The group is interested in Mesh networks, 4G LTE/WiMAX, Cognitive radio, Cellular network measurements, Wireless networks, Network security, Operating systems security, mobile operating systems and device drivers, Operating systems for IoT systems.
Publications
Is the Shuffle-Exchange Better Than the Butterfly? Proceedings Article
In: Wen-Lian Hsu, Richard C. T. Lee (Ed.): ISA '91 Algorithms, 2nd International Symposium on Algorithms, Taipei, Republic of China, December 16-18, 1991, Proceedings, pp. 32–41, Springer, 1991.
Covering Orthogonal Polygons with Star Polygons: The Perfect Graph Approach Journal Article
In: J. Comput. Syst. Sci., vol. 40, no. 1, pp. 19–48, 1990.
Perfect Graphs and Orthogonally Convex Covers Journal Article
In: SIAM J. Discret. Math., vol. 2, no. 3, pp. 371–392, 1989.
Covering Orthogonal Polygons with Star Polygons: The Perfect Graph Approach Proceedings Article
In: Herbert Edelsbrunner (Ed.): Proceedings of the Fourth Annual Symposium on Computational Geometry, Urbana-Champaign, IL, USA, June 6-8, 1988, pp. 211–223, ACM, 1988.
Constructive Results from Graph Minors: Linkless Embeddings Proceedings Article
In: 29th Annual Symposium on Foundations of Computer Science, White Plains, New York, USA, 24-26 October 1988, pp. 398–409, IEEE Computer Society, 1988.
Members
Projects
- Detecting Adversarial Machine Learning-Assisted Attacks in IoT NetworksVireshwar Kumar (Assistant Professor, IITD) (PI), Rajeev Shorey (Adjunct Faculty, IITD) (co-PI), Dan Kim (Professor, University of Queensland) (co-PI) Sponsored by: Ministry of Electronics and Information Technology (MeitY)… Read More »Detecting Adversarial Machine Learning-Assisted Attacks in IoT Networks