default search action
Santhanakrishnan Anand
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [i2]Santhanakrishnan Anand, Ofer Arazy, Narayan B. Mandayam, Oded Nov:
A Game-Theoretic Analysis of Competitive Editing in Wikipedia: Contributors' Effort to Influence Articles and the Community's Attempt to Ensure Neutrality. CoRR abs/2105.07966 (2021) - 2020
- [j17]Santhanakrishnan Anand, Ding Ding, Paolo Gasti, Mike O'Neal, Mauro Conti, Kiran S. Balagani:
DISPERSE: A Decentralized Architecture for Content Replication Resilient to Node Failures. IEEE Trans. Netw. Serv. Manag. 17(1): 201-212 (2020)
2010 – 2019
- 2017
- [j16]Mohammad Alnakhli, Santhanakrishnan Anand, Rajarathnam Chandramouli:
Joint Spectrum and Energy Efficiency in Device to Device Communication Enabled Wireless Networks. IEEE Trans. Cogn. Commun. Netw. 3(2): 217-225 (2017) - 2016
- [j15]Santhanakrishnan Anand, Rajarathnam Chandramouli:
A Micro-Finance Model for Spectrum Management in Wireless Networks. IEEE Trans. Cogn. Commun. Netw. 2(3): 263-272 (2016) - 2015
- [j14]Santhanakrishnan Anand, Mukundan Venkataraman, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Spatio-Temporal Analysis of Passive Consumption in Internet Media. IEEE Trans. Knowl. Data Eng. 27(10): 2839-2850 (2015) - [i1]Alireza Louni, Santhanakrishnan Anand, K. P. Subbalakshmi:
Identification of Source of Rumors in Social Networks with Incomplete Information. CoRR abs/1509.00557 (2015) - 2014
- [j13]Santhanakrishnan Anand, Shamik Sengupta, Rajarathnam Chandramouli:
Price-bandwidth dynamics for WSPs in heterogeneous wireless networks. Phys. Commun. 12: 63-78 (2014) - [j12]Santhanakrishnan Anand, Shamik Sengupta, Kai Hong, K. P. Subbalakshmi, Rajarathnam Chandramouli, Hasan Cam:
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities. IEEE Trans. Veh. Technol. 63(8): 3867-3874 (2014) - [c9]Zituo Jin, J. P. Morgan, Santhanakrishnan Anand, K. P. Subbalakshmi:
NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA. CNS 2014: 44-52 - 2013
- [j11]Santhanakrishnan Anand, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi, Mukundan Venkataraman:
Altruism in social networks: good guys do finish first. Soc. Netw. Anal. Min. 3(2): 167-177 (2013) - [j10]Santhanakrishnan Anand, K. P. Subbalakshmi, Rajarathnam Chandramouli:
A Quantitative Model and Analysis of Information Confusion in Social Networks. IEEE Trans. Multim. 15(1): 207-223 (2013) - 2012
- [j9]Santhanakrishnan Anand, Shamik Sengupta, Rajarathnam Chandramouli:
MAximum SPECTrum packing: a distributed opportunistic channel acquisition mechanism in dynamic spectrum access networks. IET Commun. 6(8): 872-882 (2012) - [j8]Santhanakrishnan Anand, Shamik Sengupta, Kai Hong, Rajarathnam Chandramouli:
Power Control Game in Multi-Terminal Covert Timing Channels. IEEE J. Sel. Areas Commun. 30(1): 44-53 (2012) - [j7]Zituo Jin, Santhanakrishnan Anand, Koduvayur P. Subbalakshmi:
Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks. IEEE Trans. Commun. 60(9): 2635-2643 (2012) - 2011
- [j6]Ziqian Dong, Santhanakrishnan Anand, Rajarathnam Chandramouli:
Estimation of missing RTTs in computer networks: Matrix completion vs compressed sensing. Comput. Networks 55(15): 3364-3375 (2011) - [c8]Santhanakrishnan Anand, Kai Hong, Rajarathnam Chandramouli, Shamik Sengupta, K. P. Subbalakshmi:
Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network. GLOBECOM 2011: 1-5 - [c7]Santhanakrishnan Anand, Kai Hong, Shamik Sengupta, Rajarathnam Chandramouli:
Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure? ICC 2011: 1-5 - [c6]Santhanakrishnan Anand, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
Cost of Collaboration vs Individual Effort in Social Networks. SDM 2011: 403-413 - 2010
- [j5]Santhanakrishnan Anand, Rajarathnam Chandramouli:
A network flow based approach for network selection in dynamic spectrum access networks. Inf. Process. Lett. 110(3): 104-107 (2010) - [j4]Santhanakrishnan Anand, Rajarathnam Chandramouli:
On the location of an eavesdropper in multiterminal networks. IEEE Trans. Inf. Forensics Secur. 5(1): 148-157 (2010) - [c5]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks. GLOBECOM 2010: 1-5 - [c4]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks. GLOBECOM 2010: 1-5 - [c3]Santhanakrishnan Anand, Shamik Sengupta, Rajarathnam Chandramouli:
An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks. INFOCOM 2010: 1586-1594
2000 – 2009
- 2009
- [j3]Shamik Sengupta, Santhanakrishnan Anand, Mainak Chatterjee, Rajarathnam Chandramouli:
Dynamic pricing for service provisioning and network selection in heterogeneous networks. Phys. Commun. 2(1-2): 138-150 (2009) - [j2]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(2): 74-85 (2009) - [j1]Shamik Sengupta, Santhanakrishnan Anand, Kai Hong, Rajarathnam Chandramouli:
On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels? ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(2): 96-107 (2009) - [c2]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks. ICC 2009: 1-5 - 2008
- [c1]Santhanakrishnan Anand, Rajarathnam Chandramouli:
On the Secrecy Capacity of Fading Cognitive Wireless Networks. CrownCom 2008: 1-5
Coauthor Index
aka: Koduvayur P. Subbalakshmi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint