default search action
Mahalingam Ramkumar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c46]Nisha Pillai, Athish Ram Das, Moses Ayoola, Ganga Gireesan, Bindu Nanduri, Mahalingam Ramkumar:
EndToEndML: An Open-Source End-to-End Pipeline for Machine Learning Applications. ICICT 2024: 350-358 - [c45]Nisha Pillai, Ganga Gireesan, Michael J. Rothrock, Bindu Nanduri, Zhiqian Chen, Mahalingam Ramkumar:
Towards Interpreting Multi-Objective Feature Associations. SysCon 2024: 1-8 - [i11]Ganga Gireesan, Nisha Pillai, Michael J. Rothrock, Bindu Nanduri, Zhiqian Chen, Mahalingam Ramkumar:
Deep Sensitivity Analysis for Objective-Oriented Combinatorial Optimization. CoRR abs/2403.00016 (2024) - [i10]Nisha Pillai, Ganga Gireesan, Michael J. Rothrock Jr., Bindu Nanduri, Zhiqian Chen, Mahalingam Ramkumar:
Towards Interpreting Multi-Objective Feature Associations. CoRR abs/2403.00017 (2024) - [i9]Nisha Pillai, Athish Ram Das, Moses Ayoola, Ganga Gireesan, Bindu Nanduri, Mahalingam Ramkumar:
EndToEndML: An Open-Source End-to-End Pipeline for Machine Learning Applications. CoRR abs/2403.18203 (2024) - [i8]Nisha Pillai, Bindu Nanduri, Michael J. Rothrock Jr., Zhiqian Chen, Mahalingam Ramkumar:
Bayesian-Guided Generation of Synthetic Microbiomes with Minimized Pathogenicity. CoRR abs/2405.00070 (2024) - 2023
- [j17]Naresh Adhikari, Mahalingam Ramkumar:
IoT and Blockchain Integration: Applications, Opportunities, and Challenges. Network 3(1): 115-141 (2023) - [c44]Nisha Pillai, Bindu Nanduri, Michael J. Rothrock, Zhiqian Chen, Mahalingam Ramkumar:
Towards Optimal Microbiome to Inhibit Multidrug Resistance. CIBCB 2023: 1-9 - [c43]Prasad Ayyalasomayajula, Mahalingam Ramkumar:
Optimization of Merkle Tree Structures: A Focus on Subtree Implementation. CyberC 2023: 59-67 - 2022
- [j16]Franklin Wei, Stephen R. Tate, Mahalingam Ramkumar, Somya D. Mohanty:
A Scalable Trustworthy Infrastructure for Collaborative Container Repositories. Distributed Ledger Technol. Res. Pract. 1(1): 1-29 (2022)
2010 – 2019
- 2019
- [c42]Naresh Adhikari, Naila Bushra, Mahalingam Ramkumar:
Redistricting using Blockchain Network. TPS-ISA 2019: 150-159 - [c41]Naila Bushra, Naresh Adhikari, Mahalingam Ramkumar:
Secure Queryable Dynamic Graphs using Blockchain. TPS-ISA 2019: 160-167 - 2018
- [c40]Naila Bushra, Naresh Adhikari, Mahalingam Ramkumar:
A TCB Minimizing Model of Computation. SSCC 2018: 455-470 - [i7]Franklin Wei, Mahalingam Ramkumar, Somya D. Mohanty:
A Scalable, Trustworthy Infrastructure for Collaborative Container Repositories. CoRR abs/1810.07315 (2018) - 2014
- [c39]Mahalingam Ramkumar, Somya D. Mohanty:
A Trustworthy Assurance-as-a-Service Architecture. ICS 2014: 831-840 - 2013
- [c38]Tamer Aldwairi, Bindu Nanduri, Mahalingam Ramkumar, Dilip Gautam, Michael Johnson, Andy D. Perkins:
Statistical Methods for Ambiguous Sequence Mappings. BCB 2013: 674 - 2012
- [j15]Arun Velagapalli, Mahalingam Ramkumar:
Trustworthy TCB for DNS Servers. Int. J. Netw. Secur. 14(4): 187-205 (2012) - [c37]Somya D. Mohanty, Arun Velagapalli, Mahalingam Ramkumar:
An Efficient TCB for a Generic Content Distribution System. CyberC 2012: 5-12 - 2011
- [c36]Somya D. Mohanty, Mahalingam Ramkumar:
Securing File Storage in an Untrusted Server - Using a Minimal Trusted Computing Base. CLOSER 2011: 460-470 - [c35]Arun Velagapalli, Mahalingam Ramkumar:
Minimizing the TCB for securing SCADA systems. CSIIRW 2011: 19 - 2010
- [j14]Mahalingam Ramkumar:
The subset keys and identity tickets (SKIT) key distribution scheme. IEEE Trans. Inf. Forensics Secur. 5(1): 39-51 (2010) - [c34]Vinay Thotakura, Mahalingam Ramkumar:
Minimal trusted computing base for MANET nodes. WiMob 2010: 91-99
2000 – 2009
- 2009
- [c33]Kulasekaran A. Sivakumar, Mahalingam Ramkumar:
Private logical neighborhoods for wireless ad hoc networks. Q2SWinet 2009: 73-79 - 2008
- [j13]Mahalingam Ramkumar:
Trustworthy Computing under Resource Constraints with the DOWN Policy. IEEE Trans. Dependable Secur. Comput. 5(1): 49-61 (2008) - [c32]Brian L. Gaines, Mahalingam Ramkumar:
A Framework for Dual-Agent MANET Routing Protocols. GLOBECOM 2008: 1968-1973 - [c31]Mahalingam Ramkumar:
Proxy Aided Key Pre-distribution Schemes for Sensor Networks. IPCCC 2008: 462-468 - [c30]Mahalingam Ramkumar:
On the scalability of an efficient "Nonscalable" key distribution scheme. WOWMOM 2008: 1-6 - [c29]Kulasekaran A. Sivakumar, Mahalingam Ramkumar:
Improving the resiliency of Ariadne. WOWMOM 2008: 1-6 - [i6]Mahalingam Ramkumar:
Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications. IACR Cryptol. ePrint Arch. 2008: 332 (2008) - 2007
- [j12]Mahalingam Ramkumar:
Broadcast Authentication With Preferred Verifiers. Int. J. Netw. Secur. 4(2): 166-178 (2007) - [j11]Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu, Amol Sukerkar:
Improved utilization of embedding distortion in scalar quantization based data hiding techniques. Signal Process. 87(5): 877-890 (2007) - [c28]Kulasekaran A. Sivakumar, Mahalingam Ramkumar:
An Efficient Secure Route Discovery Protocol for DSR. GLOBECOM 2007: 458-463 - [c27]Kulasekaran A. Sivakumar, Mahalingam Ramkumar:
Safeguarding Mutable Fields in AODV Route Discovery Process. ICCCN 2007: 645-651 - [c26]Vinay Thotakura, Ray Vaughn, Mahalingam Ramkumar:
Covert Channels In Ad-hoc Networks. ICWN 2007: 160-166 - 2006
- [j10]Mahalingam Ramkumar, Nasir D. Memon:
Secure collaborations over message boards. Int. J. Secur. Networks 1(1/2): 113-124 (2006) - [j9]Mahalingam Ramkumar:
Broadcast Encryption Using Probabilistic Key Distribution and Applications. J. Comput. 1(3): 1-12 (2006) - [j8]Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu:
An overview of scalar quantization based data hiding methods. Signal Process. 86(5): 893-914 (2006) - [c25]Mahalingam Ramkumar:
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies. GLOBECOM 2006 - [c24]Mahalingam Ramkumar:
I-HARPS: An Efficient Key Predistribution Scheme for Mobile Computing Applications. GLOBECOM 2006 - [c23]Mahalingam Ramkumar:
An Efficient Broadcast Authentication Scheme for Ad Hoc Routing Protocols. ICC 2006: 2231-2236 - [c22]Kulasekaran A. Sivakumar, Mahalingam Ramkumar:
On the Effect of One-way Links on Route Discovery in DSR. ICCCN 2006: 219-225 - 2005
- [j7]Mahalingam Ramkumar, Nasir D. Memon:
An efficient key predistribution scheme for ad hoc network security. IEEE J. Sel. Areas Commun. 23(3): 611-621 (2005) - [c21]Mahalingam Ramkumar:
On Broadcast Encryption with Random Key Pre-distribution Schemes. ICISS 2005: 304-316 - [i5]Mahalingam Ramkumar:
Broadcast Authentication With Hashed Random Preloaded Subsets. IACR Cryptol. ePrint Arch. 2005: 134 (2005) - [i4]Mahalingam Ramkumar:
I-HARPS: An Efficient Key Pre-distribution Scheme. IACR Cryptol. ePrint Arch. 2005: 138 (2005) - [i3]Mahalingam Ramkumar:
Broadcast Encryption with Random Key Pre-distribution Schemes. IACR Cryptol. ePrint Arch. 2005: 142 (2005) - 2004
- [j6]Litao Gang, Ali N. Akansu, Mahalingam Ramkumar:
Linear and Nonlinear Oblivious Data Hiding. EURASIP J. Adv. Signal Process. 2004(14): 2102-2112 (2004) - [j5]Mahalingam Ramkumar, Ali N. Akansu:
A robust protocol for proving ownership of multimedia content. IEEE Trans. Multim. 6(3): 469-478 (2004) - [j4]Mahalingam Ramkumar, Ali N. Akansu:
On the design of data hiding methods robust to lossy compression. IEEE Trans. Multim. 6(6): 947-951 (2004) - [j3]Mahalingam Ramkumar, Ali N. Akansu:
Signaling methods for multimedia steganography. IEEE Trans. Signal Process. 52(4): 1100-1111 (2004) - [c20]Yeling Zhang, Mahalingam Ramkumar, Nasir D. Memon:
Information flow based routing algorithms for wireless sensor networks. GLOBECOM 2004: 742-747 - [c19]Mahalingam Ramkumar, Nasir D. Memon:
An efficient random key pre-distribution scheme. GLOBECOM 2004: 2218-2223 - [c18]Hüsrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu:
An analysis of quantization based embedding-detection techniques. ICASSP (3) 2004: 77-80 - [c17]Ismail Avcibas, Sevinc Bayram, Nasir D. Memon, Mahalingam Ramkumar, Bülent Sankur:
A classifier design for detecting Image manipulations. ICIP 2004: 2645-2648 - [c16]Mahalingam Ramkumar, Nasir D. Memon:
A system for digital rights management using key predistribution. ICME 2004: 431-434 - [i2]Mahalingam Ramkumar, Nasir D. Memon:
Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance. IACR Cryptol. ePrint Arch. 2004: 89 (2004) - 2003
- [c15]Mahalingam Ramkumar, Nasir Menon:
Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks. GLOBECOM 2003: 1405-1409 - [c14]Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu:
A new perspective for embedding-detection methods with distortion compensation and thresholding processing techniques. ICIP (2) 2003: 507-510 - [i1]Mahalingam Ramkumar, Nasir D. Memon:
HARPS: HAshed Random Preloaded Subset Key Distribution. IACR Cryptol. ePrint Arch. 2003: 170 (2003) - 2002
- [c13]Husrev T. Sencar, Ali N. Akansu, Mahalingam Ramkumar:
Improvements on data hiding for lossy compression. ICASSP 2002: 3449-3452 - [c12]Litao Gang, Ali N. Akansu, Mahalingam Ramkumar:
Security and synchronization in watermark sequence. ICASSP 2002: 3736-3739 - 2001
- [j2]Mahalingam Ramkumar, Ali N. Akansu:
Capacity estimates for data hiding in compressed images. IEEE Trans. Image Process. 10(8): 1252-1263 (2001) - [c11]Litao Gang, Ali N. Akansu, Mahalingam Ramkumar:
MP3 resistant oblivious steganography. ICASSP 2001: 1365-1368 - [c10]Litao Gang, Ali N. Akansu, Mahalingam Ramkumar:
Set partitioning in oblivious data hiding. ICASSP 2001: 1985-1988 - 2000
- [c9]I. Burak Özer, Mahalingam Ramkumar, Ali N. Akansu:
A new method for detection of watermarks in geometrically distorted images. ICASSP 2000: 1963-1966 - [c8]Mahalingam Ramkumar, Ali N. Akansu:
FFT based signaling for multimedia steganography. ICASSP 2000: 1979-1982 - [c7]Mahalingam Ramkumar, Ali N. Akansu, Xiaodong Cai:
Floating Signal Constellations for Multimedia Steganography. ICC (1) 2000: 249-253 - [c6]Mahalingam Ramkumar, Ali N. Akansu:
A Robust Oblivious Watermarking Scheme. ICIP 2000: 61-64 - [c5]Mahalingam Ramkumar, Ali N. Akansu:
Robust Protocols for Proving Ownership of Images. ITCC 2000: 22-29
1990 – 1999
- 1999
- [c4]Mahalingam Ramkumar, Ali N. Akansu, A. Aydin Alatan:
On the choice of transforms for data hiding in compressed video. ICASSP 1999: 3049-3052 - [c3]Mahalingam Ramkumar, Ali N. Akansu, A. Aydin Alatan:
A Robust Data Hiding Scheme for Images Using DFT. ICIP (2) 1999: 211-215 - [c2]Mahalingam Ramkumar, G. V. Anand, Ali N. Akansu:
On the implementation of 2-band cyclic filterbanks. ISCAS (3) 1999: 520-523 - 1998
- [c1]Mahalingam Ramkumar, Ali N. Akansu:
Information theoretic bounds for data hiding in compressed images. MMSP 1998: 267-272 - 1997
- [j1]Mahalingam Ramkumar, G. V. Anand:
An FFT-based technique for fast fractal image compression. Signal Process. 63(3): 263-268 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-31 20:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint