Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
2023 journal article
Enhanced Machine Learning Sketches for Network Measurements
IEEE TRANSACTIONS ON COMPUTERS, 72(4), 957–970.
2023 journal article
Using RF Signals to Generate Indoor Maps
ACM TRANSACTIONS ON SENSOR NETWORKS, 19(1).
2022 article
A Distributed & Lightweight Framework to Secure IoT Networks Against Network Layer Attacks
A Distributed & Lightweight Framework to Secure IoT Networks Against Network Layer Attacks. 2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022).
2022 article
Characterizing the Availability and Latency in AWS Network From the Perspective of Tenants
Iqbal, H., Singh, A., & Shahzad, M. (2022, February 22). IEEE-ACM TRANSACTIONS ON NETWORKING.
2022 journal article
Contactless Monitoring of PPG Using Radar
PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 6(3).
2022 article
Estimating Soil Moisture using RF Signals
PROCEEDINGS OF THE 2022 THE 28TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, ACM MOBICOM 2022, pp. 242–254.
2022 article
Left or Right: A Peek into the Political Biases in Email Spam Filtering Algorithms During US Election 2020
PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), pp. 2491–2500.
2022 article
RMS: Removing Barriers to Analyze the Availability and Surge Pricing of Ridesharing Services
PROCEEDINGS OF THE 2022 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI' 22).
2021 article
Accurately Decoding MIMO Streams in VLC
30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021).
2021 article
Characterizing the Performance of QUIC on Android and Wear OS Devices
30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021).
2021 journal article
Dissecting Cloud Gaming Performance with DECAF
PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 5(3).
2021 journal article
WiFi based Multi-User Gesture Recognition
IEEE TRANSACTIONS ON MOBILE COMPUTING, 20(3), 1242–1256.
2020 article
A WiFi-based Home Security System
2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), pp. 129–137.
2020 journal article
Bimodal affect recognition based on autoregressive hidden Markov models from physiological signals
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 195.
2020 article
Characterizing the Impact of TCP Coexistence in Data Center Networks
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), pp. 388–398.
2020 article
Distributed and Privacy Preserving Routing of Connected Vehicles to Minimize Congestion
2020 IEEE 17TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS 2020), pp. 220–228.
2020 journal article
Large Scale Characterization of Software Vulnerability Life Cycles
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 17(4), 730–744.
2020 article
RFMap: Generating Indoor Maps using RF Signals
2020 19TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN 2020), pp. 133–144.
2020 journal article
SF-Sketch: A Two-Stage Sketch for Data Streams
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 31(10), 2263–2276.
2019 article
CSLIM: Automated Extraction of loT Functionalities from Legacy C Codebases
ICDCN '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, pp. 421–426.
2018 journal article
FID-sketch: an accurate sketch to store frequencies in data streams
World Wide Web, 22(6), 2675–2696.
2018 journal article
Identifying and Estimating Persistent Items in Data Streams
IEEE-ACM TRANSACTIONS ON NETWORKING, 26(6), 2429–2442.
2018 article
Multi-User Gesture Recognition Using WiFi
MOBISYS'18: PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, pp. 401–413.
2017 journal article
A Shifting Framework for Set Queries
IEEE-ACM TRANSACTIONS ON NETWORKING, 25(5), 3116–3131.
2017 journal article
Behavior Based Human Authentication on Touch Screen Devices Using Gestures and Signatures
IEEE TRANSACTIONS ON MOBILE COMPUTING, 16(10), 2726–2741.
2017 journal article
Continuous Authentication and Authorization for the Internet of Things
IEEE INTERNET COMPUTING, 21(2), 86–90.
Contributors: M. Singh n n &
2017 journal article
Device-Free Human Activity Recognition Using Commercial WiFi Devices
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(5), 1118–1131.
2017 article
Fast and Accurate Tracking of Population Dynamics in RFID Systems
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), pp. 836–846.
2017 journal article
Multi-Category RFID Estimation
IEEE-ACM TRANSACTIONS ON NETWORKING, 25(1), 264–277.
2017 journal article
Recognizing Keystrokes Using WiFi Devices
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 35(5), 1175–1190.
2017 conference paper
Rectangular hash table: Bloom filter and bitmap assisted hash table with high speed
2017 IEEE International Conference on Big Data (Big Data), 837–846.
2017 article
SF-sketch: A Fast, Accurate, and Memory Efficient Data Structure to Store Frequencies of Data Items
2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), pp. 103–106.
2016 journal article
A shifting bloom filter framework for set queries
Proceedings of the VLDB Endowment, 9(5), 408–419.
2016 conference paper
A stochastic frame based approach to RFID tag searching
2016 IFIP Networking Conference (IFIP Networking) and Workshops, 153–161.
2016 journal article
Accurate and Efficient Per-Flow Latency Measurement Without Probing and Time Stamping
IEEE-ACM TRANSACTIONS ON NETWORKING, 24(6), 3477–3492.
2016 journal article
Fast and Reliable Detection and Identification of Missing RFID Tags in the Wild
IEEE-ACM TRANSACTIONS ON NETWORKING, 24(6), 3770–3784.
2016 journal article
Finding persistent items in data streams
Proceedings of the VLDB Endowment, 10(4), 289–300.
2015 article
Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness
2015 IEEE 23RD INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), pp. 279–290.
2013 journal article
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
Information Sciences, 231, 45–63.
2009 chapter
Keystroke-Based User Identification on Smart Phones
In Lecture Notes in Computer Science (pp. 224–243).
2008 chapter
A Scalable Formal Framework for Analyzing the Behavior of Nature-Inspired Routing Protocols
In Parallel Problem Solving from Nature – PPSN X (pp. 1130–1139).
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.