Bharat K. Bhargava
Professor of Comp Science
bbshail@purdue.edu
|
Purdue University
Department of Computer Sciences
305 N. University Street
West Lafayette, Indiana, 47907-2107
Office Phone: +1 765-494-6013
FAX: 765-494-0739
[In the News] [Research] [Raid Laboratory] [Students/Postdocs] [Misc] [Teaching] [Colloquia and conference slides] [Information for prospective students]
1.
Prof. Bhargava has been listed as distinguished DAV College Alumni
3. On Purdue CS News:
REALM: The right information at the right time
4.
Prof. Bhargava is listed as Rising Star for contributions in database domain from 1990-1994
5. Schleman Gold Medallion Award, 2017:
Board of Trustees Letter
6. Focus Award at Purdue Univeristy, 2017:
Board of Trustees Recognition Letter,
News
7. DAVCJAA Distinguished Alumni Award
8. Best poster award at 6th
International Conference on Cloud Computing and Services Science (CLOSER'16)
for "Disruption-Resilient Publish and Subscribe," N. Ahmed and B.
Bhargava.
9. Best paper award at
DNCMS'15
10. Best
poster award at 16-th CERIAS Information Security Symposium. March, 2015. Poster,
Abstract,
News
11. New book published: Managing Trust in Cyberspace (Hardback).
12. Purdue added to Yahoo!
M45 Academic Research Initiative
14. Best paper award on
identity management at ICACC 2011
15. Book
of great teachers adds a new chapter.
16. ACM Tech
News for IT Professionals
17. Purdue
computer scientist balances access and safety
18. Researchers
study Internet trust issues, create solution
Click [pdf]
here for the latest
biographical information of Prof. Bhargava.
1. VecDB: A Cloud-Native Vector Data Management System, Submitted to NSF as co-PI, (PI: Jianguo Wang), $599,000 (2023-2026)
1. NSF AI Institute for Active Cyber Defense Leveraging
Intelligent Agents, Preliminary Proposal Submitted to NSF as Co-PI ( PI: Prasad Calyam at UM-Columbia) (Encouraged and Invited for full proposal)
1. Robust Distributed Systems, Sandia Corporation, budget and task to be finalized on Feb 23 (for three years)
1. Software Defined Networking in Automotive Environment, Ford Corporation (2020-2022)
2. Real Applications of Learning Machines (REALM) Consortium, Northrop-Grumman Corporation, 2019-2022 ($460k per year with MIT, CMU, Stanford)
3. Countering Adversarial AI/ML for Protection and Threat Recognition in Intelligent Autonomous Systems, Northrop-Grumman Corporation (2019-2021)
4. Generating Novelty in Open-world Multi-agent Environments (GNOME), DARPA (joint with USC-ISI), 2019-2023
5. MTD Algorithm and adaptation on an ARINC-825/CAN bus and SpaceWire (SpW) bus, Sandia Laboratory (2019-2021)
6. Hadoop/Sparc
7. Protecting and Securing
Supply Chain Data throughout its Lifecycle
8. Defending Collaborative Attacks in Mobile Ad
Hoc Networks Using Cooperative Immunization
10. Experiments in
Adaptable Distributed Systems
12. Experiments in Security
and QoS in Mobile Systems
13. Formalizing Evidence and
Trust for User Authorization
14. ITR: Scalable Edge Router
for Differentiated Services Networks
15. Vulnerability
Analysis and Threat Assessment/Avoidance
16. Time Based
Coordination of Network Embedded Nodes
17. Adaptable
Communications Software for Differential QoS
18. Cellular Assisted
Mobile Ad hoc (CAMA) Networks
19. Trusted Routing and
Intruder Identification in Ad Hoc Networks
20. Collaborative
Attacks in Wireless Networks
\A0[Back to top]
PATENT: Method and System for Providing Cellular Assisted Secure
Communication of a Plurality of Ad hoc Devices (With Motorola), US7817986 B2. http://www.cs.purdue.edu/news/10-31-11_Bhargava.html
1. Lixiang Li, Bharat Bhargava, Alina Nesen and Nagender Aneja, "SentimentPulse: Temporal Aware Custom Language Model vs GPT3.5 on Consumer Sentiment", accepted in "I Can't Believe It's Not Better (ICBINB): Failure Modes in the Age of Foundation Models in 37th Annual Conference on Neural Information Processing Systems (Neurips) Workshop", New Orleans, Louisiana, December 10-16, 2023[pdf]
2. Z. Cui, B. Cui, J. Fu and B. K. Bhargava, "An Attack to One-Tap Authentication Services in Cellular Networks", IEEE Transactions on Information Forensics and Security, vol. 18, pp. 5082-5095, 2023, doi: 10.1109/TIFS.2023.3304840.[pdf]
3. Servio Palacios, Aaron Ault, James V. Krogmeier, Bharat K. Bhargava, Christopher G. Brinton, "AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts", IEEE Trans. Dependable Secur. Comput. 20(4): 3269-3286 (2023).[pdf]
4. Na Wang, Shancheng Zhang, Zheng Zhang, Jiawen Qiao, Junsong Fu, Jianwei Liu, Bharat K. Bhargava, "Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks", IEEE Trans. Inf. Forensics Secur. 18: 4652-4667 (2023).[pdf]
5. Na Wang, Junsong Fu, Shancheng Zhang, Zheng Zhang, Jiawen Qiao, Jianwei Liu, Bharat K. Bhargava, "Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain", IEEE/ACM Trans. Netw. 31(4): 1550-1565 (2023).[pdf]
6. Junsong Fu, Shuai Xiong, Na Wang, Ruiping Ren, Ang Zhou, Bharat K. Bhargava, "A Framework of High-speed Network Protocol Fuzzing based on Shared Memory", IEEE TRANSACTION ON DEPENDABLE AND SECURE COMPUTING. (Minor Revision).
7. T. Bonjour, M. Haliem, V. Aggarwal, M. Kejriwal, B. Bhargava, "Multi-agent Game Domain: Monopoly in A unified Framework for Formal Theories of Novelty",ISBN 978-3-031-33054-4, print 978-3-031-33052-7 (edited by Terry Boult and Walter Scheirer)(2023).[Link]
8. S Jain, S. Groppe, B. Bhargava (editors), "Semantic Intelligence",Springer Verlag. Lecture Notes in Electrical Engineering, ISBN number: 978-981-19-7125-9, Semantic Intelligence: Select Proceedings of ISIC 2022.[Link]
9. J. Fu, N. Wang, L. Yun, B. Bhargava, "A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems", IEEE Transactions on Parallel and Distributed Systems, Vol. 33, No. 5, 1246-1261, May, 2022 .[pdf]
10. M. Jedh, L. b. Othmane, N. Ahmed and B. Bhargava, "Detection of Message Injection Attacks onto the CAN Bus using Similarities of Successive Messages-Sequence Graphs," in IEEE Transactions on Information Forensics and Security, 16: 4133-4146 (2021), doi: 10.1109/TIFS.2021.3098162.[pdf]
11. T. Bonjour, M. Haliem, A. Alsalem, Shilpa; L. Yu, V. Aggarwal, M. Kejriwal, B. Bhargava,"Decision Making in Monopoly using a Hybrid Deep Reinforcement Learning Approach", IEEE Transactions on Emerging Topics in Computational Intelligence, 6(6): 1335-1344 (2022).[pdf]
J. Fu, N. Yao, B. Cui, B. Bhargava, "Defending Trace-back Attack in 3D Wireless Internet of Things" IEEE/ACM Transactions on Networking, Jan 2022 .[pdf]
13. M. Villars, B. Bhargava, "Hunting for Insider Threats Using LSTM-based Anomaly Detection", IEEE Transactions on Dependable and Secure Computing (2023).[pdf]
14. M. Haliem, G. Mani, V. Aggarwal, and B. Bhargava, "A Distributed Model-Free Ride-Sharing Approach for Joint Matching, Pricing, and Dispatching using Deep Reinforcement Learning", IEEE Transactions on Intelligent Transportation Systems (T-ITS), June, 2021.[pdf]
15. K. Manchella, M. Haliem, V. Aggarwal, and B. Bhargava, "PassGoodPool: Joint Passengers and Goods Fleet Management with Reinforcement Learning aided Pricing, Matching, and Route Planning", The IEEE Transactions on Intelligent Transportation Systems, (T-ITS), November, 2021.[pdf]
16. M. Haliem, V. Aggarwal, and B. Bhargava, "AdaPool: A Diurnal-Adaptive Fleet Management Framework using Model-Free Deep Reinforcement Learning and Change Point Detection", IEEE Transactions on Intelligent Transportation Systems, (T-ITS), Oct. 2021, Print ISSN: 1524-9050 Online ISSN: 1558-0016 Digital Object Identifier: 10.1109/TITS.2021.3109611.[pdf]
17. R. Jiang, Q. Zhao, B. Bhargava, "RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage", IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2020.2973256.[pdf]
18. S. Aneja, N. Aneja, B. Bhargava, S. Islam, "Device Fingerprinting using Deep Convolutional Neural Networks", International Journal of Communication Networks and Distributed Systems, June 2021.[Link]
19. Junsong Fu, Na Wang, Baojiang Cui, Bharat K. Bhargava, "A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems", IEEE Transactions on Parallel and Distributed Systems, 2021. [PDF]
20. Ganapathy Mani, Bharat Bhargava, Jason Kobes, Justin King, James MacDonald, "Securing Intelligent Autonomous Systems Through Artificial Intelligence", International Semantic Intelligence Conference (ISIC 2021) [PDF]
21. H. Chen, Y. Zhang, Y. Cao, B. Bhargava, Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment, Wireless personal Communication, Springer-US, pp 1-21, 2021, https://doi.org/10.1007/s11277-021-08284-8[pdf]
22. A. Hu, R. Jiang and B. Bhargava, "Identity-Preserving Public Integrity Checking with Dynamic Groups for Cloud Storage," IEEE Transactions on Services Computing, Vol. 14, No. 4, 1097-1110, 1 July-Aug. 2021, doi: 10.1109/TSC.2018.2859999[pdf]
23. N. Ahmed and B. Bhargava, Bio-inspired Formal Model for Space/Time Virtual Machine Randomization and Diversification, IEEE Transactions on Cloud Computing, April, 2020, On page(s): 1-11 Print ISSN: 2168-7161 Online ISSN: 2168-7161 Digital Object Identifier: 10.1109/TCC.2020.2969353[pdf]
24. N. Ahmed, B. Bhargava, From Byzantine Fault-Tolerance to Fault-Avoidance: An Architectural Transformation to Attack and Failure Resilience. IEEE Transactions on Cloud Computing, Volume 8, No. 3, pp 847-860, September, 2020.[pdf]
25 J. Fu, L. Yun, B. Bhargava, "Source-Location Privacy Protection based on Anonymity Cloud in Wireless Sensor Networks", IEEE Transactions on Information Forensics and Security, Vol. 15, 100-114, May, (2020)[pdf]
26. A. Nesen, K. Solaiman, B. Bhargava, Dataset Augmentation with Generated Novelties, 3rd IEEE Transdisciplinary Artificial Intelligence Conference (TransAI) 2021[pdf]
27. A Nesen, B. Bhargava, Situational Awareness with Multimodal Streaming Data Fusion: Serverless Computing Approach, ACM SIGMOD workshop on Big Data in Emergent Distributed Environments (BiDEDE 2021), June 2021[pdf]
28. S. Palacios, D. Zabrocki, B. Bhargava, V. Aggrawal, Auditable Serverless Computing for Farm Management, ACM SIGMOD workshop on Big Data in Emergent Distributed Environments (BiDEDE 2021), June 2021[pdf]
29. M. Haliem, T. Bonjour, A. Alsalem, S. Thomas, H. Li, V. Aggarwal, B. Bhargava, M. Kejriwal: Learning Monopoly Gameplay: A Hybrid Model-Free Deep Reinforcement Learning and Imitation Learning Approach. CoRR abs/2103.00683 (2021)[pdf]
30. M. Haliem, V. Aggarwal, and B. Bhargava, "Novelty Detection and Adaptation: A Domain Agnostic Approach", in Proceedings of the International Semantic Intelligence Conference (ISIC 2021), Feb. 2021[pdf]
31. R. Ranchal, P. Angin, B. Bhargava, Privacy-Preserving Data Dissemination and Adaptable Service Compositions in Mission-Critical Clouds, in Proceedings of the International Semantic Intelligence Conference (ISIC 2021), Feb. 2021[pdf]
32. M. Haliem, G. Mani, B. Bhargava, V. Aggarwal, J. MacDonald. "Distributed Pricing and Negotiation in Multi-Agent Ride-sharing Environment using Deep Reinforcement learning", The European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD) 2020.
33. M. Haliem, V. Aggarwal B. Bhargava, A Distributed Delivery-Fleet Management Framework using Deep Reinforcement Learning and Dynamic Multi-Hop Routing, NeurIPS Machine Learning for Autonomous Driving Workshop, 2020[pdf]
34. G. Mani, V. Pasumarti , B. Bhargava , F. Vora , J. MacDonald , J King , J. Kobes, DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters. In Proceedings of IEEE International Conference on Autonomic Computing and Self-Organizing Systems (ACSOS) 2020 pp. 109-118.[pdf]
35. Nesen and B. Bhargava, Knowledge Graphs for Semantics aware Anomaly Detection in Videos, IEEE Conference on Artificial Intelligence and Knowledge Engineering ( AIKE), Dec 2020 [pdf]
36. M. Haliem, G. Mani, V. Aggarwal, B. Bhargava, A Distributed Model-Free Ride-Sharing Algorithm with Pricing using Deep Reinforcement Learning. CSCS 2020: 5:1-5:10[pdf]
37. Marina Haliem, Vaneet Aggarwal, and Bharat Bhargava, "AdaPool: An Adaptive Model-Free Ride-Sharing Approach for Dispatching using Deep Reinforcement Learning", in Proceedings of the 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation Environments (BuildSys 2020) - BuildSys@SenSys 2020: 304-305[pdf]
38. K. Manchella, M. Haliem, V. Aggarwal, B, Bhargava, PassGoodPool: Joint Passengers and Goods Fleet Management with Reinforcement Learning aided Pricing, Matching, and Route Planning. CoRR abs/2011.08999 (2020)
39. M. Haliem, G. Mani, V. Aggarwal, B. Bhargava: A Distributed Model-Free Ride-Sharing Approach for Joint Matching, Pricing, and Dispatching using Deep Reinforcement Learning. CoRR abs/2010.01755 (2020)
40. M. Stonebraker, B. Bhargava, M. Cafarella ,Z. Collins, A. Sipser, T. Sun, J. McClellan, A. Nesen, K. Solaiman, G. Mani, K. Kochpatcharin and P. Angin, J. MacDonald, Surveillance Video Querying With A Human-in-the-Loop, HILDA 2020 (HILDA 2020: Workshop on Human-In-the-Loop Data Analytics) with SIGMOD conference[pdf]
41. M. Abdelkhalek, S. Veeraraghava, A. Muhsinah Jamil, L. Othmane and B. Bhargava, Security Analysis of Vehicle to Vehicle Arada Locomate On Board Unit, IEEE Computers, Software, and Applications Conference (COMPSAC 2020), Madrid, May 2020[pdf]
42. K Solaiman, T. Sun, A Nesen, B. Bhargava, M. Stonebreaker, Applying Machine Learning and Data Fusion to the Missing Person Problem, in IEEE Computer, Jun 2022 [PDF]
1. S. Palacios, KMA Solaiman, P. Angin, A. Nesen, B. Bhargava, Z. Collins, A. Sipser, M. Stonebraker, J. MacDonald, WIP - SKOD: A Framework for Situational Knowledge on Demand. In: Gadepally V. et al. (eds) Heterogeneous Data Management, Polystores, and Analytics for Healthcare. DMAH 2019, Poly 2019. Lecture Notes in Computer Science, vol 11721. Springer, Cham. (2019) https://doi.org/10.1007/978-3-030-33752-0_11[online]
2. I You, C Choi, V Sharma, I Woungang, B. Bhargava, Advances in In Security and Privacy Technologies for Forthcoming Smart Systems, Services, Computing, and Networks, Guest Editorial, Intelligent Automation and Soft Computing, 25 (1), 117-119, 2019
3. J. Xu, S. Wang, B. Bhargava and F. Yang "A Blockchain-enabled Trustless Crowd-Intelligence Ecosystem on Mobile Edge Computing", IEEE Transactions on Industrial Informatics 15(6): 3538-3547 (2019)
4. H. Chen, C. Meng, Z, Shan, Z. Fu, B. Bhargava, "A novel Low-rate Denial of Service attack detection approach in ZigBee wireless sensor network by combining Hilbert-Huang Transformation and Trust Evaluation", IEEE Access 7: 32853-32866 (2019)
5. S. Palacios, A. Ault, A. Layton, S. Noel, Y. Wang, A. Balmos, J. Krogmeier, D. Buckmaster, B. Bhargava, A. Raturi. "Trellis++ A Practical, Auditable, Privacy-Preserving Certification Framework". ASABE (American Society of Agricultural and Biological Engineers) International Meeting. 2019.
6. S. Palacios, V. Santos, E. Barsallo Yi, B. Bhargava. "MioStream: a peer-to-peer distributed live media streaming on the edge", Multimedia Tools and Applications (2019): 1-24.
7. G. Mani, B. Bhargava, P. Angin, M. Villarreal, D. Ulybyshev, J. Kobes, "Machine Models to Enhance the Science of Cognitive Autonomy", Proceedings of IEEE Artificial Intelligence and Knowledge Engineering (AIKE) , Laguna Hills, Sept., 2018 [PDF] Slides: [pptx] / [pdf] Presentation Video: Video_1
8. G. Mani, B. Bhargava, J. Kobes, "Scalable Deep Learning Through Fuzzy-based Clustering in Autonomous Systems ", Proceedings of IEEE Artificial Intelligence and Knowledge Engineering (AIKE) , Laguna Hills, Sept., 2018 [PDF] Slides: [pptx] / [pdf] Presentation Video: Video_2
9. G. Mani, D. Ulybyshev, B. Bhargava, J. Kobes, P. Goyal, "Autonomous Aggregate Data Analytics in Untrusted Cloud", Proceedings of IEEE Artificial Intelligence and Knowledge Engineering (AIKE) , Laguna Hills, Sept., 2018 [PDF] Slides: [pptx] / [pdf] Presentation Video: Video_3
10. J. Fu, L. Yun, J. Jiang, B. Bhargava, "Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing", IEEE Transactions on Industrial Informatics (A special on Fog Computing for Industrial Applications submission). Preprint: Digital Object Identifier: 10.1109/TII.2018.2793350, (Online ISSN: 1941-0050), January, 2018
11. R. Ranchal, P. Angin, B. Bhargava, A Self-Protecting Agents Based Model for High-Performance Mobile-Cloud Computing, Computers and Security, April 2018
12. N. Wang, J. Zeng, and B. Bhargava, Efficient Retrieval over Documents Encrypted by Attributes in Cloud Computing, IEEE Transactions on Information Forensics & Security, March 2018 Print ISSN: 1556-6013, Online ISSN: 1556-6021, Digital Object Identifier: 10.1109/TIFS.2018.2825952
13. R. Ranchal, P. Angin, B. Bhargava, and L. Ben Othame, "EPICS: A Framework for Enforcing Security Policies in Composite Web Services", IEEE Transactions on Services Computing, ( To Appear), January 2018
14. D. Ulybyshev, S. Palacios, G. Mani, B. Bhargava, A. Alsalem, P. Goyal "On-the-fly Analytics over Encrypted Records in Untrusted V2X Environments", 4-th ICACEEE, May 2018.
[PDF]
15. D. Ulybyshev, A. Alsalem, B. Bhargava, S. Savvides, G. Mani, L. Ben-Othmane "Secure Data Communication in Autonomous V2X Systems", IEEE ICIOT, July 2018.
[PDF]
16. D. Ulybyshev, M. Villarreal-Vasquez, B. Bhargava, G. Mani, S. Seaberg, P. Conoval, R. Pike, J. Kobes "Blockhub: Blockchain-based Software Development System for Untrusted Environments", IEEE CLOUD 2018.
[PDF]
17. S. Sardesai, D. Ulybyshev, L. Ben-Othmane, B. Bhargava, "Impacts of Security Attacks on The Effectiveness of
Collaborative Adaptive Cruise Control Mechanism", Intl. Smart Cities (ISC-2) Conference, Kansas City, Sep.18-22, 2018 (Accepted, in-press).
[PDF]
18. G. Mani, B. Bhargava, B. Shivakumar, J. Kobes "Incremental Learning Through Graceful Degradations in Autonomous Systems", To appear in the proceedings of IEEE International Conference on Cognitive Computing (ICCC), June 2018 [PDF]. 19. D. Ulybyshev, B. Bhargava, A. Alsalem "Secure Data Exchange and Data Leakage Detection in Untrusted Cloud", Springer Journal on Applications of Computing and Communication Technologies, on 1-st Intl Conf. ICACCT 2018, pp. 99-113.
[Slides], [PDF]
20. M. Villarreal-Vasquez, B. Bhargava, P. Angin. "Adaptable Safety and Security in V2X Systems", IEEE ICIOT, June 2017.
[PDF]
[Slides] 21. M. Villarreal-Vasquez, B. Bhargava, P. Angin, N. Ahmed, D. Goodwin, K.Brin and J. Kobes. "An MTD-based Self-Adaptive Resilience Approach for Cloud Systems", IEEE CLOUD, June 2017.
[PDF]
[Slides] 22. S. Kumar, B. Bhargava, R. Macédo, G. Mani "Securing IoT-based Cyber-Physical Human Systems Against Collaborative Attacks", To appear in 2nd IEEE International Congress on Internet of Things, June 2017
[PDF]
Slides: [PDF]
[PPT] 23. D. Ulybyshev, B. Bhargava, M. Villarreal-Vasquez, D. Steiner, L. Li, J. Kobes, H. Halpin, R. Ranchal, A. Alsalem "Privacy - Preserving Data Dissemination in Untrusted Cloud", IEEE Cloud, June 2017
[PDF]
[Slides] 24. Xianglong Wu, Rui Jiang, Bharat K. Bhargava "On the Security of Data Access Control for Multiauthority Cloud Storage Systems", IEEE Trans. Services Computing 10(2): 258-272 (2017) 25. A. Bijarano, A. Jindal, and B. Bhargava, "Measuring user's influence in the Yelp recommender system", PSU
Journal Review, Vol. 1 Issue: 2, pp.91-104, 2017, https://doi.org/10.1108/PRR-02-2017-0016 26. X. Wu, R. Jiang, B. Bhargava, "On the Security of Data Access Control for Multiauthority Cloud Storage Systems", IEEE Transactions on Services Computing, , No. 10, Vol. 2, pp. 258-272, 2017 27. Bharat K. Bhargava, Amber M. Johnson, Gisele Izera Munyengabe, Pelin Angin "A Systematic Approach for Attack Analysis and Mitigation in V2V Networks", JoWUA 7(1): 79-96 (2016) 28. Noor O. Ahmed, Bharat K. Bhargava "Mayflies: A Moving Target Defense Framework for Distributed Systems", MTD@CCS 2016: 59-64 29. Rui Jiang, Xianglong Wu, Bharat K. Bhargava "SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems", Computers & Security 62: 193-212 (2016) 30. B. Bhargava, A. Johnson, G. Munyengabe, and P. Angin, A Systematic Approach for Attack Analysis and Mitigation in V2V Networks, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) Vol. 7, No. 1, pp. 79-96, 2016 31. R. Jiang, X. Wu, B. Bhargava, SDSS-MAC: Secure data sharing scheme in multi authority cloud storage systems, Computers and Security Vol. 62, pp 193-212, 2016 32. R. Fernando, R. Ranchal,
B. An, L. ben Othmane, B. Bhargava. "Consumer Oriented Privacy Preserving
Access Control for Electronic Health Records", 9th IEEE International
Conference on Cloud Computing (CLOUD'16), June 2016. 33. R. Ranchal, B. Bhargava,
R. Fernando, H. Lei, Z. Jin. "Privacy Preserving Access Control in Service
Oriented Architecture", 23rd IEEE International Conference on Web Services
(ICWS'16), June 2016. 34. N. Ahmed, B. Bhargava.
"Disruption-Resilient Publish and Subscribe",
Proceedings of 6th International Conference on Cloud Computing and Services
Science (CLOSER'16), April 2016 (Best Paper Award). 35. P.
Angin, B. Bhargava, and R. Ranchal. "Tamper
Resistance Autonomous Agent-based Mobile Computing ", Proceedings of
IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul,
Turkey, April, 2016 36. C.
Qu, D. Ulybyshev, B.
Bhargava, R. Rohit, and L. Lilien. "Secure Dissemination
of Video Data in Vehicle-to-vehicle Systems", 6th Intl. Workshop on
Dependable Network Computing and Mobile Systems (DNCMS 2015) in conjunction
with SRDS'15. Slides (pdf)
, Slides (PowerPoint) 37. X.
Wu, R. Jiang, B. Bhargava, "On the Security of Data Access Control for
Multiauthority Cloud Storage Systems", IEEE Transactions on Service
Computing, To Appear, accepted for Publication. 38. B. Bhargava, P. Angin, R.
Ranchal, S. Lingayat. "A Distributed
Monitoring and Reconfiguration Approach for Adaptive Network Computing",
6th International Workshop on Dependable Network Computing and Mobile Systems
(DNCMS 2015) in conjunction with SRDS'15. Slides 39. P. Angin and B. Bhargava,
"A Self-Cloning Agents Based Model for High-Performance Mobile-Cloud
Computing", 8th IEEE International Conference on Cloud Computing (IEEE
CLOUD), New York, June, 2015. 40. R. Ranchal, A. Mohindra,
N. Zhou, S. Kapoor, B. Bhargava, "Hierarchical Aggregation of Consumer
Ratings for Service Ecosystem", 22nd IEEE International Conference on Web
Services (IEEE ICWS), New York, June 2015. 41. N. Ahmed and B. Bhargava,
"Towards Targeted Anomaly Detection Deployments in Cloud Computing",
IEEE Int. Conference on Cloud Computing and Services Science, Lisbon, Portugal,
May 2015. 42. 43. Y. Zhong, B. Bhargava, Y.
Lu, P. Angin, "A computational Dynamic Trust Model for User
Authorization", IEEE Transaction on Dependable and Secure Computing, Vol.
12, No. 1, pp. 1-15, 2015. 44. L. Othmane, R. Fernando,
R. Ranchal, B. Bhargava, E. Bodden, "Incorporating Attacker Capabilities
in Risk Estimation and Mitigation", Computers and Security, Vol. 51, pp.
41-61, June 2015. 45. L. Othmane, P. Angin and
B. Bhargava, "Using Assurance Cases to Develop Iteratively Security
Features Using Scrum", In Proceedings of ARES, 2014, pp. 490-497. 46. K. Xu, Y. Sun, B.
Bhargava, "An Introduction to the Enterprise-Participant (EP) Data
Model", International Journal of Next Generation Computing (IJNGC), Vol.
5, No. 3, pp. 304-317, 2014. 47. L. Othmane, R. Fernando,
R. Ranchal, B. Bhargava, E. Bodden, "Likelihood of Threats to Connected
Vehicles", International Journal of Next Generation Computing (IJNGC),
Vol. 5, No. 3, pp. 290-303, 2014. 48. R. Jiang and B. Bhargava,
"Formal Theory for Security Protocol Analysis of Distributed Denial of
Service", International Journal of Next Generation Computing (IJNGC), Vol.
5, No. 3, pp. 233-248, 2014. 49. A. Can and B. Bhargava,
"k-anonymity Chord for Anonymous Query Response", International
Journal of Next Generation Computing (IJNGC), Vol. 5, No. 3, pp. 274-289, 2014. 50. B. Panja, D. Morrison, P.
Meharia, B. Bhargava, A. Prakash, "Group Security of V2Vusing Cloud
Computing Processing and 4G Wireless Services", International Journal of
Next Generation Computing (IJNGC), Vol. 5, No. 3, pp. 218-232, 2014. Online 51. A. Miles, Y. Bai, D.
Chinn, B. Bhargava, "An Experimental Study of Hybrid Energy-Aware
Scheduling in a Cloud Testbed", in the Proceedings of the 6th Global
Information Infrastructure and Networking Symposium, Montreal, Canada,
September 2014. 52. B. Bhargava, I. Khalil,
R. Sandhu. "Securing Big Data Applications in the Cloud", Guest
Editors Introduction, IEEE Cloud Computing Vol. 1, No. 3, pp. 24-26, 2014. 53. H. Chen, B. Bhargava, Z.
Fu, "Multilabels-Based Scalable Access Control for Big Data Applications",
IEEE Cloud Computing Vol. 1, No. 3, pp. 65-71, 2014. 54. L.
Lilien, L. ben Othmane, P. Angin, A. DeCarlo, R. Salih, B. Bhargava, "A
Simulation Study of Ad Hoc Networking of UAVs with Opportunistic Resource
Utilization Networks", Journal of Network and Computer Applications,
Special Issue on Advanced Technologies for Homeland Defense and Security, Vol.
38, pp. 3-15, February 2014. PDF 55. L. ben Othmane, P. Angin,
H. Weffers, B. Bhargava, "Extending the Agile Development Approach to
Develop Acceptably Secure Software", IEEE Transactions on Dependable and
Secure Computing", Vol. 11, No. 6, pp. 497-509, 2014. 56. Sabu M. Thampi, Bharat
Bhargava, Pradeep Atrey, "Managing Trust in Cyberspace (Hardback)",
CRC Press Inc, 26 December 2013, ISBN 13: 9781466568440 ISBN 10: 1466568445. 57. P. Angin and B. Bhargava,
\93A Confidence Ranked Co-occurrence Approach for Accurate Object Recognition in
Highly Complex Scenes\94, Journal of Internet Technology, Vol. 14, No. 1, pp.
13-19, 2013. 58. T. Gong and B. Bhargava,
\93Immunizing mobile ad hoc networks against collaborative attacks using
cooperative immune model\94, Security and Communication Networks Vol. 6, pp.
58-68, 2013. 59. L.B. Othmane, H. Weffers,
P. Angin, B. Bhargava, "A Time-Evolution Model for the Privacy Degree of
Information Disseminated in Online Social Networks", International Journal
of Communication Networks and Distributed Systems, Vol. 11, No. 4, pp. 412-430,
2013. 60. H. Kim, R. Oliveira, B.
Bhargava, J. Song, "A Novel Robust Routing Scheme against Rushing Attacks
in Wireless Ad Hoc Networks", Wireless Personal Communications, Vol. 70,
No. 4, pp. 1339-1351, ISSN: 0929-6212, 2013. 61. Pelin Angin and Bharat
Bhargava, "An Agent-based Optimization Framework for Mobile-Cloud
Computing", Journal of Wireless Mobile Networks, Ubiquitous Computing and
Dependable Applications, Vol. 4, No. 2, pp. 1-17, 2013. PDF 62. Lotfi ben Othmane, Harold
Weffers, Rohit Ranchal, Pelin Angin, Bharat Bhargava, Mohd Murtadha Mohamad,
"A Case for Societal Digital Security Culture", 28th IFIP TC 11
International Conference, SEC 2013, Auckland, New Zealand, July, 2013, pp.
391-404. PDF 63. N. Ahmed, M. Linderman,
R. Gamble, B. Bhargava, "Analysis of End to End SOA Security Protocols
with Mobile Devices", IEEE Mobile Data Management Conference and Workshop,
Milan, June, 2013. 64. Nelcileno Virgilio de
Souza Araujo, Ruy de Oliveira, Ailton Akira Shinoda, Bharat Bhargava,
"Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion
Detection in Computer Networks", In Proceedings of IEEE International
Conference on Trust, Security, and Privacy in Computing and Communications,
(TrustCom), Melbourne, pp. 271-276, July 2013. DOCX
65. Lei Yao, Tao Gong, Jin
Fan, Bharat Bhargava, "Research on ARM9-Based Intelligent Immune System
for Avoiding Rear-End Collision", International Journal of Immune
Computation (IC) Vol. 1, No. 1, pp. 4-8, 2013. DOC
66. Biswajit Panja, Bharat
Bhargava, Sourav Pati, Dayton Paul, Leszek Lilien, Priyanka Meharia,
"Monitoring and Managing Cloud Computing Security using Denial of Service
Bandwidth Allowance", Recent Patents on Computer Science, Vol. 6, No. 1,
pp. 73-81, 2013. PDF 67. Taeshik Shon, Athanasios
V. Vasilakos, B. Bhargava, Ivan Stojmenovic, Hai Jin, Albert Y. Zomaya,
Editorial for Special Issue on "New Technologies and Applications for
Wireless Communications & Mobile Cloud Computing", MONET Vol. 18, No.
1, pp. 98-102, 2013. 68. Karthik Kumar, Jibang
Liu, Yung-Hsiang Lu, Bharat Bhargava, "A Survey of Computation Offloading
for Mobile Systems", MONET Vol. 18, No. 1, pp. 129-140, 2013. PDF 69. A. B. Can and B.
Bhargava, "SORT: A Self-Organizing Trust Model for Peer-to-Peer
Systems", IEEE Transactions on Dependable and Secure Computing Vol. 10,
No. 1, pp. 14-27, 2013. PDF 70. B. Bhargava, R. Ranchal, L. B. Othmane,
"Secure Information Sharing in Digital Supply Chains", In Proceedings
of IEEE International Advance Computing Conference (IACC), 2013. PDF 71. R. Ranchal,
B. Bhargava, "Protecting PLM Data throughout their lifecycle", In
Proceedings of 9th International Conference on Heterogeneous Networking for
Quality, Reliability, Security and Robustness (QSHINE), 2013. PDF 72. B. Bhargava, P. Angin, R.
Ranchal, R. Sivakumar, A. Sinclair, M. Linderman, "A Trust-based Approach
for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs",
International Journal of Next Generation Computing (IJNGC), Vol. 3, No. 1,
2012. PDF 73. N.C. Idika and B.
Bhargava, "Extending Attack Graph-Based Security Metrics and Aggregating
Their Application", IEEE Transactions on Dependable and Secure Computing
Vol. 9, No. 1, pp. 75-85, 2012. PDF 74. S.K. Dhurandher, I.
Woungang, A. Gupta, B. Bhargava, "E2SIW: An Energy Efficient Scheme Immune
to Wormhole Attacks in Wireless Ad Hoc Networks", AINA Workshops 2012, pp.
472-477. PDF 75. Nelcileno Ara\FAjo, Ruy de
Oliveira, Ed Wilson Tavares Ferreira, Valtemir Nascimento, Ailton Shinoda
Akira, Bharat Bhargava, "Performance Evaluation of the Fuzzy ARTMAP for
Network Intrusion Detection", International Conference on Security in
Computer Networks and Distributed Systems (SNDS), 2012, pp. 23-34. PPTX 76. M. Azarmi, B. Bhargava,
P. Angin, R. Ranchal, N. Ahmed, A. Sinclair, M. Linderman, L.B. Othmane,
"An End-to-End Security Auditing Approach for Service Oriented
Architectures", International Symposium on Reliable Distributed Systems
(SRDS), 2012. PDF 77. F. Ruchith, B. Bhargava, M. Linderman,
"Private anonymous messaging", International Symposium on Reliable Distributed Systems
(SRDS), 2012. PDF 1. B. Bhargava, P. Angin, L. Duan. "A
Mobile-Cloud Pedestrian Crossing Guide for the Blind", International
Conference on Advances in Computing & Communication, 2011. PDF 2. Y. Zhang and B. Bhargava.
"Allocation schemes, Architectures, and Policies for Collaborative Port
Scanning Attack", Journal of Emerging Technologies in Web Intelligence,
Vol. 3, No. 2, pp. 154-167, May 2011, doi:10.4304/jetwi.3.2.154-167. 3. B. Bhargava, N. Singh, A.
Sinclair, "Privacy in Cloud Computing Through Identity Management",
International Conference on Advances in Computing and Communication (ICACC-11),
April, 2011, India. PDF 4. P. Guturu,
B. Bhargava, "Cyber-Physical Systems: A confluence of Cutting Edge
Technology Streams", International Conference on Advances in Computing and
Communication (ICACC-11), April, 2011, India. PDF 5. N. Idika,
B. Bhargava, "A Kolmogorov Complexity Approach for Measuring Attack Path
Complexity", in Proceedings of IFIP International Information Security
Conference (SEC), June 2011, Lucerne, Switzerland. PDF 6. P. Angin and B. Bhargava,
"Real-time Mobile-Cloud Computing for Context-Aware Blind
Navigation", International Journal of Next Generation Computing (IJNGC),
Vol. 2. No 2, 2011. 7. A. Shirsat and B.
Bhargava, "Local geometric algorithm for hole boundary", Security and
Communication Networks 2010, Wiley Online Library, DOI: 10.1002/sec.271;
3:1\9610. 8. R. Ranchal,
B. Bhargava, L. Othmane, L. Lilien,
A. Kim, M. Kang, M. Linderman, "Protection of
Identity Information in Cloud Computing without Trusted Third Party", in
Proceedings of Third International Workshop on Dependable Network Computing and
Mobile Systems (DNCMS 2010) in conjunction with 29th IEEE Symposium on Reliable
Distributed System (SRDS), Oct 2010, New Delhi, India. PDF 9. P. Angin,
B. Bhargava, R. Ranchal, N. Singh, L. Lilien, L. Othmane, M. Linderman, "An Entity-Centric Approach for Privacy and
Identity Management in Cloud Computing", in Proceedings of 29th IEEE
Symposium on Reliable Distributed System (SRDS), Nov. 2010, New Delhi, India. PDF 10. P. Angin,
B. Bhargava, S. Helal, "A Mobile-Cloud
Collaborative Approach for Context-Aware Blind Navigation", Grace Hopper
Celebration of Women in Computing, 2010. 11. P. Angin,
B. Bhargava, S. Helal, "A Mobile Cloud Collaborative
Traffic Lights Detector for Blind Navigation", 1st MDM International
Workshop on Mobile Cloud, 2010. PDF 12. N. C. Idika,
B. H. Marshall, B. K. Bhargava, " Maximizing network security given a
limited budget", In Proceedings of Richard Tapia Celebration of Diversity
in Computing Conference 2009, pp. 12-17. 13. B. Bhargava, Y. Zhang, N.
Idika, L. Lilien, M. Azarmi, "Collaborative Attacks in WiMAX
Networks", Wiley Journal on Security and Communication Networks, Vol. 2,
No. 5, pp. 373-391, 2009. 14. Y. Zhang and B. Bhargava,
"Self-Learning Disk Scheduling", IEEE Transactions on Knowledge and
Data Engineering, Vol. 21, No. 1, January 2009. 15. W. Wang, Z. Li, R Owens,
B. Bhargava, "Secure and Efficient Access to Outsourced Data", ACM
Cloud Computing Security Workshop (CCSW) in conjunction with the 16th ACM
Conference on Computer and Communications Security (CCS), November 2009,
Chicago, IL. 16. Y. Bai, X. Su, B.
Bhargava, "Detection and Filtering Spam over Internet Telephony - A
User-behavior-aware Intermediate-network-based Approach", In Proceedings
of ICME, 2009. PDF 17. E. Ferreira, R. Olivier,
G. Carrijo, B. Bhargava, "Intrusion Detection in
Wireless Mesh Networks Using a Hybrid Approach", IEEE International Conference
on Distributed Computing Systems Workshop SAHN, May, 2009, Montreal. 18. B. Bhargava, R. Olivier,
Y. Zhang, N. Idika, "Addressing Collaborative
Attacks and Defense in Ad Hoc Wireless Networks", IEEE International
Conference on Distributed Computing Systems Workshop SAHN, May, 2009, Montreal. 19. W. Wang and B. Bhargava,
"Defending against Collaborative Packet Drop Attacks on MANET", in
Proceedings of IEEE Symposium on Reliable Distributed System (SRDS) workshop on
Dependable Network Computing and Mobile Systems, Sept., 2009, Buffalo, NY. 19. Wang, W., Li, Z., Owens, R. and Bhargava, B., 2009, November. Secure and efficient access to outsourced data. In Proceedings of the 2009 ACM workshop on Cloud computing security (pp. 55-66). Acm [PDF] 20. R. Olivier, B. Bhargava,
M. Azarmi, W. Ferreira, W. Wang, M. Linderman, "Developing Attack Defense Ideas for Ad Hoc
Wireless Networks", in Proceedings of IEEE Symposium on Reliable
Distributed System (SRDS) workshop on Dependable Network Computing and Mobile
Systems, Sept. 2009, Buffalo, NY. PDF 21. W. Wang, J. Kong, B.
Bhargava, and M. Gerla, "Visualization of Wormholes in Underwater Sensor
Networks: A Distributed Approach", International Journal of Security and
Networks, Vol. 3, No. 1, pp. 10-23, 2008. PDF 22. S.P. Mohanty,
B. Bhargava, "Invisible Watermarking Based on Creation and Robust
Insertion-Extraction of Image Adaptive Watermarks", ACM Transactions on
Multimedia Computing, Communications, and Applications (TOMCCAP), Vol. 5, No.
2, November 2008. PDF 23. B. Panja,
S. Madria, B. Bhargava, "Energy and Communication
Efficient Group Key Management Protocol for Hierarchical Sensor Networks",
Vol. 3, No. 2, April 2007. PDF 24. M. Jenamani,
Y. Zhong, and B. Bhargava, "Cheating in Online
Auction: Towards Explaining the Popularity of English Auction", Journal of
Electronic Commerce Research and Applications (ECRA), 2007. PDF 25. X. Wu, B. Mukherjee, and
B. Bhargava, "A Crossing-tier Location Update/Paging Scheme in
Hierarchical Cellular Networks", IEEE Transactions on Wireless
Communications, Vol. 4, No. 5, pp. 839-848, 2006. PDF
26. Y. Lu, W. Wang, D. Xu,
and B. Bhargava, "Trust based Privacy Preservation in Peer to Peer Data
Sharing", IEEE Transaction on Systems Man and Cybernetics (Special issue
based on best papers in Secure Knowledge Management Conference), Vol. 36, No.
3, pp. 498-502, 2006. PDF 27. G. Ding, Z. Sahinoglu, P. Orlik, J. Zhang,
and B. Bhargava, "Tree-Based Data Broadcast in IEEE 802.15.4 and ZigBee
Networks", IEEE Transactions on Mobile Computing, Vol. 5, No. 11, pp.
1561-1574, November, 2006. PDF 28. G. Ding, X. Wu, and B.
Bhargava, "Performance Evaluation of Multiple-Rate Mobile Wireless Ad Hoc
Networks", International Journal of Performance Evaluation, Vol. 63, No.
11, pp. 1110-1126, 2006. PDF 29. B. Panja,
S. Madria, and B. Bhargava, "Energy and
Communication Efficient Group Key Management Protocol for Hierarchical Sensor
Networks", IEEE International Conference on Sensor Networks, Ubiquitous,
and Trustworthy Computing (SUTC2006), June 2006. 30. A. Habib, S. Fahmy, and B. Bhargava, "Monitoring and Controlling QoS Network Domains", ACM/Wiley International Journal
of Network Management, Vol. 15, No. 1, pp. 11-29, Jan-Feb 2005. PDF 31. W. Wang, B. Bhargava, Y.
Lu, and X. Wu, "Defending Against Wormhole Attacks in Mobile Ad Hoc
Networks", Wiley Journal on Wireless Communications and Mobile Computing,
Vol. 5, pp. 1-21, 2005. PDF 32. B. Bhargava, S. Wang, M.
Khan, and A. Habib, "Multimedia Data Transmission and Contol
Using Active Networks ", Special Issue on Activated and Programmable
Internet, Journal of Computer Communications Vol. 28, No. 6, pp. 623-639, April
2005. PDF 33. X. Wu and B. Bhargava,
"A02P: Ad Hoc On-Demand Position-Based Private Routing Protocol", IEEE
Transactions on Mobile Computing Vol. 4, No. 4, pp. 335-348, July, 2005. PDF 34. A. Habib, D. Xu, M. Atallah, B. Bhargava, J. Chuang, "A tree-based Forward
Digest Protocol to Verify Data Integrity in Distributed Media Streaming",
IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 7, July,
2005. PDF 35. M. Hefeeda,
A. Habib, D. Xu, B. Bhargava, and B. Botev, "CollectCast: A Peer-to-Peer Service for Media
Streaming", ACM/Springer Multimedia Systems Journal, Vol. 11, No. 1,
Sept., 2005. PDF 36. B. Bhargava, M. Jenamani, and Y. Zhong,
"Counteracting Shill Bidding in Online English Auction",
International Journal of Cooperative Information Systems, Vol. 14, No. 2-3, pp.
245-263, Oct., 2005. PDF 37. A. Habib, D. Xu, M. Atallah, B. Bhargava, "Verifying Data Integrity in
Peer to Peer Video Streaming", in Proceedings of Multimedia SPIE/ACM Twelth Conference on Computing and Network (MMCN),
Berkeley, January 2005. PDF 38. G. Ding, Z. Sahinoglu, P. Orlik, J. Zhang,
and B. Bhargava, "Reliable Broadcast in ZigBee Networks", IEEE
Conference on Sensor and Ad Hoc Communications and Networks (SECON), Santa
Clara, September, 2005. 39. A. Kumar, A. Bhargava, B.
Bhargava, S. Madria, "Adaptable Web Browsing of
Images in Mobile Computing Environment: Experiments and Observations", in
International Conference on Distributed Computing & Internet Technology
(ICDCIT), Bhubaneswar, India, Dec. 2005. 40. R. M. Garimella,
H. R. Gogineni, and B. Bhargava, "Modeling
Adaptive Routing in Wireless and Other Networks Using Coupled Queues", in
the 12th IEEE International Conference on High Performance Computing: Workshop
on Next Generation Wireless networks, Goa, December 18-21, 2005. 41. J. Kong, Z. Ji, W. Wang,
M. Gerla, R. Bagrodia, and
B. Bhargava, "Low-cost Attacks against Packet Delivery, Localization and
Time Synchronization Services in Under-Water Sensor Networks", in
Proceedings of ACM Workshop on Wireless Security (WiSe),
in conjunction with MobiCom, 2005. 42. W. Wang and B. Bhargava,
"Key Distribution and Update for Secure Inter-group Multicast
Communication", in Proceedings of ACM Workshop on Security of Ad Hoc and
Sensor Networks (SASN), in conjunction with ACM CCS, 2005. PDF 43. M. Hefeeda,
B. Bhargava, and D. Yau, "A Cost-Effective
Architecture for On-demand Media Streaming", Journal of Computer Networks,
Vol. 44, No. 4, pp. 353-382, March 2004. PDF 44. B. Bhargava, C. Shi and
S. Wang, "MPEG Video Encryption Algorithms", Multimedia Tools and
Applications, Vol. 24, No. 3, pp. 57-79, April, 2004. PS 45. B. Bhargava, X. Wu, Y.
Lu, and W. Wang, "Integrating Heterogeneous Wireless Technologies: A
Cellular Aided Mobile Ad Hoc Network (CAMA)", ACM Special Issue of the
Journal on Special Topics in Mobile Networking and Applications (MONET), Vol.
9, pp. 393-408, 2004. PS 46. B. Bhargava, L. Lilien, A. Rosenthal, and M. Winslett,
"Pervasive Trust", IEEE Intelligent Systems, Vol. 19, No. 5, 74-88,
Sept./Oct. 2004. PDF 47. X. Wu, G.-H. Gary Chan,
B. Mukherjee, and B. Bhargava, "Mobile-Assisted Data Forwarding for
Wireless Networks", in Journal of Communications and Networks, Vol. 6, No.
3, pp. 216-225, Sept. 2004. PDF 48. A. Habib, M. Khan and B.
Bhargava, "Edge-to-Edge Measurement-based Distributed Network
Monitoring", Elsevier Computer Networks Journal, Vol. 44, No. 2, pp.
211-233, Feb 2004. PDF 49. G. Ding and B. Bhargava,
"Peer-to-peer File-sharing over Mobile Ad hoc Networks", in the First
International Workshop on Mobile Peer-to-Peer Computing, Orlando, Florida,
March 2004. PDF 50. P. Ruth, D. Xu, B.
Bhargava, and F. Regnier, "E-notebook Middleware
for Accountability and Reputation Based Trust in Distributed Data Sharing
Communities", in Proceedings of 2nd International Conference on Trust
Management (Springer Verlag), London, UK, March 2004.
PDF 51. M. Jenamani,
L. Lilien, and B. Bhargava, "Anonymizing Web
Services Through a Club Mechanism with Economic Incentives", in
Proceedings of International Conference on Web Services (ICWS 2004), San Diego,
California, July 2004, pp. 792-795. PDF 52. B. Bhargava and L. Lilien, "Private and Trusted Collaborations", in
Proceedings of NSF/NSA/AFRL Conference on Secure Knowledge Management (SKM),
Amherst, N.Y., Sept. 2004. (Invited paper.) 53. Yi Lu, Weichao Wang, Dongyan Xu, and B.
Bhargava, "Trust-Based Privacy Preservation for Peer-to-peer Media
Streaming", in Proceedings of NSF/NSA/AFRL Conference on Secure Knowledge
Management (SKM), Amherst, NY, Sep. 2004. (Selected as one of the two best
papers) 54. Yuhui Zhong,
and B. Bhargava, "Using Entropy to Tradeoff Privacy and Trust", in
Proceedings of NSF/NSA/AFRL Conference on Secure Knowledge Management (SKM),
Amherst, NY, Sep. 2004. 55. W. Wang and B. Bhargava,
"Visualization of Wormholes in Sensor Networks", in Proceedings of
ACM Workshop on Wireless Security (WiSe), in
conjunction with MobiCom, October, 2004. 56. G. Ding, X. Wu, and B.
Bhargava, "A Simulation Study on Multi-Rate Mobile Ad Hoc Networks",
in ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor,
Ubiquitous Networks, Venice, Italy, Oct. 2004. 57. B. Bhargava and L. Lilien, "Vulnerabilities and Threats in Distributed
Systems", in Proceedings of International Conference on Distributed
Computing & Internet Technology (ICDCIT), Bhubaneswar, India, Dec. 2004.
(Keynote paper.) PDF 58. Y. Lu, B. Bhargava, W.
Wang, Y. Zhong, and X. Wu, "Secure Wireless
Network with Movable Base Stations", in IEICE Transaction on
Communications, IEICE/IEEE Joint Special Issue on Assurance Systems and
Networks, Vol. E86-B, No. 10, pp. 2922-2930, 2003. 59. X. Wu, B. Mukherjee,
G.-H. Chan and B. Bhargava, "Assuring Communications by Balancing Load in
Cellular Networks", in IEICE Transaction on Communications, IEICE/IEEE
Joint Special Issue on Assurance Systems and Networks, Vol. E86-B, No. 10, pp.
2912-2921, 2003. 60. B. Bhargava, Y. Zhong, and Y. Lu, "Fraud Formalization and
Detection", in Proceedings of DaWak 2003. 61. I. Chung, B. Bhargava, M.
Mahoui, and L. Lilien,
"Autonomous Transaction Processing Using Data Dependency in Mobile
Environments", in FTDCS 2003, San Juan, Puerto Rico, May 2003. PDF 62. G. Ding, H. Ghafoor and B. Bhargava, "Resilient Video Transmission
over Wireless Networks", in the 6th IEEE International Conference on
Object-oriented Real-time Distributed Computing, Japan, May 2003. PDF 63. M. Hefeeda
and B. Bhargava, "On-Demand Media Streaming Over the Internet", in
FTDCS'03. 64. Y. Lu, W. Wang, Y. Zhong and B. Bhargava, "Study of Distance Vector
Routing Protocols for Mobile Ad Hoc Networks", in Proceedings of IEEE
International Conference on Pervasive Computing and Communications
(PerCom),Texas, March 2003. 65. W. Wang, Y. Lu and B.
Bhargava, "On Security Study of Two Distance Vector Routing Prototols for Mobile Ad Hoc Networks", in Proceedings
of IEEE International Conference on Pervasive Computing and Communications
(PerCom), Texas, March 2003. 66. A. Habib, M. Hefeeda and B. Bhargava, "Detecting Service Violations
and DoS Attacks", in Proceedings of Network and
Distributed System Security (NDSS), Feb. 2003. 67. Y. Lu, W. Wang and B.
Bhargava, "Hierarchical Structure for Supporting Movable Base Stations in
Wireless Networks", in Proceedings of International Conference on
Telecommunications (ICT), Papeete, French Polynesia,
Feb. 2003. 68. W. Wang, Y. Lu and B.
Bhargava, "On Vulnerability and Protection of Ad Hoc On-demand Distance
Vector Protocol", in Proceedings of International Conference on
Telecommunications (ICT), Papeete, French Polynesia,
Feb. 2003. 69. A. Bhargava and M. Zoltowski, "Sensors and Wireless Communication for
Medical Care", in Proceedings of DEXA, Prague, Czech Republic, Sep. 2003. DOC 70. A. Habib, S. Fahmy. S. Avasarala, V. Prabhakar and B. Bhargava, "On Detecting Service
Violations and Bandwidth Theft in QoS Network
Domains", Elsevier Science Journal of Computer Communication, Vol. 26, No.
8, pp. 861-871, 2003. 71. D. Yau
and B. Bhargava, "Heterogeneous CPU Services Using Differentiated
Admission Control", Journal of Multimedia Tools and Applications, Special
Issue on QoS in Multimedia Networks, Vol. 17, pp.
213-232, July 2002. PS 72. S. Madria,
M. Tubaishat and B. Bhargava, "Performance
Evaluation of Linear Hash Structures in a Nested Transaction Environment",
Journal of Systems and Software, Vol. 63, No. 3, May 2002. 73. S. Madria,
M. Mohania, B. Bhargava and S. Bhowmick,
"Mobile Data and Transactions", Information Science Journal, Vol.
141, No. 3-4, April 2002. \A0[Back to top]
1. KMA Solaiman (E-mail: ksolaima@purdue.edu) 2. Mijanur Palash (E-mail: mpalsh@purdue.edu) 3. Trevor A Bonjour (E-mail: tbonjour@purdue.edu) 4. Shafkat Islam (E-mail: islam59@purdue.edu) 5. MD Shamsul Kaonain (E-mail: mkaonain@purdue.edu) 6. Aala Oqab-Alsalem 1. Marina Wagdy Wadea Haliem (E-mail: mwadea@purdue.edu) 2. Alina V Nesen (E-mail: anesen@purdue.edu) 3. Norman Ahmed 5. Guneshi Wickramaarachchi
7. Mehdi Azarmi 8. Pelin Angin 1. Rui Jiang (Visiting Scholar)
2. Tao Gong (Visiting
Scholar) \A0[Back to top]
1.
WAXEDPRUNE 2019 prototype demo video 2. ICACEEE 2018 Keynote Talk, May 11-12, 2018, Zurich, Switzerland
V2V Slides: pdf /
V2V Slides: pptx 3. NGCRC Symposium Apr.18-19 2018
Slides
IAS Reflexivity/Data Provenance/Blockchain DEMO video
4. IEEE ICIOT 2017 Conference, June 25-30, 2017, Honolulu (Hawaii)
IoT Paper: pdf ;
IoT Slides: pdf /
IoT Slides: ppt 5. IEEE ICIOT 2017 Conference, June 25-30, 2017, Honolulu (Hawaii)
V2V Paper: pdf ;
V2V Paper Slides: pdf /
V2V Paper Slides: pptx 6. IEEE Cloud 2017 Conference, June 25-30, 2017, Honolulu (Hawaii)
MTD Paper: pdf ;
MTD Paper Slides: pdf /
MTD Paper Slides: pptx /
MTD Demo Video 7. IEEE Cloud 2017 Conference, June 25-30, 2017, Honolulu (Hawaii)
Data Dissemination Paper: pdf ;
Data Dissemination Paper Slides: pdf /
Data Dissemination Paper Slides: pptx /
Data Dissemination Demo Video 8. NGCRC Symposium Apr.25-26 2017
Slides
Secure Data Dissemination/Provenance DEMO video
Secure/Resilient Systems DEMO video
9. ADI (Sypris) Meeting Feb 2017
pptx / pdf
10. NGCRC Meeting at Purdue,
Nov.04 2016. 2015-2016
Project Report Slides: pdf / pptx 2016-2017 Proposed
Research Slides: pdf / pptx 11. NGCRC Symposium Apr.25-26
2016 Secure
EHR dissemination (slides) / Demo
video / Adaptable
Service Composition Demo Secure EHR
dissemination (Prototype Tutorial) 12. NGCRC Meeting 2015 pptx / pdf
13. Keynote talk at DNCMS'15 (in conjunction with
SRDS 2015) / Download version 14. 2015 IEEE Cloud Panel slides
15. NGCRC TechFest 2015: slides tutorial demo:trusted
demo:untrusted
16. Technologies
to help Navigation for Blind persons 17. NGCRC meeting
- November 2014 18. Bhargava
Colloquia April 2014 20. E2E Security in Service
Oriented Architecture (AFRL): slides
21. E2E-Mobile Cloud
Security: slides 22. Mobile-Cloud Computing: slides 23. High-Performance
Mobile-Cloud Computing with Agents: slides
24. Cloud Computing for
Blind: slides 25. Mobile-Cloud Signal
Detector for Blind Pedestrians: slides 26. Talk at India: slides 27. Abstract 28. IFIP-SEC-2011-Lucern Paper, Slides, Comments 29. Tutorial on Cloud
Computing Tutorial 30. Detecting Service
Violation in Internet and Mobile Ad Hoc Networks Slides,
Abstract 31. Trust-based Privacy
Preservation for Peer-to-peer Data Sharing Slides
32. 2004 December ICDCIT
"Vulnerabilities and Threats in Distributed Systems" - conference
slide presentation and extended slide presentation:: Slides, Extended Slides. 33. 2004 October NSF IDM
Trust Slides: Slides 34. 2004 NSF/NSA/AFRL Buffalo
workshop: Entropy
Paper, P2P Data Sharing Paper, CAMA Poster,
Location
Privacy Slides, Location
Privacy Paper 35. 2004 NSF IDM Boston PI
Meeting: Report 36. Academic Talk at Your
University: Abstract, Bio,
Seminar Slides 37. Pittsburgh PI Meeting: Slides 38. Talk at WSU: Abstract, Bio, Seminar Slides, Detailed
Slides, Vision 39. Anonymizing Web Service
Slides 2004: slides 40. Private and Trusted
Interactions - CERIAS Symposium, March 2004: slides
41. Anu Bhargava's Talk at
University of Bern, 2004: slides 42. Talk at ECE Department,
Northwestern University: slides 43. Talk at Motorola: Short Version, Full
Version 44. PerCom 2003 Bhargava : slides 45. PerCom 2003 Wang : slides 46. vision
47. Talk at MDDS 2003: slides 48. Talk at DaWak 2003: slides
49. Talk at NSF IDM Workshop,
Seattle, 2003: Breakout, Formalization 50. Talk at IU Med: slides 51. Talk for Secure Data
Warehouse: slides 52. Talk at Sweden, Berlin,
and Helsinki: slides 53. Talk at Karlstad: slides 54. Privacy: slides 55. Collaborative Attack Slides 56. ICSM 2007 slides 57. Opportunistic Networks slides 58. Las Vegas AI Conference slides 59. NGCRC IAS Short Presentationslides 60. NGCRC IAS Long Presentation slides 61. NIT - Presentation Slides - Security slides 62. NIT - Security slides 63. REALM Situational Knowledge on Demand slides 64. Las Vegas CSCI slide
CSCI-paper-slide-pdf /
Presentation Video /
CSCI-paper-slide-pptx 65. Las Vegas Keynote slides
CSCI-Keynote-pptx /
CSCI-Keynote-pdf Selected Publications
(since 2001)
Students/Postdocs:
Current PhD Students (updated Feb 2023)
Graduated Students
Visiting Scholars
Miscellaneous
Research Materials:
Teaching:
Colloquia and conference slides:
Secure
Dissemination of Video Data in V2V systems (DNCMS'15, in conjunction with SRDS
2015) / Download
PowerPoint version
A Distributed
Monitoring and Reconfiguration Approach for Adaptive Network Computing
(DNCMS'15, in conjunction with SRDS 2015) / Download PowerPoint version
Demos:
Data
dissemination with active bundles in healthcare scenario / Download version
Data
dissemination with active bundles launched from secure browser in mission
scenario / Download version
Data
dissemination with active bundles launched from insecure browser in mission
scenario / Download version
P2P data
sharing in UAV network using active bundles / Download
version
Dynamic
Service Composition Reconfiguration / Download
version
\A0[Back to top]
Please apply directly to the dept. RA positions may only be available to students who have spent two years at CS and passed qualifier exams.
Please put your transcripts and resume in my mail box.
Please check our website. Give me an abstract of what independent study project that
you plan to do and how you will proceed. After this information, I will communicate with you.
You will work with a grad student to complete your project and report will be needed.