Verifying ADS-B navigation information through Doppler shift measurements N Ghose, L Lazos 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC), 4A2-1-4A2-11, 2015 | 47 | 2015 |
SFIRE: Secret-free-in-band trust establishment for COTS wireless devices N Ghose, L Lazos, M Li IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 1529-1537, 2018 | 20 | 2018 |
RadioNet: Robust deep-learning based radio fingerprinting H Li, K Gupta, C Wang, N Ghose, B Wang 2022 IEEE Conference on Communications and Network Security (CNS), 190-198, 2022 | 15 | 2022 |
HELP: Helper-Enabled In-Band Device Pairing Resistant Against Signal Cancellation N Ghose, L Lazos, M Li 26th USENIX Security Symposium (USENIX Security 17), 433-450, 2017 | 12 | 2017 |
Pof: Proof-of-following for vehicle platoons Z Xu, J Li, Y Pan, L Lazos, M Li, N Ghose arXiv preprint arXiv:2107.09863, 2021 | 10 | 2021 |
Secure device bootstrapping without secrets resistant to signal manipulation attacks N Ghose, L Lazos, M Li 2018 IEEE Symposium on Security and Privacy (SP), 819-835, 2018 | 10 | 2018 |
In-band secret-free pairing for COTS wireless devices N Ghose, L Lazos, M Li IEEE Transactions on Mobile Computing 21 (2), 612-628, 2020 | 9 | 2020 |
Multimodal graph analysis of cyber attacks N Ghose, L Lazos, J Rozenblit, R Breiger 2019 Spring simulation conference (SpringSim), 1-12, 2019 | 8 | 2019 |
Secure Physical Layer Voting N Ghose, B Hu, Y Zhang, L Lazos IEEE Transactions on Mobile Computing 17 (3), 688 - 702, 2018 | 7 | 2018 |
ZITA: zero-interaction two-factor authentication using contact traces and in-band proximity verification N Ghose, K Gupta, L Lazos, M Li, Z Xu, J Li IEEE Transactions on Mobile Computing, 2023 | 5 | 2023 |
Verifying ADS-B navigation information through Doppler shift measurements. In 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC) N Ghose, L Lazos IEEE, 4A2–1, 2015 | 5 | 2015 |
Radtec: Re-authentication of iot devices with machine learning K Gupta, N Ghose, B Wang 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), 817-822, 2023 | 2 | 2023 |
Robust deep-learning-based radio fingerprinting with fine-tuning H Li, C Wang, N Ghose, B Wang Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 2 | 2021 |
POSTER: Robust Deep-learning-based Radio Fingerprinting with Fine-Tuning H Li, C Wang, N Ghose, B Wang Proc. ACM WiSec 21, 2021 | 2 | 2021 |
Bio-inspired decentralized rogue node detection in fair dynamic spectrum access networks T Duong, A Wisniewska, N Ghose 2022 14th International Conference on Computational Intelligence and …, 2022 | 1 | 2022 |
Authentication and Message Integrity Verification without Secrets N Ghose The University of Arizona, 2019 | 1 | 2019 |
Reciprocal Altruism as a Rogue Node Detection Mechanism in Dynamic Spectrum Access Networks T Duong, A Wisniewska, N Ghose 2024 IEEE 21st Consumer Communications & Networking Conference (CCNC), 614-615, 2024 | | 2024 |
Cross-layer Device Identification for Smart Grid Substation Networks: IEEE CNS 23 Poster VSSL Karanam, F Afrin, B Ramamurthy, N Ghose 2023 IEEE Conference on Communications and Network Security (CNS), 1-2, 2023 | | 2023 |
STUN: Secret-Free Trust-Establishment For Underground Wireless Networks E Oguchi, N Ghose, MC Vuran IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops …, 2022 | | 2022 |
Evaluation of a bio-socially inspired secure DSA scheme using testbed-calibrated hybrid simulations A Wisniewska, N Ghose, B Khan 2021 IEEE 12th Annual Information Technology, Electronics and Mobile …, 2021 | | 2021 |