The group is interested in Mesh networks, 4G LTE/WiMAX, Cognitive radio, Cellular network measurements, Wireless networks, Network security, Operating systems security, mobile operating systems and device drivers, Operating systems for IoT systems.
Publications
APGPM: Automated PMC-Based Power Modeling Methodology for Modern Mobile GPUs Proceedings Article
In: IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2024, Indianapolis, IN, USA, May 5-7, 2024, pp. 295–297, IEEE, 2024.
WebLight: DRL based Intersection Control in Developing Countries without Reliable Cameras Proceedings Article
In: Aaditeshwar Seth, Pushpendra Singh, Aditya Vashistha, Agha Ali Raza, Vanessa Fr'ıas-Martinez (Ed.): Proceedings of the 7th ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, COMPASS 2024, New Delhi, India, July 8-11, 2024, pp. 201–210, ACM, 2024.
Reactive Dataflow for Inflight Error Handling in ML Workflows Proceedings Article
In: Proceedings of the Eighth Workshop on Data Management for End-to-End Machine Learning, DEEM 2024, Santiago, AA, Chile, 9 June 2024, pp. 51–61, ACM, 2024.
SpotOn: Adversarially Robust Keyword Spotting on Resource-Constrained IoT Platforms Proceedings Article
In: Jianying Zhou, Tony Q. S. Quek, Debin Gao, Alvaro A. Cárdenas (Ed.): Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, Singapore, July 1-5, 2024, ACM, 2024.
Reactive Dataflow for Inflight Error Handling in ML Workflows Proceedings Article
In: Proceedings of the Eighth Workshop on Data Management for End-to-End Machine Learning, DEEM 2024, Santiago, AA, Chile, 9 June 2024, pp. 51–61, ACM, 2024.
Members
Projects
- Detecting Adversarial Machine Learning-Assisted Attacks in IoT NetworksVireshwar Kumar (Assistant Professor, IITD) (PI), Rajeev Shorey (Adjunct Faculty, IITD) (co-PI), Dan Kim (Professor, University of Queensland) (co-PI) Sponsored by: Ministry of Electronics and Information Technology (MeitY)… Read More »Detecting Adversarial Machine Learning-Assisted Attacks in IoT Networks