JavaScript Menu Courtesy of Milonic.com
Stevens Lab
        
back
Professor K. P. (Suba) Subbalakshmi

Personal Webpage
Professor K. P. (Suba) Subbalakshmi

Associate Professor (RESEARCH INTERESTS: Cognitive radio network security, wireless security, steganography, steganalysis, media forensics)

School:

  

Schaefer School of Engineering & Science

Department:

  

Electrical and Computer Engineering

Program:

 

Electrical Engineering


Research Center:

  

Center for Intelligent Networked Systems / Center for the Advancement of Secure Systems and Information Assurance


Location:

208 Burchard

Phone:

201.216.8641

Fax:

201.216.8246

Email:

ksubbala@stevens.edu

The Innovation University TM
Courses:
EE 612
EE 610
EE 670
CPE 591
CPE 612
CPE 602
Research & Education
Research

Cognitive radio networks: security and design; Social Media Analytics; Deception detection on the Internet and Steganography, steganalysis and media forensics and Wireless security

Experience & Service
General Information

Dr. Subbalakshmi (Suba) is a Professor at the Electrical and Computer Engineering, Stevens Institute of Technology, where she co-founded and co-directs the  Infinity (Information Networks and Security) Laboratory. Her research interests lie in Cognitive Radio Networks -- design and security, Internet Media Analytics and Wireless Security.

Prof. Subbalakshmi is a Co-Founder and Chief Scientist of Dynamic Spectrum LLC (that commercializes Cognitive Radio Technology)

and

a Co-Founder of Jaasuz (a company specializing in text content security) 

 

Institutional Service

Stevens Senate, Fall 2012 -- 2014

Stevens Patent Committee Member

Stevens R&E Day Committee Member

   
Experience

Associate Professor, Dept of E.C.E, Stevens Institue of Technology, (September, 2007 -- August 31, 2014)

Co-Founder and Cheif Scientist, Dynamic Spectrum LLC, June 2012 

Co-Founder, Jaasuz, 2012 

Visting Researcher, IRISA, INRIA, Rennes, France, October 2007.

Assistant Professor, Dept of E.C.E, Stevens Institue of Technology, (Fall 2000 - August 31 2007)

Professional Service
  • Founding Chair, Special Interest Group on Security, IEEE COMSOC, Technical Committee on Cognitive Networks, (June 2013 --)
  • Vice-Chair, North America, IEEE COMSOC Technical Committee on Cognitive Networks, (January 2011 -- January 2013)
  • Secretary,IEEE COMSOC Technical Committee on Multimedia Communications, (June 2006 -June 2008)
  • Chair Special Interest Group on Security, IEEE Technical Committee on Multimedia Communications, (2005 -2010)
  • Member, IEEE Technical Committee on Cognitive Networks, (2007, --)
  • Member, IEEE Technical Committee on Communications Security, (2005 -)
  • Member, Best Paper Awards Selection Committee, IEEE MMC (2004 -).

Speaking Engagements

  • Mini-Course, Dynamic Spectrum Access Wireless Networking: Security, Systems and Standards, WiFiUS Summer School,Rensselaer Polytechnic Institute, August 14--16, 2013. 
  • Invited Talk, Impact of Attacks on Dynamic Spectrum Access Networks, Virginia Tech, April 2013.
  • Invited Talk, Internet Lurkers: Large Scale Measurements and Modeling, University of California Los Angeles, December 4, 2012. 
  • Invited Panelist, "Dynamic Spectrum Access: Research Challenges", IEEE Workshop on Dynamic Spectrum Access: Collaboration Between the Technical, Regulatory and Business Communities, Washington DC, September 2011.
  • Invited Tutorial, "Cognitive Radio Networks: Systems and Security",  at IEEE Wingcom, 2011, Dec 9, 2011, India.
  • Invited Tutorial, Cognitive Radio Networks and Security", at IEEE IMSAA 2011, Dec. 11, 2011, India.
  • Keynote Address, SMi Conference on Software Defined Radio, June 2011, London, UK.
  • Tutorial on Security Issues in Dynamic Spectrum Access Networks, IEEE International Conference on Commmunications, May 27, 201, Cape Town, Africa.
  • Tutorial on Cognitive Radio Network Security, IEEE Sarnoff Symposium, March 30, 2009.

Editor

  • Associate Editor, IEEE Transactions on Vehicular Technology, (August 2013 --)
  • Guest Editor, EURASIP Journal on Advances in Signal Processing, Special Issue on Dyanmic Spectrum Access for Wireless Networks, 2009.
  • Associate Editor, IS&T/SPIE Journal of Electronic Imaging, (May 2007 --)
  • Associate Editor, Hindawi Journal on Advances in Multimedia
  • Guest Editor, IEEE Journal on Selected Areas of Communications, Special Issue on Cross-Layer Optimized Wireless Multimedia Communications.
Innovation and Entrepreneurship

Member, Stevens Patent Commitee, August 2007 --

 

Achievements & Professional Societies
   
Grants, Contracts & Funds
RECENT GRANTS
  • Renewal: CyberCorps: Scholarship for Service Program at Stevens, National Science Foundation
  • STTR Phase II:SpiderRadio: Enabling Cognitive Dynamic Spectrum Access Wireless Communications, National Science Foundation
  • STTR Phase I:SpiderRadio: Enabling Cognitive Dynamic Spectrum Access Wireless Communications, National Science Foundation
  • Denial-of-Service Attacks and Counter Measures in Dynamic Sepctrum Access Networks, National Science Foundation
  • Human Behavior Inspired Cognitive Radio Network Design, National Science Foundation
  • Cognitive Radios for First Responder Networks in Public Safety Bands, National Institute of Justice
  • Security-Resource Trade-Offs in Wireless Networks, National Science Foundation, Cyber-Trust Program.
  • Watermarking and Internet Forensics, with R. Chandramouli
  • Compression Driven Routing, US Army Picatinny Arsenal, Acoustic and Network Sensors Program.
  • Energy Efficient, Error Resilient Encryption for Wireless Security, US Army Picatinny Arsenal, iNETS, with R. Chandramouli.
  • Sensor Data Correlation Modelling and Compression for Ocean Sensor Networks, ONR/Maritime Security Laboratory
  • Security in the Distributed Environment, US Army Picatinny Arsenal/ WiNSec
  • Perspectives on Information Hiding for Multimedia Security, National Science Foundation, with R. Chandramouli
  • Improving Steganographic Capacity in the Presence of Attacks via Multiple Description and Joint Source-Channel Coding, Airforce Research Laboratory, Rome NY.
  • Lightweight Error Resilient Cryptographic Systems for Wireless Network Security, US Army Picattiny Arsenal/WiNSec
Patents & Inventions
Palak Amin and K.P. Subbalakshmi,  "A Robust Image Watermark Extraction Algorithm for Scaling Attacks", U.S Patent.
Honors & Awards
  • Innovator Award, New Jersey Inventors Hall of Fame,  October 2012
  • Stevens Technogenesis Award for Research and Technology Contributions, 2007.
  • IEEE Best Student Paper Award, for the paper, “Real-Time Secondary Spectrum Sharing with QoS Provisioning”, Yiping Xing, Chetan Nanjunda Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi, IEEE Consumer Communications and Networking Conference 2005, Special Session on Agile Radios and Cooperative Networking for Next Generation Wireless Networks.
  • Stevens President’s Research Recognition Award, 2003.
Professional Societies

Senior Member IEEE,

 

Selected Publications
Journals

  • Syed Eman Mahmoodi, K.P. Subbalakshmi, R. Chandramouli and Bahman Abolhassani. (Apr 2014). "Joint Spectrum Sensing and Resource Allocation for OFDM-based Transmission with a Cognitive Relay", ICST Transactions on Wireless Spectrum, 1 (1), 13.


  • S. Anand, Shamik Sengupta, Hong Kai, K.P. Subbalakshmi, R. Chandramouli and Hassan Cam. "Exploiting Channel Fragmentation and Aggregation/ Bonding to Create Security Vulnerabilities", Transactions on Vehicular Technology, IEEE. Accepted for Publication.


  • S. Anand, K.P. Subbalakshmi and R. Chandramouli. (Jan 2013). "A Quantitative Model and Analysis of Information Confusion in Social Networks", Transactions on Multimedia, IEEE. 15 (1), 207 - 223.


  • Zituo Jin, S. Anand and K.P. Subbalakshmi. (2012). "Impact of Primary User Emulation Attacks on Dynamic Spectrum Access Networks", Transactions on Communications, IEEE. 9 (60), 2635 - 2643.  Download  (304 kb PDF).


  • Shamik Sengupta and K.P. Subbalakshmi. (Apr 2013). "Open Research Issues in Multi-hop Cognitive Radio Networks", IEEE Communications Magazine, 51 (4), 168-176.  Download  (459 kb PDF).


  • Hafiz Malik, K.P. Subbalakshmi and R. Chandramouli. (Apr 2012). "Nonparametric Steganalysis of QIM Steganography using Approximate Entropy", IEEE Transactions on Information Forensics and Security, 7 (3), 418 - 431.  Download  (992 kb PDF).


  • S. Anand, R. Chandramouli, K.P. Subbalakshmi and M. Venkataraman. (Mar 2012). "Altruism in social networks: Good guys do finish first", Springer Social Networks Analysis and Mining, Print ISBN:1869-5450.


  • Z. Dong, R.D.W. Perera, R. Chandramouli and K.P. Subbalakshmi. (Jan 2012). "Network measurement based modeling and optimization for IP geo-location", Elsevier Journal Computer Networks: The International Journal of Computer and Telecommunications Networking, 56 (1), 85-98.


  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (May 22, 2012). "Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach", IET Communications, IET. 6 (8), 964 - 973.  Download  (251 kb PDF).


  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (Apr 2011). "Analysis of Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks", Journal on Selected Areas of Communications, Special Issue on Cognitive Radio Networking and Communications, IEEE. 29 (4), 890 - 902.


  • C. Mathur, M.A. Haleem, K.P. Subbalakshmi and R. Chandramouli. (2012). "Impact of constraints on the complexity and performance of channel assignment in multihop wireless networks", Journal of Cyber Security and Mobility, River Publishers.


  • S. Sengupta, K. Hong, R. Chandramouli and K. P. Subbalakshmi. (Mar 2011). "SpiderRadio: A Cognitive Radio Network with Commodity Hardware and Open Source Software", IEEE Communications Magazine, IEEE. 49 (3), 101 - 109 .


  • Guoqi Luo and K.P. Subbalakshmi. (Nov 4, 2011). "KL-sense secure image steganography", Inderscience International Journal of Security and Networks, 6 211–225.


  • Fabrizio Granelli, P. Pawelczak, R.V. Prasad, K.P. Subbalakshmi, R. Chandramouli, J.A. Hoffmeyer, H.S. Berger. (Jun 2010). "Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities", IEEE Communications Magazine, 71 - 79.


  • Na Cheng, R. Chandramouli and K.P. Subbalakshmi. (2011). "Author Gender Identification from Text Documents", The Journal of Digital Investigation (Accepted for Publication), Elsevier.


  • Zituo Jin, S. Anand and K.P. Subbalakshmi. (Apr 2009). "Mitigating Primary User Emulation Attacks in Dynamic Spectrum Access Networks using Hypothesis Testing", Mobile Computing and Communications Review, Special Issue on Cognitive Radio Technologies and Systems, ACM. 13 (2), 74-85.


  • Goce Jakimoski and K.P. Subbalakshmi. (Apr 2008). "Cryptanalysis of Some Multimedia Encryption Schemes", IEEE Transactions on Multimedia, 10 (3), 330–338.


  • Kiran Sampath Kumar, R. Chandramouli and K.P. Subbalakshmi. (Sep 2008). "On Stochastic Learning in Predictive Wireless ARQ", Wiley Journal on Wireless Communications and Mobile Computing, ISSN:1530-8669. 8 (7), 871–883.


  • Mohamed Haleem, Chetan N. Mathur, R. Chandramouli and K.P. Subbalakshmi. (Oct 2007). "Opportunistic Encryption: A Trade-off between Security and Throughput in Wireless Networks", IEEE Transactions on Secure and Dependable Computing, 4 (4), 313 - 324.


  • Goce Jakimoski and K. P. Subbalakshmi. (Jun 2007). "Discrete Lyapunov Exponent and Differential Cryptanalysis", IEEE Transactions on Circuits and Systems II, 499–501.


  • Mohamed Haleem, K.P. Subbalakshmi and R. Chandramouli. (2007). "Joint Encryption and Compression of Correlated Sources", Special Issue on The Interplay between Compression and Security for Image and Video Communication and Adaptation over Networks, EURASIP Journal on Information Security (JIS). DOI:10.1155/2007/98374 [invited paper]. 2007 9.


  • Ning Liu, Palak Amin and K.P. Subbalakshmi. (Apr 2007). "Security and Robustness Enhancement for Image Data Hiding", IEEE Transactions on Multimedia, 9 (3), 466–474.


  • Yiping Xing, Chetan N. Mathur, R. Chandramouli and K.P. Subbalakshmi. (Apr 2007). "Dynamic Spectrum Access with QoS and Interference Temperature Constraints", IEEE Transactions on Mobile Computing, 6 (4), 423–433.


  • Chetan Nanjunda Mathur and K.P. Subbalakshmi. (Sep 2007). "A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices", International Journal of Network Security, 5 (2), 205-212.


  • R. Chandramouli, K.P. Subbalakshmi, and N. Ranganathan. (May 2004). "Channel-Adaptive Stochastic Rate Control For Low Bit Rate Wireless Video Transmission", Pattern Recognition Letters, Special issue on Video Objects: representation, creation, coding, transmission, manipulation and retrieval. 25 (7), 793-806.


  • R. Chandramouli, S. Bapatla, K.P. Subbalakshmi, R.N. Uma. (May 2006). "Battery Power-Aware Encryption", ACM Transactions on Information Systems and Security, 9 (2), 162-180.


  • Palak Amin, Ning Liu and K.P. Subbalakshmi. (Jul 2007). "Statistical Attack Resilient Data Hiding", International Journal of Network Security, 5 (1), 112-120.


  • Qingyu Chen and K.P. Subbalakshmi. (2006). "Joint Source-Channel Decoder for Data Centric Network Applications", IEE Proceedings Communications, ISSN 1350-2425. 153 (6), 871-877.


  • Chetan Nanjunda Mathur, Karthik Narayan, and K. P. Subbalakshmi. "On the Design of Error Correcting Ciphers", Special Issue on Wireless Network Security, EURASIP Journal on Wireless Communications and Networking. Article ID 42871, DOI 10.1155/WCN/2006/42871. 2006 112.


  • K.P. Subbalakshmi, R. Chandramouli and N. Ranganathan. (Nov 2007). "A Sequential Distinguisher for Covert Channel Identification", International Journal of Network Security, 5 (3), 274-282.


  • A. Patel, M. Shah, R. Chandramouli, K.P. Subbalakshmi. (Jul 2007). "Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences", International Journal of Network Security, 5 (1), 45–50.


  • Qingyu Chen and K.P. Subbalakshmi. (Dec 2003). "Joint Source-Channel Decoding forMPEG-4 Video Transmission over Wireless Channels", IEEE Journal on Selected Areas in Communications-Special Issues on Recent Advances in Wireless Multimedia, 1780-1789.


  • K. P. Subbalakshmi and Jacques Vaisey. (Sep 2003). "On the Joint Source-Channel Decoding of Variable-Length Encoded Sources: The Additive Markov Channel Case", IEEE Transactions on Communications, 1420-1425.


  • K. P. Subbalakshmi and Jacques Vaisey. (Dec 2001). "On the Joint Source-Channel Decoding of Variable-Length Encoded Sources: The BSC Case", IEEE Transactions on Communications, 49 2052-2055.


  • A. Makur and K.P. Subbalakshmi. (Aug 1997). "Variable Dimension VQ Encoding and Codebook Design", IEEE Transactions on Communications, 45 (8), 897 - 900.


  • Conference Proceedings

  • Zituo Jin, S. Anand and K.P. Subbalakshmi. (Oct 2014). "NEAT: A NEighbor AssisTed Spectrum Decision Protocol for Resilience against PUEA", IEEE Workshop on Cognitive Radio and Electromagnetic Spectrum Security (CRESS 14). [Invited Paper].


  • Alireza Louni and K.P. Subbalakshmi. (Apr 2014). "A Two-stage Algorithm to Estimate the Source of Information Diffusion in Social Media Networks", IEEE INFOCOM Workshop on Dynamic Social Networks. IEEE.


  • Alireza Louni and K.P. Subbalakshmi. (Nov 2013). "Optimizing Flow Control in Multi-interface Wireless Cognitive Radio Networks", GLOBECOM 2013. IEEE.  Download  (155 kb PDF).


  • Mahdi Azarafrooz, R. Chandramouli and K.P. Subbalakshmi. (Jul 2013). "Reciprocity and Fairness in Medium Access Control Games", IEEE ICCCN 2013. IEEE.


  • S. Anand, Kai Hong, R. Chandramouli, Shamik Sengupta and K.P. Subbalakshmi. "Security Vulnerability due to Channel Aggregation/Bonding in LTE and HSPA+ Networks", IEEE GLOBECOM 2011.


  • Guoqi Luo and K. P. Subbalakshmi. (Dec 2011). "Zero Kullback-Liebler Divergence Image Data Hiding", IEEE GLOBECOM 2011.


  • Yi Tan, Shamik Sengupta and K. P. Subbalakshmi. (Dec 2011). "Human Society Inspired Dynamic Spectrum Access Networks: The Effect of Parochialism", IEEE GLOBECOM 2011 - Cognitive Radio and Networks Symposium (GC'11 - CRN).


  • M. Venkataraman, K.P. Subbalakshmi and R. Chandramouli. (May 2012). "Measuring and quantifying the silent majority on the Internet", IEEE Sarnoff Symposium. IEEE. Invited Paper.


  • Yi Tan, Kai Hong, Shamik Sengupta and K. P. Subbalakshmi. (Dec 2011). "Using Sybil Identities for Primary User Emulation and Byzantine Attacks in DSA Networks", IEEE GLOBECOM 2011 - Cognitive Radio and Networks Symposium (GC'11 - CRN).


  • Seyed Ebrahim Safavi and K.P. Subbalakshmi. (2011). "Optimal Joint Power Allocation and Phase Control for DS-CDMA Cognitive Radio Networks", IEEE GLOBECOM 2011.


  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (May 2011). "Spectrum Stealing via Sybil Attacks in DSA Networks: Implementation and Defense", International Conference on Communications. IEEE.


  • S. Anand, R. Chandramouli and K.P. Subbalakshmi. (2011). "Cost of collaboration vs. individual effort in social networks", SIAM Data Mining Conference.


  • X. Chen, R. Chandramouli and K.P. Subbalakshmi. (2011). "Scam detection in Twitter", SIAM Text Mining Workshop . SIAM.


  • X. Chen, R. Chandramouli and K.P. Subbalakshmi. (2011). "Authorship similarity detection from emails", Machine Learning and Data Mining Conference.


  • P. Hao, X. Chen, R. Chandramouli and K.P. Subbalakshmi. (2011). "Adaptive context modeling for deception detection in emails", Machine Learning and Data Mining Conference.


  • Zituo Jin, Anand Santhanakrishnan and K.P. Subbalakshmi. (Nov 2010). "Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks", IEEE GLOBECOM 2010.


  • Zituo Jin, Anand Santhanakrishnan and K.P. Subbalakshmi. (Nov 2010). "Robust Spectrum Decision Protocol against Primary User Emulation Attacks in Dynamic Spectrum Access Networks", IEEE Globecom 2010. IEEE.


  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (Nov 2010). "Competitive Spectrum Trading in Dynamic Spectrum Access Markets: A Price War", IEEE GLOBECOM 2010.


  • R. Perera, S. Anand, R. Chandramouli and K.P. Subbalakshmi. (2010). "Twitter analytics: Architecture, tools and analysis", IEEE MILCOM.


  • Anand Santhanakrishnan, R. Chandramouli and K.P. Subbalakshmi. (Apr 2011). "Cost of Collaboration vs Individual Effort in Social Networks", SIAM International Conference on Data Mining. SIAM.


  • Yi Tan, Shamik Sengupta and K.P. Subbalakshmi. (May 2010). "Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks", IEEE International Conference on Communications, 2010. IEEE .  Download  (181 kb PDF).


  • Goce Jakimoski and K.P. Subbalakshmi. (Jun 2009). "Towards Secure Spectrum Decision", IEEE International Conference on Communications.


  • Na Cheng, Xiaoling Chen, Rajarathnam Chandramouli and K.P. Subbalakshmi. (2008). "Gender Identification from E-mails", IEEE Symposium on Computational Intelligence and Data Mining.


  • Zituo Jin, S. Anand and K.P. Subbalakshmi. (Jun 2009). "Detecting Primary User Emulation Attacks in Dynamic Spectrum Access Networks", IEEE International Conference on Communications.


  • S. Anand, Zituo Jin and K.P. Subbalakshmi. (Oct 2008). "An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks", IEEE Dynamic Spectrum Access Networks (DySPAN).


  • Chetan Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi. (2008). "Impact of Constraints on the Complexity of Dynamic Spectrum Assignment", IEEE GLOBECOM - Symposium on Selected Areas of Communications.


  • Goce Jakimoski and K.P. Subbalakshmi. (May 2008). "Denial-of-Service Attacks on Dynamic Spectrum Access Networks", IEEE CogNets Workshop, IEEE International Conference on Communications.


  • H. Malik, K. P. Subbalakshmi, and and R. Chandramouli. (Jan 28-31, 2008). "Nonparametric Steganalysis of QIM Data Hiding Using Approximate Entropy", Proc. of IS&T/SPIE Security, Steganography, and Watermarking of Multimedia Content X, San Jose, CA, USA. 6819.


  • Goce Jakimoski and K.P. Subbalakshmi. (Dec 2007). "On Efficient Message Authentication via Block Cipher Design Techniques", Asiacrypt.


  • Hafiz Malik, K.P. Subbalakshmi and R. Chandramouli. (Dec 2007). "Steganalysis of QIM-Based Data Hiding using Kernel Density Estimation", ACM Multimedia Security Workshop.


  • Goce Jakimoski and K.P. Subbalakshmi. (Nov 4-7, 2007). "Security of Compressing Encrypted Sources", Asilomar Conference on Signals and Systems. invited paper.


  • Palak Amin and K.P. Subbalakshmi. (Sep 2007). "Detecting Hidden Messages using Image Power Spectrum", IEEE International Conference on Image Processing.


  • M. A. Haleem and K. P. Subbalakshmi. (Mar 27-29, 2007). "Optimal Source-Channel Decoder for Correlated Markov Sources over Additive Markov Channels", IEEE Data Compression Conference.


  • Chetan N. Mathur and K.P. Subbalakshmi. (Jan 11, 2007). "Digital Signatures for Centralized DSA Networks", First IEEE Workshop on Cognitive Radio Networks. Las Vegas.


  • Ning Liu and K.P. Subbalakshmi. (2006). "Worst Case Attack on Quantization based Data Hiding", IEEE International Symposium on Multimedia.


  • Chetan N. Mathur and K. P. Subbalakshmi. (Nov 2006). "Energy EfficientWireless Encryption", IEEE GLOBECOM 2006. Symposium on Network and Information Security Systems.


  • M. A. Haleem, Chetan N. Mathur, and K. P. Subbalakshmi. (Oct 2006). "Joint Distributed Compression and Encryption of Correlated Data in Sensor Networks", IEEE MILCOM 2006.


  • Chetan N. Mathur, Karthik Narayan and K. P. Subbalakshmi. (Jun 2006). "High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive", 4th International Conference on Applied Cryptography and Network Security,Lecture Notes in Computer Science. ISBN: 3-540-34703-8. 3989 309-324.


  • Chetan Nanjunda Mathur, Karthik Narayan and K.P. Subbalakshmi. (Nov 2005). "High Diffusion Codes: A Class of Maximum Distance Separable Codes for Error Resilient Block Ciphers", Second IEEE International Workshop on Adaptive Wireless Networks. IEEE GLOBECOM 2005. 1–22.


  • M. A. Haleem, Chetan N. Mathur, R. Chandramouli, and K. P. Subbalakshmi. (Jun 2006). "On Optimizing the Security-Throughput Trade-off in Wireless Networks with Adversaries", 4th International Conference on Applied Cryptography and Network Security, Lecture Notes in Computer Science. ISBN: 3-540-34703-8. 3989 448-458.


  • Yiping Xing, Chetan Nanjunda Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi. (Jun 2006). "Priority Based Dynamic Spectrum Access with QoS and Interference Temperature Constraints", IEEE International Conference on Communication.


  • Yiping Xing, Chetan Nanjunda Mathur, Mohamed Haleem, R. Chandramouli and K.P. Subbalakshmi. (Jan 2006). "Real-Time Secondary Spectrum Sharing with QoS Provisioning", IEEE Consumer Communications and Networking Conference 2006, 3rd IEEE Volume 1. Best Student Paper Award Winner. 630 - 634, 8-10.


  • Ning Liu, Palak Amin and K.P. Subbalakshmi. (Oct 2005). "Secure Quantizer Based Data Embedding", IEEE Multimedia Signal Processing, China, Chapter 13: Multimedia Assurance. ISBN: 0-7803-9289-2. 509-512.


  • Palak Amin, Ning Liu and K.P. Subbalakshmi. (Oct 2005). "Statistically Secure Digital Image Data Hiding", IEEE Multimedia Signal Processing, China, Chapter 13: Multimedia Assurance. ISBN: 0-7803-9289-2. 497-500.


  • Qingyu Chen and K. P. Subbalakshmi. (Mar 2005). "Distributed Joint Source-Channel Decoding for Correlated Markov Sources", IEEE Data Compression Conference. 453.


  • Ning Liu and K.P. Subbalakshmi. (Jan 2005). "TCQ-based quantizer design for data hiding in images", IS&T/SPIE Electronic Imaging, Conference on Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose. 5681 185-193.


  • Siva Somasundaram, K.P. Subbalakshmi and R.N. Uma. (Oct 24-27, 2004). "MDC and Path Diversity in Video Streaming", IEEE International Conference on Image Processing, Singapore. 5 3153 - 3156.


  • Palak Amin and K.P. Subbalakshmi. (Oct 24-27, 2004). "Rotation and Cropping Resilient Data Hiding with Zernike Moments", IEEE International Conference on Image Processing, Singapore. 4 2175 - 2178.


  • R. Chandramouli and K.P. Subbalakshmi. (Dec 2004). "Current Trends in Steganalysis: A Critical Survey", Invited session on Multimedia Security, IEEE The Eighth International Conference on Control, Automation, Robotics and Vision, ICARCV 2004. invited paper. 2 964-967.


  • Ning Liu and K.P. Subbalakshmi. (Oct 24-27, 2004). "Non-Uniform Quantizer Design for Image Data Hiding", IEEE International Conference on Image Processing, Singapore. 4 2179 - 2182.


  • Ning Liu and K.P. Subbalakshmi. (Jan 2004). "Vector Quantization Based Scheme For Data Embedding In Images", Proceedings of the IS&T/SPIE Electronic Imaging, Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose. 548-559.


  • K. P. Subbalakshmi and R. Chandramouli. (Mar 2004). "A Joint Source-Channel Steganography Decoding Paradigm and it’s Implications on Capacity", The 38th Annual Conference on Information Sciences and Systems, Invited Session on Watermarking and Steganography. invited paper.


  • Qingyu Chen and K. P. Subbalakshmi. (Oct 6-9, 2003). "An Integrated Joint Source-Channel Decoder for MPEG-4 Coded Video", IEEE Semi-Annual Vehicular Technology Conference. 1 347 - 351.


  • Siva Somasundaram and K. P. Subbalakshmi. (Jul 6-9, 2003). "3-D Multiple Description Video Coding for Packet Switched Networks", IEEE International Conference on Multimedia and Expo, Baltimore, Maryland. 1 589-592.


  • R. Chandramouli and K. P. Subbalakshmi. (May 2003). "Active Steganalysis of Spread Spectrum Steganography", IEEE International Symposium on Circuits and Systems, Bangkok, Thailand. 3 830-833.


  • Siva Somasundaram and K.P. Subbalakshmi. (Apr 2003). "Exploiting Path Diversity and Forward Error Correction for Robust Transmission of Images", 23rd Picture Coding Symposium, Saint-Malo, France. invited paper. 259-262.


  • Siva Somasundaram and K.P. Subbalakshmi. (Jan 2003). "A Novel 3D Scalable Video Compression Algorithm", IS&T/SPIE Electronic Imaging, Image and Video Communications and Processing, Santa Clara. 5022 966-971.


  • Qingyu Chen and K.P. Subbalakshmi. (Jan 2003). "Trellis Decoding for MPEG-4 Streams Over Wireless Channels", Proceedings of the IS&T/SPIE Electronic Imaging, Image and Video Communications and Processing, Santa Clara. 5022 810-817.


  • Derek Soeder, Siva Somasundaram, K.P. Subbalakshmi and R.N. Uma. (Sep 2002). "On Deterministic Scheduling Approaches to Delivery of Scalable Streaming Media", Proceedings of the XXXIII Annual Conference of the Operational Research Society of Italy, AIRO: Integrating Operations Research and Information Technology to Support Decisions in Real World Systems, Italian Association of Operations Research (Operations and Decision Sciences) L’Aquila, Italy. 13.


  • K. P. Subbalakshmi and Qingyu Chen. (Jul 2002). "Joint Source-Channel Decoding for MPEG-4 Coded Video Over Wireless Channels", IASTED International Conference on Wireless and Optical Communications (WOC 2002), Banff, Canada.


  • K. P. Subbalakshmi and Siva Somasundaram. (Jun 2002). "Multiple Description Coding Framework for EBCOT", IEEE International Conference on Image Processing, Rochester, New York. 3 541 - 544.


  • Derek Soeder, K. P. Subbalakshmi and R.N. Uma. (Jul 2002). "On Deterministic Scheduling Approaches to Delivery of Scalable Streaming Media", 6th World Multiconference on Systemics, Cybernetics and Informatics (SCI 2002). 48-53.


  • K. P. Subbalakshmi and Jacques Vaisey. (Mar 2002). The 36th Annual Conference on Information Sciences and Systems. Joint Source-Channel Decoding for Entropy Coded Image Transmission.


  • K. P. Subbalakshmi and Jacques Vaisey. (Mar 1999). "Optimal Decoding of Entropy Coded Markov Sources over Channels with Memory", The 33rd Annual Conference on Information Sciences and Systems. 2 624-629.


  • K. P. Subbalakshmi and Jacques Vaisey. (Jun 1999). "Joint Source-Channel Decoding of Entropy Coded Markov Sources over Binary Symmetric Channels", IEEE International Conference on Communications 99. 1 (4), 446-450.


  • K. P. Subbalakshmi and Jacques Vaisey. (Mar 1998). "Optimal Decoding of Entropy Coded Memoryless Sources over Binary Symmetric Channels", IEEE Data Compression Conference. 573.


  • Book Chapters

  • Alireza Louni and K.P. Subbalakshmi. (2014). "Diffusion of Information in Social Networks", Social Networking: Mining, Visualization and Security, Mrutyunjaya Panda, Satchidananda Dehuri and Gi-Nam Wang, Springer-Verlag GmbH. XXII.


  • Xiaoling Chen, R. Chandramouli and K.P. Subbalakshmi. (2014). "Scam Detection in Twitter", Data Mining for Service, Katsutoshi Yada, Series: Studies in Big Data, Springer Berlin Heidelberg. 3 133-150.


  • Z. Dong, S. Sengupta, S. Anand, K. Hong, R. Chandramouli and K.P. Subbalakshmi. (Sep 28, 2011). "Cognitive radio mobile ad hoc networks in healthcare, Cognitive Radio Mobile Ad Hoc Networks", Cognitive Radio Mobile Ad-Hoc Networks, Richard Yu , Chapter 13, pp. , 2011, Springer. Invited . 335-349.


  • Hafiz Malik, R. Chandramouli and K.P. Subbalakshmi. (Jun 2008). "Steganalysis: Trends and Challenges", in Multimedia Forensics and Security", Multimedia Forensics and Security, Chang-Tsun Li, Idea Group Publishing.


  • Chetan Nanjunda and K.P. Subbalakshmi. (2007). "Security Issues in Cognitive Networks", Cognitive Networks: Towards Self-Aware Networks, Qusay H. Mahmoud, Wiley. 271-292.


  • Yiping Xing, Harikesh Kushwaha, K.P. Subbalakshmi and R. Chandramouli. (2007). "Codes and Games for Dynamic Spectrum Access", Cognitive Radio, Software Defined Radio, and Adaptive Wireless Systems, Arslan Huseyin, Springer Verlag.


  • Xiaoling Chen, Rohan D Perera, Ziqian Dong, R. Chandramouli, and K.P. Subbalakshmi. (2010). "Deception Detection on the Internet", Research on Computational Forensics, Digital Crime and Investigation: Methods and Solutions, IGI Global, ISBN13: 978-1-60566-836-9. 334 – 354.


  • Harikeshwar Kushwaha, R. Chandramouli, and K. P. Subbalakshmi. (2007). "Erasure Tolerant Coding for Cognitive Radios", Cognitive Networks: Towards Self-Aware Networks, Qusay H. Mahmoud, Wiley. 315-332.


  • M.A. Haleem and K.P. Subbalakshmi. "Global Systems for Mobile Communications", The Handbook of Computer Networks, Volume II, LANs, MANs, WANs, The Internet, Global, Cellular and Wireless Networks, John Wiley and Sons Inc.


  • Ning Liu, Palak Amin, Aruna Ambalavanan and K.P. Subbalakshmi. (Jun 2006). "An Overview of Digital Watermarking", Multimedia Security Technologies for Digital Rights Management, W. Zeng, H. Yu and C. Lin, Elsevier Inc.


  • K.P. Subbalakshmi. (2003). "Lossless Image Compression", Lossless Compression Handbook, Khalid Sayood, Academic Press Series in Communications, Networking, and Multimedia, Academic Press.


  •  
    Stevens Lab
            
    Stevens Lab