Publications

Conference Paper
A. Salau, Dantu, R., Morozov, K., Upadhyay, K., and Badruddoja, S., Towards a Threat Model and Security Analysis for Data Cooperatives, in 19th International Conference on Security and Cryptography (SECRYPT 2022), 2022.PDF icon Towards a Threat Model and Security Analysis for Data Cooperatives.pdf (511.21 KB)
M. Jaynes and Dantu, R., Tire-road friction estimation utilizing smartphones, in Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on, 2014.PDF icon tire_road_friction_estimation_smartphone.pdf (192.64 KB)
A. Alazzawe, Alazzawe, A., Wijesekera, D., and Dantu, R., A testbed for mobile social computing, in Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on, 2009.PDF icon testbed_mobile_social_computing.pdf (292.66 KB)
V. Chandrasekaran, Dantu, S., Kadiyala, P., Dantu, R., and Phithakkitnukoon, S., Socio-technical aspects of video phones, in 2010 Second International Conference on COMmunication Systems and NETworks (COMSNETS 2010), 2010.PDF icon socio_technical_aspects_video_phones.pdf (635.82 KB)
X. Yang, Dantu, R., and Wijesekera, D., A society-integrated testbed architecture for peer-to-peer telecommunications, in Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, 2009. TridentCom 2009. 5th International Conference on, 2009.
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Smarter Contracts to Predict using Deep-Learning Algorithms, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Smarter_Contracts_to_Predict_using_Deep-Learning_Algorithms.pdf (1.01 MB)
S. Thiyagaraja, Vempati, J., Dantu, R., Sarma, T., and Dantu, S., Smart phone monitoring of second heart sound split, in 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2014.PDF icon smartphone_monitoring_second_heart_sound_split.pdf (663.54 KB)
R. Dantu, Cangussu, J., and Turi, J., Sensitivity Analysis of an Attack Containment Model, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon sensitivity_analysis_attack_containment_model.pdf (359.68 KB)
H. Sengar, Dantu, R., and Wijesekera, D., Securing VoIP and PSTN from integrated signaling network vulnerabilities, in 1st IEEE Workshop on VoIP Management and Security, 2006., 2006.PDF icon securing_voip_pstn_integrated_signaling_network.pdf (157.95 KB)
R. Dantu and Kolan, P., Risk Management Using Behavior Based Bayesian Networks, in Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics, Atlanta, GA, 2005.PDF icon risk_mgmt_using_behavior_based_bayesian_networks.pdf (245.51 KB)
R. Dantu, Loper, K., and Kolan, P., Risk Management Using Behavior Based Attack Graphs, in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2, Washington, DC, USA, 2004.
J. Talkington and Dantu, R., Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation, in 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), 2016.PDF icon Realizing_Optimal_Chest_Compression_Fraction_CPR.pdf (222.05 KB)
C. Claiborne, Ncube, C., and Dantu, R., Random anonymization of mobile sensor data: Modified Android framework, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon random_anonymization_mobile_sensor_data.pdf (371.83 KB)
J. Germain, Dantu, R., and Thompson, M., Qubit Reset and Refresh: A Gamechanger for Random Number Generation, in Twelveth ACM Conference on Data and Application Security and Privacy (CODASPY ), 2022.PDF icon Qubit Reset and Refresh: A Gamechanger for Random Number Generation.pdf (1.08 MB)
J. Germain, Dantu, R., Thompson, M., and Dockendorf, M., Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation, in 2022 IEEE International Conference on Quantum Computing and Engineering (QCE), 2022.PDF icon Quantum_Networks_Reset-and-Reuse_can_be_a_Game-changer_for_Entanglement_via_Distillation.pdf (1.03 MB)
H. Zhang and Dantu, R., Quantifying the Presence of Phone Users, in 2008 5th IEEE Consumer Communications and Networking Conference, 2008.PDF icon quantifying_presence_phone_users.pdf (278.32 KB)
H. Zhang, Dantu, R., and Cangussu, J., Quantifying Reciprocity in Social Networks, in 2009 International Conference on Computational Science and Engineering, Washington, DC, USA, 2009.PDF icon quantifying_reciprocity_social_networks.pdf (250.6 KB)
H. Husna, Phithakkitnukoon, S., Baatarjav, E. - A., and Dantu, R., Quantifying presence using calling patterns, in Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, 2008.PDF icon quantifying_presence_call_patterns.pdf (126.24 KB)
N. Gupta and Dantu, R., Quantifying Cognitive Impairment Due to Physical or Mental Stress, in Proceedings of the 6th International Conference on PErvasive Technologies Related to Assistive Environments, New York, NY, USA, 2013.PDF icon quantify_cognitive_impairment_physical_mental_stress.pdf (403.58 KB)
E. - A. Baatarjav, Dantu, R., and Phithakkitnukoon, S., Privacy Management for Facebook, in 4th International Conference on Information Systems Security (ICISS 2008), Hyderabad, India, 2008.PDF icon privacy_mgmt_facebook.pdf (661.91 KB)
H. Takabi, Hashem, Y., and Dantu, R., Prediction of human error using eye movements patterns for unintentional insider threat detection, in 2018 IEEE 4th International Conference on Identity, Security, and Behavior Analysis (ISBA), 2018.PDF icon Predict_Human_Error_Eye_Movement_Unintentional_Insider_Threat.pdf (102.75 KB)
H. Zhang and Dantu, R., Predicting social ties in mobile phone networks, in 2010 IEEE International Conference on Intelligence and Security Informatics (ISI), Vancouver, BC, Canada, 2010.PDF icon predicting_social_ties_in_mobile_phone_networks.pdf (366.29 KB)
S. Phithakkitnukoon and Dantu, R., Predicting Calls: New Service for an Intelligent Phone, in 10th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2007, San José, USA, 2007.PDF icon PredictingCalls_NewServices_IntelligentPhone.pdf (493.1 KB)
Q. Mayo, Bryce, R., and Dantu, R., PhD Forum: A System Identification Approach to Monitoring Network Traffic Security, in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015.PDF icon System_Identification_Approach_Monitor_Network_Traffic_Sec.pdf (146.01 KB)
N. Sen, Dantu, R., Vempati, J., and Thompson, M., Performance Analysis of Elliptic Curves for Real-Time Video Encryption, in 2018 National Cyber Summit (NCS), 2018.PDF icon Performance_Analysis_Elliptic_Curves_RealTime_Video_Encryption.pdf (382.64 KB)

Pages