Recent Submissions

  • Link-renaming technique for efficiently increasing similarity among SDN entries 

    Almohaimeed, Abdulrahman; Asaduzzaman, Abu; Chidella, Kishore K.; Shahin, Firas (IEEE, 2019)
    Software-defined networking (SDN) is an evolved concept to network's architecture with a centralized form of network controlling. The centralized nature of SDN has raised concerns regarding the high demand for communication ...
  • MR-Anonymization: A relationship-based privacy model 

    Almohaimeed, Abdulrahman; Gampa, Srikanth (IEEE, 2019)
    There are several reasons for organizations to publish or share their data. Therefore, ensuring the privacy of individual information is a serious issue. A typical medical organization must publish data about thousands of ...
  • Kraus operator formalism for quantum multiplexer operations for arbitrary two-qubit mixed states 

    Udayakumar, Pavithra; Kumar, Preethika (Springer, 2019-12)
    The dynamics of open quantum systems are described using a set of operators called Kraus operators. In this paper, we show how to find system parameters for a closed system of two qubits undergoing quantum multiplexer ...
  • Introduction: Selfie Biometrics 

    Rattani, Ajita; Derakhshani, Reza R.; Ross, Arun A. (Springer London, 2019-09-22)
    Traditional password-based solutions are being predominantly replaced by biometric technology for mobile user authentication. Since the inception of smartphones, smartphone cameras have made substantial progress in image ...
  • Preface 

    Rattani, Ajita; Derakhshani, Reza R.; Ross, Arun A. (Springer London, 2019-09)
    This book highlights the field of selfie biometrics, providing a clear overview and presenting recent advances and challenges. It also discusses numerous selfie authentication techniques on mobile devices. Biometric ...
  • Soft-biometric attributes from selfie images 

    Rattani, Ajita; Agrawal, Mudit (Springer London, 2019-09-22)
    The aim of this chapter is to discuss the soft-biometric attributes that can be extracted from selfie images acquired from mobile devices. Existing literature suggests that various features in demographics, such as gender ...
  • Mobile user re-authentication using clothing information 

    Nguyen, Hoang Mark; Rattani, Ajita; Derakhshani, Reza R. (Springer London, 2019-09-22)
    Biometric authentication has become a popular alternative to passwords on mobile devices. However, most implementations do not incorporate any mechanisms to ascertain whether the originally authenticated user is still in ...
  • The Degraded Gaussian many-access wiretap channel 

    Chou, Remi; Yener, Aylin (IEEE, 2019-07)
    The Gaussian multiple-access wiretap channel when the number of transmitters grows unbounded and at most linearly with the blocklength is studied. Its capacity region is characterized when the eavesdropper channel is ...
  • Biometric systems with multiuser access structures 

    Chou, Remi (IEEE, 2019-07)
    We propose a model for biometric systems with a multiuser access structure, where after enrollment only predefined authorized sets of participants are allowed to access the system upon presenting their biometrics. Two types ...
  • A tiling approach for multiple parallel routing in software-defined networks 

    Almohaimeed, Abdulrahman; Asaduzzaman, Abu; Singh, Gurtaj (IEEE, 2019-05)
    Software-defined networking (SDN) is a form of computer network that simplifies the organization of data communications and provides an adaptive architecture that facilitates the transmission of large amounts of data. ...
  • Privacy-preserving IoT devices 

    Almohaimeed, Abdulrahman; Gampa, Srikanth; Singh, Gurtaj (IEEE, 2019-05)
    With the recent exponential increase in network-based devices, it is expected that billions of devices will be connected to the Internet. In enabling this growth, effectively securing Internet of Things (IoT) devices while ...
  • Why is multimedia quality of experience assessment a challenging problem? 

    Akhtar, Zahid; Siddique, Kamran; Rattani, Ajita; Lebai Lutfi, Syaheerah; Falk, Tiago H. (IEEE, 2019-08-21)
    Quality of experience (QoE) assessment occupies a key role in various multimedia networks and applications. Recently, large efforts have been devoted to devise objective QoE metrics that correlate with perceived subjective ...
  • Nonfullerene organic photovoltaic cells exhibiting 13.76% efficiency by employing upside-down solvent vapor annealing 

    Jiao, Chaoqun; Pang, Chengzong; An, Qiaoshi (John Wiley & Sons, 2019-09-10)
    Organic photovoltaic cells (OPVs) are fabricated with a polymer donor PM7 and a nonfullerene acceptor IT-4Cl; the morphology of active layers is optimized by employing upside-down solvent vapor annealing (UD-SVA) method ...
  • GuideCall: affordable and trustworthy video call-based remote assistance for people with visual impairments 

    Ravindran, Naveen Mukundan; Cheraghi, Seyed Ali; Namboodiri, Vinod; Babu, Rakesh (Association for Computing Machinery, Inc., 2019-05-13)
    Blind or Visually Impaired (BVI) individuals often face many challenges while performing daily tasks or exploring new places. Assistive technologies can help independently address some of these challenges, but there remain ...
  • SafeExit4All: An inclusive indoor emergency evacuation system for people with disabilities 

    Unknown author (Association for Computing Machinery, Inc., 2019-05-13)
    Indoor wayfinding has remained a challenge for people with disabilities in unfamiliar environments. With some accessible indoor wayfinding systems coming to the fore recently, a major application of interest is that of ...
  • Submillimeter wave communication versus millimeter wave communication 

    Goswami, Madhuprana; Kwon, Hyuck M. (Chongqing University of Posts and Telecommunications, 2019)
    This paper studies the performance of a submillimeter wave antenna operating between frequencies 0.1 THz and 10 THz with a 4-cyano-4-pentylbiphenyl [5CB] substrate. Since the size and shape of the antenna impact its ...
  • Revisiting kd-tree for nearest neighbor search 

    Ram, Parikshit; Sinha, Kaushik (Association for Computing Machinery, 2019)
    kd-tree [16] has long been deemed unsuitable for exact nearest-neighbor search in high dimensional data. The theoretical guarantees and the empirical performance of kd-tree do not show significant improvements over brute-force ...
  • Uncertainty mitigation in feeder level power loss reduction with distributed generation 

    Manoharan, Arun Kaarthick; Hettiarachchige-Don, Anton C. Sameepa; Aravinthan, Visvakumar (IEEE, 2019)
    The grid is moving towards a system of decentralized distributed generation using a large number of small scale renewable generation resources. These resources are stochastic in nature and therefore have to be continuously ...
  • Secret-key generation in many-to-one networks: an integrated game-theoretic and information-theoretic approach 

    Chou, Remi; Yener, Aylin (IEEE, 2019-08)
    This paper considers secret-key generation between several agents and a base station that observe independent and identically distributed realizations of correlated random variables. Each agent wishes to generate the longest ...
  • Performance and consumer satisfaction-based bi-level tariff scheme for EV charging as a VPP 

    Argade, Sachin G.; Aravinthan, Visvakumar; Buyuktahtakin, Esra; Joseph, Siny (Institution of Engineering and Technology, 2019-06-04)
    Appropriate control of the electric vehicle (EV) charging and corresponding prices can act as a virtual power plant (VPP) and support distribution system operators (DSOs). When multiple EVs are directly managed or controlled ...

View more