Load aware traffic engineering for mesh networks DM Shila, T Anjali Computer Communications 31 (7), 1460-1469, 2008 | 261 | 2008 |
Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks X Cao, DM Shila, Y Cheng, Z Yang, Y Zhou, J Chen IEEE Internet of Things Journal 3 (5), 816-829, 2016 | 169 | 2016 |
Secure key establishment for device-to-device communications W Shen, W Hong, X Cao, B Yin, DM Shila, Y Cheng 2014 IEEE Global Communications Conference, 336-340, 2014 | 93 | 2014 |
Mitigating selective forwarding attacks with a channel-aware approach in WMNs DM Shila, Y Cheng, T Anjali IEEE transactions on wireless communications 9 (5), 1661-1675, 2010 | 91 | 2010 |
AMCloud: Toward a secure autonomic mobile ad hoc cloud computing system DM Shila, W Shen, Y Cheng, X Tian, XS Shen IEEE Wireless Communications 24 (2), 74-81, 2016 | 75 | 2016 |
Advancing the state-of-the-art in hardware trojans detection SK Haider, C Jin, M Ahmad, DM Shila, O Khan, M van Dijk IEEE Transactions on Dependable and Secure Computing 16 (1), 18-32, 2017 | 71 | 2017 |
Defending selective forwarding attacks in WMNs DM Shila, T Anjali 2008 IEEE International Conference on Electro/Information Technology, 96-101, 2008 | 64 | 2008 |
Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks DM Shila, Y Cheng, T Anjali 2011 Proceedings IEEE INFOCOM, 1476-1484, 2011 | 51 | 2011 |
Design, implementation and security analysis of hardware Trojan threats in FPGA DM Shila, V Venugopal 2014 IEEE International Conference on Communications (ICC), 719-724, 2014 | 41 | 2014 |
High throughput implementations of cryptography algorithms on GPU and FPGA V Venugopal, DM Shila 2013 IEEE International Instrumentation and Measurement Technology …, 2013 | 30 | 2013 |
Channel-aware detection of gray hole attacks in wireless mesh networks DM Shila, Y Cheng, T Anjali GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 30 | 2009 |
A game theoretic approach to gray hole attacks in wireless mesh networks DM Shila, T Anjali MILCOM 2008-2008 IEEE Military Communications Conference, 1-7, 2008 | 30 | 2008 |
Ctin: Robust contextual transformer network for inertial navigation B Rao, E Kazemi, Y Ding, DM Shila, FM Tucker, L Wang Proceedings of the AAAI Conference on Artificial Intelligence 36 (5), 5413-5421, 2022 | 28 | 2022 |
Moving target defense for Internet of Things using context aware code partitioning and code diversification K Mahmood, DM Shila 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 329-330, 2016 | 26 | 2016 |
A systematic study of maximal scheduling algorithms in multiradio multichannel wireless networks Y Cheng, H Li, DM Shila, X Cao IEEE/ACM Transactions on Networking 23 (4), 1342-1355, 2014 | 26 | 2014 |
Detecting data integrity attacks on correlated solar farms using multi-layer data driven algorithm KG Lore, DM Shila, L Ren 2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018 | 25 | 2018 |
A multi-faceted approach to user authentication for mobile devices—using human movement, usage, and location patterns DM Shila, K Srivastava, P O'Neill, K Reddy, V Sritapan 2016 IEEE symposium on Technologies for Homeland Security (HST), 1-6, 2016 | 24 | 2016 |
A systematic study of the delayed column generation method for optimizing wireless networks Y Cheng, X Cao, X Shen, DM Shila, H Li Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014 | 24 | 2014 |
Ad hoc wireless networks meet the infrastructure: Mobility, capacity and delay DM Shila, Y Cheng 2012 Proceedings IEEE INFOCOM, 3031-3035, 2012 | 23 | 2012 |
CASTRA: Seamless and unobtrusive authentication of users to diverse mobile services DM Shila, K Srivastava IEEE Internet of Things Journal 5 (5), 4042-4057, 2018 | 21 | 2018 |