default search action
Keshav Sood
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Mohammad Reza Nosouhi, Keshav Sood, Vinay Chamola, Jongkil Jay Jeong, Anuroop Gaddam:
Towards quantum-secure software defined networks. IET Quantum Commun. 5(1): 66-71 (2024) - [j39]Lang Fan, Xiaoning Zhang, Yangming Zhao, Keshav Sood, Shui Yu:
Online Training Flow Scheduling for Geo-Distributed Machine Learning Jobs Over Heterogeneous and Dynamic Networks. IEEE Trans. Cogn. Commun. Netw. 10(1): 277-291 (2024) - [j38]Dinh Duc Nha Nguyen, Keshav Sood, Yong Xiang, Longxiang Gao, Lianhua Chi, Gurpreet Singh, Shui Yu:
Design and Robust Evaluation of Next Generation Node Authentication Approach. IEEE Trans. Dependable Secur. Comput. 21(6): 5311-5323 (2024) - [j37]Gurpreet Singh, Keshav Sood, Rajalakshmi Pachamuthu, Dinh Duc Nha Nguyen, Yong Xiang:
Evaluating Federated Learning-Based Intrusion Detection Scheme for Next Generation Networks. IEEE Trans. Netw. Serv. Manag. 21(4): 4816-4829 (2024) - [j36]Youyang Qu, Shui Yu, Longxiang Gao, Keshav Sood, Yong Xiang:
Blockchained Dual-Asynchronous Federated Learning Services for Digital Twin Empowered Edge-Cloud Continuum. IEEE Trans. Serv. Comput. 17(3): 836-849 (2024) - [c14]Mohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Divyans Mahansaria, Debi Prasad Pati, Praveen Gauravaram, Lei Pan, Keshav Sood:
Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology Environments. ARES 2024: 145:1-145:11 - [i4]Alireza Mohammadi, Keshav Sood, Dhananjay R. Thiruvady, Asef Nazari:
Securing Voice Authentication Applications Against Targeted Data Poisoning. CoRR abs/2406.17277 (2024) - 2023
- [j35]Xiaodong Qu, Chengcheng Guan, Gang Xie, Zhiyi Tian, Keshav Sood, Chaoli Sun, Lei Cui:
Personalized Federated Learning for Heterogeneous Residential Load Forecasting. Big Data Min. Anal. 6(4): 421-432 (2023) - [j34]Chaochen Shi, Yong Xiang, Jiangshan Yu, Keshav Sood, Longxiang Gao:
Machine translation-based fine-grained comments generation for solidity smart contracts. Inf. Softw. Technol. 153: 107065 (2023) - [j33]Dinh Duc Nha Nguyen, Keshav Sood, Yong Xiang, Longxiang Gao, Lianhua Chi, Shui Yu:
Toward IoT Node Authentication Mechanism in Next Generation Networks. IEEE Internet Things J. 10(15): 13333-13341 (2023) - [j32]Keshav Sood, Dinh Duc Nha Nguyen, Youyang Qu, Lei Cui, Kallol Krishna Karmakar, Shui Yu:
Security Challenges and Potential Solutions in Aerial-Terrestrial Wireless Networking. IEEE Internet Things Mag. 6(4): 118-123 (2023) - [j31]Juan Zhao, Tianrui Zong, Yong Xiang, Longxiang Gao, Guang Hua, Keshav Sood, Yushu Zhang:
SSVS-SSVD Based Desynchronization Attacks Resilient Watermarking Method for Stereo Signals. IEEE ACM Trans. Audio Speech Lang. Process. 31: 448-461 (2023) - [j30]Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler, Raja Jurdak, Ali Dorri, Shigen Shen:
UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies. IEEE Trans. Dependable Secur. Comput. 20(1): 242-255 (2023) - [j29]Keshav Sood, Mohammad Reza Nosouhi, Neeraj Kumar, Anuroop Gaddam, Bohao Feng, Shui Yu:
Accurate Detection of IoT Sensor Behaviors in Legitimate, Faulty and Compromised Scenarios. IEEE Trans. Dependable Secur. Comput. 20(1): 288-300 (2023) - [j28]Keshav Sood, Mohammad Reza Nosouhi, Dinh Duc Nha Nguyen, Frank Jiang, Morshed Chowdhury, Robin Doss:
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks. IEEE Trans. Inf. Forensics Secur. 18: 965-979 (2023) - [j27]Aleteng Tian, Bohao Feng, Huachun Zhou, Yunxue Huang, Keshav Sood, Shui Yu, Hongke Zhang:
Efficient Federated DRL-Based Cooperative Caching for Mobile Edge Networks. IEEE Trans. Netw. Serv. Manag. 20(1): 246-260 (2023) - [j26]Keshav Sood, Dinh Duc Nha Nguyen, Mohammad Reza Nosouhi, Neeraj Kumar, Frank Jiang, Morshed Chowdhury, Robin Doss:
Performance Evaluation of a Novel Intrusion Detection System in Next Generation Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 3831-3847 (2023) - [j25]Yunhua He, Yueting Wu, Cui Zhang, Jialong Shen, Ke Xiao, Keshav Sood, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Based on BPSO-vote-HMM Hybrid Model. IEEE/ACM Trans. Netw. 31(2): 485-496 (2023) - [j24]Chaochen Shi, Borui Cai, Yao Zhao, Longxiang Gao, Keshav Sood, Yong Xiang:
CoSS: Leveraging Statement Semantics for Code Summarization. IEEE Trans. Software Eng. 49(6): 3472-3486 (2023) - [c13]Zhida Bao, Jiawei He, Quanjun Zhang, Chunrong Fang, Keshav Sood, Yun Lin:
OATGA: Optimizing Adversarial Training via Genetic Algorithm for Automatic Modulation Classification. GLOBECOM 2023: 6073-6078 - [c12]Zhiyi Tian, Chenhan Zhang, Keshav Sood, Shui Yu:
Inferring Private Data from AI Models in Metaverse through Black-box Model Inversion Attacks. MetaCom 2023: 49-56 - [i3]Jianhua Li, Sophie McKenzie, Richard Dazeley, Frank Jiang, Keshav Sood:
Current Status and Trends of Engineering Entrepreneurship Education in Australian Universities. CoRR abs/2308.06943 (2023) - 2022
- [j23]Yexiao He, Xiaoning Zhang, Zixiang Xia, Yutao Liu, Keshav Sood, Shui Yu:
Joint optimization of Service Chain Graph Design and Mapping in NFV-enabled networks. Comput. Networks 202: 108626 (2022) - [j22]Dinh Duc Nha Nguyen, Keshav Sood, Mohammad Reza Nosouhi, Yong Xiang, Longxiang Gao, Lianhua Chi:
RF Fingerprinting-Based IoT Node Authentication Using Mahalanobis Distance Correlation Theory. IEEE Netw. Lett. 4(2): 78-81 (2022) - [j21]Mohammad Reza Nosouhi, Keshav Sood, Neeraj Kumar, Tricia Wevill, Chandra Thapa:
Bushfire Risk Detection Using Internet of Things: An Application Scenario. IEEE Internet Things J. 9(7): 5266-5274 (2022) - [j20]Jingxue Chen, Yining Liu, Yong Xiang, Keshav Sood:
RPPTD: Robust Privacy-Preserving Truth Discovery Scheme. IEEE Syst. J. 16(3): 4525-4531 (2022) - [j19]Mohammad Reza Nosouhi, Keshav Sood, Marthie Grobler, Robin Doss:
Towards Spoofing Resistant Next Generation IoT Networks. IEEE Trans. Inf. Forensics Secur. 17: 1669-1683 (2022) - [c11]Dinh Duc Nha Nguyen, Keshav Sood, Yong Xiang, Longxiang Gao, Lianhua Chi:
Impersonation Attack Detection in IoT Networks. GLOBECOM 2022: 6061-6066 - [c10]Youyang Qu, Shiping Chen, Longxiang Gao, Lei Cui, Keshav Sood, Shui Yu:
Personalized Privacy-Preserving Medical Data Sharing for Blockchain-based Smart Healthcare Networks. ICC 2022: 4229-4234 - [c9]Chaochen Shi, Yong Xiang, Jiangshan Yu, Longxiang Gao, Keshav Sood, Robin Ram Mohan Doss:
A Bytecode-based Approach for Smart Contract Classification. SANER 2022: 1046-1054 - 2021
- [j18]Keshav Sood, Shui Yu, Dinh Duc Nha Nguyen, Yong Xiang, Bohao Feng, Xiaoning Zhang:
A Tutorial on Next Generation Heterogeneous IoT Networks and Node Authentication. IEEE Internet Things Mag. 4(4): 120-126 (2021) - [j17]Keshav Sood, Kallol Krishna Karmakar, Vijay Varadharajen, Neeraj Kumar, Yong Xiang, Shui Yu:
Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and Beyond. IEEE Netw. 35(2): 34-39 (2021) - [j16]Bohao Feng, Huachun Zhou, Guanglei Li, Yuming Zhang, Keshav Sood, Shui Yu:
Enabling Machine Learning with Service Function Chaining for Security Enhancement at 5G Edges. IEEE Netw. 35(5): 196-201 (2021) - [i2]Chaochen Shi, Yong Xiang, Jiangshan Yu, Keshav Sood, Longxiang Gao:
SolcTrans: Towards machine translation of Solidity smart contract source code. CoRR abs/2106.06458 (2021) - [i1]Chaochen Shi, Yong Xiang, Robin Ram Mohan Doss, Jiangshan Yu, Keshav Sood, Longxiang Gao:
A Bytecode-based Approach for Smart Contract Classification. CoRR abs/2106.15497 (2021) - 2020
- [j15]Yuming Zhang, Bohao Feng, Wei Quan, Aleteng Tian, Keshav Sood, Youfang Lin, Hongke Zhang:
Cooperative Edge Caching: A Multi-Agent Deep Learning Based Approach. IEEE Access 8: 133212-133224 (2020) - [j14]Guanglei Li, Bohao Feng, Huachun Zhou, Yuming Zhang, Keshav Sood, Shui Yu:
Adaptive service function chaining mappings in 5G using deep Q-learning. Comput. Commun. 152: 305-315 (2020) - [j13]Keshav Sood, Kallol Krishna Karmakar, Shui Yu, Vijay Varadharajan, Shiva Raj Pokhrel, Yong Xiang:
Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security. IEEE Internet Things J. 7(7): 5964-5975 (2020) - [j12]Lang Fan, Xiaoning Zhang, Keshav Sood, Yunqing Wang, Shui Yu:
Reliability-aware virtual network function placement in carrier networks. J. Netw. Comput. Appl. 154: 102536 (2020) - [j11]Mohammad Reza Nosouhi, Keshav Sood, Shui Yu, Marthie Grobler, Jingwen Zhang:
PASPORT: A Secure and Private Location Proof Generation and Verification Framework. IEEE Trans. Comput. Soc. Syst. 7(2): 293-307 (2020) - [c8]Yunhua He, Jialong Shen, Ke Xiao, Keshav Sood, Chao Wang, Limin Sun:
A Sparse Protocol Parsing Method for IIoT Protocols Based on HMM hybrid model. ICC 2020: 1-6
2010 – 2019
- 2019
- [j10]Ying Yuan, Cong Wang, Sancheng Peng, Keshav Sood:
Topology-Oriented Virtual Network Embedding Approach for Data Centers. IEEE Access 7: 2429-2438 (2019) - [j9]Keshav Sood, Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Shui Yu:
Analysis of Policy-Based Security Management System in Software-Defined Networks. IEEE Commun. Lett. 23(4): 612-615 (2019) - [j8]Lu Zhou, Keshav Sood, Yong Xiang:
ERM: An Accurate Approach to Detect DDoS Attacks Using Entropy Rate Measurement. IEEE Commun. Lett. 23(10): 1700-1703 (2019) - [c7]Keshav Sood, Shiva Raj Pokhrel, Kallol Krishna Karmakar, Vijay Varadharajan, Shui Yu:
SDN-Capable IoT Last-Miles: Design Challenges. GLOBECOM 2019: 1-6 - [c6]Shiva Raj Pokhrel, Keshav Sood, Shui Yu, Mohammad Reza Nosouhi:
Policy-based Bigdata Security and QoS Framework for SDN/IoT: An Analytic Approach. INFOCOM Workshops 2019: 73-78 - [c5]Mohammad Reza Nosouhi, Shui Yu, Keshav Sood, Marthie Grobler:
HSDC-Net: Secure Anonymous Messaging in Online Social Networks. TrustCom/BigDataSE 2019: 350-357 - 2018
- [j7]Vu Viet Hoang Pham, Shui Yu, Keshav Sood, Lei Cui:
Privacy issues in social networks and analysis: a comprehensive survey. IET Networks 7(2): 74-84 (2018) - [c4]Ahmed Al-Mansoori, Shui Yu, Yong Xiang, Keshav Sood:
A survey on big data stream processing in SDN supported cloud environment. ACSW 2018: 12:1-12:11 - [c3]Keshav Sood, Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Shui Yu:
Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks. GLOBECOM 2018: 1-6 - 2017
- [j6]Keshav Sood, Yong Xiang:
The controller placement problem or the controller selection problem? J. Commun. Inf. Networks 2(3): 1-9 (2017) - [c2]Keshav Sood, Shui Yu, Yong Xiang:
Are current resources in SDN allocated to maximum performance and minimize costs and maintaining QoS problems? ACSW 2017: 42:1-42:6 - 2016
- [j5]Keshav Sood, Shui Yu, Yong Xiang, Hongbing Cheng:
A General QoS Aware Flow-Balancing and Resource Management Scheme in Distributed Software-Defined Networks. IEEE Access 4: 7176-7185 (2016) - [j4]Keshav Sood, Shui Yu, Yong Xiang:
Performance Analysis of Software-Defined Network Switch Using M/Geo/1 Model. IEEE Commun. Lett. 20(12): 2522-2525 (2016) - [j3]Keshav Sood, Shui Yu, Yong Xiang:
Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review. IEEE Internet Things J. 3(4): 453-463 (2016) - 2015
- [c1]Keshav Sood, Shigang Liu, Shui Yu, Yong Xiang:
Dynamic access point association using Software Defined Networking. ITNAC 2015: 226-231 - 2014
- [j2]Shui Yu, Keshav Sood, Yong Xiang:
An Effective and Feasible Traceback Scheme in Mobile Internet Environment. IEEE Commun. Lett. 18(11): 1911-1914 (2014) - [j1]Sudarshan Kudlur Satyanarayana, Keshav Sood, Yuan Tao, Shui Yu:
Security and Privacy in Online Social Networks: A Survey. EAI Endorsed Trans. Ind. Networks Intell. Syst. 1(1): e3 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint