Name
Affiliation
Papers
SNEHA KUMAR KASERA
University of Utah
69
Collaborators
Citations 
PageRank 
138
1011
89.86
Referers 
Referees 
References 
2130
1454
728
Search Limit
1001000
Title
Citations
PageRank
Year
A Non-Cooperative Game-Based Distributed Beam Scheduling Framework for 5G Millimeter-Wave Cellular Networks10.362022
DeepRadar: a deep-learning-based environmental sensing capability sensor design for CBRS00.342021
A Q-Learning-Based Approach for Distributed Beam Scheduling in mmWave Networks00.342021
How to Get Away with MoRTr: MIMO Beam Altering for Radio Window Privacy00.342021
Powder: Platform For Open Wireless Data-Driven Experimental Research20.412021
Quantifying Interference-Assisted Signal Strength Surveillance Of Sound Vibrations00.342021
LLOCUS: learning-based localization using crowdsourcing00.342020
POWDER: Platform for Open Wireless Data-driven Experimental Research10.362020
Auto-Scaling Cloud-Based Memory-Intensive Applications10.362020
Spectrum Sharing in CBRS Using Blockchain00.342020
Sitara: Spectrum Measurement Goes Mobile Through Crowd-Sourcing00.342019
Demo Abstract: Cost-Effective Crowdsensing: Spectrum Monitoring with Sitara00.342019
Scheduling virtual wifi interfaces for high bandwidth video upstreaming using multipath TCP.00.342019
On-Off Noise Power Communication10.352019
Cloud Functions for Fast and Robust Resource Auto-Scaling30.402019
Privacy-Aware Peak Load Reduction in Smart Homes00.342019
Towards Wireless Environment Cognizance Through Incremental Learning00.342019
Privacy Enabled Crowdsourced Transmitter Localization Using Adjusted Measurements10.352018
Hybrid network clusters using common gameplay for massively multiplayer online games.00.342018
STRAP: Secure TRansfer of Association Protocol10.392018
Privacy Enabled Noise Free Data Collection in Vehicular Networks00.342018
EpiFi: An in-Home IoT Architecture for Epidemiological Deployments00.342018
Enabling WiFi in Open Access Networks.10.372017
Simultaneous Power-Based Localization of Transmitters for Crowdsourced Spectrum Monitoring.40.452017
Mobile Live Video Upstreaming00.342016
Efficient High-Rate Secret Key Extraction in Wireless Sensor Networks Using Collaboration110.602014
Towards understanding TCP performance on LTE/EPC mobile networks231.152014
Violating privacy through walls by passive monitoring of radio windows80.562014
Through Wall People Localization Exploiting Radio Windows.00.342013
Beyond OFDM: best-effort dynamic spectrum access using filterbank multicarrier100.552013
Secret Key Extraction from Wireless Signal Strength in Real Environments110.632013
Channel Sounding for the Masses: Low Complexity GNU 802.11b Channel Impulse Response Estimation.10.392012
Experimental Performance Evaluation of Location Distinction for MIMO Channels00.342011
Efficient dynamic spectrum access in vehicular networks using filterbank multicarrier00.342011
Emergency service in Wi-Fi networks without access point association00.342011
Securing wireless networks using unique device and link characteristics00.342011
Wireless network security00.342011
Distinguishing locations across perimeters using wireless link measurements.40.622011
Detecting malicious nodes in RSS-based localization20.402011
Secret key extraction in MIMO-like sensor networks using wireless signal strength10.352010
Mobility assisted secret key generation using wireless link signatures250.922010
On the Impact of MIMO Diversity on Higher Layer Performance100.722010
Robust uncorrelated bit extraction methodologies for wireless sensors531.972010
SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution60.462010
Channel Sounding for the Masses: Low Complexity GNU 802.11b Channel Impulse Response Estimation90.662010
On the effectiveness of secret key extraction from wireless signal strength in real environments1886.902009
Cross Layer Multirate Adaptation Using Physical Capture00.342009
Advancing wireless link signatures for location distinction352.642008
Statistical trust establishment in wireless sensor networks351.402007
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls70.542007
  • 1
  • 2