What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Radha Poovendran
Google Scholar
ORCID:
0000-0003-0269-8097
29
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acns
CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations.
Denis Donadel
Kavya Balasubramanian
Alessandro Brighente
Bhaskar Ramasubramanian
Mauro Conti
Radha Poovendran
2024
conf/uss
ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning.
Zhangchen Xu
Fengqing Jiang
Luyao Niu
Jinyuan Jia
Bo Li
Radha Poovendran
2024
conf/asiaccs
POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors.
Dinuka Sahabandu
Xiaojun Xu
Arezoo Rajabi
Luyao Niu
Bhaskar Ramasubramanian
Bo Li
Radha Poovendran
2024
conf/asiaccs
Poster: Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning.
Zhangchen Xu
Fengqing Jiang
Luyao Niu
Jinyuan Jia
Radha Poovendran
2024
conf/asiaccs
POSTER: Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications.
Fengqing Jiang
Zhangchen Xu
Luyao Niu
Boxin Wang
Jinyuan Jia
Bo Li
Radha Poovendran
2024
conf/asiaccs
POSTER: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization.
Arezoo Rajabi
Reeya Pimple
Aiswarya Janardhanan
Surudhi Asokraj
Bhaskar Ramasubramanian
Radha Poovendran
2023
journals/tifs
A Natural Language Processing Approach for Instruction Set Architecture Identification.
Dinuka Sahabandu
J. Sukarno Mertoguno
Radha Poovendran
2023
conf/ccs
MDTD: A Multi-Domain Trojan Detector for Deep Neural Networks.
Arezoo Rajabi
Surudhi Asokraj
Fengqing Jiang
Luyao Niu
Bhaskar Ramasubramanian
James A. Ritcey
Radha Poovendran
2023
conf/asiaccs
LDL: A Defense for Label-Based Membership Inference Attacks.
Arezoo Rajabi
Dinuka Sahabandu
Luyao Niu
Bhaskar Ramasubramanian
Radha Poovendran
2023
conf/asiaccs
POSTER: A Common Framework for Resilient and Safe Cyber-Physical System Design.
Luyao Niu
Abdullah Al Maruf
Andrew Clark
J. Sukarno Mertoguno
Radha Poovendran
2023
conf/wisec
BARON: Base-Station Authentication Through Core Network for Mobility Management in 5G Networks.
Alessandro Lotto
Vaibhav Singh
Bhaskar Ramasubramanian
Alessandro Brighente
Mauro Conti
Radha Poovendran
2022
conf/esorics
EVExchange: A Relay Attack on Electric Vehicle Charging System.
Mauro Conti
Denis Donadel
Radha Poovendran
Federico Turrin
2019
journals/tifs
Shape of the Cloak: Formal Analysis of Clock Skew-Based Intrusion Detection System in Controller Area Networks.
Xuhang Ying
Sang Uk Sagong
Andrew Clark
Linda Bushnell
Radha Poovendran
2019
conf/cns
Detecting ADS-B Spoofing Attacks Using Deep Neural Networks.
Xuhang Ying
Joanna Mazer
Giuseppe Bernieri
Mauro Conti
Linda Bushnell
Radha Poovendran
2018
conf/ccs
Dynamic Defense against Adaptive and Persistent Adversaries.
Radha Poovendran
2017
conf/ccs
Attacking Automatic Video Analysis Algorithms: A Case Study of Google Cloud Video Intelligence API.
Hossein Hosseini
Baicen Xiao
Andrew Clark
Radha Poovendran
2017
conf/acns
No Free Charge Theorem: A Covert Channel via USB Charging Cable on Mobile Devices.
Riccardo Spolaor
Laila Abudahi
Veelasha Moonsamy
Mauro Conti
Radha Poovendran
2016
conf/cns
Despicable me(ter): Anonymous and fine-grained metering data reporting with dishonest meters.
Moreno Ambrosin
Hossein Hosseini
Kalikinkar Mandal
Mauro Conti
Radha Poovendran
2016
conf/cans
Secure Error-Tolerant Graph Matching Protocols.
Kalikinkar Mandal
Basel Alomair
Radha Poovendran
2015
conf/ccs
LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks.
Moreno Ambrosin
Mauro Conti
Fabio De Gaspari
Radha Poovendran
2015
conf/cns
Verifiable and privacy-preserving fine-grained data-collection for smart metering.
Moreno Ambrosin
Hossein Hosseini
Kalikinkar Mandal
Mauro Conti
Radha Poovendran
2010
conf/icisc
$\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels.
Basel Alomair
Radha Poovendran
2010
conf/icics
Efficient Authentication for Mobile and Pervasive Computing.
Basel Alomair
Radha Poovendran
2010
conf/dsn
Scalable RFID systems: a privacy-preserving protocol with constant-time identification.
Basel Alomair
Andrew Clark
Jorge Cuéllar
Radha Poovendran
2009
conf/wisec
A coding-theoretic approach for efficient message verification over insecure channels.
David Slater
Patrick Tague
Radha Poovendran
Brian J. Matt
2007
conf/icisc
Passive Attacks on a Class of Authentication Protocols for RFID.
Basel Alomair
Loukas Lazos
Radha Poovendran
2006
journals/compsec
A framework and taxonomy for comparison of electronic voting schemes.
Krishna Sampigethaya
Radha Poovendran
2003
conf/sacrypt
Broadcast Enforced Threshold Schemes with Disenrollment.
Mingyan Li
Radha Poovendran
1999
conf/crypto
An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.
Radha Poovendran
John S. Baras
Coauthors
Abdullah Al Maruf
(1)
Aiswarya Janardhanan
(1)
Alessandro Brighente
(2)
Alessandro Lotto
(1)
Andrew Clark
(4)
Arezoo Rajabi
(4)
Baicen Xiao
(1)
Basel Alomair
(5)
Bhaskar Ramasubramanian
(6)
Bo Li
(3)
Boxin Wang
(1)
Brian J. Matt
(1)
David Slater
(1)
Denis Donadel
(2)
Dinuka Sahabandu
(3)
Fabio De Gaspari
(1)
Federico Turrin
(1)
Fengqing Jiang
(4)
Giuseppe Bernieri
(1)
Hossein Hosseini
(3)
J. Sukarno Mertoguno
(2)
James A. Ritcey
(1)
Jinyuan Jia
(3)
Joanna Mazer
(1)
John S. Baras
(1)
Jorge Cuéllar
(1)
Kalikinkar Mandal
(3)
Kavya Balasubramanian
(1)
Krishna Sampigethaya
(1)
Laila Abudahi
(1)
Linda Bushnell
(2)
Loukas Lazos
(1)
Luyao Niu
(7)
Mauro Conti
(8)
Mingyan Li
(1)
Moreno Ambrosin
(3)
Patrick Tague
(1)
Radha Poovendran
(29)
Reeya Pimple
(1)
Riccardo Spolaor
(1)
Sang Uk Sagong
(1)
Surudhi Asokraj
(2)
Vaibhav Singh
(1)
Veelasha Moonsamy
(1)
Xiaojun Xu
(1)
Xuhang Ying
(2)
Zhangchen Xu
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to