Research Topics

Over the years my research interests have changed quite a bit. The overarching themes remain: curiosity and interdisciplinarity! Each of the bullet items in the list below is linked to a page that describes my work in that specific area. A list of all patents and publications appear below that. If you are interested in a listing of publications in chronological order, see here



Publications and Patents

It is likely that this list will never be fully up-to-date! If you are looking for publications pertaining to a particular research topic, they are available via the related project page above. For a chronological listing of papers see here.

Most of my papers can be found at: https://dblp.org/pid/s/KPSubbalakshmi.html

patents

  1. Constanine Boyadjiev, R. Chandramouli, K.P. Subbalakshmi, Zongru Shao, "Machine learning for authenticating voice", US Patent 10,593,336, 2020.

  2. Constantine Boyadijev, R. Chandramouli, K.P. Subbalakshmi and Zongru (Doris) Shao, "Natural Language Processing Artificial Intelligence Network and Data Security System", US Patent No: , December 24, 2019.

  3. Syed Eman Mahmoodi and K.P. Subbalakshmi, “Cognitive cloud off-loader: Real-time method for joint scheduling offloading computation in multi-Rat enabled mobile devices”, US Patent 10,397,829, 2019

  4. Alireza Louni and K.P. Subbalakshmi, “Method and Apparatus to Identify the Source of Information /Misinformation in Large Scale Social Media Networks”, 9959365, US Patent Awarded May 1 2018

  5. Vidya Sagar, R. Chandramouli, K.P. Subbalakshmi, "Systems and methods for wireless spectrum access in heterogeneous networks", US Patent 10,548,021

  6. R. Chandramouli, Xiaoling Chen, K.P. Subbalakshmi and R. Perera, “Systems and methods for automatically detecting deception in human communications expressed in digital form", US Patent 9292493, PCT/US11/033936, Awarded March 22, 2016

  7. R. Chandramouli, X. Chen and K.P. Subbalakshmi, “Psycho-linguistic statistical deception detection from text content”, PCT/US11/020390, US Patent Number 9116877, Issue Date: August 25, 2015.

  8. R. Chandramouli, K.P. Subbalakshmi and Helena Wisniewski, “Data Hiding based Messages and Advertisements”, US8555052 B2, Issue Date: Oct 8, 2013.

  9. Palak Amin and K.P. Subbalakshmi, “Robust Hidden Data Extraction Method for Scaling Attacks”, U.S Patent #: 7,529,384, Issue Date: May 5, 2009.

Publications

Books

Spectrum-Awareness in Mobile Computing - Convergence of Cloud Computing and Cognitive Networking, Syed Eman Mahmoodi, K.P. Subbalakshmi and R. N. Uma, Springer International Publishing, 2018

Reports

  • K.P. Subbalakshmi, A. Galstyan, R. Chellappa and C. Clancy, "Sensemaking Research Roadmap", Stevens Institute of Technology Hoboken, Delivered to the ODNI, 2018

Book Chapters

  • Syed Eman Mahmoodi, K.P. Subbalakshmi and R. N. Uma ,"Spectrum Aware Mobile Computing using Cognitive Networks", Handbook of Cognitive Radio - Section: Dynamic Spectrum Access and Sharing, Springer, Eds: Dusit Niyato and Ping Wang, EiC: Wei Zhang. [invited]

  • Olga Leon and K.P. Subbalakshmi, "Security Issues in Cognitive Radio Networks", Handbook of Cognitive Radio - Section: Dynamic Spectrum Access and Sharing, Springer, Eds: Dusit Niyato and Ping Wang, EiC: Wei Zhang. [invited]

  • Zituo Jin, S. Anand, K.P. Subbalakshmi and R. Chandramouli, "Connectivity of Ad-hoc 5G Wireless Networks under Denial of Service Attacks", in 5G Outlook Innovations and Applications, River Publishers Series in Communications, Ed.: Ramjee Prasad, pp.:85--102, ISBN: 978-87-93379-77-0 [invited]

  • Alireza Louni and K.P. Subbalakshmi. (2014). "Diffusion of Information in Social Networks", Social Networking: Mining, Visualization and Security, Mrutyunjaya Panda, Satchidananda Dehuri and Gi-Nam Wang, Springer-Verlag GmbH. XXII. [invited]

  • Xiaoling Chen, R. Chandramouli and K.P. Subbalakshmi. (2014). "Scam Detection in Twitter", Data Mining for Service, Katsutoshi Yada, Series: Studies in Big Data, Springer Berlin Heidelberg. 3 133-150.

  • Z. Dong, S. Sengupta, S. Anand, K. Hong, R. Chandramouli and K.P. Subbalakshmi. (Sep 28, 2011). "Cognitive radio mobile ad hoc networks in healthcare, Cognitive Radio Mobile Ad Hoc Networks", Cognitive Radio Mobile Ad-Hoc Networks, Richard Yu , Chapter 13, pp. , 2011, Springer. Invited . 335-349.

  • Hafiz Malik, R. Chandramouli and K.P. Subbalakshmi. (Jun 2008). "Steganalysis: Trends and Challenges", in Multimedia Forensics and Security", Multimedia Forensics and Security, Chang-Tsun Li, Idea Group Publishing.

  • Chetan Nanjunda and K.P. Subbalakshmi. (2007). "Security Issues in Cognitive Networks", Cognitive Networks: Towards Self-Aware Networks, Qusay H. Mahmoud, Wiley. 271-292.

  • Yiping Xing, Harikesh Kushwaha, K.P. Subbalakshmi and R. Chandramouli. (2007). "Codes and Games for Dynamic Spectrum Access", Cognitive Radio, Software Defined Radio, and Adaptive Wireless Systems, Arslan Huseyin, Springer Verlag.

  • Xiaoling Chen, Rohan D Perera, Ziqian Dong, R. Chandramouli, and K.P. Subbalakshmi. (2010). "Deception Detection on the Internet", Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, IGI Global, ISBN13: 978-1-60566-836-9. 334 – 354.

  • Harikeshwar Kushwaha, R. Chandramouli, and K. P. Subbalakshmi. (2007). "Erasure Tolerant Coding for Cognitive Radios", Cognitive Networks: Towards Self-Aware Networks, Qusay H. Mahmoud, Wiley. 315-332.

  • M.A. Haleem and K.P. Subbalakshmi. "Global Systems for Mobile Communications", The Handbook of Computer Networks, Volume II, LANs, MANs, WANs, The Internet, Global, Cellular and Wireless Networks,John Wiley and Sons Inc.

  • Ning Liu, Palak Amin, Aruna Ambalavanan and K.P. Subbalakshmi. (Jun 2006). "An Overview of Digital Watermarking", Multimedia Security Technologies for Digital Rights Management, W. Zeng, H. Yu and C. Lin, Elsevier Inc.

  • K.P. Subbalakshmi. (2003). "Lossless Image Compression", Lossless Compression Handbook, Khalid Sayood, Academic Press Series in Communications, Networking, and Multimedia, Academic Press.

Journal Papers

  • R. Chandramouli, S. Srikanth, K.P. Subbalakshmi, and V. Sagar, "6G Multinetwork Convergence, 6G Enabling Technologies - Innovation 6G", River Publishers, 2021 (invited).

  • Zongru Shao, Rajarathnam Chandramouli, K. P. Subbalakshmi, Constantine T. Boyadjiev, "An analytical system for user emotion extraction, mental state modeling, and rating", Expert Syst. Appl. 124: 82-96 (2019)

  • Alireza Louni and K.P. Subbalakshmi, "Who Spread that Rumor: Finding the Source of Information in Large On-line Social Networks with Probabilistically Varying Inter-Node Relationship Strengths", Accepted for Publication in IEEE Transactions on Computational Social Systems, 2018.

  • Syed Eman Mahmoodi and K.P. Subbalakshmi, "A Time-Adaptive Heuristic for Cognitive Cloud Offloading in Multi-RAT Enabled Wireless Devices", IEEE Transactions on Cognitive Communications and Networking, Vol.2, Issue 2, pp.: 194-207, June 2016. Download (701 kb PDF)

  • Syed Eman Mahmoodi, R. N. Uma and K.P. Subbalakshmi. "Optimal Joint Scheduling and Cloud Offloading for Mobile Applications", IEEE Transactions on Cloud Computing, April 2016, Online ISSN 2168-7161, Download (626 kb PDF)

  • Syed Ebrahim Safavi and K.P. Subbalakshmi. "Effective Bandwidth for Delay Tolerant Secondary User Traffic in Multi-PU, Multi-SU Dynamic Spectrum Access Networks", IEEE Transactions on Cognitive Communications and Networking, Vol 1, Issue 2, pp: 175-184, November 2015. Download (776 kb PDF).

  • Vidya Sagar, R. Chandramouli and K.P. Subbalakshmi. (2016). "Software Defined Access for HetNets", IEEE Communications Magazine.

  • S. Anand, M. Venkataraman, K. P. Subbalakshmi and R. Chandramouli. (Oct 1, 2015). "Spatio-Temporal Analysis of Passive Consumption in Internet Media", IEEE Transactions on Knowledge and Data Engineering, IEEE. 27 (10), 2839-2850.

  • Hafiz Malik, K.P. Subbalakshmi and R Chandramouli, "Joint-Channel Modeling to Attack QIM Steganography", Springer Multimedia Tools and Applications, November 2015.

  • Syed Eman Mahmoodi, K.P. Subbalakshmi, R. Chandramouli and Bahman Abolhassani. (Apr 2014). "Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay", ICST Transactions on Wireless Spectrum, 1 (1), 13.

  • S. Anand, Shamik Sengupta, Hong Kai, K.P. Subbalakshmi, R. Chandramouli and Hassan Cam. (Feb 2014). "Exploiting Channel Fragmentation and Aggregation/ Bonding to Create Security Vulnerabilities", Transactions on Vehicular Technology, IEEE. 63 (8), 3867 - 3874.

  • S. Anand, K.P. Subbalakshmi and R. Chandramouli. (Jan 2013). "A Quantitative Model and Analysis of Information Confusion in Social Networks", Transactions on Multimedia, 15 (1), 207 - 223. Download (375 kb PDF).

  • Zituo Jin, S. Anand and K.P. Subbalakshmi. (2012). "Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks", Transactions on Communications, IEEE. 9 (60), 2635- 2643. Download (304 kb PDF).

  • Shamik Sengupta and K.P. Subbalakshmi. (Apr 2013). "Open Research Issues in Multi-hop Cognitive Radio Networks", IEEE Communications Magazine, 51 (4), 168-176. Download (459 kb PDF).

  • Hafiz Malik, K.P. Subbalakshmi and R. Chandramouli. (Apr 2012). "Nonparametric Steganalysis of QIM Steganography using Approximate Entropy", IEEE Transactions on Information Forensics and Security, 7 (3), 418 - 431. Download (992 kb PDF).

  • S. Anand, R. Chandramouli, K.P. Subbalakshmi and M. Venkataraman. (Mar 2012). "Altruism in social networks: Good guys do finish first", Springer Social Networks Analysis and Mining, Print ISBN:1869-5450.

  • Z. Dong, R.D.W. Perera, R. Chandramouli and K.P. Subbalakshmi. (Jan 2012). "Network measurement based modeling and optimization for IP geo-location", Elsevier Journal Computer Networks: The International Journal of Computer and Telecommunications Networking, 56 (1), 85-98.

  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (May 22, 2012). "Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach", IET Communications, IET. 6 (8), 964- 973. Download (251 kb PDF).

  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (Apr 2011). "Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks", Journal on Selected Areas of Communications, Special Issue on Cognitive Radio Networking and Communications, IEEE. 29 (4), 890- 902.

  • C. Mathur, M.A. Haleem, K.P. Subbalakshmi and R. Chandramouli. (2012). "Impact of constraints on the complexity and performance of channel assignment in multihop wireless networks", Journal of Cyber Security and Mobility, River Publishers.

  • S. Sengupta, K. Hong, R. Chandramouli and K. P. Subbalakshmi. (Mar 2011). "SpiderRadio: A Cognitive Radio Network with Commodity Hardware and Open Source Software", IEEE Communications Magazine, IEEE. 49 (3), 101- 109 .

  • Guoqi Luo and K.P. Subbalakshmi. (Nov 4, 2011). "KL-sense secure image steganography", Inderscience International Journal of Security and Networks, 6 211–225.

  • Fabrizio Granelli, P. Pawelczak, R.V. Prasad, K.P. Subbalakshmi, R. Chandramouli, J.A. Hoffmeyer, H.S. Berger. (Jun 2010). "Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities", IEEE Communications Magazine, 71 - 79.

  • Na Cheng, R. Chandramouli and K.P. Subbalakshmi. (2011). "Author Gender Identification from Text Documents", The Journal of Digital Investigation (Accepted for Publication), Elsevier.

  • Zituo Jin, S. Anand and K.P. Subbalakshmi. (Apr 2009). "Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing", Mobile Computing and Communications Review, Special Issue on Cognitive Radio Technologies and Systems, ACM. 13 (2), 74-85.

  • Goce Jakimoski and K.P. Subbalakshmi. (Apr 2008). "Cryptanalysis of Some Multimedia Encryption Schemes", IEEE Transactions on Multimedia, 10 (3), 330–338.

  • Kiran Sampath Kumar, R. Chandramouli and K.P. Subbalakshmi. (Sep 2008). "On Stochastic Learning in Predictive Wireless ARQ", Wiley Journal on Wireless Communications and Mobile Computing, ISSN:1530-8669. 8 (7), 871–883.

  • Mohamed Haleem, Chetan N. Mathur, R. Chandramouli and K.P. Subbalakshmi. (Oct 2007). "Opportunistic Encryption: A Trade-off between Security and Throughput in Wireless Networks", IEEE Transactions on Secure and Dependable Computing, 4 (4), 313 - 324.

  • Goce Jakimoski and K. P. Subbalakshmi. (Jun 2007). "Discrete Lyapunov Exponent and Differential Cryptanalysis", IEEE Transactions on Circuits and Systems II, 499–501.

  • Mohamed Haleem, K.P. Subbalakshmi and R. Chandramouli. (2007). "Joint Encryption and Compression of Correlated Sources", Special Issue on The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks, EURASIP Journal on Information Security (JIS). DOI:10.1155/2007/98374 [invited paper]. 2007 9.

  • Ning Liu, Palak Amin and K.P. Subbalakshmi. (Apr 2007). "Security and Robustness Enhancement for Image Data Hiding", IEEE Transactions on Multimedia, 9 (3), 466–474.

  • Yiping Xing, Chetan N. Mathur, R. Chandramouli and K.P. Subbalakshmi. (Apr 2007). "Dynamic Spectrum Access with QoS and Interference Temperature Constraints", IEEE Transactions on Mobile Computing, 6 (4), 423–433.

  • Chetan Nanjunda Mathur and K.P. Subbalakshmi. (Sep 2007). "A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices", International Journal of Network Security, 5 (2), 205-212.

  • R. Chandramouli, K.P. Subbalakshmi, and N. Ranganathan. (May 2004). "Channel-Adaptive Stochastic Rate Control For Low Bit Rate Wireless Video Transmission", Pattern Recognition Letters, Special issue on Video Objects: representation, creation, coding, transmission, manipulation and retrieval. 25 (7), 793-806.

  • R. Chandramouli, S. Bapatla, K.P. Subbalakshmi, R.N. Uma. (May 2006). "Battery Power-Aware Encryption", ACM Transactions on Information Systems and Security, 9 (2), 162-180.

  • Palak Amin, Ning Liu and K.P. Subbalakshmi. (Jul 2007). "Statistical Attack Resilient Data Hiding", International Journal of Network Security, 5 (1), 112-120.

  • Qingyu Chen and K.P. Subbalakshmi. (2006). "Joint Source-Channel Decoder for Data Centric Network Applications", IEE Proceedings Communications, ISSN 1350-2425. 153 (6), 871-877.

  • Chetan Nanjunda Mathur, Karthik Narayan, and K. P. Subbalakshmi. "On the Design of Error Correcting Ciphers", Special Issue on Wireless Network Security, EURASIP Journal on Wireless Communications and Networking. Article ID 42871, DOI 10.1155/WCN/2006/42871. 2006 112.

  • K.P. Subbalakshmi, R. Chandramouli and N. Ranganathan. (Nov 2007). "A Sequential Distinguisher for Covert Channel Identification", International Journal of Network Security, 5 (3), 274-282.

  • A. Patel, M. Shah, R. Chandramouli, K.P. Subbalakshmi. (Jul 2007). "Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences", International Journal of Network Security, 5 (1), 45–50.

  • Qingyu Chen and K.P. Subbalakshmi. (Dec 2003). "Joint Source-Channel Decoding forMPEG-4 Video Transmission over Wireless Channels", IEEE Journal on Selected Areas in Communications-Special Issues on Recent Advances in Wireless Multimedia, 1780-1789.

  • K. P. Subbalakshmi and Jacques Vaisey. (Sep 2003). "On the Joint Source-Channel Decoding of Variable-Length Encoded Sources: The Additive Markov Channel Case", IEEE Transactions on Communications, 1420-1425.

  • K. P. Subbalakshmi and Jacques Vaisey. (Dec 2001). "On the Joint Source-Channel Decoding of Variable-Length Encoded Sources: The BSC Case", IEEE Transactions on Communications, 49 2052-2055.

  • A. Makur and K.P. Subbalakshmi. (Aug 1997). "Variable Dimension VQ Encoding and Codebook Design", IEEE Transactions on Communications, 45 (8), 897 - 900.

Conference Papers

  • Ning Wang, Yupeng Cao, Shuai Hao, Doris Shao and K.P. Subbalakshmi, "Modular Multi-Modal Attention Network for Alzheimer's Disease Detection Using Patient Audio and Language Data", INTERSPEECH 2021 [pdf]

  • Ning Wang, Fan Luo, Yuvraj Shivtare, Varsha D Badal, K. P. Subbalakshmi, R. Chandramouli, Ellen Lee, "Learning Models for Suicide Prediction from Social Media Posts", NAACL CL-Psych Workshop, 2021. [pdf]

  • Mingxuan Chen, Xinqiao Chu and K.P. Subbalakshmi, "MMCoVaR: Multimodal COVID-19 Vaccine Focused Data Repository for Fake News Detection and a Baseline Architecture for Classification", ASONAM 2021 [pdf]

  • Mingxuan Chen, Ning Wang, K. P. Subbalakshmi, "Explainable Rumor Detection using Inter and Intra-feature Attention Networks", TrueFact KDD Workshop, 2020.

  • Ning Wang, Mingxuan Chen, K. P. Subbalakshmi, Explainable CNN-attention Networks (C-Attention Network) for Automated Detection of Alzheimer's Disease, BioKDD, 2020.

  • Ning Wang, Fan Luo, Vishal Peddagangireddy, Koduvayur P. Subbalakshmi, Rajarathnam Chandramouli, Personalized Early Stage Alzheimer's Disease Detection: A Case Study of President Reagan's Speeches. BioNLP 2020: 133-139

  • Santhanakrishnan Anand, Mohammad Alnakhli, Rajarathnam Chandramouli and Koduvayur P Subbalakshmi, ``Enhancing Spectrum Efficiency in D2D Wireless Networks by Exploiting Source Correlation", IEEE DySPAN 2019

  • Syed Eman Mahmoodi, K.P. Subbalakshmi and R. N.Uma. (Oct 2016). "Harnessing Spectrum Awareness to Enhance Mobile Computing", ACM The 22nd International Conference on Mobile Computing and Networking (Mobicom) 2016, pp: 460-461. Download (410 kb PDF)

  • Syed Ebrahim Safavi and K.P. Subbalakshmi. (Sep 2015). "Delay Analysis of Multi-User Dynamic Spectrum Access Networks", IEEE Dynamic Spectrum Access Networks (DySPAN) 2015. IEEE.

  • Alireza Louni, Anand Santhanakrishnan and K.P. Subbalakshmi. (Aug 19, 2015). "Identification of Source of Rumors in Social Networks with Incomplete Information", 2015 ASE Eighth International Conference on Social Computing (SocialCom 2015). Academy of Science and Engineering. (9% Acceptance Rate). Download (535 kb PDF).

  • Eman Mahmoodi, K.P. Subbalakshmi and Vidya Sagar. (Jun). "Cloud Offloading for Multi-Radio Enabled Mobile Devices", IEEE International Conference on Communication. IEEE. Download .

  • Zituo Jin, S. Anand and K.P. Subbalakshmi. (Oct 2014). "NEAT: A NEighbor AssisTed Spectrum Decision Protocol for Resilience against PUEA", IEEE Workshop on Cognitive Radio and Electromagnetic Spectrum Security (CRESS 14). [Invited Paper].

  • Alireza Louni and K.P. Subbalakshmi. (Apr 2014). "A Two-stage Algorithm to Estimate the Source of Information Diffusion in Social Media Networks", IEEE INFOCOM Workshop on Dynamic Social Networks. IEEE.

  • Alireza Louni and K.P. Subbalakshmi. (Nov 2013). "Optimizing Flow Control in Multi-interface Wireless Cognitive Radio Networks", GLOBECOM 2013. IEEE. Download (155 kb PDF).

  • Mahdi Azarafrooz, R. Chandramouli and K.P. Subbalakshmi. (Jul 2013). "Reciprocity and Fairness in Medium Access Control Games", IEEE ICCCN 2013. IEEE.

  • S. Anand, Kai Hong, R. Chandramouli, Shamik Sengupta and K.P. Subbalakshmi. "Security Vulnerability due to Channel Aggregation/Bonding in LTE and HSPA+ Networks", IEEE GLOBECOM 2011.

  • Guoqi Luo and K. P. Subbalakshmi. (Dec 2011). "Zero Kullback-Liebler Divergence Image Data Hiding", IEEE GLOBECOM 2011.

  • Yi Tan, Shamik Sengupta and K. P. Subbalakshmi. (Dec 2011). "Human Society Inspired Dynamic Spectrum Access Networks: The Effect of Parochialism", IEEE GLOBECOM 2011 - Cognitive Radio and Networks Symposium (GC'11 - CRN).

  • M. Venkataraman, K.P. Subbalakshmi and R. Chandramouli. (May 2012). "Measuring and quantifying the silent majority on the Internet", IEEE Sarnoff Symposium. IEEE. Invited Paper.

  • Yi Tan, Kai Hong, Shamik Sengupta and K. P. Subbalakshmi. (Dec 2011). "Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks", IEEE GLOBECOM 2011 - Cognitive Radio and Networks Symposium (GC'11 - CRN).

  • Seyed Ebrahim Safavi and K.P. Subbalakshmi. (2011). "Optimal Joint Power Allocation and Phase Control for DS-CDMA Cognitive Radio Networks", IEEE GLOBECOM 2011.

  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (May 2011). "Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense", International Conference on Communications. IEEE.

  • S. Anand, R. Chandramouli and K.P. Subbalakshmi. (2011). "Cost of collaboration vs. individual effort in social networks", SIAM Data Mining Conference.

  • X. Chen, R. Chandramouli and K.P. Subbalakshmi. (2011). "Scam detection in Twitter", SIAM Text Mining Workshop . SIAM.

  • X. Chen, R. Chandramouli and K.P. Subbalakshmi. (2011). "Authorship similarity detection from emails", Machine Learning and Data Mining Conference.

  • P. Hao, X. Chen, R. Chandramouli and K.P. Subbalakshmi. (2011). "Adaptive context modeling for deception detection in emails", Machine Learning and Data Mining Conference.

  • Zituo Jin, Anand Santhanakrishnan and K.P. Subbalakshmi. (Nov 2010). "Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks", IEEE GLOBECOM 2010.

  • Zituo Jin, Anand Santhanakrishnan and K.P. Subbalakshmi. (Nov 2010). "Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks", IEEE Globecom 2010. IEEE.

  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (Nov 2010). "Competitive Spectrum Trading in Dynamic Spectrum Access Markets: A Price War", IEEE GLOBECOM 2010.

  • R. Perera, S. Anand, R. Chandramouli and K.P. Subbalakshmi. (2010). "Twitter analytics: Architecture, tools and analysis", IEEE MILCOM.

  • Anand Santhanakrishnan, R. Chandramouli and K.P. Subbalakshmi. (Apr 2011). "Cost of Collaboration vs Individual Effort in Social Networks", SIAM International Conference on Data Mining. SIAM.

  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (May 2010). "Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks", IEEE International Conference on Communications, 2010. IEEE . Download (181 kb PDF).

  • Goce Jakimoski and K.P. Subbalakshmi. (Jun 2009). "Towards Secure Spectrum Decision", IEEE International Conference on Communications.

  • Na Cheng, Xiaoling Chen, Rajarathnam Chandramouli and K.P. Subbalakshmi. (2008). "Gender Identification from E-mails", IEEE Symposium on Computational Intelligence and Data Mining.

  • Zituo Jin, S. Anand and K.P. Subbalakshmi. (Jun 2009). "Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks", IEEE International Conference on Communications.

  • S. Anand, Zituo Jin and K.P. Subbalakshmi. (Oct 2008). "An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks", IEEE Dynamic Spectrum Access Networks (DySPAN).

  • Chetan Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi. (2008). "Impact of Constraints on the Complexity of Dynamic Spectrum Assignment", IEEE GLOBECOM - Symposium on Selected Areas of Communications.

  • Goce Jakimoski and K.P. Subbalakshmi. (May 2008). "Denial-of-Service Attacks on Dynamic Spectrum Access Networks", IEEE CogNets Workshop, IEEE International Conference on Communications.

  • H. Malik, K. P. Subbalakshmi, and and R. Chandramouli. (Jan 28-31, 2008). "Nonparametric Steganalysis of QIM Data Hiding Using Approximate Entropy", Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content X, San Jose, CA, USA. 6819.

  • Goce Jakimoski and K.P. Subbalakshmi. (Dec 2007). "On Efficient Message Authentication via Block Cipher Design Techniques", Asiacrypt.

  • Hafiz Malik, K.P. Subbalakshmi and R. Chandramouli. (Dec 2007). "Steganalysis of QIM-Based Data Hiding using Kernel Density Estimation", ACM Multimedia Security Workshop.

  • Goce Jakimoski and K.P. Subbalakshmi. (Nov 4-7, 2007). "Security of Compressing Encrypted Sources", Asilomar Conference on Signals and Systems. invited paper.

  • Palak Amin and K.P. Subbalakshmi. (Sep 2007). "Detecting Hidden Messages using Image Power Spectrum", IEEE International Conference on Image Processing.

  • M. A. Haleem and K. P. Subbalakshmi. (Mar 27-29, 2007). "Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels", IEEE Data Compression Conference.

  • Chetan N. Mathur and K.P. Subbalakshmi. (Jan 11, 2007). "Digital Signatures for Centralized DSA Networks", First IEEE Workshop on Cognitive Radio Networks. Las Vegas.

  • Ning Liu and K.P. Subbalakshmi. (2006). "Worst Case Attack on Quantization based Data Hiding", IEEE International Symposium on Multimedia.

  • Chetan N. Mathur and K. P. Subbalakshmi. (Nov 2006). "Energy EfficientWireless Encryption", IEEE GLOBECOM 2006. Symposium on Network and Information Security Systems.

  • M. A. Haleem, Chetan N. Mathur, and K. P. Subbalakshmi. (Oct 2006). "Joint Distributed Compression and Encryption of Correlated Data in Sensor Networks", IEEE MILCOM 2006.

  • Chetan N. Mathur, Karthik Narayan and K. P. Subbalakshmi. (Jun 2006). "High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive", 4th International Conference on Applied Cryptography and Network Security,Lecture Notes in Computer Science. ISBN: 3-540-34703-8. 3989 309-324.

  • Chetan Nanjunda Mathur, Karthik Narayan and K.P. Subbalakshmi. (Nov 2005). "High Diffusion Codes: A Class of Maximum Distance Separable Codes for Error Resilient Block Ciphers", Second IEEE International Workshop on Adaptive Wireless Networks. IEEE GLOBECOM 2005. 1–22.

  • M. A. Haleem, Chetan N. Mathur, R. Chandramouli, and K. P. Subbalakshmi. (Jun 2006). "On Optimizing the Security-Throughput Trade-off in Wireless Networks with Adversaries", 4th International Conference on Applied Cryptography and Network Security, Lecture Notes in Computer Science. ISBN: 3-540-34703-8. 3989 448-458.

  • Yiping Xing, Chetan Nanjunda Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi. (Jun 2006). "Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints", IEEE International Conference on Communication.

  • Yiping Xing, Chetan Nanjunda Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi. (Jan 2006). "Real-Time Secondary Spectrum Sharing with QoS Provisioning", IEEE Consumer Communications and Networking Conference 2006, 3rd IEEE Volume 1. Best Student Paper Award Winner. 630 - 634, 8-10.

  • Ning Liu, Palak Amin and K.P. Subbalakshmi. (Oct 2005). "Secure Quantizer Based Data Embedding", IEEE Multimedia Signal Processing, China, Chapter 13: Multimedia Assurance. ISBN: 0-7803-9289-2. 509-512.

  • Palak Amin, Ning Liu and K.P. Subbalakshmi. (Oct 2005). "Statistically Secure Digital Image Data Hiding", IEEE Multimedia Signal Processing, China, Chapter 13: Multimedia Assurance. ISBN: 0-7803-9289-2. 497-500.

  • Qingyu Chen and K. P. Subbalakshmi. (Mar 2005). "Distributed Joint Source-Channel Decoding for Correlated Markov Sources", IEEE Data Compression Conference. 453.

  • Ning Liu and K.P. Subbalakshmi. (Jan 2005). "TCQ-based quantizer design for data hiding in images", IS&T/SPIE Electronic Imaging, Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose. 5681 185-193.

  • Siva Somasundaram, K.P. Subbalakshmi and R.N. Uma. (Oct 24-27, 2004). "MDC and Path Diversity in Video Streaming", IEEE International Conference on Image Processing, Singapore. 5 3153 - 3156.

  • Palak Amin and K.P. Subbalakshmi. (Oct 24-27, 2004). "Rotation and Cropping Resilient Data Hiding with Zernike Moments", IEEE International Conference on Image Processing, Singapore. 4 2175 - 2178.

  • R. Chandramouli and K.P. Subbalakshmi. (Dec 2004). "Current Trends in Steganalysis: A Critical Survey", Invited session on Multimedia Security, IEEE The Eighth International Conference on Control, Automation, Robotics and Vision, ICARCV 2004. invited paper. 2 964-967.

  • Ning Liu and K.P. Subbalakshmi. (Oct 24-27, 2004). "Non-Uniform Quantizer Design for Image Data Hiding", IEEE International Conference on Image Processing, Singapore. 4 2179 - 2182.

  • Ning Liu and K.P. Subbalakshmi. (Jan 2004). "Vector Quantization Based Scheme For Data Embedding In Images", Proceedings of the IS&T/SPIE Electronic Imaging, Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose. 548-559.

  • K. P. Subbalakshmi and R. Chandramouli. (Mar 2004). "A Joint Source-Channel Steganography Decoding Paradigm and it’s Implications on Capacity", The 38th Annual Conference on Information Sciences and Systems, Invited Session on Watermarking and Steganography. invited paper.

  • Qingyu Chen and K. P. Subbalakshmi. (Oct 6-9, 2003). "An Integrated Joint Source-Channel Decoder for MPEG-4 Coded Video", IEEE Semi-Annual Vehicular Technology Conference. 1 347 - 351.

  • Siva Somasundaram and K. P. Subbalakshmi. (Jul 6-9, 2003). "3-D Multiple Description Video Coding for Packet Switched Networks", IEEE International Conference on Multimedia and Expo, Baltimore, Maryland. 1 589-592.

  • R. Chandramouli and K. P. Subbalakshmi. (May 2003). "Active Steganalysis of Spread Spectrum Steganography", IEEE International Symposium on Circuits and Systems, Bangkok, Thailand. 3 830-833.

  • Siva Somasundaram and K.P. Subbalakshmi. (Apr 2003). "Exploiting Path Diversity and Forward Error Correction for Robust Transmission of Images", 23rd Picture Coding Symposium, Saint-Malo, France. invited paper. 259-262.

  • Siva Somasundaram and K.P. Subbalakshmi. (Jan 2003). "A Novel 3D Scalable Video Compression Algorithm", IS&T/SPIE Electronic Imaging, Image and Video Communications and Processing, Santa Clara. 5022 966-971.

  • Qingyu Chen and K.P. Subbalakshmi. (Jan 2003). "Trellis Decoding for MPEG-4 Streams Over Wireless Channels", Proceedings of the IS&T/SPIE Electronic Imaging, Image and Video Communications and Processing, Santa Clara. 5022 810-817.

  • Derek Soeder, Siva Somasundaram, K.P. Subbalakshmi and R.N. Uma. (Sep 2002). "On Deterministic Scheduling Approaches to Delivery of Scalable Streaming Media", Proceedings of the XXXIII Annual Conference of the Operational Research Society of Italy, AIRO: Integrating Operations Research and Information Technology to Support Decisions in Real World Systems, Italian Association of Operations Research (Operations and Decision Sciences) L’Aquila, Italy. 13.

  • K. P. Subbalakshmi and Qingyu Chen. (Jul 2002). "Joint Source-Channel Decoding for MPEG-4 Coded Video Over Wireless Channels", IASTED International Conference on Wireless and Optical Communications (WOC 2002), Banff, Canada.

  • K. P. Subbalakshmi and Siva Somasundaram. (Jun 2002). "Multiple Description Coding Framework for EBCOT", IEEE International Conference on Image Processing, Rochester, New York. 3 541 - 544.

  • Derek Soeder, K. P. Subbalakshmi and R.N. Uma. (Jul 2002). "On Deterministic Scheduling Approaches to Delivery of Scalable Streaming Media", 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2002). 48-53.

  • K. P. Subbalakshmi and Jacques Vaisey. (Mar 2002). The 36th Annual Conference on Information Sciences and Systems. Joint Source-Channel Decoding for Entropy Coded Image Transmission.

  • K. P. Subbalakshmi and Jacques Vaisey. (Mar 1999). "Optimal Decoding of Entropy Coded Markov Sources over Channels with Memory", The 33rd Annual Conference on Information Sciences and Systems. 2 624-629.

  • K. P. Subbalakshmi and Jacques Vaisey. (Jun 1999). "Joint Source-Channel Decoding of Entropy Coded Markov Sources over Binary Symmetric Channels", IEEE International Conference on Communications 99. 1 (4), 446-450.

  • K. P. Subbalakshmi and Jacques Vaisey. (Mar 1998). "Optimal Decoding of Entropy Coded Memoryless Sources over Binary Symmetric Channels", IEEE Data Compression Conference. 573.