Sachin Shetty
Cited by
Cited by
Provchain: A blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability
X Liang, S Shetty, D Tosh, C Kamhoua, K Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
Integrating blockchain for data sharing and collaboration in mobile healthcare applications
X Liang, J Zhao, S Shetty, J Liu, D Li
2017 IEEE 28th annual international symposium on personal, indoor, and …, 2017
System and method of implementing an object storage infrastructure for cloud-based services
S Shetty, K Sankar, A Jassal, K Patel, S Sharma
US Patent 9,135,269, 2015
Physical layer security in wireless cooperative relay networks: State of the art and beyond
LJ Rodriguez, NH Tran, TQ Duong, T Le-Ngoc, M Elkashlan, S Shetty
IEEE Communications Magazine 53 (12), 32-39, 2015
Security implications of blockchain cloud with analysis of block withholding attack
DK Tosh, S Shetty, X Liang, CA Kamhoua, KA Kwiat, L Njilla
2017 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2017
Towards data assurance and resilience in IoT using blockchain
X Liang, J Zhao, S Shetty, D Li
MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM), 261-266, 2017
Rogue access point detection by analyzing network traffic characteristics
S Shetty, M Song, L Ma
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
Dynamic spectrum access for wireless networks
DB Rawat, M Song, S Shetty
Springer International Publishing, 2015
Exploring the attack surface of blockchain: A systematic overview
M Saad, J Spaulding, L Njilla, C Kamhoua, S Shetty, DH Nyang, ...
arXiv preprint arXiv:1904.03487, 2019
Consensus protocols for blockchain-based data provenance: Challenges and opportunities
DK Tosh, S Shetty, X Liang, C Kamhoua, L Njilla
2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile …, 2017
Survey toward a smart campus using the internet of things
A Alghamdi, S Shetty
2016 IEEE 4th international conference on future internet of things and …, 2016
AKM-IoV: Authenticated key management protocol in fog computing-based Internet of vehicles deployment
M Wazid, P Bagga, AK Das, S Shetty, JJPC Rodrigues, Y Park
IEEE Internet of Things Journal 6 (5), 8804-8817, 2019
Stackelberg-game-based dynamic spectrum access in heterogeneous wireless systems
DB Rawat, S Shetty, C Xin
IEEE Systems Journal 10 (4), 1494-1504, 2014
Control-free dynamic spectrum access for cognitive radio networks
C Xin, M Song, L Ma, S Shetty, CC Shen
2010 IEEE International Conference on Communications, 1-5, 2010
The impact of antenna orientation on wireless sensor network performance
M Wadhwa, M Song, V Rali, S Shetty
2009 2nd IEEE International Conference on Computer Science and Information …, 2009
Cloud-assisted GPS-driven dynamic spectrum access in cognitive radio vehicular networks for transportation cyber physical systems
DB Rawat, S Reddy, N Sharma, BB Bista, S Shetty
2015 IEEE Wireless Communications and Networking Conference (WCNC), 1942-1947, 2015
Detecting compromised nodes in wireless sensor networks
M Mathews, M Song, S Shetty, R McKenzie
Eighth ACIS International Conference on Software Engineering, Artificial …, 2007
A learning-based multiuser opportunistic spectrum access approach in unslotted primary networks
S Shetty, M Song, C Xin, EK Park
IEEE INFOCOM 2009, 2966-2970, 2009
Secure radio resource management in cloud computing based cognitive radio networks
DB Rawat, S Shetty, K Raza
2012 41st International Conference on Parallel Processing Workshops, 288-295, 2012
A hidden Markov model based approach to detect rogue access points
G Shivaraj, M Song, S Shetty
MILCOM 2008-2008 IEEE Military Communications Conference, 1-7, 2008
The system can't perform the operation now. Try again later.
Articles 1–20