Follow
Devu Manikantan Shila
Devu Manikantan Shila
Founder & CEO @ Unknot.id
Verified email at unknot.id - Homepage
Title
Cited by
Cited by
Year
Load aware traffic engineering for mesh networks
DM Shila, T Anjali
Computer Communications 31 (7), 1460-1469, 2008
2612008
Ghost-in-zigbee: Energy depletion attack on zigbee-based wireless networks
X Cao, DM Shila, Y Cheng, Z Yang, Y Zhou, J Chen
IEEE Internet of Things Journal 3 (5), 816-829, 2016
1632016
Secure key establishment for device-to-device communications
W Shen, W Hong, X Cao, B Yin, DM Shila, Y Cheng
2014 IEEE Global Communications Conference, 336-340, 2014
912014
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
DM Shila, Y Cheng, T Anjali
IEEE transactions on wireless communications 9 (5), 1661-1675, 2010
902010
AMCloud: Toward a secure autonomic mobile ad hoc cloud computing system
DM Shila, W Shen, Y Cheng, X Tian, XS Shen
IEEE Wireless Communications 24 (2), 74-81, 2016
742016
Advancing the state-of-the-art in hardware trojans detection
SK Haider, C Jin, M Ahmad, DM Shila, O Khan, M van Dijk
IEEE Transactions on Dependable and Secure Computing 16 (1), 18-32, 2017
682017
Defending selective forwarding attacks in WMNs
DM Shila, T Anjali
2008 IEEE International Conference on Electro/Information Technology, 96-101, 2008
652008
Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks
DM Shila, Y Cheng, T Anjali
2011 Proceedings IEEE INFOCOM, 1476-1484, 2011
512011
Design, implementation and security analysis of hardware Trojan threats in FPGA
DM Shila, V Venugopal
2014 IEEE International Conference on Communications (ICC), 719-724, 2014
412014
A game theoretic approach to gray hole attacks in wireless mesh networks
DM Shila, T Anjali
MILCOM 2008-2008 IEEE Military Communications Conference, 1-7, 2008
312008
High throughput implementations of cryptography algorithms on GPU and FPGA
V Venugopal, DM Shila
2013 IEEE International Instrumentation and Measurement Technology …, 2013
302013
Channel-aware detection of gray hole attacks in wireless mesh networks
DM Shila, Y Cheng, T Anjali
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
282009
A systematic study of maximal scheduling algorithms in multiradio multichannel wireless networks
Y Cheng, H Li, DM Shila, X Cao
IEEE/ACM Transactions on Networking 23 (4), 1342-1355, 2014
262014
Detecting data integrity attacks on correlated solar farms using multi-layer data driven algorithm
KG Lore, DM Shila, L Ren
2018 IEEE Conference on Communications and Network Security (CNS), 1-9, 2018
252018
Moving target defense for Internet of Things using context aware code partitioning and code diversification
K Mahmood, DM Shila
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 329-330, 2016
252016
A multi-faceted approach to user authentication for mobile devices—using human movement, usage, and location patterns
DM Shila, K Srivastava, P O'Neill, K Reddy, V Sritapan
2016 IEEE symposium on Technologies for Homeland Security (HST), 1-6, 2016
232016
Ad hoc wireless networks meet the infrastructure: Mobility, capacity and delay
DM Shila, Y Cheng
2012 Proceedings IEEE INFOCOM, 3031-3035, 2012
232012
A systematic study of the delayed column generation method for optimizing wireless networks
Y Cheng, X Cao, X Shen, DM Shila, H Li
Proceedings of the 15th ACM international symposium on Mobile ad hoc …, 2014
222014
Ctin: Robust contextual transformer network for inertial navigation
B Rao, E Kazemi, Y Ding, DM Shila, FM Tucker, L Wang
Proceedings of the AAAI Conference on Artificial Intelligence 36 (5), 5413-5421, 2022
202022
Adversarial gait detection on mobile devices using recurrent neural networks
DM Shila, E Eyisi
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
192018
The system can't perform the operation now. Try again later.
Articles 1–20