default search action
K. P. Subbalakshmi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Yupeng Cao, Zhi Chen, Qingyun Pei, Nathan Lee, K. P. Subbalakshmi, Papa Momar Ndiaye:
ECC Analyzer: Extracting Trading Signal from Earnings Conference Calls using Large Language Model for Stock Volatility Prediction. ICAIF 2024: 257-265 - [i14]Yupeng Cao, Aishwarya Muralidharan Nair, Elyon Eyimife, Nastaran Jamalipour Soofi, K. P. Subbalakshmi, John R. Wullert II, Chumki Basu, David Shallcross:
Can Large Language Models Detect Misinformation in Scientific News Reporting? CoRR abs/2402.14268 (2024) - [i13]Yupeng Cao, Zhi Chen, Qingyun Pei, Fabrizio Dimino, Lorenzo Ausiello, Prashant Kumar, K. P. Subbalakshmi, Papa Momar Ndiaye:
RiskLabs: Predicting Financial Risk Using Large Language Model Based on Multi-Sources Data. CoRR abs/2404.07452 (2024) - [i12]Yupeng Cao, Zhi Chen, Qingyun Pei, Prashant Kumar, K. P. Subbalakshmi, Papa Momar Ndiaye:
ECC Analyzer: Extract Trading Signal from Earnings Conference Calls using Large Language Model for Stock Performance Prediction. CoRR abs/2404.18470 (2024) - 2023
- [c56]Farhad Rezazadeh, Sergio Barrachina-Muñoz, Engin Zeydan, Houbing Song, K. P. Subbalakshmi, Josep Mangues-Bafalluy:
X-GRL: An Empirical Assessment of Explainable GNN-DRL in B5G/6G Networks. NFV-SDN 2023: 172-174 - [i11]Farhad Rezazadeh, Sergio Barrachina-Muñoz, Engin Zeydan, Houbing Song, K. P. Subbalakshmi, Josep Mangues-Bafalluy:
X-GRL: An Empirical Assessment of Explainable GNN-DRL in B5G/6G Networks. CoRR abs/2311.08798 (2023) - 2022
- [j47]Fan Yang, Bingyang Wen, Cristina Comaniciu, K. P. Subbalakshmi, Rajarathnam Chandramouli:
TONet: A Fast and Efficient Method for Traffic Obfuscation Using Adversarial Machine Learning. IEEE Commun. Lett. 26(11): 2537-2541 (2022) - [i10]Bingyang Wen, K. P. Subbalakshmi, Fan Yang:
Revisiting Attention Weights as Explanations from an Information Theoretic Perspective. CoRR abs/2211.07714 (2022) - 2021
- [c55]Mingxuan Chen, Xinqiao Chu, K. P. Subbalakshmi:
MMCoVaR: multimodal COVID-19 vaccine focused data repository for fake news detection and a baseline architecture for classification. ASONAM 2021: 31-38 - [c54]Ning Wang, Yupeng Cao, Shuai Hao, Zongru Shao, K. P. Subbalakshmi:
Modular Multi-Modal Attention Network for Alzheimer's Disease Detection Using Patient Audio and Language Data. Interspeech 2021: 3835-3839 - [i9]Bingyang Wen, Luis Oliveros Colón, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Causal-TGAN: Generating Tabular Data Using Causal Generative Adversarial Networks. CoRR abs/2104.10680 (2021) - [i8]Ning Wang, Fan Luo, Yuvraj Shivtare, Varsha D. Badal, K. P. Subbalakshmi, Rajarathnam Chandramouli, Ellen Lee:
Learning Models for Suicide Prediction from Social Media Posts. CoRR abs/2105.03315 (2021) - [i7]Mingxuan Chen, Xinqiao Chu, K. P. Subbalakshmi:
MMCoVaR: Multimodal COVID-19 Vaccine Focused Data Repository for Fake News Detection and a Baseline Architecture for Classification. CoRR abs/2109.06416 (2021) - 2020
- [c53]Ning Wang, Fan Luo, Vishal Peddagangireddy, Koduvayur P. Subbalakshmi, Rajarathnam Chandramouli:
Personalized Early Stage Alzheimer's Disease Detection: A Case Study of President Reagan's Speeches. BioNLP 2020: 133-139 - [i6]Ning Wang, Fan Luo, Vishal Peddagangireddy, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Personalized Early Stage Alzheimer's Disease Detection: A Case Study of President Reagan's Speeches. CoRR abs/2005.12385 (2020) - [i5]Ning Wang, Mingxuan Chen, K. P. Subbalakshmi:
Explainable CNN-attention Networks (C-Attention Network) for Automated Detection of Alzheimer's Disease. CoRR abs/2006.14135 (2020) - [i4]Mingxuan Chen, Ning Wang, K. P. Subbalakshmi:
Explainable Rumor Detection using Inter and Intra-feature Attention Networks. CoRR abs/2007.11057 (2020)
2010 – 2019
- 2019
- [j46]Zongru Shao, Rajarathnam Chandramouli, K. P. Subbalakshmi, Constantine T. Boyadjiev:
An analytical system for user emotion extraction, mental state modeling, and rating. Expert Syst. Appl. 124: 82-96 (2019) - [j45]S. Eman Mahmoodi, R. N. Uma, K. P. Subbalakshmi:
Optimal Joint Scheduling and Cloud Offloading for Mobile Applications. IEEE Trans. Cloud Comput. 7(2): 301-313 (2019) - 2018
- [j44]Jianwei Huang, Yue Gao, K. P. Subbalakshmi:
Introduction to the Special Section From the IEEE GLOBECOM 2017 Conference. IEEE Trans. Cogn. Commun. Netw. 4(2): 344-346 (2018) - [j43]Alireza Louni, K. P. Subbalakshmi:
Who Spread That Rumor: Finding the Source of Information in Large Online Social Networks With Probabilistically Varying Internode Relationship Strengths. IEEE Trans. Comput. Soc. Syst. 5(2): 335-343 (2018) - 2016
- [j42]Vidya Sagar, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Software defined access for HetNets. IEEE Commun. Mag. 54(1): 84-89 (2016) - [j41]Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Joint-channel modeling to attack QIM steganography. Multim. Tools Appl. 75(21): 13585-13611 (2016) - [j40]S. Eman Mahmoodi, K. P. Suba Subbalakshmi:
A Time-Adaptive Heuristic for Cognitive Cloud Offloading in Multi-RAT Enabled Wireless Devices. IEEE Trans. Cogn. Commun. Netw. 2(2): 194-207 (2016) - [c52]S. Eman Mahmoodi, K. P. Subbalakshmi, R. N. Uma:
Harnessing spectrum awareness to enhance mobile computing: poster. MobiCom 2016: 460-461 - 2015
- [j39]S. Ebrahim Safavi, K. P. Subbalakshmi:
Effective Bandwidth for Delay Tolerant Secondary User Traffic in Multi-PU, Multi-SU Dynamic Spectrum Access Networks. IEEE Trans. Cogn. Commun. Netw. 1(2): 175-184 (2015) - [j38]Santhanakrishnan Anand, Mukundan Venkataraman, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Spatio-Temporal Analysis of Passive Consumption in Internet Media. IEEE Trans. Knowl. Data Eng. 27(10): 2839-2850 (2015) - [c51]S. Ebrahim Safavi, K. P. Subbalakshmi:
Delay analysis of multi-user dynamic spectrum access networks. DySPAN 2015: 319-325 - [c50]S. Eman Mahmoodi, K. P. Subbalakshmi, Vidya Sagar:
Cloud offloading for multi-radio enabled mobile devices. ICC 2015: 5473-5478 - [i3]Alireza Louni, Santhanakrishnan Anand, K. P. Subbalakshmi:
Identification of Source of Rumors in Social Networks with Incomplete Information. CoRR abs/1509.00557 (2015) - [i2]S. Eman Mahmoodi, K. P. Subbalakshmi, Vidya Sagar:
Cloud Offloading for Multi-Radio Enabled Mobile Devices. CoRR abs/1511.03698 (2015) - [i1]S. Eman Mahmoodi, K. P. Subbalakshmi, Rajarathnam Chandramouli, Bahman Abolhassani:
Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay. CoRR abs/1511.04115 (2015) - 2014
- [j37]Mahdi Azarafrooz, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Reciprocity, fairness and learning in medium access control games. Comput. Commun. 46: 22-28 (2014) - [j36]S. Eman Mahmoodi, K. P. Subbalakshmi, Rajarathnam Chandramouli, Bahman Abolhassani:
Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay. EAI Endorsed Trans. Wirel. Spectr. 1(1): e4 (2014) - [j35]Santhanakrishnan Anand, Shamik Sengupta, Kai Hong, K. P. Subbalakshmi, Rajarathnam Chandramouli, Hasan Cam:
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities. IEEE Trans. Veh. Technol. 63(8): 3867-3874 (2014) - [c49]Zituo Jin, J. P. Morgan, Santhanakrishnan Anand, K. P. Subbalakshmi:
NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA. CNS 2014: 44-52 - [c48]Alireza Louni, K. P. Subbalakshmi:
A two-stage algorithm to estimate the source of information diffusion in social media networks. INFOCOM Workshops 2014: 329-333 - 2013
- [j34]Shamik Sengupta, K. P. Subbalakshmi:
Open research issues in multi-hop cognitive radio networks. IEEE Commun. Mag. 51(4): 168-176 (2013) - [j33]Santhanakrishnan Anand, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi, Mukundan Venkataraman:
Altruism in social networks: good guys do finish first. Soc. Netw. Anal. Min. 3(2): 167-177 (2013) - [j32]Santhanakrishnan Anand, K. P. Subbalakshmi, Rajarathnam Chandramouli:
A Quantitative Model and Analysis of Information Confusion in Social Networks. IEEE Trans. Multim. 15(1): 207-223 (2013) - [c47]Alireza Louni, K. P. Subbalakshmi:
Optimizing flow control in multi-interface wireless cognitive radio networks. GLOBECOM 2013: 1227-1232 - [c46]Mahdi Azarafrooz, Ramamurti Chandramouli, Koduvayur P. Subbalakshmi:
Reciprocity and Fairness in Medium Access Control Games. ICCCN 2013: 1-5 - 2012
- [j31]Ziqian Dong, Rohan D. W. Perera, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Network measurement based modeling and optimization for IP geolocation. Comput. Networks 56(1): 85-98 (2012) - [j30]Yi Tan, Shamik Sengupta, Koduvayur P. Subbalakshmi:
Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach. IET Commun. 6(8): 964-973 (2012) - [j29]Chetan Nanjunda Mathur, Mohamed A. Haleem, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Impact of Constraints on the Complexity and Performance of Channel Assignment in Multi-Hop Wireless Networks. J. Cyber Secur. Mobil. 1(2-3) (2012) - [j28]Zituo Jin, Santhanakrishnan Anand, Koduvayur P. Subbalakshmi:
Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks. IEEE Trans. Commun. 60(9): 2635-2643 (2012) - [j27]Hafiz Malik, K. P. Subbalakshmi, Ramamurti Chandramouli:
Nonparametric Steganalysis of QIM Steganography Using Approximate Entropy. IEEE Trans. Inf. Forensics Secur. 7(2): 418-431 (2012) - [c45]Mukundan Venkataraman, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Measuring and quantifying the silent majority on the Internet. Sarnoff Symposium 2012: 1-5 - 2011
- [j26]Shamik Sengupta, Kai Hong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
SpiderRadio: A cognitive radio network with commodity hardware and open source software. IEEE Commun. Mag. 49(3): 101-109 (2011) - [j25]Na Cheng, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Author gender identification from text. Digit. Investig. 8(1): 78-88 (2011) - [j24]Guoqi Luo, K. P. Subbalakshmi:
KL-sense secure image steganography. Int. J. Secur. Networks 6(4): 211-225 (2011) - [j23]Yi Tan, Shamik Sengupta, K. P. Subbalakshmi:
Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks. IEEE J. Sel. Areas Commun. 29(4): 890-902 (2011) - [c44]Santhanakrishnan Anand, Kai Hong, Rajarathnam Chandramouli, Shamik Sengupta, K. P. Subbalakshmi:
Security Vulnerability Due to Channel Aggregation/Bonding in LTE and HSPA+ Network. GLOBECOM 2011: 1-5 - [c43]Guoqi Luo, K. P. Subbalakshmi:
Zero Kullback-Liebler Divergence Image Data Hiding. GLOBECOM 2011: 1-5 - [c42]S. Ebrahim Safavi, K. P. Subbalakshmi:
Optimal Joint Power Allocation and Phase Control for DS-CDMA Cognitive Radio Networks. GLOBECOM 2011: 1-5 - [c41]Yi Tan, Kai Hong, Shamik Sengupta, K. P. Subbalakshmi:
Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks. GLOBECOM 2011: 1-5 - [c40]Yi Tan, Shamik Sengupta, K. P. Subbalakshmi:
Human Society Inspired Dynamic Spectrum Access Networks: The Effect of Parochialism. GLOBECOM 2011: 1-5 - [c39]Yi Tan, Kai Hong, Shamik Sengupta, Koduvayur P. Subbalakshmi:
Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense. ICC 2011: 1-5 - [c38]Xiaoling Chen, Peng Hao, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Authorship Similarity Detection from Email Messages. MLDM 2011: 375-386 - [c37]Peng Hao, Xiaoling Chen, Na Cheng, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Adaptive Context Modeling for Deception Detection in Emails. MLDM 2011: 458-468 - [c36]Santhanakrishnan Anand, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
Cost of Collaboration vs Individual Effort in Social Networks. SDM 2011: 403-413 - 2010
- [j22]Fabrizio Granelli, Przemyslaw Pawelczak, R. Venkatesha Prasad, K. P. Subbalakshmi, Rajarathnam Chandramouli, James A. Hoffmeyer, H. Stephen Berger:
Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities. IEEE Commun. Mag. 48(1): 71-79 (2010) - [c35]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks. GLOBECOM 2010: 1-5 - [c34]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks. GLOBECOM 2010: 1-5 - [c33]Yi Tan, Shamik Sengupta, K. P. Subbalakshmi:
Competitive Spectrum Trading in Dynamic Spectrum Access Markets: A Price War. GLOBECOM 2010: 1-5 - [c32]Yi Tan, Shamik Sengupta, K. P. Subbalakshmi:
Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks. ICC 2010: 1-5 - [p1]Xiaoling Chen, Rohan D. W. Perera, Ziqian Dong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
Deception Detection on the Internet. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 334-354
2000 – 2009
- 2009
- [j21]Rajarathnam Chandramouli, Ananthram Swami, John Chapin, K. P. Subbalakshmi:
Dynamic Spectrum Access for Wireless Networking. EURASIP J. Adv. Signal Process. 2009 (2009) - [j20]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing. ACM SIGMOBILE Mob. Comput. Commun. Rev. 13(2): 74-85 (2009) - [c31]Na Cheng, Xiaoling Chen, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Gender identification from E-mails. CIDM 2009: 154-158 - [c30]Goce Jakimoski, K. P. Subbalakshmi:
Towards Secure Spectrum Decision. ICC 2009: 1-5 - [c29]Zituo Jin, Santhanakrishnan Anand, K. P. Subbalakshmi:
Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks. ICC 2009: 1-5 - 2008
- [j19]Goce Jakimoski, K. P. Subbalakshmi:
Cryptanalysis of Some Multimedia Encryption Schemes. IEEE Trans. Multim. 10(3): 330-338 (2008) - [j18]K. S. Kumar, Ramamurti Chandramouli, K. P. Subbalakshmi:
On stochastic learning in predictive wireless ARQ. Wirel. Commun. Mob. Comput. 8(7): 871-883 (2008) - [c28]Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Impact of Constraints on the Complexity of Dynamic Spectrum Assignment. GLOBECOM 2008: 3164-3169 - [c27]Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Nonparametric steganalysis of QIM data hiding using approximate entropy. Security, Forensics, Steganography, and Watermarking of Multimedia Contents 2008: 681914 - 2007
- [j17]Mohamed A. Haleem, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Joint Encryption and Compression of Correlated Sources with Side Information. EURASIP J. Inf. Secur. 2007 (2007) - [j16]Ashish Patel, M. Shah, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi:
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences. Int. J. Netw. Secur. 5(1): 41-50 (2007) - [j15]Palak K. Amin, Ning Liu, Koduvayur P. Subbalakshmi:
Statistical Attack Resilient Data Hiding. Int. J. Netw. Secur. 5(1): 112-120 (2007) - [j14]Chetan Nanjunda Mathur, K. P. Subbalakshmi:
A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices. Int. J. Netw. Secur. 5(2): 205-212 (2007) - [j13]K. P. Subbalakshmi, Rajarathnam Chandramouli, Nagarajan Ranganathan:
A Sequential Distinguisher for Covert Channel Identification. Int. J. Netw. Secur. 5(3): 274-282 (2007) - [j12]Pascal Frossard, Chang Wen Chen, Cormac J. Sreenan, K. P. Subbalakshmi, Dapeng Oliver Wu, Qian Zhang:
Guest Editorial Cross-layer Optimized Wireless Multimedia Communications. IEEE J. Sel. Areas Commun. 25(4): 641-644 (2007) - [j11]Goce Jakimoski, K. P. Subbalakshmi:
Discrete Lyapunov Exponent and Differential Cryptanalysis. IEEE Trans. Circuits Syst. II Express Briefs 54-II(6): 499-501 (2007) - [j10]Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. IEEE Trans. Dependable Secur. Comput. 4(4): 313-324 (2007) - [j9]Yiping Xing, Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Dynamic Spectrum Access with QoS and Interference Temperature Constraints. IEEE Trans. Mob. Comput. 6(4): 423-433 (2007) - [j8]Ning Liu, Palak K. Amin, K. P. Subbalakshmi:
Security and Robustness Enhancement for Image Data Hiding. IEEE Trans. Multim. 9(3): 466-474 (2007) - [c26]Goce Jakimoski, K. P. Subbalakshmi:
On Efficient Message Authentication Via Block Cipher Design Techniques. ASIACRYPT 2007: 232-248 - [c25]Chetan Nanjunda Mathur, K. P. Subbalakshmi:
Digital Signatures for Centralized DSA Networks. CCNC 2007: 1037-1041 - [c24]Mohamed A. Haleem, K. P. Subbalakshmi:
Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels. DCC 2007: 383 - [c23]Palak K. Amin, K. P. Subbalakshmi:
Detecting Hidden Messages Using Image Power Spectrum. ICIP (1) 2007: 421-424 - [c22]Hafiz Malik, K. P. Subbalakshmi, Rajarathnam Chandramouli:
Steganalysis of GIM-based data hiding using kernel density estimation. MM&Sec 2007: 149-160 - 2006
- [j7]Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi:
On the Design of Error-Correcting Ciphers. EURASIP J. Wirel. Commun. Netw. 2006 (2006) - [j6]Rajarathnam Chandramouli, Satish Bapatla, K. P. Subbalakshmi, R. N. Uma:
Battery power-aware encryption. ACM Trans. Inf. Syst. Secur. 9(2): 162-180 (2006) - [c21]Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi:
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. ACNS 2006: 309-324 - [c20]Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi:
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. ACNS 2006: 448-458 - [c19]Yiping Xing, Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Real-time secondary spectrum sharing with QoS provisioning. CCNC 2006: 630-634 - [c18]Chetan Nanjunda Mathur, K. P. Subbalakshmi:
Energy Efficient Wireless Encryption. GLOBECOM 2006 - [c17]Yiping Xing, Chetan Nanjunda Mathur, Mohamed A. Haleem, Rajarathnam Chandramouli, K. P. Subbalakshmi:
Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints. ICC 2006: 4420-4425 - [c16]Ning Liu, K. P. Subbalakshmi:
Worst Case Attack on Quantization Based Data Hiding. ISM 2006: 679-684 - 2005
- [c15]Qingyu Chen, Koduvayur P. Subbalakshmi:
Distributed Joint Source-Channel Decoding for Correlated Markov Sources. DCC 2005: 453 - [c14]Palak K. Amin, Ning Liu, K. P. Subbalakshmi:
Statistically Secure Digital Image Data Hiding. MMSP 2005: 1-4 - [c13]Ning Liu, Palak K. Amin, K. P. Subbalakshmi:
Secure Quantization Based Data Embedding. MMSP 2005: 1-4 - [c12]Ning Liu, Koduvayur P. Subbalakshmi:
TCQ-based quantizer design for data hiding in images. Security, Steganography, and Watermarking of Multimedia Contents 2005: 185-193 - 2004
- [j5]Ramamurti Chandramouli, Koduvayur P. Subbalakshmi, N. Ranganathan:
Stochastic channel-adaptive rate control for wireless video transmission. Pattern Recognit. Lett. 25(7): 793-806 (2004) - [c11]Rajarathnam Chandramouli, K. P. Subbalakshmi:
Current trends in steganalysis: a critical survey. ICARCV 2004: 964-967 - [c10]Palak K. Amin, Koduvayur P. Subbalakshmi:
Rotation and cropping resilient data hiding with zernike moments. ICIP 2004: 2175-2178 - [c9]Ning Liu, Koduvayur P. Subbalakshmi:
Non-uniform quantizer design for image data hiding. ICIP 2004: 2179-2182 - [c8]Siva Somasundaram, Koduvayur P. Subbalakshmi, R. N. Uma:
MDC and path diversity in video streaming. ICIP 2004: 3153-3156 - [c7]Ning Liu, Koduvayur P. Subbalakshmi:
Vector-quantization-based scheme for data embedding for images. Security, Steganography, and Watermarking of Multimedia Contents 2004: 548-559 - 2003
- [j4]Qingyu Chen, Koduvayur P. Subbalakshmi:
Joint source-channel decoding for MPEG-4 video transmission over wireless channels. IEEE J. Sel. Areas Commun. 21(10): 1780-1789 (2003) - [j3]Koduvayur P. Subbalakshmi, Jacques Vaisey:
On the joint source-channel decoding of variable-length encoded sources: the additive-Markov case. IEEE Trans. Commun. 51(9): 1420-1425 (2003) - [c6]Siva Somasundaram, Koduvayur P. Subbalakshmi:
3-D multiple description video coding for packet switched networks. ICME 2003: 589-592 - [c5]Ramamurti Chandramouli, Koduvayur P. Subbalakshmi:
Active steganalysis of spread spectrum image steganography. ISCAS (3) 2003: 830-833 - 2002
- [c4]Koduvayur P. Subbalakshmi, Siva Somasundaram:
Multiple description image coding framework for EBCOT. ICIP (3) 2002: 541-544 - 2001
- [j2]Koduvayur P. Subbalakshmi, Jacques Vaisey:
On the joint source-channel decoding of variable-length encoded sources: the BSC case. IEEE Trans. Commun. 49(12): 2052-2055 (2001) - [c3]Koduvayur P. Subbalakshmi:
Preface to Special Sessions on Current Trends in Multimedia Communications and Computing. ITCC 2001: 249
1990 – 1999
- 1999
- [c2]K. P. Subbalakshmi, Jacques Vaisey:
Joint source-channel decoding of entropy coded Markov sources over binary symmetric channels. ICC 1999: 446-450 - 1998
- [c1]Koduvayur P. Subbalakshmi, Jacques Vaisey:
Optimal Decoding of Entrophy Coded Memoryless Sources over Binary Symmetric Channels. Data Compression Conference 1998: 573 - 1997
- [j1]Anamitra Makur, K. P. Subbalakshmi:
Variable dimension VQ encoding and codebook design. IEEE Trans. Commun. 45(8): 897-899 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint