Game theory based charging solution for networked electric vehicles: A location-aware approach A Laha, B Yin, Y Cheng, LX Cai, Y Wang IEEE Transactions on Vehicular Technology 68 (7), 6352-6364, 2019 | 55 | 2019 |
An energy efficient routing protocol for device-to-device based multihop smartphone networks A Laha, X Cao, W Shen, X Tian, Y Cheng 2015 IEEE International conference on communications (ICC), 5448-5453, 2015 | 50 | 2015 |
Real-time misbehavior detection and mitigation in cyber-physical systems over WLANs X Cao, L Liu, W Shen, A Laha, J Tang, Y Cheng IEEE Transactions on Industrial Informatics 13 (1), 186-197, 2015 | 42 | 2015 |
A location aware game theoretic approach for charging plug-in hybrid electric vehicles A Laha, B Yin, Y Cheng, LX Cai 2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016 | 4 | 2016 |
A hybrid approach for efficient wireless information and power transfer in green c-ran X Li, Z Chen, A Laha, Z Chen, Y Cheng, LX Cai 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018 | 3 | 2018 |
Substop: an analysis on subscription email bombing attack and machine learning based mitigation A Laha, MT Yasar, Y Cheng High-Confidence Computing 2 (4), 100086, 2022 | 2 | 2022 |
Game theory based location-aware charging solutions for networked electric vehicles A Laha Illinois Institute of Technology, 2020 | 1 | 2020 |
Enhancement of Security through aCryptographic Algorithm Based onMathematical Representation of NaturalNumbers P Singhal, NK Verma, A Laha, P Paul, A KBhattacharjee International Journal of Computer and Electrical Engineering 2 (5), 856, 2010 | 1 | 2010 |
GOOGLY-A Cryptographic Algorithm based on Mathematical Representation of Transfer Functions of a Discrete Time A Vaishnavi, S Roy, A Laha, NK Verma IJCSNS 9 (10), 216, 2009 | | 2009 |
High-Confidence Computing A Laha, MT Yasar, Y Cheng | | |