Vireshwar Kumar
Vireshwar Kumar
Assistant Professor, Department of Computer Science & Engineering, IIT Delhi
Verified email at - Homepage
Cited by
Cited by
Security and enforcement in spectrum sharing
JM Park, JH Reed, AA Beex, TC Clancy, V Kumar, B Bahrak
Proceedings of the IEEE 102 (3), 270-281, 2014
3D printed graphene-based self-powered strain sensors for smart tires in autonomous vehicles
D Maurya, S Khaleghian, R Sriramdas, P Kumar, RA Kishore, MG Kang, ...
Nature communications 11 (1), 5392, 2020
Energy harvesting and strain sensing in smart tire for next generation autonomous vehicles
D Maurya, P Kumar, S Khaleghian, R Sriramdas, MG Kang, RA Kishore, ...
Applied Energy 232, 312-322, 2018
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
J Wu, Y Nan, V Kumar, DJ Tian, A Bianchi, M Payer, D Xu
14th USENIX Workshop on Offensive Technologies (WOOT), 2020
Blind transmitter authentication for spectrum security and enforcement
V Kumar, JM Park, K Bian
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Evading Voltage-Based Intrusion Detection on Automotive CAN
R Bhatia, V Kumar, K Serag, ZB Celik, M Payer, D Xu
Network and Distributed System Security (NDSS), 2021
PHY-Layer Authentication Using Duobinary Signaling for Spectrum Enforcement
V Kumar, JMJ Park, K Bian
IEEE Transactions on Information Forensics and Security 11 (5), 1027-1038, 2016
BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks
J Wu, Y Nan, V Kumar, M Payer, D Xu
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
Group signatures with probabilistic revocation: A computationally-scalable approach for providing privacy-preserving authentication
V Kumar, H Li, JMJ Park, K Bian, Y Yang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
PHY-layer authentication by introducing controlled inter symbol interference
V Kumar, JM Park, TC Clancy, K Bian
Communications and Network Security (CNS), 2013 IEEE Conference on, 10-18, 2013
Exposing New Vulnerabilities of Error Handling Mechanism in CAN
K Serag, R Bhatia, V Kumar, ZB Celik, D Xu
30th USENIX Security Symposium, 2021
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal Embedded Applications
T Kim, V Kumar, J Rhee, J Chen, K Kim, CH Kim, D Xu, DJ Tian
30th USENIX Security Symposium, 2021
Cumulative Message Authentication Codes for Resource-Constrained IoT Networks
H Li, V Kumar, JM Park, Y Yang
IEEE Internet of Things Journal 8 (15), 11847-11859, 2021
Direct anonymous attestation with efficient verifier-local revocation for subscription system
V Kumar, H Li, N Luther, P Asokan, JMJ Park, K Bian, MBH Weiss, T Znati
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Group signatures with probabilistic revocation
J Park, V Kumar
US Patent 10,326,602, 2019
Enforcement in Spectrum Sharing: Crowd-sourced Blind Authentication of Co-channel Transmitters
V Kumar, H Li, JMJ Park, K Bian
2018 IEEE International Symposium on Dynamic Spectrum Access Networks …, 2018
Cumulative message authentication codes for resource-constrained networks
H Li, V Kumar, JMJ Park, Y Yang
2020 IEEE Conference on Communications and Network Security (CNS), 1-9, 2020
Crowd-Sourced Authentication for Enforcement in Dynamic Spectrum Sharing
V Kumar, H Li, JMJ Park, K Bian
IEEE Transactions on Cognitive Communications and Networking 5 (3), 625-636, 2019
ZBCAN: A Zero-Byte CAN Defense System
K Serag, R Bhatia, A Faqih, MO Ozmen, V Kumar, ZB Celik, D Xu
32nd USENIX Security Symposium (USENIX Security 23), 6893-6910, 2023
Achievable secrecy sum-rate in a fading MAC-WT with power control and without CSI of eavesdropper
SM Shah, V Kumar, V Sharma
Signal Processing and Communications (SPCOM), 2012 International Conference …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20