default search action
Sachin Shetty
Person information
- affiliation: Old Dominion University, Department of Modeling, Simulation and Visualization Engineering, Norfolk, VA, USA
- affiliation (2009 - 2016): Tennessee State University, Nashville, TN, USA
- affiliation (2008 - 2009): Rowan University, Glassboro, NJ, USA
- affiliation (PhD 2007): Old Dominion University, Norfolk, VA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j79]Mahsa Mahvash, Neda Moghim, Mojtaba Mahdavi, Mahdieh Amiri, Sachin Shetty:
Blockchain-Inspired Trust Management in Cognitive Radio Networks with Cooperative Spectrum Sensing. Pervasive Mob. Comput. 106: 101999 (2025) - [j78]Mohammad Wazid, Shivansh Nautiyal, Ashok Kumar Das, Sachin Shetty, SK Hafizul Islam:
A Secure Authenticated Healthcare Data Analysis Mechanism in IoMT-Enabled Healthcare. Secur. Priv. 8(1) (2025) - 2024
- [j77]Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain:
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security. IEEE Access 12: 14647-14658 (2024) - [j76]Pankaj Kumar, Vivek Bharmaik, Sunil Prajapat, Garima Thakur, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues:
A Secure and Privacy-Preserving Signature Protocol Using Quantum Teleportation in Metaverse Environment. IEEE Access 12: 96718-96728 (2024) - [j75]Fabrice Setephin Atedjio, Jean-Pierre Lienou, Frederica Free-Nelson, Sachin S. Shetty, Charles A. Kamhoua:
CycleGAN-Gradient Penalty for Enhancing Android Adversarial Malware Detection in Gray Box Setting. IEEE Access 12: 162685-162696 (2024) - [j74]Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Nelson, Sachin Shetty, Charles A. Kamhoua:
Enhancing Cyber Resilience Through Traffic Generation Patterns in Complex Networks: A Study on Cascading Failures. IEEE Access 12: 164151-164163 (2024) - [j73]Fabrice Setephin Atedjio, Jean-Pierre Lienou, Frederica F. Nelson, Sachin S. Shetty, Charles A. Kamhoua:
A Defensive Strategy Against Android Adversarial Malware Attacks. IEEE Access 12: 169432-169441 (2024) - [j72]Muhammad Inaam Ul Haq, Khalid Mahmood, Qianmu Li, Ashok Kumar Das, Sachin Shetty, Majid Hussain:
Efficiently Learning an Encoder That Classifies Token Replacements and Masked Permuted Network-Based BIGRU Attention Classifier for Enhancing Sentiment Classification of Scientific Text. IEEE Access 12: 190240-190254 (2024) - [j71]Mostafa Taghizade Firouzjaee, Kamal Jamshidi, Neda Moghim, Sachin Shetty:
User preference-aware content caching strategy for video delivery in cache-enabled IoT networks. Comput. Networks 240: 110142 (2024) - [j70]Sachin Shetty, Lucas Potter, Xavier-Lewis Palmer, Saltuk Karahan:
Biocybersecurity and Applications of Predictive Physiological Modeling. Int. J. Syst. Syst. Eng. 14(4): 1 (2024) - [j69]Lucas Potter, Sachin Shetty, Saltuk Karahan, Xavier-Lewis Palmer:
Biocybersecurity and applications of predictive physiological modelling. Int. J. Syst. Syst. Eng. 14(4): 349-361 (2024) - [j68]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
Lightweight, geo-scalable deterministic blockchain design for 5G networks sliced applications with hierarchical CFT/BFT consensus groups, IPFS and novel hardware design. Internet Things 25: 101077 (2024) - [j67]Sandip Roy, Abhishek Bisht, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain:
Age of correlated information-optimal dynamic policy scheduling for sustainable Green IoT devices: A multi-agent deep reinforcement learning approach. Internet Things 26: 101141 (2024) - [j66]Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Wilson Ejuh Geh, Frederica Free-Nelson, Sachin Shetty, Charles A. Kamhoua:
TriAssetRank: Ranking Vulnerabilities, Exploits, and Privileges for Countermeasures Prioritization. IEEE Trans. Inf. Forensics Secur. 19: 10189-10205 (2024) - [j65]Le Thanh Tan, Martin Reisslein, Sachin Shetty:
Multi-Timescale Actor-Critic Learning for Computing Resource Management With Semi-Markov Renewal Process Mobility. IEEE Trans. Intell. Transp. Syst. 25(1): 452-461 (2024) - [j64]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty:
An Authentication and Key Management Framework for Secure and Intelligent Transportation of Internet of Space Things. IEEE Trans. Intell. Transp. Syst. 25(6): 5242-5257 (2024) - [j63]Samira Taheri, Neda Moghim, Naser Movahhedinia, Sachin Shetty:
A centralized delay-sensitive hierarchical computation offloading in fog radio access networks. J. Supercomput. 80(19): 26831-26864 (2024) - [j62]Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sandip Roy, Sachin Shetty:
ACKS-IA: An Access Control and Key Agreement Scheme for Securing Industry 4.0 Applications. IEEE Trans. Netw. Sci. Eng. 11(1): 254-269 (2024) - [j61]Sandip Roy, Sourav Nandi, Raj Maheshwari, Sachin Shetty, Ashok Kumar Das, Pascal Lorenz:
Blockchain-Based Efficient Access Control With Handover Policy in IoV-Enabled Intelligent Transportation System. IEEE Trans. Veh. Technol. 73(3): 3009-3024 (2024) - [c179]Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Wee Keong Ng, Kasun De Zoysa:
SliceGPT - OpenAI GPT-3.5 LLM, Blockchain and Non-Fungible Token Enabled Intelligent 5G/6G Network Slice Broker and Marketplace. CCNC 2024: 439-445 - [c178]Bikash Chandra Singh, Sachin Shetty, Praneet Chivate, David Wright, Alex Alenberg, Peter Woodward:
Performance Analysis of Indoor 5G NR Systems. CCNC 2024: 632-633 - [c177]Peter Foytik, Safdar Hussain Bouk, Gustave Anderson, Sachin Shetty:
Self-Sovereign Identity Management in Ship-Based 5G-Devices Use Case. CCNC 2024: 650-651 - [c176]Uttam Ghosh, Laurent Njilla, Sachin Shetty, Charles A. Kamhoua:
A Decentralized Smart Grid Communication Framework Using SDN-Enabled Blockchain. CCNC 2024: 982-985 - [c175]Safdar Hussain Bouk, Babatunji Omoniwa, Sachin Shetty:
Predicting Downlink Retransmissions in 5G Networks Using Deep Learning. CCNC 2024: 1056-1057 - [c174]Debashis Das, Uttam Ghosh, Nate Evans, Sachin Shetty:
Blockchain-Enabled Secure Device-to-Device Communication in Software-Defined Networking. ICC Workshops 2024: 1450-1455 - [c173]Saurabh Agrawal, Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, Sachin Shetty, Sajal K. Das:
Secure Location-based Authenticated Key Establishment Scheme for Maritime Communication. ICC 2024: 1927-1932 - [c172]Md. Shirajum Munir, Sravanthi Proddatoori, Manjushree Muralidhara, Walid Saad, Zhu Han, Sachin Shetty:
A Zero Trust Framework for Realization and Defense Against Generative AI Attacks in Power Grid. ICC 2024: 2482-2488 - [c171]Mahmudul Hasan, Sachin Shetty:
Sentiment Analysis With Lipschitz Recurrent Neural Networks Based Generative Adversarial Networks. ICNC 2024: 485-489 - [c170]Amar Sinha, Anmol Agrawal, Sandip Roy, Venkanna Uduthalapally, Debanjan Das, Rajarshi Mahapatra, Sachin Shetty:
AnDet: ML-Based Anomaly Detection of UEs in a Multi-cell B5G Mobile Network for Improved QoS. ICNC 2024: 500-505 - [c169]Sayyed Farid Ahamed, Kazi Aminul Islam, Sachin Shetty:
Targeted Transfer Learning: Leveraging Optimal Transport for Enhanced Knowledge Transfer. ICNC 2024: 506-510 - [c168]Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning. ICNC 2024: 635-640 - [c167]Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Peter Foytik, Xueping Liang:
RMF-GPT - OpenAI GPT-3.5 LLM, Blockchain, NFT, Model Cards and OpenScap Enabled Intelligent RMF Automation System. ICNC 2024: 653-658 - [c166]Muhammad Enayetur Rahman, Md. Shirajum Munir, Sachin Shetty:
An Attention-based AI Model for 3D Beam Prediction in THz Unmanned Aerial Vehicle Communication. ICNC 2024: 761-766 - [c165]Abigail O. Oyekola, Imtiaz Ahmed, Danda B. Rawat, Ramesh Annavajjala, Sachin Shetty:
Data-Driven Joint Demodulation and Decoding in THz Communication Systems. ICNC 2024: 978-983 - [c164]Debashis Das, Laurent Njilla, Uttam Ghosh, Sachin Shetty, Eugene Levin:
An Edge-Cloud Approach for Dynamic Resource Allocation in Drone Communication Networks. INFOCOM (Workshops) 2024: 1-6 - [c163]Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Ng Wee Keong, Kasun De Zoysa:
WedaGPT - Generative-AI (with Custom-Trained Meta's Llama2 LLM), Blockchain, Self Sovereign Identity, NFT and Model Card Enabled Indigenous Medicine Platform. ISCC 2024: 1-6 - [c162]Mahmudul Hasan, Sachin Shetty, Peter B. Foytik:
Enhancing Sentiment Analysis with Attention Mechanism and Bayesian-Lipschitz Recurrent Neural Networks. ISNCC 2024: 1-4 - [c161]Aakash, Saksham Mittal, Mohammad Wazid, Amit Kumar Mishra, Ashok Kumar Das, Sachin Shetty, Mohsen Guizani:
EM-PAD: An Effective Mechanism for Phishing Attack Detection. IWCMC 2024: 363-368 - [c160]Vijay Karnatak, Neha Tripathi, Amit Kumar Mishra, Mohammad Wazid, Ashok Kumar Das, Mohsen Guizani, Sachin Shetty:
AKM-FCCI: Secure Authentication and Key Management Mechanism for Fog Computing-Based IoT-Driven Critical Infrastructure. IWCMC 2024: 628-633 - [c159]Sharif Ullah, Sachin Shetty, Abdul Rahman, Amin Hass, Xiaoyong Yuan:
TTPatternMiner: Automated Learning and Characterization of Attack Pattern from Malicious Cyber Campaign. MILCOM 2024: 405-411 - [c158]Manjushree Muralidhara, Md. Shirajum Munir, Sravanthi Proddatoori, Sachin Shetty, Kimberly Gold:
Detecting Attacks and Optimizing Routes in Radio-frequency Networks Using Machine Learning and Graph Theory. NetSoft 2024: 157-165 - [i11]Md. Shirajum Munir, Sravanthi Proddatoori, Manjushree Muralidhara, Walid Saad, Zhu Han, Sachin Shetty:
A Zero Trust Framework for Realization and Defense Against Generative AI Attacks in Power Grid. CoRR abs/2403.06388 (2024) - [i10]Sayyed Farid Ahamed, Soumya Banerjee, Sandip Roy, Devin Quinn, Marc Vucovich, Kevin Choi, Abdul Rahman, Alison Hu, Edward Bowen, Sachin Shetty:
Accuracy-Privacy Trade-off in the Mitigation of Membership Inference Attack in Federated Learning. CoRR abs/2407.19119 (2024) - [i9]Al Amin, Kamrul Hasan, Saleh Zein-Sabatto, Liang Hong, Sachin Shetty, Imtiaz Ahmed, Tariqul Islam:
Advancing Healthcare: Innovative ML Approaches for Improved Medical Imaging in Data-Constrained Environments. CoRR abs/2410.12245 (2024) - [i8]Sayyed Farid Ahamed, Soumya Banerjee, Sandip Roy, Aayush Kapoor, Marc Vucovich, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:
Privacy Drift: Evolving Privacy Concerns in Incremental Learning. CoRR abs/2412.05183 (2024) - 2023
- [j60]Safdar Hussain Javed, Maaz Bin Ahmad, Muhammad Asif, Waseem Akram, Khalid Mahmood, Ashok Kumar Das, Sachin Shetty:
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System. IEEE Access 11: 74000-74020 (2023) - [j59]Siddhant Thapliyal, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty, Abdullah Alqahtani:
Design of Robust Blockchain-Envisioned Authenticated Key Management Mechanism for Smart Healthcare Applications. IEEE Access 11: 93032-93047 (2023) - [j58]Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty:
Energy-Efficient Multi-Rate Opportunistic Routing in Wireless Mesh Networks. IEEE Access 11: 97466-97477 (2023) - [j57]Garima Thakur, Sunil Prajapat, Pankaj Kumar, Ashok Kumar Das, Sachin Shetty:
An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks. IEEE Access 11: 114662-114679 (2023) - [j56]Xueping Liang, Charalambos Konstantinou, Sachin Shetty, Eranga Bandara, Ruimin Sun:
Decentralizing Cyber Physical Systems for Resilience: An Innovative Case Study from A Cybersecurity Perspective. Comput. Secur. 124: 102953 (2023) - [j55]Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda B. Rawat:
A review of IoT security and privacy using decentralized blockchain techniques. Comput. Sci. Rev. 50: 100585 (2023) - [j54]Vinay Gugueoth, Sunitha Safavat, Sachin Shetty:
Security of Internet of Things (IoT) using federated learning and deep learning - Recent advancements, issues and prospects. ICT Express 9(5): 941-960 (2023) - [j53]Eranga Bandara, Xueping Liang, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Nalin Ranasinghe, Kasun De Zoysa:
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS). Int. J. Inf. Sec. 22(3): 591-609 (2023) - [j52]Ashok Kumar Das, Sandip Roy, Eranga Bandara, Sachin Shetty:
Securing Age-of-Information (AoI)-Enabled 5G Smart Warehouse Using Access Control Scheme. IEEE Internet Things J. 10(2): 1358-1375 (2023) - [j51]Md. Shirajum Munir, Ki Tae Kim, Apurba Adhikary, Walid Saad, Sachin Shetty, Seong-Bae Park, Choong Seon Hong:
Neuro-Symbolic Explainable Artificial Intelligence Twin for Zero-Touch IoE in Wireless Network. IEEE Internet Things J. 10(24): 22451-22468 (2023) - [j50]Prithwi Bagchi, Basudeb Bera, Ashok Kumar Das, Sachin Shetty, Pandi Vijayakumar, Marimuthu Karuppiah:
Post Quantum Lattice-Based Secure Framework using Aggregate Signature for Ambient Intelligence Assisted Blockchain-Based IoT Applications. IEEE Internet Things Mag. 6(1): 52-58 (2023) - [j49]Munmun Bhattacharya, Sandip Roy, Samiran Chattopadhyay, Ashok Kumar Das, Sachin Shetty:
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning-based solutions, and open challenges. Secur. Priv. 6(1) (2023) - [j48]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty:
BSFR-SH: Blockchain-Enabled Security Framework Against Ransomware Attacks for Smart Healthcare. IEEE Trans. Consumer Electron. 69(1): 18-28 (2023) - [j47]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Mohsen Guizani:
AISCM-FH: AI-Enabled Secure Communication Mechanism in Fog Computing-Based Healthcare. IEEE Trans. Inf. Forensics Secur. 18: 319-334 (2023) - [j46]Mohammad Wazid, Siddhant Thapliyal, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty:
Design and Testbed Experiments of User Authentication and Key Establishment Mechanism for Smart Healthcare Cyber Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2697-2709 (2023) - [j45]Basker Palaniswamy, Keyvan Ansari, Alavalapati Goutham Reddy, Ashok Kumar Das, Sachin Shetty:
Robust Certificateless Authentication Protocol for the SAE J1939 Commercial Vehicles Bus. IEEE Trans. Veh. Technol. 72(4): 4493-4509 (2023) - [c157]Nadini Sahabandu, Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang:
GreenThread - Blockchain, Non-Fungible Token(NFT), Model Cards, Self-Sovereign Identity and IPFS Enabled Sustainable Circular Fashion Platform. ANNSIM 2023: 357-243 - [c156]Debashis Das, Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty:
Advanced Federated Learning-Empowered Edge-Cloud Framework for School Safety Prediction and Emergency Alert System. CloudNet 2023: 507-512 - [c155]Armando B. Mpembele, Tamara Rogers, Uttam Ghosh, Sachin Shetty:
Communication-Efficient and Privacy-Preserving Edge-Cloud Framework For Smart Healthcare. GLOBECOM (Workshops) 2023: 377-382 - [c154]Saksham Mittal, Amit Kumar Mishra, Mohammad Wazid, Devesh Pratap Singh, Ashok Kumar Das, Sachin Shetty:
Multiclass Classification Approaches for Intrusion Detection in IoT-Driven Aerial Computing Environment. GLOBECOM 2023: 2160-2165 - [c153]Aymar Le Père Tchimwa Bouom, Jean-Pierre Lienou, Frederica Free-Nelson, Sachin Shetty, Wilson Ejuh Geh, Charles A. Kamhoua:
Cyber Resilience Measurement Through Logical Attack Graph Analysis. ICC 2023: 6034-6039 - [c152]Soumya Banerjee, Sarada Prasad Gochhayat, Sachin Shetty:
Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G. ICNC 2023: 124-129 - [c151]Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Adversarial Technique Validation & Defense Selection Using Attack Graph & ATT&CK Matrix. ICNC 2023: 181-187 - [c150]Dipanwita Thakur, Sandip Roy, Suparna Biswas, Edmond S. L. Ho, Samiran Chattopadhyay, Sachin Shetty:
A Novel Smartphone-Based Human Activity Recognition Approach using Convolutional Autoencoder Long Short-Term Memory Network. IRI 2023: 146-153 - [c149]Eranga Bandara, Sachin Shetty, Peter Foytik, Abdul Rahman, Ravi Mukkamala, Xueping Liang, Nadini Sahabandu:
Blockchain, NFT, Federated Learning and Model Cards enabled UAV Surveillance System for 5G/6G Network Sliced Environment. ISNCC 2023: 1-8 - [c148]Mahmudul Hasan, Sachin Shetty:
Sentiment Analysis With Lipschitz Recurrent Neural Networks. ISNCC 2023: 1-4 - [c147]Nishat Ara Nipa, Yan Lu, Sachin Shetty:
U-Net Based Disaster Damage Detection Through Semantic Segmentation. ISNCC 2023: 1-5 - [c146]Mehrdad Sadehvand, Neda Moghim, Behrouz Shahgholi Ghahfarokhi, Sachin Shetty:
Transmission Power Control for Interference Reduction in Cellular D2D Networks. ISNCC 2023: 1-6 - [c145]Eranga Bandara, Peter Foytik, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Xueping Liang, Wee Keong Ng, D. N. Ranasinghe, Kasun De Zoysa:
Proof-of-Pedal - Pedal-Powered Byzantine Green Consensus for Blockchain. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2023: 810-814 - [c144]Sidheswar Routray, Amrit Suman, Preetam Suman, Sasmita Padhy, Pushpita Chatterjee, Sachin Shetty:
Vehicular Safety Revolution: A Cutting-Edge Communication Paradigm for Accident Prevention. MobiHoc 2023: 406-411 - [c143]Uttam Ghosh, Debashis Das, Pushpita Chatterjee, Sachin Shetty:
Quantum-Enabled Blockchain for Data Processing and Management in Smart Cities. WoWMoM 2023: 425-430 - [c142]Md. Shirajum Munir, Sachin Shetty, Danda B. Rawat:
Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid. WSC 2023: 636-647 - [i7]Md. Shirajum Munir, Sachin Shetty, Danda B. Rawat:
Trustworthy Artificial Intelligence Framework for Proactive Detection and Risk Explanation of Cyber Attacks in Smart Grid. CoRR abs/2306.07993 (2023) - [i6]Ying Wang, Shashank Jere, Soumya Banerjee, Lingjia Liu, Sachin Shetty, Shehadi Dayekh:
Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis. CoRR abs/2311.17097 (2023) - [i5]Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty:
MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning. CoRR abs/2312.00051 (2023) - [i4]Soumya Banerjee, Sarada Prasad Gochhayat, Sachin Shetty:
Performance Analysis of Fixed Broadband Wireless Access in mmWave Band in 5G. CoRR abs/2312.09467 (2023) - 2022
- [j44]Mohammad Wazid, Jaskaran Singh, Ashok Kumar Das, Sachin Shetty, Muhammad Khurram Khan, Joel J. P. C. Rodrigues:
ASCP-IoMT: AI-Enabled Lightweight Secure Communication Protocol for Internet of Medical Things. IEEE Access 10: 57990-58004 (2022) - [j43]Le Thanh Tan, Sachin Shetty:
Artificial intelligence-aided privacy preserving trustworthy computation and communication in 5G-based IoT networks. Ad Hoc Networks 126: 102752 (2022) - [j42]Sachin S. Shetty, Jhing-Fa Wang, Uttam Ghosh, Schahram Dustdar:
Guest Editorial Special Issue on Secure Data Analytics for Emerging Internet of Things. IEEE Internet Things J. 9(4): 2463-2467 (2022) - [j41]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty:
TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems. IEEE Internet Things J. 9(22): 22643-22656 (2022) - [j40]Eranga Bandara, Sachin Shetty, Ravi Mukkamala, Xueping Liang, Peter Foytik, Nalin Ranasinghe, Kasun De Zoysa:
Casper: a blockchain-based system for efficient and secure customer credential verification. J. Bank. Financial Technol. 6(1): 43-62 (2022) - [j39]Wu He, Zuopeng Justin Zhang, Huanmei Wu, Wenzhuo Li, Sachin Shetty:
A Unified Health Information System Framework for Connecting Data, People, Devices, and Systems. J. Glob. Inf. Manag. 30(11): 1-19 (2022) - [c141]Justin Zhang, Wu He, Sachin Shetty, Yuming He, Xin Tian:
A Proposed Framework for the Governance of Blockchain Technology. AMCIS 2022 - [c140]Eranga Bandara, Sachin Shetty, Ravi Mukkamala, Abdul Rahaman, Xueping Liang:
LUUNU - Blockchain, MISP, Model Cards and Federated Learning Enabled Cyber Threat Intelligence Sharing Platform. ANNSIM 2022: 235-245 - [c139]Md Ali Reza Al Amin, Peter Foytik, Sachin Shetty, Jessica Dorismond, Marco A. Gamarra:
Deception for Characterizing Adversarial Strategies in Complex Networked Systems. CCNC 2022: 429-432 - [c138]Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Juan Zhao, Xueping Liang:
Bassa-ML - A Blockchain and Model Card Integrated Federated Learning Provenance Platform. CCNC 2022: 753-759 - [c137]Ying Wang, Shashank Jere, Soumya Banerjee, Lingjia Liu, Sachin Shetty, Shehadi Dayekh:
Anonymous Jamming Detection in 5G with Bayesian Network Model Based Inference Analysis. HPSR 2022: 151-156 - [c136]Kamrul Hasan, Sachin Shetty, Tariqul Islam, Imtiaz Ahmed:
Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems. ICCCN 2022: 1-10 - [c135]Joseph Zalameda, Brady Kruse, Alexander Glandon, Megan A. Witherow, Sachin Shetty, Khan M. Iftekharuddin:
Generalized Adversarial and Hierarchical Co-occurrence Network based Synthetic Skeleton Generation and Human Identity Recognition. IJCNN 2022: 1-8 - [c134]Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Attack Graph Embedded Machine Learning Platform For Cyber Situational Awareness. MILCOM 2022: 464-469 - [c133]Eranga Bandara, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Peter Foytik, Xueping Liang, Wee Keong Ng:
Kaputa - Blockchain, Non-Fungible Token and Model Card Integrated 5G/6G Network Slice Broker and Marketplace. MILCOM 2022: 559-564 - [c132]Eranga Bandara, Xueping Liang, Sachin Shetty, Ravi Mukkamala, Abdul Rahman, Wee Keong Ng:
Skunk - A Blockchain and Zero Trust Security Enabled Federated Learning Platform for 5G/6G Network Slicing. SECON 2022: 109-117 - [c131]Md Ali Reza Al Amin, Sachin Shetty, Valerio Formicola, Martin Otto:
Assessing the Quality of Differentially Private Synthetic Data for Intrusion Detection. SecureComm 2022: 473-490 - [c130]Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala, Xueping Liang:
Moose: A Scalable Blockchain Architecture for 5G Enabled IoT with Sharding and Network Slicing. WCNC 2022: 1194-1199 - [c129]Md Ali Reza Al Amin, Sachin Shetty, Charles A. Kamhoua:
Cyber Deception Metrics For Interconnected Complex Systems. WSC 2022: 473-483 - [c128]Yan Lu, Sachin Shetty:
Towards AI Robustness Multi-Agent Adversarial Planning in Game Play. WSC 2022: 2653-2662 - [i3]Md. Shirajum Munir, Ki Tae Kim, Apurba Adhikary, Walid Saad, Sachin Shetty, Seong-Bae Park, Choong Seon Hong:
Neuro-symbolic Explainable Artificial Intelligence Twin for Zero-touch IoE in Wireless Network. CoRR abs/2210.06649 (2022) - 2021
- [j38]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Prosanta Gope, Joel J. P. C. Rodrigues:
Security in 5G-Enabled Internet of Things Communication: Issues, Challenges, and Future Research Roadmap. IEEE Access 9: 4466-4489 (2021) - [j37]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement. IEEE Access 9: 49662-49682 (2021) - [j36]Hamdi Kavak, Jose J. Padilla, Daniele Vernon-Bido, Saikou Y. Diallo, Ross Gore, Sachin Shetty:
Simulation for cybersecurity: state of the art and future directions. J. Cybersecur. 7(1) (2021) - [j35]Eranga Bandara, Sachin Shetty, Deepak K. Tosh, Xueping Liang:
Vind: A Blockchain-Enabled Supply Chain Provenance Framework for Energy Delivery Systems. Frontiers Blockchain 4: 607320 (2021) - [j34]Eranga Bandara, Deepak K. Tosh, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa:
Tikiri - Towards a lightweight blockchain for IoT. Future Gener. Comput. Syst. 119: 154-165 (2021) - [j33]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang:
Leveraging Intel SGX to enable trusted and privacy preserving membership service in distributed ledgers. Int. J. Inf. Comput. Secur. 16(1/2): 63-83 (2021) - [j32]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Crissie Hall, Daniel Bowden, Nalin Ranasinghe, Kasun De Zoysa:
A blockchain empowered and privacy preserving digital contact tracing platform. Inf. Process. Manag. 58(4): 102572 (2021) - [j31]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa:
Rahasak - Scalable blockchain architecture for enterprise applications. J. Syst. Archit. 116: 102061 (2021) - [j30]Agbotiname Lucky Imoize, Oluwadara Adedeji, Nistha Tandiya, Sachin Shetty:
6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap. Sensors 21(5): 1709 (2021) - [j29]Kamrul Hasan, Sachin Shetty, Sharif Ullah, Amin Hassanzadeh, Tariqul Islam:
Criticality based Optimal Cyber Defense Remediation in Energy Delivery Systems. EAI Endorsed Trans. Security Safety 8(28): e5 (2021) - [c127]Amanda Davenport, Sachin Shetty:
Comparative Analysis of Elliptic Curve and Lattice Based Cryptography. ANNSIM 2021: 1-9 - [c126]Eranga Bandara, Deepak K. Tosh, Sachin Shetty, Bheshaj Krishnappa:
CySCPro - Cyber Supply Chain Provenance Framework for Risk Management of Energy Delivery Systems. Blockchain 2021: 65-72 - [c125]Xuebiao Yuchi, Zhiwei Yan, Kejun Dong, Hongtao Li, Guanggang Geng, Sachin Shetty:
Dealing with the Domain Name Abuse: Issues and Approaches. EUC 2021: 166-173 - [c124]Sayyed Farid Ahamed, Priyanka Aggarwal, Sachin Shetty, Erin Lanus, Laura J. Freeman:
ATTL: An Automated Targeted Transfer Learning with Deep Neural Networks. GLOBECOM 2021: 1-7 - [c123]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Kasun De Zoysa:
A Blockchain and Self-Sovereign Identity Empowered Digital Identity Platform. ICCCN 2021: 1-7 - [c122]Yan Lu, Sachin Shetty:
Multi-Class Malware Classification Using Deep Residual Network with Non-SoftMax Classifier. IRI 2021: 201-207 - [c121]Eranga Bandara, Sachin Shetty, Abdul Rahman, Ravi Mukkamala:
Let'sTrace - Blockchain, Federated Learning and TUF/In-ToTo Enabled Cyber Supply Chain Provenance Platform. MILCOM 2021: 470-476 - [c120]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
Promize - Blockchain and Self Sovereign Identity Empowered Mobile ATM Platform. SAI (2) 2021: 891-911 - [c119]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty:
Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform. SMARTCOMP 2021: 258-263 - [c118]Abel O. Gomez Rivera, Deepak K. Tosh, Sachin Shetty:
Achieving Runtime State Verification Assurance in Critical Cyber-Physical Infrastructures. SmartGridComm 2021: 245-251 - [c117]Georges A. Kamhoua, Eranga Bandara, Peter Foytik, Priyanka Aggarwal, Sachin Shetty:
Resilient and Verifiable Federated Learning against Byzantine Colluding Attacks. TPS-ISA 2021: 31-40 - [c116]Priyanka Aggarwal, Sayyed Farid Ahamed, Sachin Shetty, Laura J. Freeman:
Selective Targeted Transfer Learning for Malware Classification. TPS-ISA 2021: 114-120 - 2020
- [j28]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo:
A Tutorial and Future Research for Building a Blockchain-Based Secure Communication Scheme for Internet of Intelligent Things. IEEE Access 8: 88700-88716 (2020) - [j27]Sarada Prasad Gochhayat, Sachin Shetty, Ravi Mukkamala, Peter Foytik, Georges A. Kamhoua, Laurent Njilla:
Measuring Decentrality in Blockchain Based Systems. IEEE Access 8: 178372-178390 (2020) - [j26]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, David Mohaisen:
Exploring the Attack Surface of Blockchain: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 22(3): 1977-2008 (2020) - [c115]Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Integrating Mission-Centric Impact Assessment to Operational Resiliency in Cyber-Physical Systems. GLOBECOM 2020: 1-7 - [c114]Eranga Bandara, Xueping Liang, Sachin Shetty, Wee Keong Ng, Peter Foytik, Nalin Ranasinghe, Kasun De Zoysa, Bård Langöy, David Larsson:
Lekana - Blockchain Based Archive Storage for Large-Scale Cloud Systems. ICBC 2020: 169-184 - [c113]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues:
On the Design of Secure Communication Framework for Blockchain-Based Internet of Intelligent Battlefield Things Environment. INFOCOM Workshops 2020: 888-893 - [c112]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa:
Bassa-Scalable Blockchain Architecture for Smart Cities. ISC2 2020: 1-8 - [c111]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Crissie Hall, Daniel Bowden, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
Connect - Blockchain and Self-Sovereign Identity Empowered Contact Tracing Platform. MobiHealth 2020: 208-223 - [c110]Md Ariful Haque, Sachin Shetty, Charles A. Kamhoua, Kimberly Gold:
Modeling Mission Impact of Cyber Attacks on Energy Delivery Systems. SecureComm (2) 2020: 41-61 - [c109]Peter Foytik, Sachin Shetty, Sarada Prasad Gochhayat, Eranga Herath, Deepak K. Tosh, Laurent Njilla:
A Blockchain Simulator for Evaluating Consensus Algorithms in Diverse Networking Environments. SpringSim 2020: 1-12 - [c108]Xueping Liang, Sachin Shetty, Peter Foytik, Deepak K. Tosh:
Enforcing Security and Privacy in Distributed Ledgers by Intel SGX. SpringSim 2020: 1-12 - [c107]Eranga Bandara, Xueping Liang, Peter Foytik, Sachin Shetty, Nalin Ranasinghe, Kasun De Zoysa, Wee Keong Ng:
SaaS - Microservices-Based Scalable Smart Contract Architecture. SSCC 2020: 228-243 - [i2]Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty, Raja Datta:
An SDN-IoT-based Framework for Future Smart Cities: Addressing Perspective. CoRR abs/2007.11536 (2020)
2010 – 2019
- 2019
- [j25]Mohammad Wazid, Ashok Kumar Das, Joel J. P. C. Rodrigues, Sachin Shetty, Youngho Park:
IoMT Malware Detection Approaches: Analysis and Research Challenges. IEEE Access 7: 182459-182476 (2019) - [j24]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent L. Njilla:
Data Provenance in the Cloud: A Blockchain-Based Approach. IEEE Consumer Electron. Mag. 8(4): 38-44 (2019) - [j23]Hellen Maziku, Sachin Shetty, David M. Nicol:
Security risk assessment for SDN-enabled smart grids. Comput. Commun. 133: 1-11 (2019) - [j22]Juan Zhao, Sachin Shetty, Jan Wei Pan, Charles A. Kamhoua, Kevin A. Kwiat:
Transfer learning for detecting unknown network attacks. EURASIP J. Inf. Secur. 2019: 1 (2019) - [j21]Mohammad Wazid, Palak Bagga, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park:
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment. IEEE Internet Things J. 6(5): 8804-8817 (2019) - [j20]Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Joel J. P. C. Rodrigues, Youngho Park:
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment. Sensors 19(24): 5539 (2019) - [j19]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles Kamouha:
Attacker Capability based Dynamic Deception Model for Large-Scale Networks. EAI Endorsed Trans. Security Safety 6(21): e2 (2019) - [c106]Md Ariful Haque, Sachin Shetty, Bheshaj Krishnappa:
ICS-CRAT: A Cyber Resilience Assessment Tool for Industrial Control Systems. BigDataSecurity/HPSC/IDS 2019: 273-281 - [c105]Sarada Prasad Gochhayat, Eranga Bandara, Sachin Shetty, Peter Foytik:
Yugala: Blockchain Based Encrypted Cloud Storage for IoT Data. Blockchain 2019: 483-489 - [c104]Amanda Davenport, Sachin Shetty:
Air Gapped Wallet Schemes and Private Key Leakage in Permissioned Blockchain Platforms. Blockchain 2019: 541-545 - [c103]Kamrul Hasan, Sachin Shetty, Sharif Ullah:
Artificial Intelligence Empowered Cyber Threat Detection and Protection for Power Utilities. CIC 2019: 354-359 - [c102]Xueping Liang, Sachin Shetty:
A State-aware Proof of Stake Consensus Protocol for Power System Resilience. e-Energy 2019: 431-432 - [c101]Marco A. Gamarra, Sachin Shetty, David M. Nicol, Laurent Njilla, Oscar R. González:
Modeling Stepping Stone Attacks with Constraints in Cyber Infrastructure. GLOBECOM 2019: 1-7 - [c100]Kamrul Hasan, Sachin Shetty, Sharif Ullah, Amin Hassanzadeh, Ethan Hadar:
Towards Optimal Cyber Defense Remediation in Energy Delivery Systems. GLOBECOM 2019: 1-7 - [c99]Marco A. Gamarra, Sachin Shetty, Oscar R. González, Laurent Njilla, Marcus Pendleton, Charles A. Kamhoua:
Dual Redundant Cyber-Attack Tolerant Control Systems Strategy for Cyber-Physical Systems. ICC 2019: 1-7 - [c98]Amanda Davenport, Sachin Shetty:
Modeling Threat of Leaking Private Keys from Air-Gapped Blockchain Wallets. ISC2 2019: 9-13 - [c97]Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Sharif Ullah:
Towards Optimal Cyber Defense Remediation in Cyber Physical Systems by Balancing Operational Resilience and Strategic Risk. MILCOM 2019: 1-8 - [c96]Sharif Ullah, Sachin Shetty, Anup Nayak, Amin Hassanzadeh, Kamrul Hasan:
Cyber Threat Analysis Based on Characterizing Adversarial Behavior for Energy Delivery System. SecureComm (2) 2019: 146-160 - [c95]Md Ali Reza Al Amin, Sachin Shetty, Laurent Njilla, Deepak K. Tosh, Charles A. Kamhoua:
Online Cyber Deception System Using Partially Observable Monte-Carlo Planning Framework. SecureComm (2) 2019: 205-223 - [c94]Laila M. Almutairi, Liang Hong, Sachin Shetty:
Security Analysis of Multiple SDN Controllers Based on Stochastic Petri Nets. SpringSim 2019: 1-12 - [c93]Sachin Shetty, Indrajit Ray, Nurcin Celik, Michael Mesham, Nathaniel Bastian, Quanyan Zhu:
Simulation for Cyber Risk Management - Where are we, and Where do we Want to Go? WSC 2019: 726-737 - [i1]Muhammad Saad, Jeffrey Spaulding, Laurent Njilla, Charles A. Kamhoua, Sachin Shetty, DaeHun Nyang, Aziz Mohaisen:
Exploring the Attack Surface of Blockchain: A Systematic Overview. CoRR abs/1904.03487 (2019) - 2018
- [j18]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Juan Zhao, Danyi Li, Jihong Liu:
A Reliable Data Provenance and Privacy Preservation Architecture for Business-Driven Cyber-Physical Systems Using Blockchain. Int. J. Inf. Secur. Priv. 12(4): 68-81 (2018) - [j17]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Daniel Bowden, Laurent Njilla, Charles A. Kamhoua:
Towards Blockchain Empowered Trusted and Accountable Data Sharing and Collaboration in Mobile Healthcare Applications. EAI Endorsed Trans. Pervasive Health Technol. 4(15): e3 (2018) - [c92]Deepak K. Tosh, Sachin Shetty, Peter Foytik, Charles A. Kamhoua, Laurent Njilla:
CloudPoS: A Proof-of-Stake Consensus Design for Blockchain Integrated Cloud. IEEE CLOUD 2018: 302-309 - [c91]Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, Jay Chen:
Self-Healing Cyber Resilient Framework for Software Defined Networking-Enabled Energy Delivery System. CCTA 2018: 1692-1697 - [c90]Kamrul Hasan, Sachin Shetty, Amin Hassanzadeh, Malek Ben Salem, Jay Chen:
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems. CNS 2018: 1-9 - [c89]Marco A. Gamarra, Sachin Shetty, David M. Nicol, Oscar Gonazlez, Charles A. Kamhoua, Laurent Njilla:
Analysis of Stepping Stone Attacks in Dynamic Vulnerability Graphs. ICC 2018: 1-7 - [c88]Hellen Maziku, Sachin Shetty, Dong Jin, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Diversity Modeling to Evaluate Security of Multiple SDN Controllers. ICNC 2018: 344-348 - [c87]Amanda Davenport, Sachin Shetty, Xueping Liang:
Attack Surface Analysis of Permissioned Blockchain Platforms for Smart Cities. ISC2 2018: 1-6 - [c86]Xueping Liang, Sachin Shetty, Deepak K. Tosh:
Exploring the Attack Surfaces in Blockchain Enabled Smart Cities. ISC2 2018: 1-8 - [c85]Jinglin Qiu, Xueping Liang, Sachin Shetty, Daniel Bowden:
Towards Secure and Smart Healthcare in Smart Cities Using Blockchain. ISC2 2018: 1-4 - [c84]Md Ariful Haque, Gael Kamdem De Teyou, Sachin Shetty, Bheshaj Krishnappa:
Cyber Resilience Framework for Industrial Control Systems: Concepts, Metrics, and Insights. ISI 2018: 25-30 - [c83]Asmah Muallem, Sachin Shetty, Liang Hong, Jan Wei Pan:
TDDEHT: Threat Detection Using Distributed Ensembles of Hoeffding Trees on Streaming Cyber Datasets. MILCOM 2018: 1-6 - [c82]Deepak K. Tosh, Sachin Shetty, Peter Foytik, Laurent Njilla, Charles A. Kamhoua:
Blockchain-Empowered Secure Internet -of- Battlefield Things (IoBT) Architecture. MILCOM 2018: 593-598 - [c81]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Yafei Ji, Danyi Li:
Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using Blockchain. SecureComm (2) 2018: 43-62 - [c80]Andreas Tolk, Fernando J. Barros, Andrea D'Ambrogio, Akshay Rajhans, Pieter J. Mosterman, Sachin S. Shetty, Mamadou K. Traoré, Hans Vangheluwe, Levent Yilmaz:
Hybrid simulation for cyber physical systems: a panel on where are we going regarding complexity, intelligence, and adaptability of CPS using simulation. SpringSim (MSCIAAS) 2018: 3:1-3:19 - [c79]Md Ariful Haque, Sachin Shetty, Gael Kamdem:
Improving bulk power system resilience by ranking critical nodes in the vulnerability graph. SpringSim (ANSS) 2018: 8:1-8:12 - [c78]Kamrul Hasan, Sachin Shetty, John Sokolowski, Deepak K. Tosh:
Security game for cyber physical systems. SpringSim (CNS) 2018: 12:1-12:12 - 2017
- [j16]Lubna Elsaid, Leonardo Jiménez Rodríguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry:
Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels. IEEE Access 5: 10469-10477 (2017) - [j15]Liang Hong, Wei Chen, Sachin Shetty, Dan Chia-Tien Lo, Reginald Cooper:
Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks. Int. J. Netw. Comput. 7(1): 50-68 (2017) - [j14]Cuong Dang, Leonardo Jiménez Rodríguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry:
On Secrecy Rate and Optimal Power Allocation of the Full-Duplex Amplify-and-Forward Relay Wire-Tap Channel. IEEE Trans. Veh. Technol. 66(5): 3887-3899 (2017) - [c77]Xueping Liang, Sachin Shetty, Lingchen Zhang, Charles A. Kamhoua, Kevin A. Kwiat:
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform. CLOUD 2017: 302-309 - [c76]Uttam Ghosh, Pushpita Chatterjee, Deepak K. Tosh, Sachin Shetty, Kaiqi Xiong, Charles A. Kamhoua:
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks. CLOUD 2017: 749-752 - [c75]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack. CCGrid 2017: 458-467 - [c74]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
ProvChain: A Blockchain-based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability. CCGrid 2017: 468-477 - [c73]Kamrul Hasan, Sachin Shetty, Taiwo Oyedare:
Cross layer attacks on GSM mobile networks using software defined radios. CCNC 2017: 357-360 - [c72]Tulha Al-Salah, Liang Hong, Sachin Shetty:
Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure. EDGE 2017: 216-219 - [c71]Deepak K. Tosh, Sachin Shetty, Shamik Sengupta, Jay P. Kesan, Charles A. Kamhoua:
Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance. GAMENETS 2017: 154-164 - [c70]Deepak K. Tosh, Iman Vakilinia, Sachin Shetty, Shamik Sengupta, Charles A. Kamhoua, Laurent Njilla, Kevin A. Kwiat:
Three Layer Game Theoretic Decision Framework for Cyber-Investment and Cyber-Insurance. GameSec 2017: 519-532 - [c69]Hellen Maziku, Sachin Shetty:
Software Defined Networking enabled resilience for IEC 61850-based substation communication systems. ICNC 2017: 690-694 - [c68]Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty:
A Security Framework for SDN-Enabled Smart Power Grids. ICDCS Workshops 2017: 113-118 - [c67]Gael Kamdem, Charles A. Kamhoua, Yue Lu, Sachin Shetty, Laurent Njilla:
A Markov Game Theoritic Approach for Power Grid Security. ICDCS Workshops 2017: 139-144 - [c66]Xueping Liang, Sachin Shetty, Deepak K. Tosh, Peter Foytik, Lingchen Zhang:
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions. ICICS 2017: 304-310 - [c65]Xueping Liang, Sachin Shetty, Juan Zhao, Daniel Bowden, Danyi Li, Jihong Liu:
Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems. ICICS 2017: 387-398 - [c64]Juan Zhao, Sachin Shetty, Jan Wei Pan:
Feature-based transfer learning for network security. MILCOM 2017: 17-22 - [c63]Xueping Liang, Juan Zhao, Sachin Shetty, Danyi Li:
Towards data assurance and resilience in IoT using blockchain. MILCOM 2017: 261-266 - [c62]Laila M. Almutairi, Sachin Shetty:
Generalized stochastic Petri Net model based security risk assessment of software defined networks. MILCOM 2017: 545-550 - [c61]Xueping Liang, Juan Zhao, Sachin Shetty, Jihong Liu, Danyi Li:
Integrating blockchain for data sharing and collaboration in mobile healthcare applications. PIMRC 2017: 1-5 - [c60]Deepak K. Tosh, Sachin Shetty, Xueping Liang, Charles A. Kamhoua, Laurent Njilla:
Consensus protocols for blockchain-based data provenance: Challenges and opportunities. UEMCON 2017: 469-474 - 2016
- [b2]Sachin Shetty, Xuebiao Yuchi, Min Song:
Moving Target Defense for Distributed Systems. Wireless Networks, Springer 2016, ISBN 978-3-319-31031-2, pp. 1-74 - [j13]Danda B. Rawat, Sachin Shetty:
Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks. Int. J. Grid High Perform. Comput. 8(2): 94-110 (2016) - [j12]Ashraf Al Sharah, Taiwo Oyedare, Sachin Shetty:
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game. J. Comput. Networks Commun. 2016: 4289176:1-4289176:13 (2016) - [j11]Danda B. Rawat, Sachin Shetty, Chunsheng Xin:
Stackelberg-Game-Based Dynamic Spectrum Access in Heterogeneous Wireless Systems. IEEE Syst. J. 10(4): 1494-1504 (2016) - [c59]Paul McNeil, Sachin Shetty, Divya Guntu, Gauree Barve:
SCREDENT: Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Mobile Devices. ANT/SEIT 2016: 1219-1225 - [c58]Md Monzurul Alam, Sudeep Bhattarai, Liang Hong, Sachin Shetty:
Robust cooperative beamforming against steering vector uncertainty in cognitive radio networks. CCNC 2016: 656-661 - [c57]Abdullah Alghamdi, Sachin Shetty:
Survey Toward a Smart Campus Using the Internet of Things. FiCloud 2016: 235-239 - [c56]Ali Aldarraji, Liang Hong, Sachin Shetty:
Polarized beamforming for enhanced countermeasure of wireless jamming attacks. IPCCC 2016: 1-2 - [c55]Wei Chen, Liang Hong, Sachin Shetty, Dan Chia-Tien Lo, Reginald Cooper:
Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks. IPDPS Workshops 2016: 499-508 - [c54]Xuebiao Yuchi, Sachin Shetty:
Hierarchical Random Graph Based Network Diversity Modeling for the Cloud. SERVICES 2016: 35-38 - [c53]Xuebiao Yuchi, Sachin Shetty:
Towards Network-Topology Aware Virtual Machine Placement in Cloud Datacenters. SERVICES 2016: 95-96 - [c52]Taiwo Oyedare, Ashraf Al Sharah, Sachin Shetty:
A Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks in MANETs. WWIC 2016: 241-253 - 2015
- [b1]Danda B. Rawat, Min Song, Sachin Shetty:
Dynamic Spectrum Access for Wireless Networks. Springer Briefs in Electrical and Computer Engineering, Springer 2015, ISBN 978-3-319-15298-1, pp. 1-65 - [j10]Leonardo Jiménez Rodríguez, Nghi H. Tran, Trung Quang Duong, Tho Le-Ngoc, Maged Elkashlan, Sachin Shetty:
Physical layer security in wireless cooperative relay networks: state of the art and beyond. IEEE Commun. Mag. 53(12): 32-39 (2015) - [j9]Anh D. Le, Sanjeewa P. Herath, Nghi H. Tran, Trung Quang Duong, Sachin Shetty:
Achievable rates and outage probability of cognitive radio with dynamic frequency hopping under imperfect spectrum sensing. IET Commun. 9(17): 2160-2167 (2015) - [j8]Biswajit Biswal, Sachin Shetty, Tamara Rogers:
Enhanced learning classifier to locate data in cloud data centres. Int. J. Metaheuristics 4(2): 141-158 (2015) - [c51]Nimish Sharma, Danda B. Rawat, Bhed Bahadur Bista, Sachin Shetty:
A Testbed Using USRP(TM) and LabView(R) for Dynamic Spectrum Access in Cognitive Radio Networks. AINA 2015: 735-740 - [c50]Depeng Li, Sachin Shetty:
POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use. CCS 2015: 1647-1649 - [c49]Kimberly Gold, Sachin Shetty, Tamara Rogers:
A testbed for modeling and detecting attacks on NFC enabled mobile devices. MILCOM 2015: 635-640 - [c48]Xuebiao Yuchi, Sachin Shetty:
Enabling security-aware virtual machine placement in IaaS clouds. MILCOM 2015: 1554-1559 - [c47]Anh D. Le, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry:
Achievable Rate and Outage Probability of Cognitive Radio with Finite-Alphabet Inputs under Imperfect Spectrum Sensing. VTC Spring 2015: 1-5 - [c46]Cuong Dang, Leonardo Jiménez Rodríguez, Nghi H. Tran, Sachin Shetty, Shivakumar Sastry:
Secrecy capacity of the full-duplex AF relay wire-tap channel under residual self-interference. WCNC 2015: 99-104 - [c45]Danda B. Rawat, Swetha Reddy Lenkala, Nimish Sharma, Bhed Bahadur Bista, Sachin Shetty:
Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems. WCNC 2015: 1942-1947 - 2014
- [j7]Sachin Shetty, Biswajit Biswal, Hellen Maziku:
Auditing and analysis of network traffic in cloud environment. Int. J. Bus. Process. Integr. Manag. 7(2): 153-165 (2014) - [j6]Danda B. Rawat, Sachin Shetty, Khurram Raza:
Geolocation-aware resource management in cloud computing-based cognitive radio networks. Int. J. Cloud Comput. 3(3): 267-287 (2014) - [c44]Hellen Maziku, Sachin Shetty:
Towards a network aware VM migration: Evaluating the cost of VM migration in cloud data centers. CloudNet 2014: 114-119 - [c43]Biswajit Biswal, Sachin Shetty, Tamara Rogers:
Enhanced learning classifier to locate data in cloud datacenters. CloudNet 2014: 375-380 - [c42]Lingchen Zhang, Sachin Shetty, Peng Liu, Jiwu Jing:
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment. ESORICS (2) 2014: 475-493 - [c41]Hellen Maziku, Sachin Shetty:
Network Aware VM Migration in Cloud Data Centers. GREE 2014: 25-28 - [c40]Danda B. Rawat, Sachin Shetty, Khurram Raza:
Game Theoretic Dynamic Spectrum Access in Cloud-Based Cognitive Radio Networks. IC2E 2014: 586-591 - [c39]Md Monzurul Alam, Sudeep Bhattarai, Liang Hong, Sachin Shetty:
Robust transmit beamforming against steering vector uncertainty in cognitive radio networks. INFOCOM Workshops 2014: 700-705 - [c38]Danda B. Rawat, Swetha Reddy Lenkala, Nimish Sharma, Sachin Shetty:
Cloud-assisted dynamic spectrum access for VANET in transportation cyber-physical systems. IPCCC 2014: 1-2 - [c37]Danda B. Rawat, Sachin Shetty:
Enhancing connectivity for spectrum-agile Vehicular Ad hoc NETworks in fading channels. Intelligent Vehicles Symposium 2014: 957-962 - 2013
- [c36]Swetha Reddy Lenkala, Sachin Shetty, Kaiqi Xiong:
Security Risk Assessment of Cloud Carrier. CCGRID 2013: 442-449 - [c35]Danda B. Rawat, Bhed Bahadur Bista, Sachin Shetty, Gongjun Yan:
Waiting Probability Analysis for Dynamic Spectrum Access in Cognitive Radio Networks. CISIS 2013: 15-20 - [c34]Danda B. Rawat, Sachin Shetty:
Game theoretic approach to dynamic spectrum access with multi-radio and QoS requirements. GlobalSIP 2013: 1150-1153 - [c33]S. M. Meena, Sachin S. Shetty:
Trace transform based identifier for speech based image retrieval on mobile phones. ICACCI 2013: 967-972 - [c32]Md Monzurul Alam, Sudeep Bhattarai, Liang Hong, Sachin Shetty:
Robust beamforming for cognitive radio based vehicular communication. ICCVE 2013: 838-839 - [c31]Robert Nix, Murat Kantarcioglu, Sachin Shetty:
Toward a Real-Time Cloud Auditing Paradigm. SERVICES 2013: 255-259 - [c30]Sachin Shetty:
Auditing and Analysis of Network Traffic in Cloud Environment. SERVICES 2013: 260-267 - [c29]Sudeep Bhattarai, Liang Hong, Sachin Shetty:
Optimum transmit beamforming scheme for underlay cognitive radio networks. WPMC 2013: 1-6 - 2012
- [j5]Ying Tang, David Carbonetta, Sachin Shetty:
Development of an integrated network visualisation and graph analysis tool for biological networks. Int. J. Comput. Biol. Drug Des. 5(2): 152-163 (2012) - [c28]Sai Kiran Mukkavilli, Sachin Shetty:
Mining Concept Drifting Network Traffic in Cloud Computing Environments. CCGRID 2012: 721-722 - [c27]Sachin Shetty, Nicholas Luna, Kaiqi Xiong:
Assessing network path vulnerabilities for secure cloud computing. ICC 2012: 5548-5552 - [c26]Kalpesh Raval, Ravi Prakash Ramachandran, Sachin S. Shetty, Brett Y. Smolenski:
Feature and Signal Enhancement for Robust Speaker Identification of G.729 Decoded Speech. ICONIP (5) 2012: 345-352 - [c25]Danda B. Rawat, Sachin Shetty, Khurram Raza:
Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks. ICPP Workshops 2012: 288-295 - [c24]Ravi Prakash Ramachandran, Robi Polikar, Kevin D. Dahm, Sachin S. Shetty:
Open-ended design and performance evaluation of a biometric speaker identification system. ISCAS 2012: 2697-2700 - [c23]Hellen Maziku, Sachin Shetty, Keesook Han, Tamara Rogers:
Enhancing the classification accuracy of IP geolocation. MILCOM 2012: 1-6 - [c22]Umashanger Thayasivam, Sachin S. Shetty, Chinthaka Kuruwita, Ravi Prakash Ramachandran:
Detection of anomalies in network traffic using L2E for accurate speaker recognition. MWSCAS 2012: 884-887 - 2011
- [j4]Min Song, Sachin Shetty, Wenbin Jiang, Eun Kyo Park:
Special issue on information dissemination and new services in P2P systems. Peer-to-Peer Netw. Appl. 4(1): 1-2 (2011) - [c21]Abdulqadir Khoshnaw, Saleh Zein-Sabatto, Sachin Shetty, Mohan Malkani:
Development of information fusion model for layered sensing systems using computing with words. CogSIMA 2011: 183-188 - [c20]Sachin Shetty, Kodzo Agbedanu, Ravi Prakash Ramachandran:
Opportunistic spectrum access in multi-user multi-channel cognitive radio networks. EUSIPCO 2011: 1229-1233 - [c19]Gina Tang, Sachin Shetty:
Adaptive virtual reality game system for personalized problem-based learning. ICNSC 2011: 1-6 - 2010
- [j3]Gayathri Shivaraj, Min Song, Sachin Shetty:
Using Hidden Markov Model to detect rogue access points. Secur. Commun. Networks 3(5): 394-407 (2010) - [c18]Robert W. Mudrowsky, Ravi Prakash Ramachandran, Sachin S. Shetty:
The affine transform and feature fusion for robust speaker identification in the presence of speech coding distortion. APCCAS 2010: 1063-1066 - [c17]Ying Tang, Sachin Shetty, Xiufang Chen:
Empowering students with engineering literacy and problem-solving through interactive virtual reality games. ICE-GIC 2010: 64-69 - [c16]Chunsheng Xin, Min Song, Liangping Ma, Sachin Shetty, Chien-Chung Shen:
Control-Free Dynamic Spectrum Access for Cognitive Radio Networks. ICC 2010: 1-5 - [c15]Sachin Shetty, Ying Tang, William Collani:
TCP Venoplus - A cross-layer approach to improve TCP performance in wired-cum-wireless networks using signal strength. ICNSC 2010: 693-697 - [c14]Ravi Prakash Ramachandran, Sachin S. Shetty:
Blind channel estimation based robust physical layer key generation in MIMO networks. ISCAS 2010: 2522-2525
2000 – 2009
- 2009
- [j2]Sachin Shetty, Min Song, HouJun Yang, Lisa Matthews:
Learning distributed bayesian network structure using majority-based method. J. Comput. Methods Sci. Eng. 9(4-6): 53-68 (2009) - [c13]Sachin Shetty, Min Song, Chunsheng Xin, E. K. Park:
A Learning-based Multiuser Opportunistic Spectrum Access Approach in Unslotted Primary Networks. INFOCOM 2009: 2966-2970 - [c12]Sachin Shetty, Min Song, Jun Wang:
Distributed Adaptive Protocols for Information Dissemination in Large-Scale Communication Systems. MUE 2009: 279-286 - [c11]Gang Zhou, Sachin Shetty, George Simmons, Min Song:
PLL Based Time Synchronization in Wireless Sensor Networks. RTCSA 2009: 51-56 - 2008
- [c10]Sachin Shetty:
Min Song, Youjun Yang, Mary Mathews: Learning Bayesian Network over Distributed Databases Using Majority-based Method. SEDE 2008: 209-215 - 2007
- [j1]Min Song, Sachin Shetty, Deepthi Gopalpet:
Coexistence of IEEE 802.11b and Bluetooth: An Integrated Performance Analysis. Mob. Networks Appl. 12(5-6): 450-459 (2007) - [c9]Sachin Shetty, Min Song, Robert Ash, Ersin Ancel, Kenneth Bone:
Wireless Sensor Payload Design for Sounding Rocket. CATA 2007: 295-300 - [c8]Mary Mathews, Min Song, Sachin Shetty, Rick McKenzie:
Detecting Compromised Nodes in Wireless Sensor Networks. SNPD (1) 2007: 273-278 - 2005
- [c7]Min Song, Sachin Shetty, Wu Li:
Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput. ICCNMC 2005: 405-413 - [c6]Sachin Shetty, Min Song:
Structure learning of Bayesian networks using a semantic genetic algorithm-based approach. ITRE 2005: 454-458 - 2004
- [c5]Min Song, Sachin Shetty, Mansoor Alam, HouJun Yang:
A New Multicast Queuing Mechanism for High-Speed Packet Switches. PDCS 2004: 327-332 - 2003
- [c4]Min Song, Sachin Shetty, Guillermo Loaisiga, HouJun Yang:
Efficient Queuing Scheme for Multicast Switches in Overlay Networks. PDCS 2003: 76-81 - [c3]Min Song, Sachin Shetty, Weiying Zhu:
Evolutionary Programming in a Distributed Packet Scheduling Architecture. CAINE 2003: 230-233 - 2002
- [c2]Min Song, Mansoor Alam, Sachin Shetty, Uday Jarajapu:
Evolutionary Scheduling in a Multi-Service Routing Switch. IS 2002: 38-43 - 2001
- [c1]Sachin Shetty, John N. McDonald, Douglas Cochran:
A windowing condition for characterization of finite signals from spectral phase or magnitude. ICASSP 2001: 3889-3892
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-05 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint