default search action
Vijay Laxmi
Person information
Other persons with a similar name
- Govindugari Vijaya Laxmi
- P. Vijaya Laxmi (aka: Pikkala Vijaya Laxmi)
- Vijaya Laxmi
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c129]Shyamili Toluchuri, Aishwarya Upadhyay, Smita Naval, Vijay Laxmi, Manoj Singh Gaur:
GAN-based Seed Generation for Efficient Fuzzing. SECRYPT 2024: 686-691 - 2023
- [j42]Vineeta Jain, Ulf Wetzker, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah, Dominique Méry:
SAP: A Secure Low-Latency Protocol for Mitigating High Computation Overhead in WI-FI Networks. IEEE Access 11: 84620-84635 (2023) - [j41]Anugrah Jain, Vijay Laxmi, Manoj Singh Gaur, Ashish Sharma:
An improved reconfiguration algorithm for handling 1-point NoC failures. Microprocess. Microsystems 101: 104910 (2023) - [j40]Sonal Yadav, Vijay Laxmi, Hemangee K. Kapoor, Manoj Singh Gaur, Amit Kumar:
Adaptive distribution of control messages for improving bandwidth utilization in multiple NoC. J. Supercomput. 79(15): 17208-17246 (2023) - [i6]Ankit Pulkit, Smita Naval, Vijay Laxmi:
A Survey of Side-Channel Attacks in Context of Cache - Taxonomies, Analysis and Mitigation. CoRR abs/2312.11094 (2023) - [i5]Aishwarya Upadhyay, Vijay Laxmi, Smita Naval:
Navigating the Concurrency Landscape: A Survey of Race Condition Vulnerability Detectors. CoRR abs/2312.14479 (2023) - 2022
- [j39]Mohit Singh, Vijay Laxmi, Parvez Faruki:
Dense spatially-weighted attentive residual-haze network for image dehazing. Appl. Intell. 52(12): 13855-13869 (2022) - [j38]Mohit Singh, Vijay Laxmi, Parvez Faruki:
Visibility enhancement and dehazing: Research contribution challenges and direction. Comput. Sci. Rev. 44: 100473 (2022) - [j37]Ashish Sharma, Manoj Singh Gaur, Lava Bhargava, Vijay Laxmi, Manoj Gupta:
Pre-Silicon NBTI Delay-Aware Modeling of Network-on-Chip Router Microarchitecture. Microprocess. Microsystems 91: 104526 (2022) - [j36]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha, Deepak Garg, Neeraj Kumar:
QoS-aware Mesh-based Multicast Routing Protocols in Edge Ad Hoc Networks: Concepts and Challenges. ACM Trans. Internet Techn. 22(1): 1:1-1:27 (2022) - 2021
- [j35]Rajendra Kumar Solanki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
MapperDroid: Verifying app capabilities from description to permissions and API calls. Comput. Secur. 111: 102493 (2021) - [j34]Prabhat Ranjan Tripathi, P. R. Thakura, Vijay Laxmi, Ritesh Kumar Keshri:
Stand-alone PV water pumping system based on high-gain resonant inverter fed induction motor serving two-head for permanent water supply. Int. J. Circuit Theory Appl. 49(8): 2494-2514 (2021) - [j33]Shweta Saharan, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
Scaling & fuzzing: Personal image privacy from automated attacks in mobile cloud computing. J. Inf. Secur. Appl. 60: 102850 (2021) - 2020
- [j32]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Adv. Comput. 119: 73-120 (2020) - [j31]Jay Dave, Avijit Dutta, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur:
Secure Proof of Ownership Using Merkle Tree for Deduplicated Storage. Autom. Control. Comput. Sci. 54(4): 358-370 (2020) - [j30]Jay Dave, Parvez Faruki, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mauro Conti:
SPARK: Secure Pseudorandom Key-based Encryption for Deduplicated Storage. Comput. Commun. 154: 148-159 (2020) - [j29]Jyoti Gajrani, Umang Agarwal, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur, Meenakshi Tripathi, Akka Zemmari:
EspyDroid+: Precise reflection analysis of android apps. Comput. Secur. 90: 101688 (2020) - [j28]Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Partha S. Roop:
SneakLeak+: Large-scale klepto apps analysis. Future Gener. Comput. Syst. 109: 593-603 (2020) - [j27]Anugrah Jain, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Rimpy Bishnoi:
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration. Integr. 72: 92-110 (2020) - [c128]Sonal Yadav, Vijay Laxmi, Manoj Singh Gaur:
Multiple-NoC Exploration and Customization for Energy Efficient Traffic Distribution. VLSI-SOC 2020: 200-201
2010 – 2019
- 2019
- [j26]Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
ETGuard: Detecting D2D attacks using wireless Evil Twins. Comput. Secur. 83: 389-405 (2019) - [j25]Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
You click, I steal: analyzing and detecting click hijacking attacks in web pages. Int. J. Inf. Sec. 18(4): 481-504 (2019) - [j24]Anugrah Jain, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Rimpy Bishnoi:
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures. J. Supercomput. 75(10): 6855-6881 (2019) - [c127]Rajendra Kumar Solanki, Vijay Laxmi, Manoj Singh Gaur:
MAPPER: Mapping Application Description to Permissions. CRiSIS 2019: 84-98 - [c126]Sonal Yadav, Vijay Laxmi, Manoj Singh Gaur, Hemangee K. Kapoor:
Improving Static Power Efficiency via Placement of Network Demultiplexer over Control Plane of Router in Multi-NoCs. DAC 2019: 225 - [c125]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha:
UAVs Reliable Transmission for Multicast Protocols in FANETs. IoTSMS 2019: 130-135 - [e3]Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki:
Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers. Communications in Computer and Information Science 939, Springer 2019, ISBN 978-981-13-7560-6 [contents] - [i4]Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
ETGuard: Detecting D2D Attacks using Wireless Evil Twins. CoRR abs/1903.05843 (2019) - 2018
- [j23]Shweta Bhandari, Rekha Panihar, Smita Naval, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur:
SWORD: Semantic aWare andrOid malwaRe Detector. J. Inf. Secur. Appl. 42: 46-56 (2018) - [j22]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti:
Enhancing QoE for video streaming in MANETs via multi-constraint routing. Wirel. Networks 24(1): 235-256 (2018) - [c124]Shweta Saharan, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari:
Privacy Preserving Data Offloading Based on Transformation. CRiSIS 2018: 86-92 - [c123]Jay Dave, Vijay Laxmi, Parvez Faruki, Manoj Singh Gaur, Bhavya Shah:
Bloom Filter Based Privacy Preserving Deduplication System. ISEA-ISAP 2018: 17-34 - [c122]Parvez Faruki, Bharat Buddhadev, Bhavya Shah, Akka Zemmari, Vijay Laxmi, Manoj Singh Gaur:
DroidDivesDeep: Android Malware Classification via Low Level Monitorable Features with Deep Neural Networks. ISEA-ISAP 2018: 125-139 - [c121]Mohit Kumar Singh, Vijay Laxmi, Neeta Nain:
Unsupervised Person Re-ID in Surveillance Feed Using Re-ranking. ISEA-ISAP 2018: 179-192 - [c120]Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
APPLADroid: Automaton Based Inter-app Privacy Leak Analysis for Android. ISEA-ISAP 2018: 219-233 - [c119]Sonal Yadav, Vijay Laxmi, Hemangee K. Kapoor, Manoj Singh Gaur, Mark Zwolinski:
A Power Efficient Crossbar Arbitration in Multi-NoC for Multicast and Broadcast Traffic. iSES 2018: 243-248 - 2017
- [j21]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, Swati Todi, D. Vijay Rao, Meenakshi Tripathi, Riti Kushwaha:
Multi-constraints link stable multicast routing protocol in MANETs. Ad Hoc Networks 63: 115-128 (2017) - [j20]Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti:
Android inter-app communication threats and detection techniques. Comput. Secur. 70: 392-421 (2017) - [j19]Gaurav Singal, Vijay Laxmi, D. Vijay Rao, Swati Todi, Manoj Singh Gaur:
Improved multicast routing in MANETs using link stability and route stability. Int. J. Commun. Syst. 30(11) (2017) - [j18]Meenakshi Tripathi, Manoj Singh Gaur, Vijay Laxmi, Ramesh Babu Battula:
Balanced energy routing protocol for clustered wireless sensor network. Int. J. Inf. Commun. Technol. 11(3): 396-411 (2017) - [j17]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao:
Moralism: mobility prediction with link stability based multicast routing protocol in MANETs. Wirel. Networks 23(3): 663-679 (2017) - [c118]Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. CCNC 2017: 854-860 - [c117]Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur:
Detecting Inter-App Information Leakage Paths. AsiaCCS 2017: 908-910 - [c116]Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti:
Detection of Information Leaks via Reflection in Android Apps. AsiaCCS 2017: 911-913 - [c115]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Unraveling Reflection Induced Sensitive Leaks in Android Apps. CRiSIS 2017: 49-65 - [c114]Jay Dave, Shweta Saharan, Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur:
Secure Random Encryption for Deduplicated Storage. ICISS 2017: 164-176 - [c113]Ashish Sharma, Yogendra Gupta, Sonal Yadav, Lava Bhargava, Manoj Singh Gaur, Vijay Laxmi:
A Power, Thermal and Reliability-Aware Network-on-Chip. iNIS 2017: 243-245 - [c112]Jay Dave, Parvez Faruki, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
Secure and efficient proof of ownership for deduplicated cloud storage. SIN 2017: 19-26 - [c111]Jimmy Bondu, Anupal Mishra, Vijay Laxmi, Manoj Singh Gaur:
Flooding in secure wireless sensor networks: Student contribution. SIN 2017: 151-156 - [c110]Shweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur:
SneakLeak: Detecting Multipartite Leakage Paths in Android Apps. TrustCom/BigDataSE/ICESS 2017: 285-292 - [c109]Vineeta Jain, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
SniffDroid: Detection of Inter-App Privacy Leaks in Android. TrustCom/BigDataSE/ICESS 2017: 331-338 - [c108]Garima Modi, Vijay Laxmi, Smita Naval, Manoj Singh Gaur:
Improving Leakage Path Coverage in Android Apps. TrustCom/BigDataSE/ICESS 2017: 355-362 - [c107]Anugrah Jain, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Rimpy Bishnoi:
Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip. VDAT 2017: 313-323 - [i3]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, D. Vijay Rao, Riti Kushwaha:
QoS-aware Mesh based Multicast Routing Protocols in Ad-Hoc Networks: Concepts and Challenges. CoRR abs/1708.09573 (2017) - 2016
- [j16]Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
Colluding browser extension attack on user privacy and its implication for web browsers. Comput. Secur. 63: 14-28 (2016) - [j15]Mark Zwolinski, Manoj Singh Gaur, Vijay Laxmi, Usha Sandeep Mehta:
Guest Editorial. IET Comput. Digit. Tech. 10(5): 203-204 (2016) - [j14]Niyati Gupta, Ashish Sharma, Vijay Laxmi, Manoj Singh Gaur, Mark Zwolinski, Rimpy Bishnoi:
σ n LBDR: generic congestion handling routing implementation for two-dimensional mesh network-on-chip. IET Comput. Digit. Tech. 10(5): 226-232 (2016) - [j13]Rimpy Bishnoi, Vijay Laxmi, Manoj Singh Gaur, Mark Zwolinski:
Resilient routing implementation in 2D mesh NoC. Microelectron. Reliab. 56: 189-201 (2016) - [c106]Shweta Bhandari, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur:
Intersection Automata Based Model for Android Application Collusion. AINA 2016: 901-908 - [c105]Lovely Sinha, Shweta Bhandari, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
FlowMine: Android app analysis via data flow. CCNC 2016: 435-441 - [c104]Parvez Faruki, Akka Zemmari, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers. DSN Workshops 2016: 60-65 - [c103]Ankit Gangwal, Megha Gupta, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
ELBA: Efficient Layer Based Routing Algorithm in SDN. ICCCN 2016: 1-7 - [c102]Vineeta Jain, Manoj Singh Gaur, Vijay Laxmi, Mohamed Mosbah:
Detection of SQLite Database Vulnerabilities in Android Apps. ICISS 2016: 521-531 - [c101]Bharat Buddhdev, Parvez Faruki, Manoj Singh Gaur, Vijay Laxmi:
Android component vulnerabities: Proof of concepts and mitigation. ICOIN 2016: 17-22 - [c100]Ashish Sharma, Ruby Ansar, Manoj Singh Gaur, Lava Bhargava, Vijay Laxmi:
Reducing FIFO buffer power using architectural alternatives at RTL. VDAT 2016: 1-2 - [c99]Sonal Yadav, Vijay Laxmi, Manoj Singh Gaur:
A Power Efficient Dual Link Mesh NoC Architecture to Support Nonuniform Traffic Arbitration at Routing Logic. VLSID 2016: 69-74 - [c98]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, Swati Todi, D. Vijay Rao, Akka Zemmari:
MCLSPM: Multi-constraints link stable multicast routing protocol in adhoc networks. Wireless Days 2016: 1-6 - [p4]Parvez Faruki, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti:
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis. Recent Advances in Computational Intelligence in Defense and Security 2016: 519-552 - [i2]Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mauro Conti:
Android App Collusion Threat and Mitigation Techniques. CoRR abs/1611.10076 (2016) - [i1]Parvez Faruki, Hossein Fereidooni, Vijay Laxmi, Mauro Conti, Manoj Singh Gaur:
Android Code Protection via Obfuscation Techniques: Past, Present and Future Directions. CoRR abs/1611.10231 (2016) - 2015
- [j12]Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi:
Multivariate verification for sybil attack detection in VANET. Open Comput. Sci. 5(1) (2015) - [j11]Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
Android Security: A Survey of Issues, Malware Penetration, and Defenses. IEEE Commun. Surv. Tutorials 17(2): 998-1022 (2015) - [j10]Parvez Faruki, Vijay Laxmi, Ammar Bharmal, Manoj Singh Gaur, Vijay Ganmoor:
AndroSimilar: Robust signature for detecting variants of Android malware. J. Inf. Secur. Appl. 22: 66-80 (2015) - [j9]Vijay Laxmi, Chhagan Lal, Manoj Singh Gaur, Deepanshu Mehta:
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. J. Inf. Secur. Appl. 22: 99-112 (2015) - [j8]Rimpy Bishnoi, Vijay Laxmi, Manoj Singh Gaur, José Flich, Francisco Triviño:
A Brief Comment on "A Complete Self-Testing and Self-Configuring NoC Infrastructure for Cost-Effective MPSoCs" [ACM Transactions on Embedded Computing Systems 12 (2013) Article 106]. ACM Trans. Embed. Comput. Syst. 14(1): 2:1-2:9 (2015) - [j7]Smita Naval, Vijay Laxmi, Muttukrishnan Rajarajan, Manoj Singh Gaur, Mauro Conti:
Employing Program Semantics for Malware Detection. IEEE Trans. Inf. Forensics Secur. 10(12): 2591-2604 (2015) - [j6]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur, Seok-Bum Ko:
Bandwidth-aware routing and admission control for efficient video streaming over MANETs. Wirel. Networks 21(1): 95-114 (2015) - [c97]Rimpy Bishnoi, Vijay Laxmi, Manoj Singh Gaur, José Flich:
d2-LBDR: distance-driven routing to handle permanent failures in 2D mesh NOCs. DATE 2015: 800-805 - [c96]Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Priyadarsi Nanda:
sandFOX: secure sandboxed and isolated environment for firefox browser. SIN 2015: 20-27 - [c95]Shweta Bhandari, Rishabh Gupta, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari, Maxim Anikeev:
DRACO: DRoid analyst combo an android malware analysis framework. SIN 2015: 283-289 - [c94]Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti:
A robust dynamic analysis system preventing SandBox detection by Android malware. SIN 2015: 290-295 - [c93]Bharat Buddhdev, Rati Bhan, Manoj Singh Gaur, Vijay Laxmi:
DynaDroid: dynamic binary instrumentation based app behavior monitoring framework. SIN 2015: 322-325 - [c92]Manoj Singh Gaur, Vijay Laxmi, Mark Zwolinski, Manoj Kumar, Niyati Gupta, Ashish Sharma:
Network-on-chip: Current issues and challenges. VDAT 2015: 1-3 - [c91]Niyati Gupta, Manoj Kumar, Vijay Laxmi, Manoj Singh Gaur, Mark Zwolinski:
σLBDR: Congestion-aware logic based distributed routing for 2D NoC. VDAT 2015: 1-6 - [c90]Ashish Sharma, Prachi Upadhyay, Ruby Ansar, Vijay Laxmi, Lava Bhargava, Manoj Singh Gaur, Mark Zwolinski:
A framework for thermal aware reliability estimation in 2D NoC. VDAT 2015: 1-6 - [c89]Sonal Yadav, Vijay Laxmi, Manoj Singh Gaur, Megha Bhargava:
C2-DLM: Cache coherence aware dual link mesh for on-chip interconnect. VDAT 2015: 1-2 - [c88]Rimpy Bishnoi, Vijay Laxmi, Manoj Singh Gaur, Radi Husin Bin Ramlee, Mark Zwolinski:
CERI: Cost-Effective Routing Implementation Technique for Network-on-Chip. VLSID 2015: 59-64 - [e2]Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md. Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk:
Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015. ACM 2015, ISBN 978-1-4503-3453-2 [contents] - 2014
- [j5]P. Vinod, Vijay Laxmi, Manoj Singh Gaur, Grijesh Chauhan:
Detecting malicious files using non-signature-based methods. Int. J. Inf. Comput. Secur. 6(3): 199-240 (2014) - [j4]Jyoti Grover, Vijay Laxmi, Manoj Singh Gaur:
Sybil attack detection in VANET using neighbouring vehicles. Int. J. Secur. Networks 9(4): 222-233 (2014) - [j3]Manoj Singh Gaur, Rajbir Kaur, P. Lalith Suresh, Vijay Laxmi:
Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks. Secur. Commun. Networks 7(1): 108-122 (2014) - [c87]Sonal Yadav, Manoj Singh Gaur, Vijay Laxmi, Megha Bhargava:
Dynamic fault injection model for on-chip 2D mesh network. COMPUTE 2014: 18:1-18:6 - [c86]Manoj Kumar, Vijay Laxmi, Manoj Singh Gaur, Masoud Daneshtalab, Masoumeh Ebrahimi, Mark Zwolinski:
Fault tolerant and highly adaptive routing for 2D NoCs. DFT 2014: 104-109 - [c85]Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Sachin Raja, Muttukrishnan Rajarajan, Mauro Conti:
Environment-Reactive Malware Behavior: Detection and Categorization. DPM/SETOP/QASA 2014: 167-182 - [c84]Manoj Kumar, Vijay Laxmi, Manoj Singh Gaur, Masoud Daneshtalab, Seok-Bum Ko, Mark Zwolinski:
Highly adaptive and congestion-aware routing for 3D NoCs. ACM Great Lakes Symposium on VLSI 2014: 97-98 - [c83]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, Chhagan Lal:
LSMRP: Link stability based multicast routing protocol in MANETs. IC3 2014: 254-259 - [c82]Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti:
Privacy Leakage Attacks in Browsers by Colluding Extensions. ICISS 2014: 257-276 - [c81]Niyati Gupta, Manoj Kumar, Ashish Sharma, Manoj Singh Gaur, Vijay Laxmi, Masoud Daneshtalab, Masoumeh Ebrahimi:
Improved Route Selection Approaches using Q-learning framework for 2D NoCs. MES@ISCA 2014: 33-40 - [c80]Manoj Kumar, Vijay Laxmi, Manoj Singh Gaur, Masoud Daneshtalab, Pankaj Kumar Srivastava, Seok-Bum Ko, Mark Zwolinski:
A novel non-minimal/minimal turn model for highly adaptive routing in 2D NoCs. NOCS 2014: 184-185 - [c79]Rimpy Bishnoi, Vijay Laxmi, Manoj Singh Gaur, Radi Husin Bin Ramlee, Mark Zwolinski:
Fault tolerant routing implementation mechanism for irregular 2D mesh NoCs. NORCHIP 2014: 1-4 - [c78]Neha Gupta, Smita Naval, Vijay Laxmi, Manoj Singh Gaur, Muttukrishnan Rajarajan:
P-SPADE: GPU accelerated malware packer detection. PST 2014: 257-263 - [c77]Parvez Faruki, Vijay Kumar, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti:
Platform Neutral Sandbox for Analyzing Malware and Resource Hogger Apps. SecureComm (1) 2014: 556-560 - [c76]Smita Naval, Vijay Laxmi, Neha Gupta, Manoj Singh Gaur, Muttukrishnan Rajarajan:
Exploring Worm Behaviors using DTW. SIN 2014: 379 - [c75]Nishant Garg, Kuldeep Pareek, Manoj Singh Gaur, Vijay Laxmi, Chhagan Lal:
Analysis of Identity Forging Attack in MANETs. SIN 2014: 441 - [c74]Parvez Faruki, Ammar Bharmal, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation. TrustCom 2014: 414-421 - [c73]Rimpy Bishnoi, Pankaj Kumar Srivastava, Vijay Laxmi, Manoj Singh Gaur, Apoorva Sikka:
Distributed adaptive routing for spidergon NoC. VDAT 2014: 1-6 - [c72]Manoj Kumar, Vijay Laxmi, Manoj Singh Gaur, Masoud Daneshtalab, Mark Zwolinski:
A novel non-minimal turn model for highly adaptive routing in 2D NoCs. VLSI-SoC 2014: 1-6 - [c71]Manoj Kumar, Vijay Laxmi, Manoj Singh Gaur, Seok-Bum Ko, Mark Zwolinski:
CARM: Congestion Adaptive Routing Method for On Chip Networks. VLSID 2014: 240-245 - 2013
- [j2]Preety Singh, Vijay Laxmi, Manoj Singh Gaur:
Near-Optimal Geometric Feature Selection for Visual speech Recognition. Int. J. Pattern Recognit. Artif. Intell. 27(8) (2013) - [c70]Parvez Faruki, Vijay Laxmi, Vijay Ganmoor, Manoj Singh Gaur, Ammar Bharmal:
DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets. ADCONS 2013: 247-252 - [c69]P. Vinod, Vijay Laxmi, Manoj Singh Gaur, Smita Naval, Parvez Faruki:
MCF: MultiComponent Features for Malware Analysis. AINA Workshops 2013: 1076-1081 - [c68]Meenakshi Tripathi, Manoj Singh Gaur, Vijay Laxmi:
Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN. ANT/SEIT 2013: 1101-1107 - [c67]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
QoS-aware routing for transmission of H.264/SVC encoded video traffic over MANETs. APCC 2013: 104-109 - [c66]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
Video streaming over MANETs: Testing and analysis using real-time emulation. APCC 2013: 190-195 - [c65]Manoj Kumar, Pankaj Kumar Srivastava, Vijay Laxmi, Manoj Singh Gaur, Seok-Bum Ko:
Reconfigurable distributed fault tolerant routing algorithm for on-chip networks. DFTS 2013: 290-295 - [c64]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
An adaptive cross-layer routing protocol for delay-sensitive applications over MANETs. ICACCI 2013: 610-615 - [c63]Sonal Yadav, Manoj Singh Gaur, Vijay Laxmi:
Ns-3 emulation on ORBIT testbed. ICACCI 2013: 616-619 - [c62]Sonal Yadav, Manoj Singh Gaur, Vijay Laxmi:
Energy Scavenging Based HybridGSM Model for Mobile Towers. ISI 2013: 343-349 - [c61]Meenakshi Tripathi, Ramesh Babu Battula, Manoj Singh Gaur, Vijay Laxmi:
Energy Efficient Clustered Routing for Wireless Sensor Network. MSN 2013: 330-335 - [c60]Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, Manoj Singh Gaur, Ammar Bharmal:
AndroSimilar: robust statistical feature signature for Android malware detection. SIN 2013: 152-159 - [c59]Vijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal:
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks. SIN 2013: 189-195 - [c58]Anil Saini, Manoj Singh Gaur, Vijay Laxmi:
The darker side of Firefox extension. SIN 2013: 316-320 - [c57]Rimpy Bishnoi, Vijay Laxmi, Manoj Singh Gaur, Mohit Baskota:
Fault Aware Dynamic Adaptive Routing Using LBDR. VDAT 2013: 304-311 - [p3]Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi:
Trust Establishment Techniques in VANET. Wireless Networks and Security 2013: 273-301 - [e1]Manoj Singh Gaur, Mark Zwolinski, Vijay Laxmi, Dharmendar Boolchandani, Virendra Singh, Adit D. Singh:
VLSI Design and Test, 17th International Symposium, VDAT 2013, Jaipur, India, July 27-30, 2013, Revised Selected Papers. Communications in Computer and Information Science 382, Springer 2013, ISBN 978-3-642-42023-8 [contents] - 2012
- [c56]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
A Node-Disjoint Multipath Routing Method Based on AODV Protocol for MANETs. AINA 2012: 399-405 - [c55]Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur:
REFORM: Relevant Features for Malware Analysis. AINA Workshops 2012: 738-744 - [c54]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
A rate adaptive and multipath routing protocol to support video streaming in MANETs. ICACCI 2012: 262-268 - [c53]Preety Singh, Vijay Laxmi, Manoj Singh Gaur:
n-Gram modeling of relevant features for lip-reading. ICACCI 2012: 1199-1204 - [c52]Preety Singh, Vijay Laxmi, Manoj Singh Gaur:
Speaker identification using optimal lip biometrics. ICB 2012: 472-477 - [c51]Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
Behavioural detection with API call-grams to identify malicious PE files. SECURIT 2012: 85-91 - [c50]Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
SPADE: Signature based PAcker DEtection. SECURIT 2012: 96-101 - [c49]Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Rakesh Kumar Tiwari:
Detection of incorrect position information using speed and time span verification in VANET. SIN 2012: 53-59 - [c48]Parvez Faruki, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
Mining control flow graph as API call-grams to detect portable executable malware. SIN 2012: 130-137 - [c47]Preety Singh, Vijay Laxmi, Manoj Singh Gaur:
Lip peripheral motion for visual surveillance. SIN 2012: 173-177 - [c46]Reena Gunjan, Vijay Laxmi, Manoj Singh Gaur:
Detection attack analysis using partial watermark in DCT domain. SIN 2012: 188-192 - [c45]Smita Naval, Vijay Laxmi, Manoj Singh Gaur, P. Vinod:
ESCAPE: entropy score analysis of packed executable. SIN 2012: 197-200 - 2011
- [c44]Manish Kumar, Rajbir Kaur, Vijay Laxmi, Manoj Singh Gaur:
A Novel Attack Model Simulation in OLSR. ACC (1) 2011: 44-53 - [c43]H. Meena Sharma, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi:
Broken Link Fraud in DSDV Routing - Detection and Countermeasure. ACC (1) 2011: 162-171 - [c42]Preety Singh, Deepika Gupta, Vijay Laxmi, Manoj Singh Gaur:
Contribution of Oral Periphery on Visual Speech Intelligibility. ACC (2) 2011: 183-190 - [c41]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
Analysis of a Traffic Classification Scheme for QoS Provisioning over MANETs. ACC (2) 2011: 452-459 - [c40]Reena Gunjan, Saurabh Maheshwari, Vijay Laxmi, Manoj Singh Gaur:
Robust Watermarking through Spatially Disjoint Transformations. ACC (3) 2011: 478-487 - [c39]P. Vinod, Vijay Laxmi, Manoj Singh Gaur:
Scattered Feature Space for Malware Analysis. ACC (1) 2011: 562-571 - [c38]Jyoti Grover, Nitesh Kumar Prajapati, Vijay Laxmi, Manoj Singh Gaur:
Machine Learning Approach for Multiple Misbehavior Detection in VANET. ACC (3) 2011: 644-653 - [c37]Chhagan Lal, Vijay Laxmi, Manoj Singh Gaur:
A Rate Adaptation Scheme to Support QoS for H.264/SVC Encoded Video Streams over MANETs. ACN 2011: 86-95 - [c36]Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki, Smita Naval:
PEAL - Packed Executable AnaLysis. ADCONS 2011: 237-243 - [c35]Jyoti Grover, Vijay Laxmi, Manoj Singh Gaur:
Misbehavior Detection Based on Ensemble Learning in VANET. ADCONS 2011: 602-611 - [c34]Naveen Choudhary, Manoj Singh Gaur, Vijay Laxmi, Virendra Singh:
GA Based Congestion Aware Topology Generation for Application Specific NoC. DELTA 2011: 93-98 - [c33]Roopesh Chuggani, Vijay Laxmi, Manoj Singh Gaur, Pankaj Khandelwal, Prateek Bansal:
A Traffic Model for Concurrent Core Tasks in Networks-on-Chip. DELTA 2011: 205-210 - [c32]P. Lalith Suresh, Navaneeth Rameshan, Manoj Singh Gaur, Mark Zwolinski, Vijay Laxmi:
Acceleration of Functional Validation Using GPGPU. DELTA 2011: 211-216 - [c31]Harsh Gidra, Israrul Haque, Nitin P. Kumar, M. Sargurunathan, Manoj Singh Gaur, Vijay Laxmi, Mark Zwolinski, Virendra Singh:
Parallelizing TUNAMI-N1 Using GPGPU. HPCC 2011: 845-850 - [c30]Deepika Gupta, Preety Singh, Vijay Laxmi, Manoj Singh Gaur:
Boundary Descriptors for Visual Speech Recognition. ISCIS 2011: 307-313 - [c29]Rajbir Kaur, Vijay Laxmi, Manoj Singh Gaur:
Detection of Broken Link Fraud in DSDV Routing. ISCIS 2011: 419-424 - [c28]Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi:
Position forging attacks in Vehicular Ad Hoc Networks: Implementation, impact and detection. IWCMC 2011: 701-706 - [c27]Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi:
A Novel Attack Model Simulation in DSDV Routing. NTMS 2011: 1-5 - [c26]Manoj Singh Gaur, Vijay Laxmi, Manish Kumar, Rajbir Kaur:
Detour attack in OLSR. SIN 2011: 137-142 - [c25]Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Nitesh Kumar Prajapati:
A sybil attack detection approach using neighboring vehicles in VANET. SIN 2011: 151-158 - [c24]Manoj Singh Gaur, Vijay Laxmi, Lakshminarayanan V., Kamal Cahndra, Mark Zwolinski:
Acceleration of packet filtering using gpgpu. SIN 2011: 227-230 - [c23]Manas Kumar Puthal, Virendra Singh, Manoj Singh Gaur, Vijay Laxmi:
C-Routing: An adaptive hierarchical NoC routing methodology. VLSI-SoC 2011: 392-397 - [p2]Rajbir Kaur, Manoj Singh Gaur, P. Lalith Suresh, Vijay Laxmi:
DoS Attacks in MANETs: Detection and Countermeasures. Cyber Security, Cyber Crime and Cyber Forensics 2011: 124-145 - [p1]P. Vinod, Vijay Laxmi, Manoj Singh Gaur:
Metamorphic Malware Analysis and Detection Methods. Cyber Security, Cyber Crime and Cyber Forensics 2011: 178-202 - 2010
- [c22]Preety Singh, Vijay Laxmi, Deepika Gupta, Manoj Singh Gaur:
Lipreading Using n-Gram Feature Vector. CISIS 2010: 81-88 - [c21]Reena Gunjan, Saurabh Maheshwari, Manoj Singh Gaur, Vijay Laxmi:
Permuted Image DCT Watermarking. CISIS 2010: 163-171 - [c20]Jyoti Grover, Deepak Kumar, M. Sargurunathan, Manoj Singh Gaur, Vijay Laxmi:
Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks. CNSA 2010: 473-482 - [c19]Navaneeth Rameshan, Vijay Laxmi, Manoj Singh Gaur, Mushtaq Ahmed, Krishan Kumar Paliwal:
Minimal Path, Fault Tolerant, QoS Aware Routing with Node and Link Failure in 2-D Mesh NoC. DFT 2010: 60-66 - [c18]Naveen Choudhary, Manoj Singh Gaur, Vijay Laxmi, Virendra Singh:
Genetic algorithm based topology generation for application specific Network-on-Chip. ISCAS 2010: 3156-3159 - [c17]Varsha Sharma, Rekha Agarwal, Manoj Singh Gaur, Vijay Laxmi, Vineetha V.:
ERA: An Efficient Routing Algorithm for Power, Throughput and Latency in Network-on-Chips. NPC 2010: 481-490 - [c16]Jyoti Grover, Manoj Singh Gaur, Vijay Laxmi:
A novel defense mechanism against sybil attacks in VANET. SIN 2010: 249-255 - [c15]P. Lalith Suresh, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi:
A collusion attack detection method for OLSR-based MANETS employing scruple packets. SIN 2010: 256-262 - [c14]Vinod P. Nair, Harshit Jain, Yashwant K. Golecha, Manoj Singh Gaur, Vijay Laxmi:
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API. SIN 2010: 263-269 - [c13]P. Lalith Suresh, Rajbir Kaur, Manoj Singh Gaur, Vijay Laxmi:
Collusion attack resistance through forced MPR switching in OLSR. Wireless Days 2010: 1-5
2000 – 2009
- 2009
- [c12]Krishan Kumar Paliwal, Jinesh Shaji George, Navaneeth Rameshan, Vijay Laxmi, Manoj Singh Gaur, Vijay Janyani, Raghavendra Narasimhan:
Implementation of QoS Aware Q-Routing Algorithm for Network-on-Chip. IC3 2009: 370-380 - [c11]Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat:
Static CFG analyzer for metamorphic Malware code. SIN 2009: 225-228 - [c10]Vijay Laxmi, Mudassar N. Khan, Sarath S. Kumar, Manoj Singh Gaur:
Buyer seller watermarking protocol for digital rights management. SIN 2009: 298-301 - 2008
- [c9]Neeta Nain, Vijay Laxmi, Bhavitavya Bhadviya:
Corner Detection on Curves. GRAPP 2008: 127-133 - [c8]Neeta Nain, Vijay Laxmi, Bhavitavya Bhadviya, Ameya Pandit, Chetna Goyal:
Feature Point Detection for Real Time Applications. IPCV 2008: 297-303 - [c7]Manoj Singh Gaur, Raghavendra Narasimhan, Vijay Laxmi, Ujjwal Kumar:
Structural Fault Modelling in Nano Devices. NanoNet 2008: 6-10 - [c6]Neeta Nain, Vijay Laxmi, Bhavitavya Bhadviya, B. M. Deepak, Mushtaq Ahmed:
Fast Feature Point Detector. SITIS 2008: 301-306 - 2007
- [c5]Neeta Nain, Vijay Laxmi, Manish Khandelwal, Deepak Agarwal, Dushyant Singh Rao, Pawan Kumar Verma:
Transformation Invariant Robust Shape Analysis. IPCV 2007: 275-281 - [c4]Neeta Nain, Vijay Laxmi, Bhavitavya Bhadviya, Nemi Chand Singh:
Optimizing Task Distribution for Heterogeneous Desktop Clusters. PDPTA 2007: 535-542 - [c3]Neeta Nain, Vijay Laxmi, Bhavitavya Bhadviya, Arpita Gopal:
Corner Detection Using Difference Chain Code as Curvature. SITIS 2007: 821-825 - 2006
- [j1]Vijay Laxmi, Robert I. Damper, John N. Carter:
Human and machine perception of biological motion. Cogn. Syst. Res. 7(4): 339-356 (2006) - [c2]Neeta Nain, Vijay Laxmi, Ankur Kumar Jain, Rakesh Agarwal:
Morphological Edge Detection and Corner Detection Algorithm Using Chain Encoding. IPCV 2006: 520-525 - 2003
- [b1]Vijay Laxmi:
Biologically-inspired motion detection and classification : human and machine perception. University of Southampton, UK, 2003 - 2002
- [c1]Vijay Laxmi, John N. Carter, Robert I. Damper:
Biologically-inspired human motion detection. ESANN 2002: 95-100
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint