K P. Subbalakshmi

Affiliations: 
Stevens Institute of Technology 
Area:
Electronics and Electrical Engineering, Computer Science
Google:
"K Subbalakshmi"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Jin Z, Morgan JP, Anand S, et al. (2014) NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA 2014 Ieee Conference On Communications and Network Security, Cns 2014. 44-52
Jin Z, Anand S, Subbalakshmi KP. (2012) Impact of primary user emulation attacks on dynamic spectrum access networks Ieee Transactions On Communications. 60: 2635-2643
Luo G, Subbalakshmi KP. (2011) KL-sense secure image steganography International Journal of Security and Networks. 6: 211-225
Luo G, Subbalakshmi KP. (2011) Zero Kullback-Liebler divergence image data hiding Globecom - Ieee Global Telecommunications Conference
Jin Z, Anand S, Subbalakshmi KP. (2010) Performance analysis of dynamic spectrum access networks under primary user emulation attacks Globecom - Ieee Global Telecommunications Conference
Jin Z, Anand S, Subbalakshmi KP. (2010) Robust spectrum decision protocol against primary user emulation attacks in dynamic spectrum access networks Globecom - Ieee Global Telecommunications Conference
Jin Z, Anand S, Subbalakshmi KP. (2009) Detecting primary user emulation attacks in dynamic spectrum access networks Ieee International Conference On Communications
Mathur CN, Haleem MA, Chandramouli R, et al. (2008) Impact of constraints on the complexity of dynamic spectrum assignment Globecom - Ieee Global Telecommunications Conference. 3164-3169
Anand S, Jin Z, Subbalakshmi KP. (2008) An analytical model for primary user emulation attacks in cognitive radio networks 2008 Ieee Symposium On New Frontiers in Dynamic Spectrum Access Networks, Dyspan 2008. 76-81
Xing Y, Mathur CN, Haleem MA, et al. (2007) Dynamic spectrum access with QoS and interference temperature constraints Ieee Transactions On Mobile Computing. 6: 423-432
See more...