Security and enforcement in spectrum sharing JM Park, JH Reed, AA Beex, TC Clancy, V Kumar, B Bahrak Proceedings of the IEEE 102 (3), 270-281, 2014 | 99 | 2014 |
3D printed graphene-based self-powered strain sensors for smart tires in autonomous vehicles D Maurya, S Khaleghian, R Sriramdas, P Kumar, RA Kishore, MG Kang, ... Nature communications 11 (1), 5392, 2020 | 92 | 2020 |
Energy harvesting and strain sensing in smart tire for next generation autonomous vehicles D Maurya, P Kumar, S Khaleghian, R Sriramdas, MG Kang, RA Kishore, ... Applied Energy 232, 312-322, 2018 | 79 | 2018 |
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu 14th USENIX Workshop on Offensive Technologies (WOOT), 2020 | 67 | 2020 |
Blind transmitter authentication for spectrum security and enforcement V Kumar, JM Park, K Bian Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 49 | 2014 |
Evading Voltage-Based Intrusion Detection on Automotive CAN R Bhatia, V Kumar, K Serag, ZB Celik, M Payer, D Xu Network and Distributed System Security (NDSS), 2021 | 47 | 2021 |
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement V Kumar, JMJ Park, K Bian IEEE Transactions on Information Forensics and Security 11 (5), 1027-1038, 2016 | 35 | 2016 |
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks J Wu, Y Nan, V Kumar, M Payer, D Xu 23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020 | 31 | 2020 |
Group signatures with probabilistic revocation: A computationally-scalable approach for providing privacy-preserving authentication V Kumar, H Li, JMJ Park, K Bian, Y Yang Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 31* | 2015 |
PHY-layer authentication by introducing controlled inter symbol interference V Kumar, JM Park, TC Clancy, K Bian Communications and Network Security (CNS), 2013 IEEE Conference on, 10-18, 2013 | 26 | 2013 |
Exposing New Vulnerabilities of Error Handling Mechanism in CAN K Serag, R Bhatia, V Kumar, ZB Celik, D Xu 30th USENIX Security Symposium, 2021 | 21 | 2021 |
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, DJ Tian 30th USENIX Security Symposium, 2021 | 21 | 2021 |
Cumulative Message Authentication Codes for Resource-Constrained IoT Networks H Li, V Kumar, JM Park, Y Yang IEEE Internet of Things Journal 8 (15), 11847-11859, 2021 | 13 | 2021 |
Direct anonymous attestation with efficient verifier-local revocation for subscription system V Kumar, H Li, N Luther, P Asokan, JMJ Park, K Bian, MBH Weiss, T Znati Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 13* | 2018 |
Group signatures with probabilistic revocation J Park, V Kumar US Patent 10,326,602, 2019 | 11 | 2019 |
Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters V Kumar, H Li, JMJ Park, K Bian 2018 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2018 | 11 | 2018 |
Cumulative message authentication codes for resource-constrained networks H Li, V Kumar, JMJ Park, Y Yang 2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020 | 9 | 2020 |
Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing V Kumar, H Li, JMJ Park, K Bian IEEE Transactions on Cognitive Communications and Networking 5 (3), 625-636, 2019 | 9 | 2019 |
ZBCAN: A Zero-Byte CAN Defense System K Serag, R Bhatia, A Faqih, MO Ozmen, V Kumar, ZB Celik, D Xu 32nd USENIX Security Symposium (USENIX Security 23), 6893-6910, 2023 | 8 | 2023 |
Achievable secrecy sum-rate in a fading MAC-WT with power control and without CSI of eavesdropper SM Shah, V Kumar, V Sharma Signal Processing and Communications (SPCOM), 2012 International Conference …, 2012 | 8 | 2012 |