


default search action
Ram Dantu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c129]Shakila Zaman, Ram Dantu, Apurba Pokharel, Sirisha Talapuru, Vinh Quach:
Indivisible State Mirroring in Cross-Chain Atomic Swap across Heterogeneous Blockchains. BCCA 2024: 116-123 - [c128]Apurba Pokharel, Ram Dantu, Shakila Zaman, Sirisha Talapuru, Vinh Quach:
Deliberation Leads to Unanimous Consensus. BCCA 2024: 356-363 - [c127]Chenxi Qiu, Sourabh Yadav, Yuede Ji, Anna Cinzia Squicciarini, Ram Dantu, Juanjuan Zhao, Cheng-Zhong Xu:
Fine-Grained Geo-Obfuscation to Protect Workers' Location Privacy in Time-Sensitive Spatial Crowdsourcing. EDBT 2024: 373-385 - [c126]Burak Tufekci, Vinh Quach, Cihan Tunc, Ram Dantu:
DUDE-IDS: A Framework for Efficiently Detecting Network-Related Drone Cyberattacks. IOTSMS 2024: 240-247 - [c125]Sirisha Talapuru, Ram Dantu, Shakila Zaman, Vinh Quach, Apurba Pokharel:
Fostering the Metaverse Immersion: Unraveling Personalized Dynamic Human Avatars. MetaCom 2024: 143-150 - [c124]Vinh Quach, Burak Tufekci, Cihan Tunc, Ram Dantu:
Hazardous Area Aware Path-Planning for Drone Swarms. MOST 2024: 168-177 - [c123]Syed Badruddoja, Ram Dantu, Mark Dockendorf, Abiola Salau, Kritagya Upadhyay
:
Revolutionizing Blockchain Consensus: Towards Deliberative and Unanimous Agreement. SECRYPT 2024: 786-791 - [c122]Shriyaa Balaji, Ram Dantu, Kritagya Upadhyay, Thomas McCullough:
Bridging the Legal Divide: Contractual Enforceability and Acceptability in the AI-Driven Automated Conversion of Smart Legal Contracts. TPS-ISA 2024: 128-137 - [c121]Vinh Quach, Ram Dantu, Sirisha Talapuru, Shakila Zaman, Apurba Pokharel:
ZCube: A Zero-Trust, Zero-Knowledge, and Zero-Memory Platform for Privacy and yet Secured Access. TPS-ISA 2024: 166-175 - 2023
- [c120]Zachary Zaccagni
, Ram Dantu
, Kirill Morozov
:
Proof of Review: Trust Me, It's Been Reviewed. BIOTC 2023: 23-34 - [c119]Julie Germain
, Ram Dantu:
W-State as a OHE Scheme for Efficient Path Selection on Quantum Random Walks. INFOCOM Workshops 2023: 1-6 - [c118]Himan Namdari, Cihan Tunc, Ram Dantu:
Phoenix: IoT Trust Evaluation Using Game Theory with Second Chance Protocol. IOTSMS 2023: 117-124 - [c117]Shakila Zaman, Ram Dantu, Syed Badruddoja
, Sirisha Talapuru, Kritagya Upadhyay
:
Layerwise Interoperability in Metaverse: Key to Next-Generation Electronic Commerce. MetaCom 2023: 9-16 - [c116]Mark Dockendorf, Ram Dantu:
Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives. SECRYPT 2023: 192-205 - [c115]Mark Dockendorf, Ram Dantu:
Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs. SECRYPT 2023: 876-884 - [c114]Shakila Zaman, Ram Dantu, Syed Badruddoja, Sirisha Talapuru, Kritagya Upadhyay
:
Seamless Asset Exchange in Interconnected Metaverses: Unraveling On-Chain Atomic Swap. TPS-ISA 2023: 146-155 - [c113]Sirisha Talapuru, Ram Dantu, Kritagya Upadhyay
, Syed Badruddoja, Shakila Zaman:
The Dark Side of the Metaverse: Why is it Falling Short of Expectations? TPS-ISA 2023: 287-296 - [c112]Mark Dockendorf, Ram Dantu:
k-Anonymity in Federated Heterogenous Graphs and k-Core Anonymization. TPS-ISA 2023: 314-323 - [c111]John Long, Ram Dantu, Jacob White:
Performance Analysis of Homomorphically-Encrypted Heterogeneous Multi-Layer Graph Databases. TPS-ISA 2023: 324-334 - 2022
- [c110]Syed Badruddoja
, Ram Dantu, Yanyan He, Mark A. Thompson, Abiola Salau
, Kritagya Upadhyay
:
Making Smart Contracts Predict and Scale. BCCA 2022: 127-134 - [c109]Syed Badruddoja
, Ram Dantu, Yanyan He, Mark A. Thompson, Abiola Salau
, Kritagya Upadhyay
:
Trusted AI with Blockchain to Empower Metaverse. BCCA 2022: 237-244 - [c108]Abiola Salau
, Ram Dantu, Kirill Morozov, Syed Badruddoja
, Kritagya Upadhyay
:
Making Blockchain Validators Honest. BCCA 2022: 267-273 - [c107]Syed Badruddoja
, Ram Dantu, Yanyan He, Mark A. Thompson, Abiola Salau
, Kritagya Upadhyay
:
Smarter Contracts to Predict using Deep-Learning Algorithms. BCCA 2022: 280-288 - [c106]Syed Badruddoja
, Ram Dantu, Yanyan He, Abiola Salau, Kritagya Upadhyay
:
Scalable Smart Contracts for Linear Regression Algorithm. BlockTEA 2022: 19-31 - [c105]Abiola Salau
, Ram Dantu, Kritagya Upadhyay
, Syed Badruddoja
:
Data Cooperatives for Trusted News Sharing in Social Media. BlockTEA 2022: 106-127 - [c104]Julie Germain
, Ram Dantu, Mark A. Thompson:
Qubit Reset and Refresh: A Gamechanger for Random Number Generation. CODASPY 2022: 367-369 - [c103]Abiola Salau, Ram Dantu, Kirill Morozov, Kritagya Upadhyay, Syed Badruddoja
:
Multi-Tier Reputation for Data Cooperatives. MARBLE 2022: 253-273 - [c102]Julie Germain
, Ram Dantu, Mark A. Thompson, Mark Dockendorf:
Quantum Networks: Reset-and-Reuse can be a Game-changer for Entanglement via Distillation. QCE 2022: 855-858 - [c101]Mark Dockendorf, Ram Dantu, John Long:
Graph Algorithms over Homomorphic Encryption for Data Cooperatives. SECRYPT 2022: 205-214 - [c100]Abiola Salau
, Ram Dantu, Kirill Morozov, Kritagya Upadhyay
, Syed Badruddoja
:
Towards a Threat Model and Security Analysis for Data Cooperatives. SECRYPT 2022: 707-713 - [c99]Kritagya Upadhyay
, Ram Dantu, Yanyan He, Syed Badruddoja
, Abiola Salau:
Auditing Metaverse Requires Multimodal Deep Learning. TPS-ISA 2022: 39-46 - [c98]Zachary Zaccagni
, Ram Dantu, Kirill Morozov:
Maintaining Review Credibility Using NLP, Reputation, and Blockchain. TPS-ISA 2022: 58-66 - 2021
- [c97]Ishan Ranasinghe, Chengping Yuan, Ram Dantu, Mark V. Albert:
A Collaborative and Adaptive Feedback System for Physical Exercises. CIC 2021: 11-15 - [c96]Syed Badruddoja
, Ram Dantu, Yanyan He, Kritagya Upadhyay
, Mark A. Thompson:
Making Smart Contracts Smarter. IEEE ICBC 2021: 1-3 - [c95]Abiola Salau
, Ram Dantu, Kritagya Upadhyay
:
Data Cooperatives for Neighborhood Watch. IEEE ICBC 2021: 1-9 - [c94]Ishan Ranasinghe, Ram Dantu, Mark V. Albert, Sam Watts, Ruben Ocana:
Cyber-Physiotherapy: Rehabilitation to Training. IM 2021: 1054-1057 - [c93]Mark Dockendorf, Ram Dantu, Kirill Morozov, Sanjukta Bhowmick:
Investing Data with Untrusted Parties using HE. SECRYPT 2021: 845-853 - [c92]Kritagya Upadhyay
, Ram Dantu, Yanyan He, Abiola Salau
, Syed Badruddoja
:
Make Consumers Happy by Defuzzifying the Service Level Agreements. TPS-ISA 2021: 98-105 - [c91]Kritagya Upadhyay
, Ram Dantu, Yanyan He, Syed Badruddoja
, Abiola Salau
:
Can't Understand SLAs? Use the Smart Contract. TPS-ISA 2021: 129-136 - [c90]Kritagya Upadhyay
, Ram Dantu, Yanyan He, Abiola Salau
, Syed Badruddoja
:
Paradigm Shift from Paper Contracts to Smart Contracts. TPS-ISA 2021: 261-268 - 2020
- [c89]Kritagya Upadhyay
, Ram Dantu, Zachary Zaccagni
, Syed Badruddoja
:
Is Your Legal Contract Ambiguous? Convert to a Smart Legal Contract. Blockchain 2020: 273-280 - [c88]Syed Badruddoja
, Ram Dantu, Logan Widick, Zachary Zaccagni
, Kritagya Upadhyay
:
Integrating DOTS With Blockchain Can Secure Massive IoT Sensors. IPDPS Workshops 2020: 937-946 - [c87]Rajasekhar Ganduri, Ram Dantu, Mark A. Thompson, Samuel Evans, Logan Widick:
A Human-Network-Security-Interface for an Average Joe. ISI 2020: 1-6 - [c86]Nilanjan Sen, Ram Dantu, Mark A. Thompson:
Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves. ISI 2020: 1-7 - [c85]Jagannadh Vempati, Ram Dantu, Syed Badruddoja
, Mark A. Thompson:
Adaptive and Predictive SDN Control During DDoS Attacks. ISI 2020: 1-6 - [c84]Nilanjan Sen, Ram Dantu, Kirill Morozov:
EW256357: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security. SecureComm (2) 2020: 291-310 - [c83]Nilanjan Sen, Ram Dantu, Mark A. Thompson:
Performance Analysis of Elliptic Curves for VoIP Audio Encryption Using a Softphone. SecureComm (1) 2020: 503-508 - [c82]Htoo Aung Win, Ram Dantu, Pradhumna L. Shrestha:
On-Road Performance Evaluation of IEEE 802.11p/WAVE in BSM Signalling and Video Streaming using WSMP. WTS 2020: 1-8 - [i7]Srikanth Jonnada, Ram Dantu, Ishan Ranasinghe, Logan Widick, Mark A. Thompson, Janice A. Hauge:
Cyber-Human System for Remote Collaborators. CoRR abs/2009.03143 (2020) - [i6]Zachary Zaccagni, Ram Dantu:
Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews. IACR Cryptol. ePrint Arch. 2020: 475 (2020)
2010 – 2019
- 2019
- [c81]Zachary Zaccagni
, Aditya Paul
, Ram Dantu:
Micro-Accreditation for Matching Employer E-Hire Needs. Blockchain 2019: 347-352 - [c80]Anudeep Sai Muttavarapu, Ram Dantu, Mark A. Thompson:
Distributed Ledger for Spammers' Resume. CNS 2019: 1-9 - [c79]Theogene Hakiza Bucuti, Ram Dantu, Kirill Morozov:
CMCAP: Ephemeral Sandboxes for Adaptive Access Control. SACMAT 2019: 207-212 - [c78]Josh Talkington, Ram Dantu, Kirill Morozov:
Verifying OAuth Implementations Through Encrypted Network Analysis. SACMAT 2019: 227-229 - [c77]Logan Widick, Ishan Ranasinghe, Ram Dantu, Srikanth Jonnada:
Blockchain Based Authentication and Authorization Framework for Remote Collaboration Systems. WOWMOM 2019: 1-7 - [i5]Garima Bajwa
, Mohamed Fazeen, Ram Dantu:
Detecting driver distraction using stimuli-response EEG analysis. CoRR abs/1904.09100 (2019) - 2018
- [j29]Shanti R. Thiyagaraja, Ram Dantu, Pradhumna L. Shrestha
, Anurag Chitnis, Mark A. Thompson, Pruthvi T. Anumandla, Tom Sarma, Siva Dantu:
A novel heart-mobile interface for detection and classification of heart sounds. Biomed. Signal Process. Control. 45: 313-324 (2018) - [c76]Jagannadh Vempati, Ram Dantu:
Automatic Feedback Control for Graceful Degradation of Real-Time Services in the Face of an Attack. CIC 2018: 80-89 - [c75]Vishnu Prasad Ranganthan, Ram Dantu, Aditya Paul
, Paula Mears, Kirill Morozov:
A Decentralized Marketplace Application on the Ethereum Blockchain. CIC 2018: 90-97 - [c74]Hassan Takabi, Yessir Hashem, Ram Dantu:
Prediction of human error using eye movements patterns for unintentional insider threat detection. ISBA 2018: 1-8 - [c73]Srikanth Jonnada, Ram Dantu, Pradhumna L. Shrestha, Ishan Ranasinghe, Logan Widick:
An OAuth-Based Authorization Framework for Access Control in Remote Collaboration Systems. NCS 2018: 38-44 - [c72]Nilanjan Sen, Ram Dantu, Jagannadh Vempati, Mark A. Thompson:
Performance Analysis of Elliptic Curves for Real-Time Video Encryption. NCS 2018: 64-71 - [c71]Jagannadh Vempati, Ram Dantu, Mark A. Thompson:
Uninterrupted Video Surveillance in the Face of an Attack. TrustCom/BigDataSE 2018: 843-848 - 2017
- [c70]Yassir Hashem, Hassan Takabi, Ram Dantu, Rodney D. Nielsen:
A Multi-Modal Neuro-Physiological Study of Malicious Insider Threats. MIST@CCS 2017: 33-44 - [c69]Shanti R. Thiyagaraja, Ram Dantu, Pradhumna L. Shrestha, Mark A. Thompson, Christopher Smith:
Optimized and Secured Transmission and Retrieval of Vital Signs from Remote Devices. CHASE 2017: 25-30 - [c68]Jagannadh Vempati, Mark A. Thompson, Ram Dantu:
Feedback control for resiliency in face of an attack. CISRC 2017: 17:1-17:7 - 2016
- [j28]Garima Bajwa
, Ram Dantu:
Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms. Comput. Secur. 62: 95-113 (2016) - [j27]Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol, Ram Dantu:
Inside the Mind of the Insider: Towards Insider Threat Detection Using Psychophysiological Signals. J. Internet Serv. Inf. Secur. 6(1): 20-36 (2016) - [c67]Josh Talkington, Ram Dantu:
Realizing Optimal Chest Compression Fraction During Cardiopulmonary Resuscitation. CHASE 2016: 348-349 - [c66]Michael Jaynes, Ram Dantu, Roland Varriale, Nathaniel Evans:
Automating ECU Identification for Vehicle Security. ICMLA 2016: 632-635 - 2015
- [c65]Yessir Hashem, Hassan Takabi, Mohammad GhasemiGol
, Ram Dantu:
Towards Insider Threat Detection Using Psychophysiological Signals. MIST@CCS 2015: 71-74 - [c64]Quentin Mayo, Renée C. Bryce, Ram Dantu:
PhD Forum: A System Identification Approach to Monitoring Network Traffic Security. CSCloud 2015: 509-511 - [c63]Logan Widick, Josh Talkington, Garima Bajwa
, Ram Dantu:
A framework for secured collaboration in mHealth. CTS 2015: 364-369 - [c62]Garima Bajwa
, Mohamed Fazeen, Ram Dantu, Sonal Tanpure:
Unintentional bugs to vulnerability mapping in Android applications. ISI 2015: 176-178 - [c61]Cynthia L. Claiborne, Cathy C. Ncube, Ram Dantu:
Random anonymization of mobile sensor data: Modified Android framework. ISI 2015: 182-184 - [c60]Theogene Hakiza Bucuti, Ram Dantu:
An opportunistic encryption extension for the DNS protocol. ISI 2015: 194 - [c59]Garima Bajwa
, Ram Dantu, Ryan Aldridge:
Pass-pic: A mobile user authentication. ISI 2015: 195 - 2014
- [c58]Mohamed Fazeen, Garima Bajwa
, Ram Dantu:
Context-aware multimedia encryption in mobile platforms. CISR 2014: 53-56 - [c57]Shanti R. Thiyagaraja, Jagannadh Vempati, Ram Dantu, Tom Sarma, Siva Dantu:
Smart phone monitoring of second heart sound split. EMBC 2014: 2181-2184 - [c56]Michael Jaynes, Ram Dantu:
Tire-road friction estimation utilizing smartphones. IRI 2014: 855-858 - [c55]Mohamed Fazeen, Ram Dantu:
Another free app: Does it have the right intentions? PST 2014: 282-289 - 2013
- [j26]Vikram Chandrasekaran, Ram Dantu, Kalyan Pathapati Subbu:
Socio-technical aspects of remote media control for a NG9-1-1 system. Multim. Tools Appl. 62(3): 733-759 (2013) - [j25]Vikram Chandrasekaran, Ram Dantu, Srikanth Jonnada, Shanti Thiyagaraja, Kalyan Pathapati Subbu:
Cuffless Differential Blood Pressure Estimation Using Smart Phones. IEEE Trans. Biomed. Eng. 60(4): 1080-1089 (2013) - [j24]Kalyan Pathapati Subbu, Brandon Gozick, Ram Dantu:
LocateMe: Magnetic-fields-based indoor localization using smartphones. ACM Trans. Intell. Syst. Technol. 4(4): 73:1-73:27 (2013) - [c54]Garima Bajwa, Ram Dantu, Mohamed Fazeen, Rajiv M. Joseph:
Self-Tracking via Brain-Mobile-Cloud Interface. AAAI Spring Symposium: Data Driven Wellness 2013 - [c53]Shanti Thiyagaraja, Ram Dantu:
Finger Blood Flow Monitoring Using Smart Phones. BODYNETS 2013: 237-239 - [c52]Garima Bajwa
, Ram Dantu:
Cerebral Autoregulation Assessment using Electroencephalograms. BODYNETS 2013: 327-330 - [c51]Neeraj K. Gupta, Ram Dantu:
Evaluation of respiration quality using smart phone. PETRA 2013: 28:1-28:5 - [c50]Neeraj K. Gupta, Ram Dantu:
Quantifying cognitive impairment due to physical or mental stress. PETRA 2013: 46:1-46:6 - 2012
- [j23]Mohamed Fazeen, Brandon Gozick, Ram Dantu, Moiz Bhukhiya, Marta C. González:
Safe Driving Using Mobile Phones. IEEE Trans. Intell. Transp. Syst. 13(3): 1462-1468 (2012) - 2011
- [j22]Santi Phithakkitnukoon
, Ram Dantu:
Mobile social group sizes and scaling ratio. AI Soc. 26(1): 71-85 (2011) - [j21]Santi Phithakkitnukoon, Ram Dantu:
Towards ubiquitous computing with call prediction. ACM SIGMOBILE Mob. Comput. Commun. Rev. 15(1): 52-64 (2011) - [j20]Mohamed Fazeen, Ram Dantu, Parthasarathy Guturu:
Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches. Soc. Netw. Anal. Min. 1(3): 241-254 (2011) - [j19]Santi Phithakkitnukoon
, Ram Dantu, Rob Claxton, Nathan Eagle:
Behavior-based adaptive call predictor. ACM Trans. Auton. Adapt. Syst. 6(3): 21:1-21:28 (2011) - [j18]Brandon Gozick, Kalyan Subbu, Ram Dantu, Tomyo Maeshiro:
Magnetic Maps for Indoor Navigation. IEEE Trans. Instrum. Meas. 60(12): 3883-3891 (2011) - [j17]Huiqi Zhang, Ram Dantu, João W. Cangussu:
Socioscope: Human Relationship and Behavior Analysis in Social Networks. IEEE Trans. Syst. Man Cybern. Part A 41(6): 1122-1143 (2011) - [c49]Christopher Barthold, Kalyan Pathapati Subbu, Ram Dantu:
Evaluation of gyroscope-embedded mobile phones. SMC 2011: 1632-1638 - [c48]Kalyan Pathapati Subbu, Brandon Gozick, Ram Dantu:
Indoor localization through dynamic time warping. SMC 2011: 1639-1644 - [c47]Enkh-Amgalan Baatarjav, Ram Dantu:
