Signal processing in random access L Tong, V Naware, P Venkitasubramaniam IEEE signal processing magazine 21 (5), 29-39, 2004 | 204 | 2004 |
Sensor networks with mobile access: Optimal random access and coding P Venkitasubramaniam, S Adireddy, L Tong IEEE Journal on Selected Areas in Communications 22 (6), 1058-1068, 2004 | 120 | 2004 |
Anonymous networking amidst eavesdroppers P Venkitasubramaniam, T He, L Tong IEEE Transactions on Information Theory 54 (6), 2770-2784, 2008 | 82 | 2008 |
Stealthy control signal attacks in linear quadratic Gaussian control systems: Detectability reward tradeoff R Zhang, P Venkitasubramaniam IEEE Transactions on Information Forensics and Security 12 (7), 1555-1570, 2017 | 69 | 2017 |
Quantization for maximin ARE in distributed estimation P Venkitasubramaniam, L Tong, A Swami IEEE Transactions on Signal Processing 55 (7), 3596-3605, 2007 | 59 | 2007 |
GPS spoofing attack characterization and detection in smart grids P Pradhan, K Nagananda, P Venkitasubramaniam, S Kishore, RS Blum 2016 IEEE Conference on Communications and Network Security (CNS), 391-395, 2016 | 57 | 2016 |
Opportunistic ALOHA and cross layer design for sensor networks P Venkitasubramaniam, S Adireddy, L Tong IEEE Military Communications Conference, 2003. MILCOM 2003. 1, 705-710, 2003 | 52 | 2003 |
Anonymous networking with minimum latency in multihop networks P Venkitasubramaniam, L Tong 2008 IEEE Symposium on Security and Privacy (sp 2008), 18-32, 2008 | 45 | 2008 |
The privacy analysis of battery control mechanisms in demand response: Revealing state approach and rate distortion bounds J Yao, P Venkitasubramaniam IEEE Transactions on Smart Grid 6 (5), 2417-2425, 2015 | 40 | 2015 |
False data injection and detection in LQG systems: A game theoretic approach R Zhang, P Venkitasubramaniam IEEE Transactions on Control of Network Systems 7 (1), 338-348, 2019 | 39 | 2019 |
On the privacy-cost tradeoff of an in-home power storage mechanism J Yao, P Venkitasubramaniam 2013 51st Annual Allerton Conference on Communication, Control, and …, 2013 | 39 | 2013 |
Mitigating timing based information leakage in shared schedulers S Kadloor, N Kiyavash, P Venkitasubramaniam 2012 Proceedings IEEE INFOCOM, 1044-1052, 2012 | 36 | 2012 |
Compressive sensing based structural damage detection and localization using theoretical and metaheuristic statistics R Yao, SN Pakzad, P Venkitasubramaniam Structural Control and Health Monitoring 24 (4), e1881, 2017 | 32 | 2017 |
Mitigating timing side channel in shared schedulers S Kadloor, N Kiyavash, P Venkitasubramaniam IEEE/ACM transactions on networking 24 (3), 1562-1573, 2015 | 32 | 2015 |
Information-theoretic security in stochastic control systems P Venkitasubramaniam, J Yao, P Pradhan Proceedings of the IEEE 103 (10), 1914-1931, 2015 | 31 | 2015 |
Privacy aware stochastic games for distributed end-user energy storage sharing J Yao, P Venkitasubramaniam IEEE Transactions on Signal and Information Processing over Networks 4 (1 …, 2017 | 28 | 2017 |
Optimal end user energy storage sharing in demand response J Yao, P Venkitasubramaniam 2015 IEEE International Conference on Smart Grid Communications …, 2015 | 28 | 2015 |
Privacy in stochastic control: A markov decision process perspective P Venkitasubramaniam 2013 51st Annual Allerton Conference on Communication, Control, and …, 2013 | 27 | 2013 |
A game-theoretic approach to anonymous networking P Venkitasubramaniam, L Tong IEEE/ACM Transactions on Networking 20 (3), 892-905, 2012 | 26 | 2012 |
Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks J Yao, P Venkitasubramaniam, S Kishore, LV Snyder, RS Blum 2017 51st Annual Conference on Information Sciences and Systems (CISS), 1-6, 2017 | 24 | 2017 |