Publications

Journal Article
N. Gupta, Dantu, V., and Dantu, R., Effective CPR Procedure With Real Time Evaluation and Feedback Using Smartphones, IEEE Journal of Translational Engineering in Health and Medicine, vol. 2, pp. 1-11, 2014.
R. Dantu, Clothier, G., and Atri, A., EAP Methods for Wireless Networks, Comput. Stand. Interfaces, vol. 29, pp. 289–301, 2007.PDF icon eap_methods_for_wireless_networks.pdf (336.97 KB)
V. Prasanna, Mikler, A., Dantu, R., and Abbas, K., Dynamic resource management in QoS controlled networks, Telecommunication Systems, vol. 32, pp. 11–30, 2006.PDF icon dynamic_resource_mgmt_qos_controlled_network.pdf (470.14 KB)
G. Bajwa, Fazeen, M., and Dantu, R., Detecting driver distraction using stimuli-response EEG analysis, CoRR, vol. abs/1904.09100, 2019.PDF icon Detect_Driver_Distraction_Stimuli_Response_EEG_Analysis.pdf (4.23 MB)
R. Dantu, Dimopoulos, N., Patel, R., and Al-Khalili, A., Depth perception using blurring and its application in VLSI wafer probing, Machine Vision and Applications, vol. 5, pp. 35–45, 1992.
V. Chandrasekaran, Dantu, R., Jonnada, S., Thiyagaraja, S., and Subbu, K., Cuffless Differential Blood Pressure Estimation Using Smart Phones, IEEE Transactions on Biomedical Engineering, vol. 60, pp. 1080 - 1089, 2013.
S. Phithakkitnukoon and Dantu, R., ContextAlert: Context‐aware alert mode for a mobile phone, International Journal of Pervasive Computing and Communications, vol. 6, pp. 1–23, 2010.PDF icon ContextAlert.pdf (599.33 KB)
R. Dantu, Palla, S., and Cangussu, J., Classification of phishers, Journal of Homeland Security and Emergency Management, vol. 5, 2008.PDF icon classification_phishers.pdf (410.26 KB)
S. Phithakkitnukoon, Dantu, R., Claxton, R., and Eagle, N., Behavior-based Adaptive Call Predictor, ACM Trans. Auton. Adapt. Syst., vol. 6, pp. 21:1–21:28, 2011.
R. Dantu and Guturu, P., An Architecture for IP-based Next Generation Radio Access Network, Fourth-Generation Wireless Networks: Applications and Innovations: Applications and Innovations, p. 61, 2009.
R. Dantu and Cangussu, J., An Architecture for Automatic and Adaptive Defense, Journal of Information Privacy and Security, vol. 3, pp. 37-58, 2007.PDF icon architecture_automatic_adaptive_defense.pdf (252.72 KB)
Conference Paper
K. Upadhyay, Dantu, R., Zaccagni, Z., and Badruddoja, S., Is your legal contract ambiguous? Convert to a smart legal contract, in 2020 IEEE International Conference on Blockchain (Blockchain), 2020.
J. Talkington, Dantu, R., and Morozov, K., Verifying OAuth Implementations Through Encrypted Network Analysis, in Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, 2019.PDF icon Verifying OAuth Implementations Through Encrypted Network.pdf (1.13 MB)
S. Palla and Dantu, R., Unwanted SMTP Paths and Relays, in 2007 2nd International Conference on Communication Systems Software and Middleware, 2007.
E. - A. Baatarjav and Dantu, R., Unveiling Hidden Patterns to Find Social Relevance, in Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on, 2011.PDF icon unveil_hidden_patterns_find_social_relevance.pdf (913.21 KB)
J. Vempati, Dantu, R., and Thompson, M., Uninterrupted Video Surveillance in the Face of an Attack, in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018.PDF icon Uninterrupted_Video_Surveillance_Attack.pdf (681.67 KB)
G. Bajwa, Fazeen, M., Dantu, R., and Tanpure, S., Unintentional bugs to vulnerability mapping in Android applications, in Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on, 2015.PDF icon unintentional_bugs_vulnerability_mapping_android_apps.pdf (182.24 KB)
S. Badruddoja, Dantu, R., He, Y., Thompson, M., Salau, A., and Upadhyay, K., Trusted AI with Blockchain to Empower Metaverse, in 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA), 2022.PDF icon Trusted_AI_with_Blockchain_to_Empower_Metaverse.pdf (1.04 MB)
H. Husna, Phithakkitnukoon, S., and Dantu, R., Traffic Shaping of Spam Botnets, in 2008 5th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2008.PDF icon traffic_shaping_spam_botnet.pdf (145.58 KB)
Y. Hashem, Takabi, H., GhasemiGol, M., and Dantu, R., Towards Insider Threat Detection Using Psychophysiological Signals, in Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, New York, NY, USA, 2015.PDF icon Towards_Insider_Threat_Detection_Psychophysiological_signals.pdf (705.73 KB)

Pages