Unveiling Hidden Patterns to Find Social Relevance. SocialCom/PASSAT 2011: 242-249 - [c46]Enkh-Amgalan Baatarjav, Ram Dantu:
Current and Future Trends in Social Media. SocialCom/PASSAT 2011: 1384-1385 - 2010
- [j16]Santi Phithakkitnukoon
, Ram Dantu:
ContextAlert: context-aware alert mode for a mobile phone. Int. J. Pervasive Comput. Commun. 6(3): 1-23 (2010) - [j15]Ahmed Alazzawe, Anis Alazzawe, Duminda Wijesekera, Ram Dantu:
A testbed for large mobile social computing experiments. Int. J. Sens. Networks 8(2): 89-97 (2010) - [c45]Enkh-Amgalan Baatarjav, Aliasgar Amin, Ram Dantu, Nikhil Kant Gupta:
Are you my friend? [Twitter response estimator]. CCNC 2010: 1-5 - [c44]Santi Phithakkitnukoon
, Ram Dantu:
Mobile Social Closeness and Communication Patterns. CCNC 2010: 1-5 - [c43]Vikram Chandrasekaran, Ram Dantu, Neeraj K. Gupta, Xiaohui Yang, Duminda Wijesekera:
Efficiency of social connection-based routing in P2P VoIP networks. COMSNETS 2010: 1-6 - [c42]Vikram Chandrasekaran, Siva Dantu, Priyanka Kadiyala, Ram Dantu, Santi Phithakkitnukoon
:
Socio-technical aspects of video phones. COMSNETS 2010: 1-7 - [c41]Paul Sroufe, Santi Phithakkitnukoon
, Ram Dantu, João W. Cangussu:
Email Shape Analysis. ICDCN 2010: 18-29 - [c40]Huiqi Zhang, Ram Dantu:
Predicting social ties in mobile phone networks. ISI 2010: 25-30 - [c39]Xiaohui Yang, Angelos Stavrou
, Ram Dantu, Duminda Wijesekera:
Small World VoIP. MobiCASE 2010: 137-155
2000 – 2009
- 2009
- [j14]Ram Dantu, Sonia Fahmy
, Henning Schulzrinne
, João W. Cangussu:
Issues and challenges in securing VoIP. Comput. Secur. 28(8): 743-753 (2009) - [j13]Wade A. Fagen, João W. Cangussu, Ram Dantu:
A virtual environment for network testing. J. Netw. Comput. Appl. 32(1): 184-214 (2009) - [j12]Ram Dantu, Prakash Kolan, João W. Cangussu:
Network risk management using attacker profiling. Secur. Commun. Networks 2(1): 83-96 (2009) - [c38]Santi Phithakkitnukoon, Ram Dantu:
A Dimension-Reduction Framework for Human Behavioral Time Series Data. AAAI Spring Symposium: Technosocial Predictive Analytics 2009: 95-101 - [c37]Paul Sroufe, Santi Phithakkitnukoon
, Ram Dantu, João W. Cangussu:
Email Shape Analysis for Spam Botnet Detection. CCNC 2009: 1-2 - [c36]Xiaohui Yang, Ram Dantu, Duminda Wijesekera:
Achieving Peer-to-Peer Telecommunication Services through Social Hashing. CCNC 2009: 1-2 - [c35]Huiqi Zhang, Ram Dantu:
Opt-In Detection Based on Call Detail Records. CCNC 2009: 1-2 - [c34]Yugesh Madhavan, João W. Cangussu, Ram Dantu:
Penetration Testing for Spam Filters. COMPSAC (2) 2009: 410-415 - [c33]Kalyan Subbu, Ning Xu, Ram Dantu:
iKnow Where You Are. CSE (4) 2009: 469-474 - [c32]Lonnie Langle, Ram Dantu:
Are You a Safe Driver? CSE (2) 2009: 502-507 - [c31]Huiqi Zhang, Ram Dantu, João W. Cangussu:
Quantifying Reciprocity in Social Networks. CSE (4) 2009: 1031-1035 - [c30]Huiqi Zhang, Ram Dantu, João W. Cangussu:
Change point detection based on call detail records. ISI 2009: 55-60 - [c29]Enkh-Amgalan Baatarjav, Ram Dantu, Yan Tang, João W. Cangussu:
BBN-based privacy management system for facebook. ISI 2009: 194-196 - [c28]Santi Phithakkitnukoon
, Ram Dantu:
Defense against SPIT using community signals. ISI 2009: 232 - [c27]Anis Alazzawe, Ahmed Alazzawe, Duminda Wijesekera, Ram Dantu:
A testbed for mobile social computing. TRIDENTCOM 2009: 1-6 - [c26]Xiaohui Yang, Ram Dantu, Duminda Wijesekera:
A society-integrated testbed architecture for peer-to-peer telecommunications. TRIDENTCOM 2009: 1-6 - 2008
- [j11]Srikanth Palla, Ram Dantu, João W. Cangussu:
Spam Classification Based on E-Mail Path Analysis. Int. J. Inf. Secur. Priv. 2(2): 46-69 (2008) - [j10]Santi Phithakkitnukoon
, Ram Dantu, Enkh-Amgalan Baatarjav:
VoIP Security - Attacks and Solutions. Inf. Secur. J. A Glob. Perspect. 17(3): 114-123 (2008) - [j9]Prakash Kolan, Ram Dantu, João W. Cangussu:
Nuisance level of a voice call. ACM Trans. Multim. Comput. Commun. Appl. 5(1): 6:1-6:22 (2008) - [j8]Syed Waseem Haider, João W. Cangussu, Kendra M. L. Cooper, Ram Dantu, Syed Haider:
Estimation of Defects Based on Defect Decay Model: ED^{3}M. IEEE Trans. Software Eng. 34(3): 336-356 (2008) - [j7]Parthasarathy Guturu, Ram Dantu:
An Impatient Evolutionary Algorithm With Probabilistic Tabu Search for Unified Solution of Some NP-Hard Problems in Graph and Set Theory via Clique Finding. IEEE Trans. Syst. Man Cybern. Part B 38(3): 645-666 (2008) - [c25]Husain Husna, Santi Phithakkitnukoon
, Ram Dantu:
Traffic Shaping of Spam Botnets. CCNC 2008: 786-787 - [c24]Prakash Kolan, Ram Dantu:
Call Algebra. CCNC 2008: 854-858 - [c23]Huiqui Zhang, Ram Dantu:
Quantifying the Presence of Phone Users. CCNC 2008: 883-887 - [c22]Husain Husna, Santi Phithakkitnukoon
, Enkh-Amgalan Baatarjav, Ram Dantu:
Quantifying presence using calling patterns. COMSWARE 2008: 184-187 - [c21]Husain Husna, Santi Phithakkitnukoon
, Srikanth Palla, Ram Dantu:
Behavior analysis of spam botnets. COMSWARE 2008: 246-253 - [c20]Enkh-Amgalan Baatarjav, Ram Dantu, Santi Phithakkitnukoon
:
Privacy Management for Facebook. ICISS 2008: 273-286 - [c19]Ram Dantu, Henning Schulzrinne, Paul Sroufe:
Experiences in building a multi-university testbed for research in multimedia communications. IPDPS 2008: 1-5 - [c18]Santi Phithakkitnukoon
, Ram Dantu:
Inferring Social Groups Using Call Logs. OTM Workshops 2008: 200-210 - [c17]Enkh-Amgalan Baatarjav, Santi Phithakkitnukoon
, Ram Dantu:
Group Recommendation System for Facebook. OTM Workshops 2008: 211-219 - [c16]Huiqi Zhang, Ram Dantu:
Discovery of Social Groups Using Call Detail Records. OTM Workshops 2008: 489-498 - [c15]Santi Phithakkitnukoon
, Ram Dantu:
CPL: Enhancing Mobile Phone Functionality by Call Predicted List. OTM Workshops 2008: 571-581 - 2007
- [j6]Ram Dantu, Gabriel Clothier, Anuj Atri:
EAP methods for wireless networks. Comput. Stand. Interfaces 29(3): 289-301 (2007) - [j5]Prakash Kolan, Ram Dantu:
Socio-technical defense against voice spamming. ACM Trans. Auton. Adapt. Syst. 2(1): 2 (2007) - [j4]Ram Dantu, João W. Cangussu, Sudeep Patwardhan:
Fast Worm Containment Using Feedback Control. IEEE Trans. Dependable Secur. Comput. 4(2): 119-136 (2007) - [c14]Prakash Kolan, Ram Vaithilingam, Ram Dantu:
Automatic Calibration Using Receiver Operating Characteristics Curves. COMSWARE 2007 - [c13]Srikanth Palla, Ram Dantu:
Unwanted SMTP Paths and Relays. COMSWARE 2007 - [c12]Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper:
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. ISI 2007: 71-74 - [c11]Santi Phithakkitnukoon
, Ram Dantu:
Predicting Calls - New Service for an Intelligent Phone. MMNS 2007: 26-37 - [c10]Wade A. Fagen, João W. Cangussu, Ram Dantu:
Goliath: A Configurable Approach for Network Testing. TRIDENTCOM 2007: 1-9 - 2006
- [j3]Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia:
SS7 over IP: signaling interworking vulnerabilities. IEEE Netw. 20(6): 32-41 (2006) - [j2]Venkatesan Prasanna, Armin R. Mikler, Ram Dantu, Kaja M. Abbas
:
Dynamic resource management in QoS controlled networks. Telecommun. Syst. 32(1): 11-30 (2006) - 2005
- [c9]Ram Dantu, Prakash Kolan:
Risk Management Using Behavior Based Bayesian Networks. ISI 2005: 115-126 - [c8]Ram Dantu, João W. Cangussu, Janos Turi:
Sensitivity Analysis of an Attack Containment Model. ISI 2005: 127-138 - [c7]Ram Dantu, João W. Cangussu:
An Architecture for Network Security Using Feedback Control. ISI 2005: 636-637 - [c6]Ram Dantu, Prakash Kolan:
Detecting Spam in VoIP Networks. SRUTI 2005 - [i4]Tom George, Brian Bidulock, Ram Dantu, Hanns Juergen Schwarzbauer, Ken Morneault:
Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Peer-to-Peer Adaptation Layer (M2PA). RFC 4165: 1-53 (2005) - 2004
- [c5]Ram Dantu, Sachin P. Joglekar:
Collaborative Vision using Networked Sensors. ITCC (2) 2004: 395-399 - [c4]Ram Dantu, João W. Cangussu, Arun Yelimeli:
Dynamic Control of Worm Propagation. ITCC (1) 2004: 419-423 - [c3]Ram Dantu, Kall Loper, Prakash Kolan:
Risk Management using Behavior based Attack Graphs. ITCC (1) 2004: 445-449 - [i3]Lily Yang, Ram Dantu, Todd A. Anderson, Ram Gopal:
Forwarding and Control Element Separation (ForCES) Framework. RFC 3746: 1-40 (2004) - 2002
- [i2]Bilel Jamoussi, Loa Andersson, Ross W. Callon, Ram Dantu, Liwen Wu, Paul Doolan, Tom Worster, Nancy K. Feldman, Andre N. Fredette, Muckai K. Girish, Eric Gray, Juha Heinänen, Timothy E. Kilty, Andrew G. Malis:
Constraint-Based LSP Setup using LDP. RFC 3212: 1-42 (2002) - [i1]Ken Morneault, Ram Dantu, Greg Sidebottom, Brian Bidulock, Jacob Heitz:
Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Adaptation Layer. RFC 3331: 1-94 (2002)
1990 – 1999
- 1991
- [j1]R. V. Dantu, Nikitas J. Dimopoulos, Rajni V. Patel
, A. J. Al-Khalili:
Depth perception using blurring and its application in VLSI wafer probing. Mach. Vis. Appl. 5(1): 35-45 (1991)
1980 – 1989
- 1988
- [c2]Ram Dantu, Nikitas J. Dimopoulos, Rajni V. Patel, Asim J. Al-Khalili:
A micro-manipulator vision in IC Manufacturing. ICRA 1988: 1455-1460 - 1987
- [c1]Nikitas J. Dimopoulos, Kin F. Li, Eric Chi-Wah Wong, R. V. Dantu, J. William Atwood:
The Homogeneous Multiprocessor System, An Overview. ICPP 1987: 592-599
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-11 20:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint