Follow
Aurobinda Laha
Aurobinda Laha
Verified email at hawk.iit.edu
Title
Cited by
Cited by
Year
An energy efficient routing protocol for device-to-device based multihop smartphone networks
A Laha, X Cao, W Shen, X Tian, Y Cheng
2015 IEEE International conference on communications (ICC), 5448-5453, 2015
492015
Game theory based charging solution for networked electric vehicles: A location-aware approach
A Laha, B Yin, Y Cheng, LX Cai, Y Wang
IEEE Transactions on Vehicular Technology 68 (7), 6352-6364, 2019
452019
Real-time misbehavior detection and mitigation in cyber-physical systems over WLANs
X Cao, L Liu, W Shen, A Laha, J Tang, Y Cheng
IEEE Transactions on Industrial Informatics 13 (1), 186-197, 2015
402015
A location aware game theoretic approach for charging plug-in hybrid electric vehicles
A Laha, B Yin, Y Cheng, LX Cai
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
42016
A hybrid approach for efficient wireless information and power transfer in green C-RAN
X Li, Z Chen, A Laha, Z Chen, Y Cheng, LX Cai
2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018
22018
Substop: An analysis on subscription email bombing attack and machine learning based mitigation
A Laha, MT Yasar, Y Cheng
High-Confidence Computing 2 (4), 100086, 2022
12022
Game theory based location-aware charging solutions for networked electric vehicles
A Laha
Illinois Institute of Technology, 2020
12020
Enhancement of Security through aCryptographic Algorithm Based onMathematical Representation of NaturalNumbers
P Singhal, NK Verma, A Laha, P Paul, A KBhattacharjee
International Journal of Computer and Electrical Engineering 2 (5), 856, 2010
12010
GOOGLY-A Cryptographic Algorithm based on Mathematical Representation of Transfer Functions of a Discrete Time
A Vaishnavi, S Roy, A Laha, NK Verma
IJCSNS 9 (10), 216, 2009
2009
High-Confidence Computing
A Laha, MT Yasar, Y Cheng
The system can't perform the operation now. Try again later.
Articles 1–10