Dadje A; Wysocki BJ (ed.), Advanced wired and Wireless Networks Series, edn. 26, Springer Publishing Company, New York, pp. 247 - 264
    Book Chapters | 2003
    Mukherjee A; Saha D; Jha S, 2003, 'Location management in mobile wireless networks', in Wireless Internet Handbook: Technologies, Standards, and Applications, pp. 351 - 380, http://dx.doi.org/10.1201/9780203011690
    Book Chapters | 2002
    Hassan M; Jha SK, 2002, 'Voice over IP: Protocols and Technical Hurdles', in Theoharakis V; Serpanos D (ed.), Enterprise Networking: Multilayer Switching and Applications, edn. Original, Idea Group Publishing, Hershey, PA, USA, pp. 123 - 143
    Book Chapters | 1997
    Jha SK; Wright PA; Fry M, 1997, 'Playout management of interactive video — an adaptive approach', in Building QoS into Distributed Systems, Springer US, pp. 149 - 160, http://dx.doi.org/10.1007/978-0-387-35170-4_16
  • Edited Books | 2005
    Bulusu N; Jha S, (ed.), 2005, Wireless sensor network systems: a systems perspective, Artech House, Norwood, MA
  • Journal articles | 2024
    Bhaskar N; Ahmed J; Masood R; Ahmed N; Kerr S; Jha SK, 2024, 'A Comprehensive Threat Modelling Analysis for Distributed Energy Resources', ACM Transactions on Cyber-Physical Systems, 8, pp. 1 - 32, http://dx.doi.org/10.1145/3678260
    Journal articles | 2024
    Karunanayake I; Jiang J; Ahmed N; Jha SK, 2024, 'Exploring Uncharted Waters of Website Fingerprinting', IEEE Transactions on Information Forensics and Security, 19, pp. 1840 - 1854, http://dx.doi.org/10.1109/TIFS.2023.3342607
    Journal articles | 2024
    Musleh AS; Ahmed J; Ahmed N; Xu H; Chen G; Kerr S; Jha S, 2024, 'Experimental Cybersecurity Evaluation of Distributed Solar Inverters: Vulnerabilities and Impacts on the Australian Grid', IEEE Transactions on Smart Grid, 15, pp. 5139 - 5150, http://dx.doi.org/10.1109/TSG.2024.3393439
    Journal articles | 2024
    Sharma A; Li J; Mishra D; Jha S; Seneviratne A, 2024, 'Towards Energy Efficient Wireless Sensing by Leveraging Ambient Wi-Fi Traffic †', Energies, 17, http://dx.doi.org/10.3390/en17020485
    Journal articles | 2024
    Wang W; Song Y; Jha S, 2024, 'USAT: A Universal Speaker-Adaptive Text-to-Speech Approach', IEEE/ACM Transactions on Audio Speech and Language Processing, 32, pp. 2590 - 2604, http://dx.doi.org/10.1109/TASLP.2024.3393714
    Journal articles | 2024
    Zaman Z; Xue W; Gauravaram P; Hu W; Jiang J; Jha SK, 2024, 'Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis', IEEE Transactions on Information Forensics and Security, 19, pp. 9173 - 9187, http://dx.doi.org/10.1109/TIFS.2024.3468150
    Journal articles | 2023
    Karunanayake I; Ahmed N; Malaney R; Islam R; Jha SK, 2023, 'Darknet Traffic Analysis: Investigating the Impact of Modified Tor Traffic on Onion Service Traffic Classification', IEEE Access, 11, pp. 70011 - 70022, http://dx.doi.org/10.1109/ACCESS.2023.3293526
    Journal articles | 2022
    Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, http://dx.doi.org/10.1016/j.jnca.2022.103356
    Journal articles | 2022
    Jiang J, 2022, 'Network Growth From Global and Local Influential Nodes', IEEE Transactions on Network Science and Engineering, http://dx.doi.org/10.1109/TNSE.2022.3165528
    Journal articles | 2022
    Ma S; Li J; Nepal S; Ostry D; Lo D; Jha SK; Deng RH; Bertino E, 2022, 'Orchestration or Automation: Authentication Flaw Detection in Android Apps', IEEE Transactions on Dependable and Secure Computing, 19, pp. 2165 - 2178, http://dx.doi.org/10.1109/TDSC.2021.3050188
    Journal articles | 2022
    Maroof U; Shaghaghi A; Michelin R; Jha S, 2022, 'iRECOVer: Patch your IoT on-the-fly', Future Generation Computer Systems, 132, pp. 178 - 193, http://dx.doi.org/10.1016/j.future.2022.02.014
    Journal articles | 2022
    Oham C; Michelin RA; Jurdak R; Kanhere SS; Jha S, 2022, 'WIDE: A witness-based data priority mechanism for vehicular forensics', Blockchain: Research and Applications, 3, http://dx.doi.org/10.1016/j.bcra.2021.100050
    Journal articles | 2022
    Purwanto RW; Pal A; Blair A; Jha S, 2022, 'PhishSim: Aiding Phishing Website Detection With a Feature-Free Tool', IEEE Transactions on Information Forensics and Security, 17, pp. 1497 - 1512, http://dx.doi.org/10.1109/TIFS.2022.3164212
    Journal articles | 2021
    Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2021, 'DIMY: Enabling Privacy-preserving Contact Tracing', , http://arxiv.org/abs/2103.05873v1
    Journal articles | 2021
    Karunanayake I; Ahmed N; Malaney R; Islam R; Jha SK, 2021, 'De-Anonymisation Attacks on Tor: A Survey', IEEE Communications Surveys and Tutorials, 23, pp. 2324 - 2350, http://dx.doi.org/10.1109/COMST.2021.3093615
    Journal articles | 2021
    Karunanayake I; Ahmed N; Malaney RA; Islam R; Jha SK, 2021, 'De-Anonymisation Attacks on Tor: A Survey.', IEEE Commun. Surv. Tutorials, 23, pp. 2324 - 2350
    Journal articles | 2021
    Oham C; Michelin RA; Jurdak R; Kanhere SS; Jha S, 2021, 'B-FERL: Blockchain based framework for securing smart vehicles', Information Processing and Management, 58, http://dx.doi.org/10.1016/j.ipm.2020.102426
    Journal articles | 2021
    Purwanto R; Pal A; Blair A; Jha S, 2021, 'Man versus Machine: AutoML and Human Experts' Role in Phishing Detection', , http://arxiv.org/abs/2108.12193v1
    Journal articles | 2021
    Xue W; Luo C; Shen Y; Rana R; Lan G; Jha S; Seneviratne A; Hu W, 2021, 'Towards a Compressive-Sensing-Based Lightweight Encryption Scheme for the Internet of Things', IEEE Transactions on Mobile Computing, 20, pp. 3049 - 3065, http://dx.doi.org/10.1109/TMC.2020.2992737
    Journal articles | 2020
    Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226
    Journal articles | 2020
    Ahmed N; Michelin RA; Xue W; Ruj S; Malaney RA; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps.', ARXIV, 2006.10306, https://arxiv.org/abs/2006.10306
    Journal articles | 2020
    Xu W; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W, 2020, 'Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings', IEEE Internet of Things Journal, 7, pp. 298 - 310, http://dx.doi.org/10.1109/JIOT.2019.2946900
    Journal articles | 2019
    Jahan M; Seneviratne S; Roy PS; Sakurai K; Seneviratne A; Jha S, 2019, 'Light weight and fine-grained access mechanism for secure access to outsourced data*', Concurrency and Computation: Practice and Experience, 31, http://dx.doi.org/10.1002/cpe.4736
    Journal articles | 2019
    Kim JY; Hu W; Sarkar D; Jha S, 2019, 'Long-term secure management of large scale Internet of Things applications', Journal of Network and Computer Applications, 138, pp. 15 - 26, http://dx.doi.org/10.1016/j.jnca.2019.04.015
    Journal articles | 2019
    Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting', IEEE Transactions on Mobile Computing, 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
    Journal articles | 2019
    Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2019, 'Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting.', IEEE Trans. Mob. Comput., 18, pp. 1274 - 1287, http://dx.doi.org/10.1109/TMC.2018.2861384
    Journal articles | 2019
    Rezvani M; Rajaratnam D; Ignjatovic A; Pagnucco M; Jha S, 2019, 'Analyzing XACML policies using answer set programming', International Journal of Information Security, 18, pp. 465 - 479, http://dx.doi.org/10.1007/s10207-018-0421-5
    Journal articles | 2019
    Tan H; Tsudik G; Jha S, 2019, 'MTRA: Multi-Tier randomized remote attestation in IoT networks', Computers and Security, 81, pp. 78 - 93, http://dx.doi.org/10.1016/j.cose.2018.10.008
    Journal articles | 2019
    Xu W; Jha S; Hu W, 2019, 'LoRa-Key: Secure Key Generation System for LoRa-Based Network', IEEE Internet of Things Journal, 6, pp. 6404 - 6416, http://dx.doi.org/10.1109/JIOT.2018.2888553
    Journal articles | 2019
    Xu W; Zhang J; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W, 2019, 'The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings', IEEE Internet of Things Journal, 6, pp. 7266 - 7281, http://dx.doi.org/10.1109/JIOT.2019.2915952
    Journal articles | 2018
    Jahan M; Rezvani M; Zhao Q; Roy PS; Sakurai K; Seneviratne A; Jha S, 2018, 'Light Weight Write Mechanism for Cloud Data', IEEE Transactions on Parallel and Distributed Systems, 29, pp. 1131 - 1146, http://dx.doi.org/10.1109/TPDS.2017.2782253
    Journal articles | 2018
    Kim JY; Hu W; Shafagh H; Jha S, 2018, 'SEDA: Secure over-the-air code dissemination protocol for the internet of things', IEEE Transactions on Dependable and Secure Computing, 15, pp. 1041 - 1054, http://dx.doi.org/10.1109/TDSC.2016.2639503
    Journal articles | 2017
    Revadigar G; Javali C; Xu W; Vasilakos AV; Hu W; Jha S, 2017, 'Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables', IEEE Transactions on Information Forensics and Security, 12, pp. 2467 - 2482, http://dx.doi.org/10.1109/TIFS.2017.2708690
    Journal articles | 2017
    Tu W; Sreenan CJ; Jha S; Zhang Q, 2017, 'Multi-Source Video Multicast in Internet-Connected Wireless Mesh Networks', IEEE Transactions on Mobile Computing, 16, pp. 3431 - 3444, http://dx.doi.org/10.1109/TMC.2017.2691706
    Journal articles | 2016
    Ahmed N; Kanhere SS; Jha S, 2016, 'On the importance of link characterization for aerial wireless sensor networks', IEEE Communications Magazine, 54, pp. 52 - 57, http://dx.doi.org/10.1109/MCOM.2016.7470935
    Journal articles | 2016
    Li K; Ahmed N; Kanhere SS; Jha S, 2016, 'Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna', Pervasive and Mobile Computing, 30, pp. 151 - 165, http://dx.doi.org/10.1016/j.pmcj.2016.01.005
    Journal articles | 2016
    Li K; Ni W; Wang X; Liu RP; Kanhere SS; Jha S, 2016, 'Energy-efficient cooperative relaying for unmanned aerial vehicles', IEEE Transactions on Mobile Computing, 15, pp. 1377 - 1386, http://dx.doi.org/10.1109/TMC.2015.2467381
    Journal articles | 2016
    misra P; Hu W; jha S, 2016, 'Sparsity based Efficient Cross-Correlation Techniques in Sensor Networks', IEEE Transactions on Mobile Computing, http://dx.doi.org/10.1109/TMC.2016.2605689
    Journal articles | 2015
    Ali ST; Sivaraman V; Radford A; Jha S, 2015, 'A Survey of Securing Networks Using Software Defined Networking', IEEE Transactions on Reliability, 64, pp. 1086 - 1097, http://dx.doi.org/10.1109/TR.2015.2421391
    Journal articles | 2015
    Chapre Y; Ignjatovic A; Seneviratne A; Jha S, 2015, 'CSI-MIMO: An efficient Wi-Fi fingerprinting using Channel State Information with MIMO', Pervasive and Mobile Computing, 23, pp. 89 - 103, http://dx.doi.org/10.1016/j.pmcj.2015.07.002
    Journal articles | 2015
    Misra P; Kanhere S; Jha S; Hu W, 2015, 'Sparse representation based acoustic rangefinders: From sensor platforms to mobile devices', IEEE Communications Magazine, 53, pp. 249 - 257, http://dx.doi.org/10.1109/MCOM.2015.7010542
    Journal articles | 2015
    Rezvani M; Ignjatovic A; Bertino E; Jha S, 2015, 'Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks', IEEE Transactions on Dependable and Secure Computing, 12, pp. 98 - 110, http://dx.doi.org/10.1109/TDSC.2014.2316816
    Journal articles | 2015
    Rezvani M; Sekulic V; Ignjatovic A; Bertino E; Jha S, 2015, 'Interdependent Security Risk Analysis of Hosts and Flows', IEEE Transactions on Information Forensics and Security, 10, pp. 2325 - 2339, http://dx.doi.org/10.1109/TIFS.2015.2455414
    Journal articles | 2015
    Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks', Security and Communication Networks, 8, pp. 2171 - 2188, http://dx.doi.org/10.1002/sec.1162
    Journal articles | 2015
    Tan H; Hu W; Jha S, 2015, 'A remote attestation protocol with Trusted Platform Modules (TPMs) in wireless sensor networks.', Security and Communication Networks, http://dx.doi.org/10.1002/sec.1162
    Journal articles | 2015
    Zhao X; Guo J; Chou CT; Misra A; Jha SK, 2015, 'High-throughput reliable multicast in multi-hop wireless mesh networks', IEEE Transactions on Mobile Computing, 14, pp. 728 - 741, http://dx.doi.org/10.1109/TMC.2014.2333731
    Journal articles | 2014
    Ali ST; Sivaraman V; Ostry D; Tsudik G; Jha S, 2014, 'Securing first-hop data provenance for bodyworn devices using wireless link fingerprints', IEEE Transactions on Information Forensics and Security, 9, pp. 2193 - 2204, http://dx.doi.org/10.1109/TIFS.2014.2357998
    Journal articles | 2014
    Javali C; Revadigar G; Libman L; Jha S, 2014, 'SeAK: Secure authentication and key generation protocol based on dual antennas for wireless body area networks', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8651, pp. 74 - 89, http://dx.doi.org/10.1007/978-3-319-13066-8_5
    Journal articles | 2014
    Ni W; Liu RP; Biswas J; Wang X; Collings IB; Jha SK, 2014, 'Multiuser MIMO scheduling for mobile video applications', IEEE Transactions on Wireless Communications, 13, pp. 5382 - 5395, http://dx.doi.org/10.1109/TWC.2014.2347973
    Journal articles | 2013
    Ahmed N; Kanhere SS; Jha S, 2013, 'Erratum: Utilizing link characterization for improving the performance of aerial wireless sensor networks (IEEE Journal on Selected Areas in Communications)', IEEE Journal on Selected Areas in Communications, 31, pp. 1638, http://dx.doi.org/10.1109/JSAC.2013.08.erratum
    Journal articles | 2013
    Ahmed N; Kanhere SS; Jha S, 2013, 'Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013)', IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 31, pp. 1638 - 1638, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000322396800025&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Journal articles | 2013
    Ahmed N; Kanhere SS; Jha S, 2013, 'Utilizing link characterization for improving the performance of aerial wireless sensor networks', IEEE Journal on Selected Areas in Communications, 31, pp. 1639 - 1649, http://dx.doi.org/10.1109/JSAC.2013.130825
    Journal articles | 2013
    Ali ST; Sivaraman V; Ostry D; Jha S, 2013, 'DEMO abstract: Securing data provenance in body area networks using lightweight wireless link fingerprints', SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517432
    Journal articles | 2013
    Mehmood T; Libman L; Dehkordi HR; Jha SK, 2013, 'Optimal opportunistic routing and network coding for bidirectional wireless flows', Computer Networks, 57, pp. 4030 - 4046, http://dx.doi.org/10.1016/j.comnet.2013.10.004
    Journal articles | 2013
    Misra P; Kottege N; Kusy B; Ostry D; Jha S, 2013, 'Acoustical ranging techniques in embedded wireless sensor networked devices', ACM Transactions on Sensor Networks, 10, http://dx.doi.org/10.1145/2529981
    Journal articles | 2012
    Misra P; Ahmed N; Jha SK, 2012, 'An empirical study of asymmetry in low-power wireless links', IEEE Communications Magazine, 50, pp. 137 - 146, http://dx.doi.org/10.1109/MCOM.2012.6231290
    Journal articles | 2012
    Tu W; Sreenan C; Chou CT; Misra A; Jha SK, 2012, 'Resource-aware video multicasting via access gateways in wireless mesh networks', IEEE Transactions on Mobile Computing, 11, pp. 881 - 895, http://dx.doi.org/10.1109/TMC.2011.103
    Journal articles | 2011
    Ahmed N; Kanhere SS; Jha S, 2011, 'A pragmatic approach to area coverage in hybrid wireless sensor networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.1002/wcm.913
    Journal articles | 2011
    Sivaraman V; Ostry D; Shaheen J; Hianto AJ; Jha SK, 2011, 'Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks', EURASIP Journal onWireless Communications and Networking, 2011, pp. 1 - 12, http://dx.doi.org/10.1155/2011/695171
    Journal articles | 2011
    Tan H; Zic J; Jha SK; Ostry D, 2011, 'Secure multi-hop network programming with multiple one-way key chains', IEEE Transactions on Mobile Computing, 10, pp. 16 - 31, http://dx.doi.org/10.1109/TMC.2010.140
    Journal articles | 2010
    Ahmed N; Kanhere S; Jha SK, 2010, 'A Pragmatic Approach to Area Coverage in Hybrid Wireless Sensor Networks', Wireless Communications and Mobile Computing, 11, pp. 23 - 45, http://dx.doi.org/10.002/wcm.913
    Journal articles | 2010
    Ahmed N; Rutten M; Bessell T; Kanhere S; Gordon N; Jha SK, 2010, 'Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks', IEEE Transactions on Mobile Computing, 9, pp. 1332 - 1345, http://dx.doi.org/10.1109/TMC.2010.83
    Journal articles | 2010
    Hu W; Bulusu N; Dang T; Taylor A; Chou CT; Jha S; Tran VN, 2010, 'Cane toad monitoring: Data reduction in a high rate application', , pp. 193 - 222, http://dx.doi.org/10.1007/978-1-4419-5834-1_7
    Journal articles | 2010
    Tan H; Hu W; Corke P; SHIH W; Jha SK, 2010, 'Toward trusted wireless sensor networks', ACM Transactions on Sensor Networks, 7, pp. 5:2 - 5:25, http://dx.doi.org/10.1145/1806895.1806900
    Journal articles | 2009
    Hu W; Bulusu N; Chou CT; Jha SK; Tran VN; Taylor AJ, 2009, 'Design and evaluation of a hybrid sensor network for cane toad monitoring', ACM Transactions on Sensor Networks, 5
    Journal articles | 2009
    Tan H; Ostry D; Zic J; Jha S, 2009, 'A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks', Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09, pp. 245 - 252, http://dx.doi.org/10.1145/1514274.1514308
    Journal articles | 2008
    Hota C; Jha S; Raghurama G, 2008, 'ADAPTIVE BANDWIDTH MANAGEMENT AND QoS PROVISIONING IN IPVPNs', International Journal of Computers and Applications, 30, http://dx.doi.org/10.2316/journal.202.2008.2.202-2223
    Journal articles | 2008
    Srivastava MB; Bagchi S; Corner M; Jha SK; Krishnamachari B; Martonosi M; Poovendran R; Raghunathan A; Ramanathan R; Santi P; Rosing TS; Snoeren AC; Trappe W; Venkatasubramanian N, 2008, 'EIC Editorial', IEEE Transactions on Mobile Computing, 7, pp. 529 - 532, http://dx.doi.org/10.1109/TMC.2008.45
    Journal articles | 2007
    Hassan M; Das S; Mohapatra P; Perkins C, 2007, 'Wireless mesh networks', IEEE Communications Magazine, 45, pp. 62 - 63, http://dx.doi.org/10.1109/MCOM.2007.4378322
    Journal articles | 2006
    Hu W; Chou CT; Jha SK; Bulusu N, 2006, 'Deploying long-lived and cost-effective hybrid sensor networks', Ad Hoc Networks, 4, pp. 749 - 767
    Journal articles | 2006
    Sohail S; Jha SK; Kanhere S; Chou CT, 2006, 'QoS Driven Parallelization of Resources to Reduce File Download Delay', IEEE Transactions on Parallel and Distributed Systems, 17, pp. 1204 - 1215, http://dx.doi.org/10.1109/TPDS.2006.144
    Journal articles | 2005
    Ahmed N; Kanhere S; Jha SK, 2005, 'The holes problem in wireless sensor networks', ACM Sigmobile Mobile Computing and Communications Review, 9, pp. 4 - 18, http://dx.doi.org/10.1145/1072989.1072992
    Journal articles | 2005
    Hu W; Bulusu N; Jha SK, 2005, 'A communication paradigm for hybrid sensor/actuator networks', International Journal of Wireless Information Networks, 12, pp. 47 - 59
    Journal articles | 2005
    Jha SK; Fry M, 2005, 'Video decompression estimation and playout scheme over the Internet', Multimedia Tools and Applications, 25, pp. 305 - 321
    Journal articles | 2005
    Moors T; Jha SK, 2005, 'Advances and directions in quality of service management.', Journal of Computer Communications, 28, pp. 1701 - 1702
    Journal articles | 2005
    Pathirana PN; Bulusu N; Savkin AV; Jha SK, 2005, 'Node localization using mobile robots in delay-tolerant sensor networks', IEEE Transactions on Mobile Computing, 4, pp. 285 - 296
    Journal articles | 2005
    Sabrina F; Nguyen C; Jha SK; Platt D; Safaei F, 2005, 'Processing resource scheduling in programmable networks', Computer Communications, 28, pp. 676 - 687
    Journal articles | 2004
    Al-Ali R; Sohail S; Rana O; Hafid A; Von Laszewski G; Amin K; Jha S; Walker D, 2004, 'Network QoS provision for distributed grid applications', International Journal of Simulation: Systems, Science and Technology, 5, pp. 13 - 28
    Journal articles | 2004
    Hassan J; Jha SK, 2004, 'Design and Analysis of Location Management Schemes for a New light-weight Wireless Network', Computer Communications, 27(8), pp. 743 - 750
    Journal articles | 2004
    Jha SK; Mukherjee A, 2004, 'Advances in future mobile/wireless networks and services', Computer Communications, 27, pp. 695 - 696
    Journal articles | 2004
    Lau CW; Jha SK, 2004, 'Failure Oriented Path Restoration Algorithm for Survivable Networks', Etransactions on Network Service and Management, 1, pp. 2 - 10
    Journal articles | 2004
    Lau W; Jha S, 2004, 'Failure-Oriented Path Restoration Algorithm for Survivable Networks', IEEE Transactions on Network and Service Management, 1, pp. 11 - 20, http://dx.doi.org/10.1109/TNSM.2004.4623690
    Journal articles | 2004
    Pathirana PN; Savkin AV; Jha SK, 2004, 'Location Estimation and Trajectory Prediction for Cellular Networks with Mobile Base Stations', IEEE Transactions on Vehicular Technology, 53, pp. 1903 - 1913
    Journal articles | 2004
    Pathirana PN; Savkin AV; Jha SK, 2004, 'Robust Extended Kalman Filter Based Technique for Location Management in PCS Networks', Computer Communications, 27(5), pp. 502 - 512
    Journal articles | 2003
    Hassan J; Jha SK, 2003, 'Cell Hoping: A Lightweight Architecture for Wireless Communications', IEEE Wireless Communications, 10, pp. 16 - 21
    Journal articles | 2003
    Jha SK; Hassan M, 2003, 'Java Implementation of Policy-Based Bandwidth Management', International Journal of Network Management, 13, pp. 249 - 258
    Journal articles | 2003
    Rosenbaum GF; Jha SK; Hassan M, 2003, 'Empirical Study of Traffic Trunking in Linux-Based MPLS Test-Bed', International Journal of Network Management, 13, pp. 277 - 288
    Journal articles | 2003
    Sabrina F; Jha SK, 2003, 'An Adaptive Resource Management Architecture for Active Networks', Telecommunication Systems, 24:, pp. 139 - 166
    Journal articles | 2003
    Sohail S; Jha SK, 2003, 'Bandwidth broker extension optimal resource management', Journal of Telecommunications and Information Technology, 3, pp. 77 - 82
    Journal articles | 2002
    Jha SK; Hassan M, 2002, 'Building Agent for Rule Based Intrusion Detection System', Computer Communications, pp. 1366 - 1373
    Journal articles | 2002
    Jha SK, 2002, 'G-QoSM: Grid Service Discovery Using QoS Properties', Computing and Informatics, pp. 363 - 382
  • Working Papers | 2020
    Karunanayake I; Ahmed N; Malaney R; Islam R; Jha S, 2020, De-anonymisation attacks on Tor: A Survey [v3], http://dx.doi.org10.48550/arXiv.2009.13018
    Working Papers | 2020
    Karunanayake I; Ahmed N; Malaney RA; Islam R; Jha SK, 2020, Anonymity with Tor: A Survey on Tor Attacks [v1, v2], http://dx.doi.org, https://dblp.org/rec/journals/corr/abs-2009-13018.html
    Working Papers | 2020
    Michelin RA; Ahmed N; Kanhere SS; Seneviratne A; Jha S, 2020, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, Institute of Electrical and Electronics Engineers (IEEE), http://dx.doi.org10.1109/ICBC48266.2020.9169429
  • Preprints | 2024
    Ali H; Nepal S; Kanhere SS; Jha S, 2024, Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning, http://arxiv.org/abs/2410.11205v1
    Reports | 2024
    Bennett Moses L; Gauravaram P; Heiser G; Jha S; Lloyd-Jones S; Manwaring K; Ruj S, 2024, Submission to Department of Home Affairs on the Consultation Paper 2023-2030 Australian Cyber Security Strategy: Legislative Reforms, http://dx.doi.org/10.26190/unsworks/28745
    Conference Papers | 2024
    Deldari S; Goudarzi M; Joshi A; Shaghaghi A; Finn S; Salim FD; Jha S, 2024, 'AuditNet: A Conversational AI-based Security Assistant', in MobileHCI 2024 Adjunct Proceedings - Publication of the 26th International Conference on Mobile Human-Computer Interaction, http://dx.doi.org/10.1145/3640471.3680444
    Conference Papers | 2024
    Malik M; Jiang J; Song Y; Jha S, 2024, 'MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 345 - 353, http://dx.doi.org/10.1007/978-3-031-56063-7_26
    Conference Papers | 2024
    Sharma A; Mishra D; Jha S; Seneviratne A, 2024, 'An Investigation into the Non-Uniformity of Channel State Information in WiFi Sensing Systems', in IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2024, http://dx.doi.org/10.1109/INFOCOMWKSHPS61880.2024.10620749
    Preprints | 2024
    Wang W; Song Y; Jha S, 2024, USAT: A Universal Speaker-Adaptive Text-to-Speech Approach,
    Reports | 2023
    Bennett Moses L; Feng R; Jha S; Liu V; Lloyd-Jones S, 2023, Vulnerability Disclosure Consultation Paper response, http://dx.doi.org/10.26190/unsworks/28705
    Reports | 2023
    Bennett Moses L; Jha S, 2023, Submission on inquiry into the capability of law enforcement to respond to cybercrime, http://dx.doi.org/10.26190/unsworks/28700
    Conference Papers | 2023
    Musleh AS; Ahmed J; Ahmed N; Xu H; Chen G; Hu J; Jha S, 2023, 'Development of a Collaborative Hybrid Cyber-Physical Testbed for Analysing Cybersecurity Issues of DER Systems', in 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2023 - Proceedings, http://dx.doi.org/10.1109/SmartGridComm57358.2023.10333908
    Conference Papers | 2023
    Wang W; Song Y; Jha S, 2023, 'Generalizable Zero-Shot Speaker Adaptive Speech Synthesis with Disentangled Representations', in Proceedings of the Annual Conference of the International Speech Communication Association, INTERSPEECH, pp. 4454 - 4458, http://dx.doi.org/10.21437/Interspeech.2023-368
    Preprints | 2022
    Go JH; Sari A; Jiang J; Yang S; Jha S, 2022, Fake News Quick Detection on Dynamic Heterogeneous Information Networks, http://dx.doi.org/10.48550/arxiv.2205.07039
    Conference Papers | 2022
    Perera Y; Ahmed N; Kanhere S; Hu W; Jha S, 2022, 'IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?', in IEEE International Conference on Communications, pp. 2954 - 2959, http://dx.doi.org/10.1109/ICC45855.2022.9839269
    Preprints | 2022
    Purwanto R; Pal A; Blair A; Jha S, 2022, PhishSim: Aiding Phishing Website Detection with a Feature-Free Tool, , http://dx.doi.org/10.1109/TIFS.2022.3164212.
    Conference Papers | 2022
    Sharma A; Jiang W; Mishra D; Jha S; Seneviratne A, 2022, 'Optimised CNN for Human Counting Using Spectrograms of Probabilistic WiFi CSI', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 2806 - 2811, http://dx.doi.org/10.1109/GLOBECOM48099.2022.10001169
    Conference Papers | 2022
    Wang W; Song Y; Jha S, 2022, 'AUTOLV: AUTOMATIC LECTURE VIDEO GENERATOR', in Proceedings - International Conference on Image Processing, ICIP, pp. 1086 - 1090, http://dx.doi.org/10.1109/ICIP46576.2022.9897436
    Conference Papers | 2022
    Xu W; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W; Misra P, 2022, 'A Novel Emergency Light Based Smart Building Solution: Design, Implementation, and Use Cases', in Proceedings - 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2022, pp. 577 - 585, http://dx.doi.org/10.1109/MASS56207.2022.00086
    Conference Papers | 2022
    Zaman Z; Xue W; Gauravaram P; Hu W; Jha S, 2022, 'BloomXNOR-Net: Privacy-Preserving Machine Learning in IoT', in S3 2022 - Proceedings of the 13th ACM Workshop on Wireless of the Students, by the Students, and for the Students Workshop, Part of MobiCom 2022, pp. 1 - 3, http://dx.doi.org/10.1145/3556563.3558534
    Preprints | 2022
    xue W; Ahmed N; Masood R; Hu W; Seneviratne A; Jha SK, 2022, FLAP: Federated Learning with Attack and Privacy Awareness, , http://dx.doi.org/10.36227/techrxiv.19766023
    Preprints | 2021
    Abaid Z; Sarkar D; Kaafar MA; Jha S, 2021, All Infections are Not Created Equal: Time-Sensitive Prediction of Malware Generated Network Attacks, , http://dx.doi.org/10.48550/arxiv.2102.01944
    Conference Papers | 2021
    Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2021, 'Health access broker: Secure, patient-controlled management of personal health records in the cloud', in Advances in Intelligent Systems and Computing, Springer Nature, pp. 111 - 121, http://dx.doi.org/10.1007/978-3-030-57805-3_11
    Preprints | 2021
    Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2021, DIMY: Enabling Privacy-preserving Contact Tracing, http://dx.doi.org/10.48550/arxiv.2103.05873
    Conference Papers | 2021
    Ahmed N; Michelin RA; Xue W; Putra GD; Song W; Ruj S; Kanhere SS; Jha S, 2021, 'Towards privacy-preserving digital contact tracing', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461052
    Preprints | 2021
    Ali H; Nepal S; S. Kanhere S; Jha SK, 2021, HaS-Net: A Heal and Select Mechanism to Securely Train DNNs against Backdoor Attacks, , http://dx.doi.org/10.36227/techrxiv.16571184
    Conference Papers | 2021
    Gao J; Xu W; Kanhere S; Jha S; Kim JY; Huang W; Hu W, 2021, 'A Novel Model-Based Security Scheme for LoRa Key Generation', in Proceedings of the 20th International Conference on Information Processing in Sensor Networks (co-located with CPS-IoT Week 2021), ACM, pp. 47 - 61, presented at IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, http://dx.doi.org/10.1145/3412382.3458256
    Conference Papers | 2021
    Liu J; Gao J; Jha S; Hu W, 2021, 'Seirios: Leveraging multiple channels for LoRaWAN indoor and outdoor localization', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 656 - 669, http://dx.doi.org/10.1145/3447993.3483256
    Preprints | 2021
    Purwanto R; Pal A; Blair A; Jha S, 2021, Man versus Machine: AutoML and Human Experts' Role in Phishing Detection, , http://dx.doi.org/10.48550/arxiv.2108.12193
    Preprints | 2020
    Abaid Z; Shaghaghi A; Gunawardena R; Seneviratne S; Seneviratne A; Jha S, 2020, Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the Cloud, http://dx.doi.org/10.48550/arxiv.2005.07987
    Preprints | 2020
    Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha S, 2020, A Survey of COVID-19 Contact Tracing Apps, http://dx.doi.org/10.48550/arxiv.2006.10306
    Preprints | 2020
    Ali H; Nepal S; Kanhere SS; Jha S, 2020, HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios, http://dx.doi.org/10.48550/arxiv.2012.07474
    Conference Papers | 2020
    Gao J; Xu W; Kanhere S; Jha S; Hu W, 2020, 'Poster abstract: A novel modeling involved security approach for lora key generation', in Proceedings - 2020 19th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2020, pp. 327 - 328, http://dx.doi.org/10.1109/IPSN48710.2020.00-23
    Conference Papers | 2020
    Jha S; Zhou J; Michelin R; Ahmed N; Shaghaghi A, 2020, 'Massage from the chairs', in Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, pp. VI, http://dx.doi.org/10.1109/ETSecIoT50046.2020.00011
    Preprints | 2020
    Karunanayake I; Ahmed N; Malaney R; Islam R; Jha S, 2020, De-anonymisation attacks on Tor: A Survey, http://dx.doi.org/10.48550/arxiv.2009.13018
    Conference Papers | 2020
    Liu J; Xu W; Jha S; Hu W, 2020, 'Nephalai: Towards LPWAN C-RAN with physical layer compression', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, Association for Computing Machinery (ACM), pp. 476 - 487, presented at Proceedings of the 26th Annual International Conference on Mobile Computing and Networking, http://dx.doi.org/10.1145/3372224.3419193
    Preprints | 2020
    Liu J; Xu W; Jha S; Hu W, 2020, Nephalai: Towards LPWAN C-RAN with Physical Layer Compression, , http://dx.doi.org/10.48550/arxiv.2008.02599
    Conference Papers | 2020
    Michelin RA; Ahmed N; Kanhere SS; Seneviratne A; Jha S, 2020, 'Leveraging lightweight blockchain to establish data integrity for surveillance cameras', in 2020 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (IEEE ICBC), IEEE, ELECTR NETWORK, presented at IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC), ELECTR NETWORK, 02 May 2020 - 06 May 2020, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000848725400035&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Preprints | 2020
    Oham C; Michelin R; Kanhere SS; Jurdak R; Jha S, 2020, B-FERL: Blockchain based Framework for Securing Smart Vehicles, , http://dx.doi.org/10.48550/arxiv.2007.10528
    Conference Papers | 2020
    Purwanto R; Pal A; Blair A; Jha S, 2020, 'PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites', in 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), IEEE, ELECTR NETWORK, presented at IEEE Conference on Communications and Network Security (CNS), ELECTR NETWORK, 28 June 2020 - 01 July 2020, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000612838300017&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Preprints | 2020
    Purwanto R; Pal A; Blair A; Jha S, 2020, PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites, , http://dx.doi.org/10.48550/arxiv.2007.11955
    Conference Papers | 2020
    Purwanto R; Paly A; Blair A; Jha S, 2020, 'PhishZip: A New Compression-based Algorithm for Detecting Phishing Websites', in 2020 IEEE Conference on Communications and Network Security, CNS 2020, http://dx.doi.org/10.1109/CNS48642.2020.9162211
    Conference Papers | 2020
    Revadigar G; Javali C; Jha S, 2020, 'ProxiCar: Proximity-Based Secure Digital Key Solution for Cars', in 2020 International Conference on COMmunication Systems and NETworkS, COMSNETS 2020, pp. 282 - 289, http://dx.doi.org/10.1109/COMSNETS48256.2020.9027327
    Conference Papers | 2020
    Xu W; Kim JY; Huang W; Kanhere S; Jha S; Hu W, 2020, 'EMIoT: A LoRa-enabled Smart Building Solution Based on Emergency Lights', in BuildSys 2020 - Proceedings of the 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, pp. 330 - 331, http://dx.doi.org/10.1145/3408308.3431129
    Preprints | 2020
    Xu W; Zhang J; Kim JY; Huang W; Kanhere SS; Jha SK; Hu W; Misra P, 2020, A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases, , http://dx.doi.org/10.48550/arxiv.2007.15906
    Conference Papers | 2020
    Xue W; Hu W; Gauranvaram P; Seneviratne A; Jha S, 2020, 'An Efficient Privacy-preserving IoT System for Face Recognition', in Proceedings - 2020 Workshop on Emerging Technologies for Security in IoT, ETSecIoT 2020, Institute of Electrical and Electronics Engineers (IEEE), pp. 7 - 11, presented at 2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT), 21 April 2020 - 21 April 2020, http://dx.doi.org/10.1109/ETSecIoT50046.2020.00006
    Conference Papers | 2019
    Ma S; Bertino E; Nepal S; Li J; Ostry D; Deng RH; Jha S, 2019, 'Finding Flaws from Password Authentication Code in Android Apps', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Luxembourg, pp. 619 - 637, presented at European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23 September 2019, http://dx.doi.org/10.1007/978-3-030-29959-0_30
    Conference Papers | 2019
    Ma S; Feng R; Li J; Liu Y; Nepal S; Ostry D; Bertino E; Deng RH; Ma Z; Jha S, 2019, 'An empirical study of SMS one-time password authentication in android apps', in ACM International Conference Proceeding Series, pp. 339 - 354, http://dx.doi.org/10.1145/3359789.3359828
    Conference Papers | 2019
    Maroof U; Shaghaghi A; Jha S, 2019, 'PLAR: Towards a Pluggable Software Architecture for Securing IoT Devices', in IoT S and P 2019 - Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, Association for Computing Machinery (ACM), ENGLAND, London, pp. 50 - 56, presented at Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, ENGLAND, London, 15 November 2019, http://dx.doi.org/10.1145/3338507.3358619
    Preprints | 2019
    Michelin RA; Ahmed N; Kanhere SS; Seneviratne A; Jha S, 2019, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, , http://dx.doi.org/10.48550/arxiv.1912.11044
    Preprints | 2019
    Oham C; Jurdak R; Jha S, 2019, Risk Analysis Study of Fully Autonomous Vehicle, , http://dx.doi.org/10.48550/arxiv.1905.10910
    Preprints | 2019
    Xu W; Kim JY; Huang W; Kanhere S; Jha S; Hu W, 2019, Measurement, Characterization and Modeling of LoRa Technology in Multi-floor Buildings, http://dx.doi.org/10.48550/arxiv.1909.03900
    Conference Papers | 2018
    Oham C; Jurdak R; Kanhere SS; Dorri A; Jha S, 2018, 'B-FICA: BlockChain based Framework for Auto-Insurance Claim and Adjudication', in Proceedings - IEEE 2018 International Congress on Cybermatics: 2018 IEEE Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology, iThings/GreenCom/CPSCom/SmartData/Blockchain/CIT 2018, pp. 1171 - 1180, http://dx.doi.org/10.1109/Cybermatics_2018.2018.00210
    Preprints | 2018
    Oham C; Jurdak R; Kanhere SS; Dorri A; Jha S, 2018, B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication, , http://arxiv.org/abs/1806.06169v1
    Preprints | 2018
    Oham C; Kanhere SS; Jurdak R; Jha S, 2018, A Blockchain Based Liability Attribution Framework for Autonomous Vehicles, , http://dx.doi.org/10.48550/arxiv.1802.05050
    Preprints | 2018
    Shaghaghi A; Kaafar MA; Buyya R; Jha S, 2018, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions and Future Directions, , http://dx.doi.org/10.48550/arxiv.1804.00262
    Conference Papers | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, 'Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations', in Proceedings - Conference on Local Computer Networks, LCN, pp. 553 - 561, http://dx.doi.org/10.1109/LCN.2018.8638245
    Preprints | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Bertino E; Jha S, 2018, Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations, , http://dx.doi.org/10.48550/arxiv.1807.02593
    Conference Papers | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, 'Gwardar: Towards protecting a software-defined network from malicious network operating systems', in NCA 2018 - 2018 IEEE 17th International Symposium on Network Computing and Applications, IEEE, Cambridge, MA, USA, presented at The 17th IEEE International Symposium on Network Computing and Applications (NCA 2018), Cambridge, MA, USA, 01 November 2018 - 03 November 2018, http://dx.doi.org/10.1109/NCA.2018.8548074
    Preprints | 2018
    Shaghaghi A; Kanhere SS; Kaafar MA; Jha S, 2018, Gwardar: Towards Protecting a Software-Defined Network from Malicious Network Operating Systems, , http://dx.doi.org/10.48550/arxiv.1809.06988
    Conference Papers | 2018
    Tan H; Ostry D; Jha S, 2018, 'Exploiting multiple side channels for secret key agreement in wireless networks', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3154273.3154337
    Conference Papers | 2018
    Xu W; Jha S; Hu W, 2018, 'Exploring the Feasibility of Physical Layer Key Generation for LoRaWAN', in Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, pp. 231 - 236, http://dx.doi.org/10.1109/TrustCom/BigDataSE.2018.00044
    Conference Papers | 2017
    Abaid Z; Kaafar MA; Jha S, 2017, 'Early detection of in-the-wild botnet attacks by exploiting network communication uniformity: An empirical study', in 2017 IFIP Networking Conference, IFIP Networking 2017 and Workshops, pp. 1 - 9, http://dx.doi.org/10.23919/IFIPNetworking.2017.8264866
    Conference Papers | 2017
    Abaid Z; Kaafar MA; Jha S, 2017, 'Quantifying the Impact of Adversarial Evasion Attacks on Machine Learning Based Android Malware Classifiers', in Gkoulalasdivanis A; Correia MP; Avresky DR (eds.), 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), IEEE, MA, Cambridge, pp. 375 - 384, presented at IEEE 16th International Symposium on Network Computing and Applications (NCA), MA, Cambridge, 30 October 2017 - 01 November 2017, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000426971900057&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2017
    Abaid Z; Kaafar MA; Jha S, 2017, 'Quantifying the impact of adversarial evasion attacks on machine learning based android malware classifiers', in 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171381
    Conference Papers | 2017
    Jahan M; Roy PS; Sakurai K; Seneviratne A; Jha S, 2017, 'Secure and light weight fine-grained access mechanism for outsourced data', in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, Institute of Electrical and Electronics Engineers (IEEE), Sydney, NSW, Australia, pp. 201 - 209, presented at 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, NSW, Australia, 01 August 2017 - 04 August 2017, http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.238
    Conference Papers | 2017
    Jahan M; Seneviratne A; Jha S, 2017, 'Access Mechanism for Outsourced Data by Preserving Data Owner's Preference', in Proceedings - Conference on Local Computer Networks, LCN, Institute of Electrical and Electronics Engineers (IEEE), Singapore, Singapore, pp. 611 - 614, presented at 2017 IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, Singapore, 09 October 2017 - 12 October 2017, http://dx.doi.org/10.1109/LCN.2017.55
    Conference Papers | 2017
    Jahan M; Seneviratne S; Chu B; Seneviratne A; Jha S, 2017, 'Privacy Preserving Data Access Scheme for IoT Devices', in Gkoulalasdivanis A; Correia MP; Avresky DR (eds.), 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), IEEE, Cambridge, MA, pp. 217 - 226, presented at IEEE 16th International Symposium on Network Computing and Applications (NCA), Cambridge, MA, 30 October 2017 - 01 November 2017, http://dx.doi.org/10.1109/NCA.2017.8171357
    Conference Papers | 2017
    Jahan M; Seneviratne S; Chu B; Seneviratne A; Jha S, 2017, 'Privacy preserving data access scheme for IoT devices', in 2017 IEEE 16th International Symposium on Network Computing and Applications, NCA 2017, pp. 1 - 10, http://dx.doi.org/10.1109/NCA.2017.8171357
    Conference Papers | 2017
    Kim JY; Holz R; Hu W; Jha S, 2017, 'Automated analysis of secure internet of things protocols', in ACM International Conference Proceeding Series, Orlando, FL, USA, pp. 238 - 249, presented at ACSAC 2017 Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, 04 December 2017 - 08 December 2017, http://dx.doi.org/10.1145/3134600.3134624
    Conference Papers | 2017
    Kim JY; Hu W; Sarkar D; Jha S, 2017, 'ESIoT: Enabling secure management of the internet of things', in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017, Boston, Massachusetts, pp. 219 - 229, presented at 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Boston, Massachusetts, 18 July 2017 - 20 July 2017, http://dx.doi.org/10.1145/3098243.3098252
    Conference Papers | 2017
    Shaghaghi A; Kaafar MA; Jha S, 2017, 'WedgeTail: An intrusion prevention system for the data plane of software defined networks', in ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, pp. 849 - 861, presented at 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 02 April 2017 - 06 April 2017, http://dx.doi.org/10.1145/3052973.3053039
    Preprints | 2017
    Shaghaghi A; Kaafar MA; Jha S, 2017, WedgeTail: An Intrusion Prevention System for the Data Plane of Software Defined Networks, , http://dx.doi.org/10.48550/arxiv.1708.05477
    Conference Papers | 2017
    Shaghaghi A; Kaafar MA; Scott-Hayward S; Kanhere SS; Jha S, 2017, 'Towards Policy Enforcement Point as a Service (PEPS)', in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2016, pp. 50 - 55, http://dx.doi.org/10.1109/NFV-SDN.2016.7919475
    Conference Papers | 2017
    Tan H; Tsudik G; Jha S, 2017, 'MTRA: Multiple-tier remote attestation in IoT networks', in 2017 IEEE Conference on Communications and Network Security, CNS 2017, Las Vegas, NV, USA, pp. 1 - 9, presented at 2017 IEEE Conference, Las Vegas, NV, USA, 09 October 2017 - 11 October 2017, http://dx.doi.org/10.1109/CNS.2017.8228638
    Conference Papers | 2016
    Abaid Z; Sarkar D; Kaafar MA; Jha S, 2016, 'The Early Bird Gets the Botnet: A Markov Chain Based Early Warning System for Botnet Attacks', in Proceedings - Conference on Local Computer Networks, LCN, pp. 61 - 68, http://dx.doi.org/10.1109/LCN.2016.17
    Conference Papers | 2016
    Biswas J; Ni W; Liu RP; Collings IB; Jha SK, 2016, 'Low complexity user pairing and resource allocation of heterogeneous users for uplink virtual MIMO system over LTE-A network', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 1903 - 1908, http://dx.doi.org/10.1109/WCNC.2014.6952560
    Conference Abstracts | 2016
    Javali C; Revadigar G; Pletea D; Jha S, 2016, 'Demo abstract: Location fingerprint evidence and authorisation using WiFi channel characteristics', in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, http://dx.doi.org/10.1109/PERCOMW.2016.7457077
    Conference Papers | 2016
    Javali C; Revadigar G; Rasmussen KB; Hu W; Jha S, 2016, 'I Am Alice, I Was in Wonderland: Secure Location Proof Generation and Verification Protocol', in Proceedings - Conference on Local Computer Networks, LCN, pp. 477 - 485, http://dx.doi.org/10.1109/LCN.2016.126
    Conference Papers | 2016
    Jha S, 2016, 'A changing landscape: Securing the Internet of Things (IoT): Keynote talk', in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), IEEE, presented at 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), 14 March 2016 - 18 March 2016, http://dx.doi.org/10.1109/percomw.2016.7457124
    Conference Papers | 2016
    Li K; Akbaş MI; Turgut D; Kanhere SS; Jha S, 2016, 'Reliable positioning with hybrid antenna model for aerial wireless sensor and actor networks', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 2904 - 2909, http://dx.doi.org/10.1109/WCNC.2014.6952912
    Preprints | 2016
    Li K; Yuen C; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2016, Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting, , http://dx.doi.org/10.48550/arxiv.1603.02476
    Conference Papers | 2016
    Revadigar G; Javali C; Xu W; Hu W; Jha S, 2016, 'Secure key generation and distribution protocol for wearable devices', in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, IEEE, Sydney, AUSTRALIA, presented at IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), Sydney, AUSTRALIA, 14 March 2016 - 19 March 2016, http://dx.doi.org/10.1109/PERCOMW.2016.7457058
    Conference Papers | 2016
    Rezvani M; Ignjatovic A; Pagnucco M; Jha S, 2016, 'Anomaly-free policy composition in software-defined networks', in 2016 IFIP Networking Conference (IFIP Networking) and Workshops, IFIP Networking 2016, vienna, pp. 28 - 36, presented at 2016 IFIP Networking Conference, vienna, 17 May 2016 - 19 May 2016, http://dx.doi.org/10.1109/IFIPNetworking.2016.7497226
    Preprints | 2016
    Shaghaghi A; Ali M; Kaafar ; Scott-Hayward S; Kanhere SS; Jha S, 2016, Towards Policy Enforcement Point as a Service (PEPS), , http://dx.doi.org/10.48550/arxiv.1610.02526
    Conference Papers | 2016
    Siddiqi M; Sivaraman V; Jha S, 2016, 'Timestamp Integrity in Wearable Healthcare Devices', in 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2016, IEEE, Bangalore, India, presented at 10th IEEE International Conference on Advanced Networks and Telecommunications Systems, Bangalore, India, 06 November 2016 - 09 November 2016, http://dx.doi.org/10.1109/ANTS.2016.7947783
    Conference Papers | 2015
    Jahan M; Rezvani M; Seneviratne A; Jha S, 2015, 'Method for Providing Secure and Private Fine-grained Access to Outsourced Data', in Kanhere S; Tolle J; Cherkaoui S (eds.), Proceedings - Conference on Local Computer Networks, LCN, Institute of Electrical and Electronics Engineers (IEEE), Clearwater Beach, Tampa, Florida, USA, pp. 406 - 409, presented at IEEE Local Computer Networks (LCN)'2015, Clearwater Beach, Tampa, Florida, USA, 26 October 2015 - 29 October 2015, http://dx.doi.org/10.1109/LCN.2015.7366339
    Conference Papers | 2015
    Javali C; Revadigar G; Ding M; Jha S; Revadigar G; Jha S, 2015, 'Secret Key Generation by Virtual Link Estimation', in BodyNets International Conference on Body Area Networks, European Alliance for Innovation n.o., Sydney, Australia, pp. 301 - 307, presented at 10th EAI International Conference on Body Area Networks (BODYNETS), Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261448
    Conference Posters | 2015
    Javali C; Revadigar G; Hu W; Jha S, 2015, 'Poster: Were you in the cafe yesterday? Location proof generation & verification for mobile users', pp. 429 - 430, http://dx.doi.org/10.1145/2809695.2817898
    Conference Posters | 2015
    Kim JY; Hu WEN; Shafagh H; Kaafar MOHAMEDALI; Jha SANJAY, 2015, 'Poster: Toward Efficient and Secure Code Dissemination Protocol for the Internet of Things', Seoul Korea, presented at ACM Conference on Embedded Networked Sensor Systems, Seoul Korea, 01 November 2015 - 04 November 2015, http://dx.doi.org/10.1145/2809695.2817896
    Conference Papers | 2015
    Li K; Ni W; Wang X; Liu RP; Kanhere SS; Jha S, 2015, 'EPLA: Energy-balancing packets scheduling for airborne relaying networks', in IEEE International Conference on Communications, pp. 6246 - 6251, http://dx.doi.org/10.1109/ICC.2015.7249319
    Conference Posters | 2015
    Li K; Yuen C; Jha S, 2015, 'Poster abstract: Fair scheduling for energy harvesting WSN in smart city', pp. 419 - 420, http://dx.doi.org/10.1145/2809695.2817893
    Conference Papers | 2015
    Murtaza G; Reinhardt A; Kanhere SS; Jha S, 2015, 'Lightweight clustering of spatio-temporal data in resource constrained mobile sensing', in Proceedings of the WoWMoM 2015: A World of Wireless Mobile and Multimedia Networks, http://dx.doi.org/10.1109/WoWMoM.2015.7158166
    Conference Papers | 2015
    Revadigar G; Javali C; Asghar HJ; Rasmussen KB; Jha S, 2015, 'IARC: Secret key generation for resource constrained devices by inducing artificial randomness in the channel', in ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Association for Computing Machinery (ACM), pp. 669, presented at Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, http://dx.doi.org/10.1145/2714576.2714644
    Conference Papers | 2015
    Revadigar GS; Javali C; Asghar HJ; Rasmussen KB; Jha S, 2015, 'Mobility Independent Secret Key Generation for Wearable Health-care Devices', in Proceedings of 10th EAI International Conference on Body Area Networks (BODYNETS), Sydney, Australia, September 2015., European Alliance for Innovation n.o., Sydney, Australia, pp. 294 - 300, presented at 10th EAI International Conference on Body Area Networks (BODYNETS), Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261446
    Conference Papers | 2015
    Revadigar GS; Javali C; Hu W; Jha S, 2015, 'DLINK: Dual Link Based Radio Frequency Fingerprinting for Wearable Devices', in Kanhere S; Tolle J; Cherkaoui S (eds.), Proceedings of the 40th IEEE Conference on Local Computer Networks (LCN), Florida, USA, October 2015, Institute of Electrical and Electronics Engineers (IEEE), Florida, USA, pp. 329 - 337, presented at IEEE Conference on Local Computer Networks (LCN), Florida, USA, 26 October 2015 - 29 October 2015, http://dx.doi.org/10.1109/LCN.2015.7366327
    Conference Papers | 2015
    Rezvani M; Allah Bakhsh M; Vigentini ; Ignjatovic ; Jha , 2015, 'An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems', in ICT Systems Security and Privacy Protection, Hamburg, Germany, presented at IFIP SEC 2015, Hamburg, Germany, 26 May 2015 - 28 May 2015, http://dx.doi.org/10.1007/978-3-319-18467-8_13
    Conference Papers | 2015
    Rezvani M; Ignjatovic ; Bertino E; Jha , 2015, 'A Collaborative Reputation System Based on Credibility Propagation in WSNs', Melbourne, VIC, presented at IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS), Melbourne, VIC, 14 December 2015 - 17 December 2015, http://dx.doi.org/10.1109/ICPADS.2015.9
    Conference Papers | 2015
    Rezvani M; Ignjatovic A; Bertino E; Jha S, 2015, 'A Trust Assessment Framework for Streaming Data in WSNs Using Iterative Filtering', in The IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, presented at The IEEE 10th International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), Singapore, 07 April 2015 - 09 April 2015, http://dx.doi.org/10.1109/ISSNIP.2015.7106935
    Conference Abstracts | 2015
    Siddiqi M; Hager G; Sivaraman V; Jha S, 2015, 'Securing the Timestamping of Sensor Data from Wearable Healthcare Devices', ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), Sydney, Australia, pp. 310 - 310, presented at BodyNets '15 Proceedings of the 10th EAI International Conference on Body Area Networks, Sydney, Australia, 28 September 2015 - 30 September 2015, http://dx.doi.org/10.4108/eai.28-9-2015.2261552
    Conference Abstracts | 2014
    Abaidy Z; Rezvani M; Jha S, 2014, 'MalwareMonitor: An SDN-based framework for securing large networks', in CoNEXT Student Workshop 2014 - Proceedings of the 2014 Workshop, pp. 40 - 42, http://dx.doi.org/10.1145/2680821.2680829
    Conference Papers | 2014
    Chapre Y; Ignjatovic A; Seneviratne A; Jha S, 2014, 'CSI-MIMO: Indoor Wi-Fi Fingerprinting System', in Turgut D (ed.), 39th Annual IEEE Conference on Local Computer Networks, IEEE, Edmonton, Canada, pp. 202 - 209, presented at Local Computer Networks Conference, Edmonton, Canada, 08 September 2014 - 11 September 2014, http://dx.doi.org/10.1109/LCN.2014.6925773
    Conference Papers | 2014
    Li K; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2014, 'kappa-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks', in Krishnamachari B; Murphy AL; Trigoni N (eds.), WIRELESS SENSOR NETWORKS, EWSN 2014, SPRINGER-VERLAG BERLIN, ENGLAND, Oxford, pp. 17 - 33, presented at 11th European Conference on Wireless Sensor Networks (EWSN), ENGLAND, Oxford, 17 February 2014 - 19 February 2014, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000340395900002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2014
    Li K; Kusy B; Jurdak R; Ignjatovic A; Kanhere SS; Jha S, 2014, 'κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks', in Krishnamachari B; Murphy A; Trigoni N (eds.), Proceedings 11th European Conference, EWSN 2014 : Lecture Notes in Computer Science, Springer, Oxford, UK, pp. 17 - 33, presented at 11th European Conference, EWSN 2014, Oxford, UK, 17 February 2014 - 19 February 2014, http://dx.doi.org/10.1007/978-3-319-04651-8_2
    Conference Papers | 2014
    Mohsen Rezvani ; Aleksandar Ignjatovic ; Elisa Bertino ; Sanjay Jha , 2014, 'Provenance-Aware Security Risk Analysis for Hosts and Network Flows', in Proceedings of NOMS 2014 IEEE/IFIP Network Operations and Management Symposium, Krakow, Poland, pp. 1 - 8, presented at IEEE/IFIP Network Operations and Management Symposium, NOMS 2014, Krakow, Poland, 05 May 2014 - 09 May 2014, http://dx.doi.org/10.1109/NOMS.2014.6838250
    Conference Papers | 2014
    Murtaza G; Kanhere S; ignjatovic A; Jha S; Jurdak R, 2014, 'Trajectory Approximation for Resource Constrained Mobile Sensor Networks', in Krishnamachari B (ed.), IEEE DCOSS, Australia, presented at Ghulam Murtaza, Australia, 26 May 2014 - 28 May 2014, http://dx.doi.org/10.1109/DCOSS.2014.27
    Conference Abstracts | 2014
    Shaghaghi A; Hong J; Jha S, 2014, 'An SDN-based framework for detection of illegal rebroadcasting of channels in P2PTV', in VideoNEXT 2014 - Proceedings of the 2014 Workshop on Design, Quality and Deployment of Adaptive Video Streaming, pp. 47 - 49, http://dx.doi.org/10.1145/2676652.2683465
    Conference Papers | 2013
    Ali ST; Sivaraman V; Ostry D; Jha S, 2013, 'Securing data provenance in body area networks using lightweight wireless link fingerprints', in Proceedings of the ACM Conference on Computer and Communications Security, pp. 65 - 72, http://dx.doi.org/10.1145/2517300.2517303
    Conference Presentations | 2013
    Biswas J; Liu R; Wei N; Collings IB; Jha SK, 2013, 'Joint Channel and Delay Aware User Scheduling for Multiuser MIMO system over LTE-A Network', presented at IEEE International Symposium on Quality of Service(IWQoS) 2013, Montreal, canada, 03 June 2013 - 04 June 2013
    Conference Papers | 2013
    Rezvani M; Ignjatovic A; Bertino E; Jha S, 2013, 'Poster abstract: A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks', in SenSys 2013 - Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems, http://dx.doi.org/10.1145/2517351.2517394
    Conference Posters | 2013
    Rezvani M; Ignjatovic A; Jha SK, (ed.), 2013, 'Iterative Security Risk Analysis for Network Flows Based on Provenance and Interdependency', Cambridge, Massachusetts, USA, presented at The IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 2013), Cambridge, Massachusetts, USA, 21 May 2013 - 23 May 2013
    Conference Papers | 2012
    Chou CT; Jha SK; Medhi D; Rosenbaum GF, 2012, 'Dynamic routing of restorable QoS connections in MPLS networks', in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), IEEE, Clearwater, Florida, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012
    Conference Papers | 2012
    Jha SK, 2012, 'Resilience provisioning in provider based overlay networks', in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), IEEE, Clearwater, Florida, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012
    Conference Papers | 2012
    Kanhere S; Jha SK; Ahmed N, 2012, 'Probabilistic coverage in wireless sensor networks', in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), IEEE, Clearwater, Florida, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://dx.doi.org/10.1109/LCN.2005.109
    Conference Posters | 2012
    Li K; Ahmed N; Kanhere S; Jha S, (eds.), 2012, 'Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna', Clearwater, Florida, pp. 156 - 159, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6423595
    Conference Papers | 2012
    Misra P; Hu W; Yang M; Jha S, 2012, 'Efficient cross-correlation via sparse representation in sensor networks', in 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN), IEEE, presented at 2012 ACM/IEEE 11th International Conference on Information Processing in Sensor Networks (IPSN), 16 April 2012 - 20 April 2012, http://dx.doi.org/10.1109/ipsn.2012.6920953
    Conference Papers | 2012
    Misra P; Hu W; Yang M; Jha SK, 2012, 'Efficient Cross-Correlation via Sparse Representation in Sensor Networks', in Proceedings of the 11th International Conference on Information Processing in Sensor Networks, ACM, New York, NY, USA, pp. 13 - 24, presented at 11th ACM/IEEE Conference on Information Processing in Sensing Networks, IPSN'12, Beijing, China, 16 April 2012 - 20 April 2012, http://dx.doi.org/10.1145/2185677.2185680
    Conference Papers | 2012
    Sabrina F; Kanhere S; Jha SK, 2012, 'Implementation and performance analysis of a packet scheduler on a programmable network processor', in Proceedings of the 37th IEEE Conference on Local Computer Networks (LCN 2012), IEEE, Clearwater, Florida, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://dx.doi.org/10.1109/LCN.2005.76
    Conference Papers | 2011
    Ahmed N; Kanhere SS; Jha S, 2011, 'Link characterization for Aerial Wireless Sensor Networks', in 2011 IEEE GLOBECOM Workshops, GC Wkshps 2011, pp. 1274 - 1279, http://dx.doi.org/10.1109/GLOCOMW.2011.6162388
    Conference Papers | 2011
    Tan H; Hu W; Jha SK, 2011, 'A TPM-enabled Remote Attestation Protocol (TRAP) in wireless sensor networks', in PM2HW2N'11 - Proceedings of the 6th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, Association for Computing Machinery, New York, pp. 9 - 16, presented at 6th ACM International Workshop on Performance Monitoring, Measurement, and Evaluation of Heterogeneous Wireless and Wired Networks, PM2HW2N'11, Miami, FL, United states, 31 October 2011 - 31 October 2011, http://dx.doi.org/10.1145/2069087.2069090
    Conference Papers | 2011
    Zhao X; Guo J; Chou CT; Misra A; Jha SK, 2011, 'A high-throughput routing metric for reliable multicast in multi-rate wireless mesh networks', in INFOCOM, 2011 Proceedings IEEE, IEEE, Shanghai, China, pp. 2042 - 2050, presented at IEEE Infocom 2011, Shanghai, China, 10 April 2011 - 15 April 2011, http://dx.doi.org/10.1109/INFCOM.2011.5935012
    Conference Papers | 2010
    Chen Q; Chou CT; Kanhere S; Zhang W; Jha SK, 2010, 'Performance of Multi-Hop Whisper Cognitive Radio Networks', in Proceedings of the IEEE Symposium on New Frontiers in Dynamic Spectrum Access, IEEE, Singapore, presented at IEEE Symposium on New Frontiers in Dynamic Spectrum Access, Singapore, 06 April 2010 - 09 April 2010, http://dx.doi.org/10.1109/DYSPAN.2010.5457892
    Conference Papers | 2010
    Jha SK; Hu W; Tan H, 2010, 'A hardware-based remote attestation protocol in wireless sensor networks', in Proceedings of the 9th International Conference on Information Processing in Sensor Networks, ACM, New York, NY, USA., pp. 378 - 379, presented at 9th ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2010, Stockholm - Sweden, 12 April 2010 - 16 April 2010, http://dx.doi.org/10.1145/1791212.1791263
    Conference Papers | 2009
    Sridhar S; Guo J; Jha S, 2009, 'Channel Assignment in Multi-Radio Wireless Mesh Networks: A Graph-Theoretic Approach', in 2009 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORKS (COMSNETS 2009), IEEE, INDIA, Bangalore, pp. 180 - +, presented at 1st International Conference on Communication Systems and Networks, INDIA, Bangalore, 05 January 2009 - 10 January 2009, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000268180500027&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2009
    Tan H; Ostry D; Zic JJ; Jha SK, 2009, 'A confidential and DoS-resistant multi-hop code dissemination protocol for Wireless Sensor Networks', in Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec`09, 2nd ACM Conference on wireless Network Security, Zurich, Switzerland, pp. 245 - 252, presented at 2nd ACM Conference on wireless Network Security, Zurich, Switzerland, 16 March 2009 - 18 March 2009, http://dx.doi.org/10.1145/1520000/1514308
    Conference Papers | 2008
    Ahmed N; Kanhere S; Dong Y; Jha SK; Rutten M; Bessell T; Gordon N, 2008, 'Performance evaluation of a wireless sensor network based tracking system', in Proceedings of the 5th IEEE conference on mobile, ad-hoc and sensor systems (MASS 2008), IEEE, Atlanta, Georgia USA, presented at 5th IEEE conference on mobile, ad-hoc and sensor systems (MASS 2008), Atlanta, Georgia USA, 29 September 2008 - 02 October 2008, http://dx.doi.org/10.1109/MAHSS.2008.4660057
    Conference Papers | 2008
    Bokareva T; Bulusu N; Jha S, 2008, 'Graph Theory Based Aggregation of Sensor Readings in Wireless Sensor Networks.', in 2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, IEEE, CANADA, Montreal, pp. 503 - 504, presented at 33rd Annual IEEE Conference on Local Computer Networks, CANADA, Montreal, 14 October 2008 - 17 October 2008, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000262914500071&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2008
    Bokareva T; Bulusu N; Jha S, 2008, 'Graph theory based aggregation of sensor readings in wireless sensor networks', in Proceedings - Conference on Local Computer Networks, LCN, pp. 514 - 515, http://dx.doi.org/10.1109/LCN.2008.4664216
    Conference Papers | 2008
    Guo J; Jha SK, 2008, 'Host-Aware Routing in Multicast Overlay Backbone', in 20th IEEE/IFIP Network Operations and Management Symposium, Salvador, Bahia, Brazil, presented at 20th IEEE/IFIP Network Operations and Management Symposium, Salvador, Bahia, Brazil, 07 April 2008 - 11 April 2008
    Conference Papers | 2008
    Liu RP; Rosberg Z; Collings IB; Wilson C; Dong AY; Jha S, 2008, 'Overcoming Radio Link Asymmetry in Wireless Sensor Networks', in 2008 IEEE 19TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, IEEE, FRANCE, Cannes, pp. 289 - 293, presented at 19th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, FRANCE, Cannes, 15 September 2008 - 18 September 2008, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000282721800056&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2008
    Liu RP; Zic J; Collings IB; Dong AY; Jha S, 2008, 'Efficient Reliable Data Collection in Wireless Sensor Networks', in 68TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, FALL 2008, IEEE, CANADA, Calgary, pp. 1974 - 1978, presented at 68th IEEE Vehicular Technology Conference, CANADA, Calgary, 21 September 2008 - 24 September 2008, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000288717900395&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2008
    Tan H; Jha S; Ostry D; Zic J; Sivaraman V, 2008, 'Secure Multi-hop Network Programming With Multiple One-way Key Chains', in WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, ASSOC COMPUTING MACHINERY, VA, Alexandria, pp. 183 - 193, presented at 1st ACM Conference on Wireless Network Security, VA, Alexandria, 31 March 2008 - 02 April 2008, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000265875600023&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2008
    Tan H; Jha SK; Ostry D; Zic J; Sivaraman V, 2008, 'Secure multi-hop network programming with multiple one-way key chains', in 1st ACM conference on wireless network security, Alexandria, Virginia USA, presented at 1st ACM conference on wireless network security, Alexandria, Virginia USA, 31 March 2008 - 02 April 2008
    Conference Papers | 2008
    Zhao X; Chou CT; Guo J; Jha SK; Misra A, 2008, 'Probabilistically reliable on-demand multicast in wireless mesh networks', in 9th IEEE international symposium on a world of wireless, mobile and multimedia networks, Newport Beach, CA, USA, presented at 9th IEEE international symposium on a world of wireless, mobile and multimedia networks, Newport Beach, CA, USA, 23 June 2008 - 27 June 2008
    Conference Papers | 2007
    Guo J; Jha S, 2007, 'Placing Multicast Proxies for Internet Live Media Streaming', in 32nd IEEE Conference on Local Computer Networks (LCN 2007), IEEE, presented at 32nd IEEE Conference on Local Computer Networks (LCN 2007), 15 October 2007 - 18 October 2007, http://dx.doi.org/10.1109/lcn.2007.101
    Conference Papers | 2007
    Guo J; Jha SK, 2007, 'Construction of a proxy-based overlay skeleton tree for large-scale real-time group communications', in IFIP networking 2007, Atlanta, Georgia USA, presented at IFIP networking 2007, Atlanta, Georgia USA, 14 May 2007 - 18 May 2007
    Conference Papers | 2007
    Jha S, 2007, 'Message from the general chair', in SenSys'07 - Proceedings of the 5th ACM Conference on Embedded Networked Sensor Systems
    Conference Papers | 2007
    Rana YK; Jha S, 2007, 'RRAND: A New Requirement Aware RAND based Flexible Slot Allocation Mechanism Optimized For Spatial Reuse Of Slots', in 32nd IEEE Conference on Local Computer Networks (LCN 2007), IEEE, presented at 32nd IEEE Conference on Local Computer Networks (LCN 2007), 15 October 2007 - 18 October 2007, http://dx.doi.org/10.1109/lcn.2007.95
    Conference Papers | 2007
    Shaheen J; Ostry D; Sivaraman V; Jha S, 2007, 'Confidential and secure broadcast in wireless sensor networks', in 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, IEEE, GREECE, Athens, pp. 2164 - 2168, presented at 18th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication, GREECE, Athens, 03 September 2007 - 07 September 2007, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000253402501141&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2007
    Sivaraman V; Jha SK; Shaheen J; Ostry D, 2007, 'Confidential and secure broadcast in wireless sensor networks', in 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communication (PIMRC 2007), Athens, Greece, presented at 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communication (PIMRC 2007), Athens, Greece, 03 September 2007 - 07 September 2007
    Conference Papers | 2007
    Zhao X; Chou CT; Guo J; Jha S, 2007, 'A Scheme for Probabilistically Reliable Multicast Routing in Wireless Mesh Networks', in 32nd IEEE Conference on Local Computer Networks (LCN 2007), IEEE, pp. 213 - 214, presented at 2007 32nd IEEE Conference on Local Computer Networks, 15 October 2007 - 18 October 2007, http://dx.doi.org/10.1109/lcn.2007.92
    Conference Papers | 2006
    Zhao X; Chou CT; Guo J; Jha SK, 2006, 'Protecting multicast sessions in wireless mesh networks', in 31st IEEE Conference on Local Computer Networks (LCN 2006), Tampa, Florida, USA, presented at 31st IEEE Conference on Local Computer Networks (LCN 2006), Tampa, Florida, USA, 14 November 2006 - 16 November 2006
    Conference Papers | 2005
    Bokareva T; Jha SK; Bulusu N, 2005, 'SASHA: toward a self-healing hybrid sensor network architecture', in 2nd IEEE workshop on embedded networked sensors (EmNetS-II), Sydney, presented at 2nd IEEE workshop on embedded networked sensors (EmNetS-II), Sydney, 30 May 2005 - 31 May 2005
    Other | 2005
    Boulis A; Jha SK, 2005, Editorial: Network management in new realms: Wireless sensor networks, John Wiley & Sons Ltd, , http://dx.doi.org/10.1002/nem.569
    Conference Papers | 2005
    Hota C; Raghurama G; Jha SK; Lau W, 2005, 'Bandwidth guaranteed restorable multicast virtual private networks', in IEEE International Conference on Personal Wireless Communications, pp. 9 - 13
    Conference Papers | 2005
    Hu W; Bulusu N; Chou CT; Jha S; Taylor A; Tran VN, 2005, 'A hybrid sensor network for cane-toad monitoring', in Proceedings of the 3rd international conference on Embedded networked sensor systems, ACM, pp. 305 - 305, presented at SenSys05: ACM Conference on Embedded Network Sensor Systems, http://dx.doi.org/10.1145/1098918.1098970
    Conference Papers | 2005
    Hu W; Bulusu N; Chou CT; Jha SK; Taylor AJ; Tran VN, 2005, 'The design and evaluation of a hybrid sensor network for cane-toad monitoring', in 4th international symposium on information processing in sensor networks, LA, USA, presented at 4th international symposium on information processing in sensor networks, LA, USA, 25 April 2005 - 27 April 2005
    Conference Papers | 2005
    Jha S, 2005, 'General chair's message', in Second IEEE Workshop on Embedded Networked Sensors, EmNetS-II, pp. 4, http://dx.doi.org/10.1109/EMNETS.2005.1469088
    Conference Papers | 2005
    Jha SK; Banerjee S; Lau CW, 2005, 'Efficient bandwidth guaranteed restoration algorithms for multicast connections', in Networking 2005, Waterloo, Canada, presented at Networking 2005, Waterloo, Canada, 02 May 2005 - 06 May 2005
    Conference Papers | 2005
    Liu BH; Chou CT; Jha SK; Lipman J, 2005, 'Using frequency division to reduce MAI in DS-CDMA wireless seonsor networks', in IEEE Wireless communications and networking conference, New Orleans, Louisiana, USA, presented at IEEE Wireless Communications and Networking Conference WCNC 2005, New Orleans, Louisiana, USA, 13 March 2005 - 17 March 2005
    Conference Papers | 2005
    Sohail S; Chou CT; Kanhere S; Jha SK, 2005, 'On large scale deployment of parallelized file transfer protocol', in 2005 IEEE International performance, computing and communications conference, IEEE, Arizona, USA, presented at IEEE International performance, computing and communications conference 2005, Arizona, USA, 07 April 2005 - 09 April 2005, http://dx.doi.org/10.1109/PCCC.2005.1460560
    Conference Papers | 2004
    Bokareva T; Bulusu N; Jha S, 2004, 'A performance comparison of data dissemination protocols for wireless sensor networks', in GLOBECOM - IEEE Global Telecommunications Conference, pp. 85 - 89
    Conference Papers | 2004
    Bokareva T; Bulusu N; Jha SK, 2004, 'A Comparison of Data Dissemination Protocols for Wireless Sensor Networks', in IEEE Global Telecommunications Conference 2004, IEEE Global Telecommunications Conference 2004, Dallas Texas, USA, presented at IEEE Global Telecommunications Conference 2004, Dallas Texas, USA, 29 November 2004 - 03 December 2004
    Conference Papers | 2004
    Bulusu N; Herbold A; Lamarre T; Jha SK, 2004, 'Resilient Event Detection in Wireless Sensor Networks', in 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, Melbourne, presented at Intelligent Sensors, Sensor Networks and Information Processing Conference 2004, Melbourne, 14 December 2004 - 17 December 2004
    Conference Papers | 2004
    Estrin D; Bulusu N; Jha S, 2004, 'Welcome from the EmNetS-I chairs', in Proceedings - Conference on Local Computer Networks, LCN
    Conference Papers | 2004
    Hassan J; Jha SK, 2004, 'On the Optimization Trade-Off of Expanding Ring Search', in IWDC 2004, Kolkata, India, presented at 6th International Workshop on Distributed Computing (IWDC 2004), Kolkata, India, 27 December 2004 - 30 December 2004
    Conference Papers | 2004
    Hassan J; Jha SK, 2004, 'On the optimization trade-offs of expanding ring search', in Proceedings of the First International Conference on Advances in Natural Computation (ICNC 2005), Part III, Lecture Notes in Computer Science 3612/2005, Springer, pp. 489 - 494
    Conference Papers | 2004
    Hassan J; Jha SK, 2004, 'Optimizing Expanding Ring Search for Multi Hop Wireless Networks', in IEEE Global Telecommunications Conference 2004, Dallas Texas, USA, presented at IEEE Global Telecommunications Conference 2004, Dallas Texas, USA, 29 November 2004 - 03 December 2004
    Conference Papers | 2004
    Hassan J; Jha SK, 2004, 'Performance Analysis of Expanding Ring Search for Multi-hop Wireless Networks', in 60th IEEE Vehicular Technology Conference, Los Angeles, California, presented at 60th IEEE Vehicular Technology Conference, Los Angeles, California, 26 September 2004 - 29 September 2004
    Conference Papers | 2004
    Hota C; Jha SK; Raghurama G, 2004, 'Distributed Dynamic Resource Management in IPVPNs to Gurantee Quality of Service', in 2004 12th IEEE International Conference on Networks (Workshop on Co-ordinated QoS in Distributed Systems), Singapore, presented at 12th IEEE International Conference on Networks (Workshop on Co-ordinated QoS in Distributed Systems) 2004, Singapore, 16 November 2004 - 19 November 2004
    Conference Papers | 2004
    Hota C; Jha SK; Raghurama G, 2004, 'Restoration of Virtual Private Networks with Qos Guarantees in the Pipe Model', in IWDC 2004, Kolkata, India, presented at 6th International Workshop on Distributed Computing (IWDC 2004), Kolkata, India, 27 December 2004 - 30 December 2004
    Conference Papers | 2004
    Hota C; Jha SK; Raghurama G, 2004, 'Restoration of virtual private networks with QoS guarantees in the pipe model', in Proceedings of the First International Conference on Advances in Natural Computation (ICNC 2005), Part III, Lecture Notes in Computer Science 3612/2005, Springer, pp. 289 - 302
    Conference Papers | 2004
    Hu W; Chou CT; Jha SK; Bulusu N, 2004, 'Deploying Long-Lived and Cost-effective Hybrid Sensor Networks', in 1st Annual International Conference on Broadband Networking (BROADNETS) 2004, San Jose, California USA, presented at 1st Annual International Conference on Broadband Networking (BROADNETS) 2004, San Jose, California USA, 25 October 2004 - 29 October 2004
    Conference Papers | 2004
    Hu W; Jha SK; Bulusu N, 2004, 'A Communication Paradigm for Hybrid Sensor/Actuator Networks', in 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Barcelona, Spain, presented at 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Barcelona, Spain, 05 September 2004 - 08 September 2004
    Other | 2004
    Jha S; Hassanein H, 2004, Program committee chair's message for LCN2004,
    Conference Abstracts | 2004
    Jha SK, (ed.), 2004, 'The REKF Localization System: Node Localization Using Mobile Robots', in International Conference on Embedded Systems, Baltimore, Maryland, USA, pp. 321 - 321, presented at International Conference on Embedded Systems, Baltimore, Maryland, USA, 03 November 2004 - 05 November 2004
    Conference Papers | 2004
    Lau CW; Jha SK, 2004, 'Joint-Path Computation Algorithms for Restoration Networks', in IEEE international conference on communications (ICC 2004), Paris, France, presented at IEEE international conference on communications (ICC 2004), Paris, France, 20 June 2004 - 24 June 2004
    Conference Papers | 2004
    Lau W; Jha S, 2004, 'Failure-oriented Path restoration algorithm for survivable networks', in IEEE Symposium Record on Network Operations and Management Symposium, pp. 205 - 218
    Conference Papers | 2004
    Lee KS; Jha SK; Bulusu N; Lee HW, 2004, 'Adaptive Distributed Location Management in Mobile Wireless Networks', in IEEE international conference on communications (ICC 2004), Paris, France, presented at IEEE international conference on communications (ICC 2004), Paris, France, 20 June 2004 - 24 June 2004
    Conference Papers | 2004
    Liu BH; Bulusu N; Pham H; Jha SK, 2004, 'A Self-Organizing, Location-Aware Media Access Control Protocol for DS-CDMA Sensor Networks', in Ist IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Fort Lauderdale, Florida, presented at Ist IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Fort Lauderdale, Florida, 24 October 2004 - 27 October 2004
    Conference Papers | 2004
    Liu BH; Bulusu N; Pham H; Jha SK, 2004, 'CSMAC: A Novel DS-CDMA based MAC Protocol for Wireless Sensor Networks', in IEEE Global Telecommunications Conference 2004, Dallas Texas, USA, presented at IEEE Global Telecommunications Conference 2004, Dallas Texas, USA, 29 November 2004 - 03 December 2004
    Conference Papers | 2004
    Liu BH; Gao Y; Chou CT; Jha SK, 2004, 'An Energy Efficient Select Optimal Neighbour Protocol for Wireless Ad Hoc Networks', in 29th Annual IEEE International Conference on Local Computer Networks, Tampa, Florida, USA, presented at 29th Annual IEEE International Conference on Local Computer Networks, Tampa, Florida, USA, 16 November 2004 - 18 November 2004
    Conference Papers | 2004
    Pathirana PN; Savkin AV; Jha SK, 2004, 'Robust Extended Kalman Filter Applied to Location Tracking and Trajectory Prediction for PCS Networks', in 2004 IEEE International Conference on Control Applications, Taipei, Taiwan, presented at IEEE International Conference on Control Applications (CCA 2004), Taipei, Taiwan, 02 September 2004 - 04 September 2004
    Conference Papers | 2004
    Pham H; Jha S, 2004, 'Addressing mobility in wireless sensor media access protocol', in INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, SAGE PUBLICATIONS INC, AUSTRALIA, Melbourne, pp. 269 - 280, presented at International Conference on Intelligent Sensing and Sensor Networks, AUSTRALIA, Melbourne, http://dx.doi.org/10.1080/15501320590966512
    Conference Papers | 2004
    Pham H; Jha SK, 2004, 'Addressing Mobility in Wireless Sensor Media Access Protocol', in 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, Melbourne, presented at Intelligent Sensors, Sensor Networks and Information Processing Conference 2004, Melbourne, 14 December 2004 - 17 December 2004
    Conference Papers | 2004
    Pham H; Jha SK, 2004, 'An Adaptive Mobility-Aware MAC Protocol for Sensor Networks', in Ist IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Fort Lauderdale, Florida, presented at Ist IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Fort Lauderdale, Florida, 24 October 2004 - 27 October 2004
    Conference Papers | 2004
    Pham H; Rosenbaum GF; Jha SK, 2004, 'Engineering VPN with Differentiated Resilience Support', in International Symposium on Performance Evaluation of Computer and Telecommunication Systems, International Symposium on Performance Evaluation of Computer and Telecommunication Systems, San Jose, California USA, presented at International Symposium on Performance Evaluation of Computer and Telecommunication Systems, San Jose, California USA, 25 July 2004 - 29 July 2004
    Conference Papers | 2004
    Rana YK; Libman L; Jha SK, 2004, 'FEC for TCP congestion control over lossy links', in 3rd Workshop on the Internet, telecommunications and Signal Prcoessing (WITSP`2004), 3rd Workshop on the Internet, telecommunications and Signal Prcoessing (WITSP`2004), Adelaide, Sth Aust, presented at 3rd Workshop on the Internet, telecommunications and Signal Prcoessing (WITSP`2004), Adelaide, Sth Aust, 20 December 2004 - 22 December 2004
    Conference Papers | 2004
    Rosenbaum GF; Jha SK; Boustead P; Safaei F, 2004, 'Resilience Differentiation in Programmable Virtual Networks', in IEEE international conference on communications (ICC 2004), Paris, France, presented at IEEE international conference on communications (ICC 2004), Paris, France, 20 June 2004 - 24 June 2004
    Conference Papers | 2004
    Sabrina F; Jha SK, 2004, 'A Composite Scheduling Algorithm for Programmable Networks', in IEEE international conference on communications (ICC 2004), Paris, France, presented at IEEE international conference on communications (ICC 2004), Paris, France, 20 June 2004 - 24 June 2004
    Conference Papers | 2004
    Savkin AV; Pathirana PN; Jha SK, 2004, 'Robust Extended Kalman Filter Kapplied to Location Tracking and Trajectory Prediction for PCS Networks', in Hara S (ed.), 2004 IEEE International Conference on Control Applications, Taipei, Taiwan, pp. 63 - 68, presented at IEEE International Conference on Control Applications (CCA 2004), Taipei, Taiwan, 02 September 2004 - 04 September 2004
    Conference Papers | 2004
    Sohail S; Jha SK, 2004, 'QoS Driven Parallelized File Transfer Protocol', in ATNAC 2004: Australian Telecommunication Networks and Applications Conference, ATNAC 2004: Australian Telecommunication Networks and Applications Conference, Sydney, presented at ATNAC 2004: Australian Telecommunication Networks and Applications Conference, Sydney, 08 December 2004 - 10 December 2004
    Conference Papers | 2003
    Hassan J; Jha SK, 2003, 'A Cell-based distributed Location Management Protocol for Cell-Hopping Networks', in IEEE ICT 2003, Papeete, French Ploynesia, presented at IEEE ICT 2003, Papeete, French Ploynesia, 24 February 2003 - 01 March 2003
    Conference Papers | 2003
    Hassan J; Jha SK, 2003, 'Reducing Signalling overhead in Cell-Hopping mobile wireless Networks using Location Caches', in IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, presented at IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, 20 October 2003 - 24 October 2003
    Conference Papers | 2003
    Lau CW; Jha SK, 2003, 'APLS: Active Protocol Label Switching', in IEEE 2003: Conference International Conference on Communications, Anchorage, Alaska, presented at IEEE international conference on communications (ICC 2003), Anchorage, Alaska, 11 May 2003 - 15 May 2003
    Conference Papers | 2003
    Liu BH; Jha SK; Chou CT; Ray PK, 2003, 'Optimized Allocation of Distributed Applications Across Local Area Networks', in IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, presented at IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, 20 October 2003 - 24 October 2003
    Conference Papers | 2003
    Liu BH; Jha SK; Chou CT; Ray PK, 2003, 'Resource Allocation for Networked Application Using Binary Integer Programming', in 7th International Symposium on DSP and 2nd Workshop on Internet Telecommunications and Signal Processing, Coolangatta, Gold Coast, Australia, presented at 7th International Symposium on DSP and 2nd Workshop on Internet Telecommunications and Signal Processing, Coolangatta, Gold Coast, Australia, 08 December 2003 - 11 December 2003
    Conference Papers | 2003
    Liu BH; Jha SK; Ray PK, 2003, 'Mapping Distributed Application SLA to Network QoS Parameters', in IEEE ICT 2003, Papeete, French Ploynesia, presented at IEEE ICT 2003, Papeete, French Ploynesia, 24 February 2003 - 01 March 2003
    Conference Papers | 2003
    Pathirana PN; Savkin AV; Jha SK, 2003, 'Mobility Modelling and Trajectory Prediction for Cellular Networks with Mobile Base Stations', in 4th ACM International Symposium on Mobile Ad Hoc Networking, Annaporis, Maryland, USA, presented at 4th ACM International Symposium on Mobile Ad Hoc Networking, Annaporis, Maryland, USA, 01 June 2003 - 03 June 2003
    Conference Papers | 2003
    Rosenbaum GF; Lau CW; Jha SK, 2003, 'An analysis of Virtual Private Network Solutions', in IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, presented at IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, 20 October 2003 - 24 October 2003
    Conference Papers | 2003
    Rosenbaum GF; Lau CW; Jha SK, 2003, 'Recent Directions in Virtual Private Network Solutions', in 11th IEEE International Conference on Networks, Sydney, presented at 11th IEEE International Conference on Networks, Sydney, 28 September 2003 - 01 October 2003
    Conference Papers | 2003
    Sabrina F; Jha S, 2003, 'Fair queuing inactive and programmable networks', in Wysocki TA; Dadej A; Wysocki BJ (eds.), ADVANCED WIRED AND WIRELESS NETWORKS, SPRINGER, AUSTRALIA, Coolangatta, pp. 249 - 266, presented at 2nd Workshop on the Internet, Telecommunications and Signal Processing, AUSTRALIA, Coolangatta, https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000225783800013&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=891bb5ab6ba270e68a29b250adbe88d1
    Conference Papers | 2003
    Sabrina F; Jha SK, 2003, 'A Novel Architecture for Resource Management in Active Networks Using a Directory Service', in IEEE ICT 2003, Papeete, French Ploynesia, presented at IEEE ICT 2003, Papeete, French Ploynesia, 24 February 2003 - 01 March 2003
    Conference Papers | 2003
    Sabrina F; Jha SK, 2003, 'CPU Resource Scheduling in Programmable Networks', in ATNAC 2003: Australian Telecommunications, Networks and Applications Conference, ATNAC 2003: Australian Telecommunications, Networks and Applications Conference, Melbourne, presented at ATNAC 2003: Australian Telecommunications, Networks and Applications Conference, Melbourne, 08 December 2003 - 10 December 2003
    Conference Papers | 2003
    Sabrina F; Jha SK, 2003, 'Fair Resource Allocation in Programmable and Active Networks Using a Composite Scheduler', in 7th International Symposium on DSP and 2nd Workshop on Internet Telecommunications and Signal Processing, 7th International Symposium on DSP and 2nd Workshop on Internet Telecommunications and Signal Processing, Coolangatta, Gold Coast, Australia, presented at 7th International Symposium on DSP and 2nd Workshop on Internet Telecommunications and Signal Processing, Coolangatta, Gold Coast, Australia, 08 December 2003 - 11 December 2003
    Conference Papers | 2003
    Sabrina F; Jha SK, 2003, 'Scheduling Resources in Programmable and Active Networks Based on Adaptive Estimations', in IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, presented at IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, 20 October 2003 - 24 October 2003
    Conference Papers | 2003
    Sohail S; Jha SK; Elgindy H, 2003, 'Parallelized File Transfer Protocol (P-FTP)', in IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, presented at IEEE 28th Conference on Local Computer Networks LCN, Bonn, Germany, 20 October 2003 - 24 October 2003
    Conference Papers | 2003
    Sohail S; Pham K; Nguyen R; Jha SK, 2003, 'Bandwidth Broker Implementation: Circa-Complete and Integrable', in 7th International Symposium on DSP and 2nd Workshop on Internet Telecommunications and Signal Processing, 7th International Symposium on DSP and 2nd Workshop on Internet Telecommunications and Signal Processing, Coolangatta, Gold Coast, Australia, presented at 7th International Symposium on DSP and 2nd Workshop on Internet Telecommunications and Signal Processing, Coolangatta, Gold Coast, Australia, 08 December 2003 - 11 December 2003
    Conference Papers | 2003
    Yuen EW; Lo S; Jha SK, 2003, 'Clack: An active network platform', in IEEE ICT 2003, Papeete, French Ploynesia, presented at IEEE ICT 2003, Papeete, French Ploynesia, 24 February 2003 - 01 March 2003
    Conference Papers | 2002
    Hassan M; Jha SK, 2002, 'Design and Performance Evaluation of a Rate Feedback Control Architecture in TCP/IP Networks', in 21st IEEE International Performance Computing and Communications Conference (IPCCC) 2002, Phoenix, Arizona, presented at 21st IEEE International Performance Computing and Communications Conference (IPCCC) 2002, Phoenix, Arizona, 03 April 2002 - 05 April 2002
    Conference Papers | 2002
    Jha SK, 2002, 'Bandwidth broker and per domain behaviour', in WITSP 2002, 1st Workshop on the Internet, telecommunications and Signal Prcoessing (WITSP 2004), Wollongong, NSW, presented at 1st Workshop on the Internet, telecommunications and Signal Prcoessing (WITSP 2004), Wollongong, NSW, 09 December 2002 - 11 December 2002
    Conference Papers | 2002
    Lee KS; Jha SK; Lau CW, 2002, 'Design and Experimental Evaluation of Mobile Wireless Control Load Protocol', in Workshop of Wireless Local Networks, Tampa, Florida, USA, presented at Workshop of Wireless Local Networks, Tampa, Florida, USA, 06 November 2002 - 08 November 2002
    Conference Papers | 2001
    Chalmers MA; Jha SK; Hassan M, 2001, 'Internet Charging - Behind the Time', in 9th IEEE International Conference on Networks, Bangkok, Thailand, presented at 9th IEEE International Conference on Networks, Bangkok, Thailand, 10 October 2001 - 12 October 2001
    Conference Papers | 2001
    Hassan J; Jha SK, 2001, 'Cell-Hopping: A New Model for Wireless Communications', in IEEE International Conference on Telecommunications ICT2001, IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001
    Conference Papers | 2001
    Hassan M; Jha SK, 2001, 'Implementing Bandwidth Broker using COPS-PR in Java', in IEEE Local Computer Network Conference (LCN2001), Tampa, Florida, USA, presented at IEEE Local Computer Network Conference (LCN2001), Tampa, Florida, USA, 14 November 2001 - 15 November 2001
    Conference Papers | 2001
    Hassan M; Wu JJ; Jha SK; Breen J, 2001, 'GPS Based Infrastructure for Internet Performance Measurement', in IEEE International Conference on Telecommunications ICT2001, IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001
    Conference Papers | 2001
    Jha SK; Hassan M; Rosenbaum F, 2001, 'Experimenting with flow and service seperation using open MPLS test bed', in Quality of Service over Next-Generation Data Networks (part of ITCom, Denver, Colorado, presented at Quality of Service over Next-Generation Data Networks (part of ITCom, Denver, Colorado, 19 August 2001
    Conference Papers | 2001
    Jha SK; Sabrina F; Hassan M; Samuels B, 2001, 'An Analysis of Web Server Performance With an Accelerator', in IEEE International Conference on Telecommunications ICT2001, IEEE International Conference on Telecommunications ICT2001, Bucharest, presented at IEEE International Conference on Telecommunications ICT2001, Bucharest, 04 June 2001
    Conference Papers | 2001
    Lau CW; Jha SK; Hassan M, 2001, 'Current Directions in Active Programmable Networks', in 9th IEEE International Conference on Networks, Bangkok, Thailand, presented at 9th IEEE International Conference on Networks, Bangkok, Thailand, 10 October 2001 - 12 October 2001
    Other | 2001
    Dini P; Borcoci E; Negrescu C; Stanomir D; Banica I; Niculescu G (eds.), 2001, IEEE ICT 2001 Tutorials, IEEE International Conference on Telecommunications ICT2001, Bucharest,
    Conference Papers | 1996
    Jha S; Fry M, 1996, 'Continuous media playback and jitter control', in International Conference on Multimedia Computing and Systems -Proceedings, pp. 245 - 251
    Conference Papers | 1994
    Jha SK; Howarth BR, 1994, 'Capacity planning of LAN using network management', in Conference on Local Computer Networks, pp. 425 - 430
    Conference Papers |
    Pathirana PN; Savkin AV; Jha S, 'Robust extended Kalman filter applied to location tracking and trajectory prediction for PCS networks', in Proceedings of the 2004 IEEE International Conference on Control Applications, 2004., IEEE, pp. 63 - 68, presented at Proceedings of the 2004 IEEE International Conference on Control Applications, http://dx.doi.org/10.1109/cca.2004.1387188

My Research Supervision

Nimesha Wickramasinghe ( joint with Dr Arash Shaghaghi)

Meghali Nandi ( with Dr Arash Shaghaghi)

Hassan Ali (joint with Prof Salil Kanhere)

Marium Malik (with Dr Jiaojiao Jiang and A/Prof Yang Song)

Wenbin Wang (joint with A/Prof Yang Song)

Jinho Go (joint with Dr Jiaojiao Jiang)

Zakia Zaman (with Prof Wen Hu)

Aryan Sharma (Joint with Prof Aruna Seneviratne)