Name
Affiliation
Papers
RAJARATHNAM CHANDRAMOULI
Stevens Institute of Technology
53
Collaborators
Citations 
PageRank 
67
238
34.38
Referers 
Referees 
References 
607
766
326
Search Limit
100766
Title
Citations
PageRank
Year
Neural Decoding of Synergy-Based Hand Movements Using Electroencephalography.00.342019
Spectrum Management over Dynamic Spectrum Access based HetNets00.342019
Decoding Asynchronous Reaching in Electroencephalography Using Stacked Autoencoders.20.352018
Joint Spectrum and Energy Efficiency in Device to Device Communication Enabled Wireless Networks.10.352017
Biometrics Based on Hand Synergies and Their Neural Representations.20.372017
Software defined access for HetNets.80.522016
A Micro-Finance Model for Spectrum Management in Wireless Networks.20.412016
Complexity Analysis of CSMA Scheduling via Dependencies Matrix00.342015
Spatio-Temporal Analysis of Passive Consumption in Internet Media10.352015
Reciprocity, fairness and learning in medium access control games.10.352014
Exploiting Channel Fragmentation and Aggregation/Bonding to Create Security Vulnerabilities.40.402014
A Quantitative Model and Analysis of Information Confusion in Social Networks30.392013
Altruism in social networks: good guys do finish first.30.392013
Power Control Game in Multi-Terminal Covert Timing Channels.10.372012
Network measurement based modeling and optimization for IP geolocation180.692012
Measuring and quantifying the silent majority on the Internet40.442012
Cost of Collaboration vs Individual Effort in Social Networks.00.342011
Is Channel Fragmentation/bonding in IEEE 802.22 Networks Secure?70.612011
Security Vulnerability due to Channel Aggregation/Bonding in LTE and HSPA plus Networks10.362011
Estimation of missing RTTs in computer networks: Matrix completion vs compressed sensing10.362011
Standardization and research in cognitive and dynamic spectrum access networks: IEEE SCC41 efforts and other activities121.162010
Cross-Layer MAC Enabling Virtual Link for Multi-Hop Routing in Wireless Ad Hoc Networks20.382010
A novel portfolio optimization method for foreign currency investment00.342009
User strategy learning when pricing a RED buffer00.342009
Guest editorial: special issue on cognitive radio oriented wireless networks and communications30.372008
Blind source separation for steganalytic secret message estimation10.362007
Decentralized Learning For Pricing A Red Buffer00.342007
Steganalysis of GIM-based data hiding using kernel density estimation100.742007
Covert Channel Forensics on the Internet: Issues, Approaches, and Experiences30.452007
A Sequential Distinguisher for Covert Channel Identification00.342007
Priority Based Dynamic Spectrum Access With Qos And Interference Temperature Constraints72.412006
Learning through Multimedia Interaction20.392006
A Bayesian image steganalysis approach to estimate the embedded secret message20.432005
Analysis and performance evaluation of a fair channel access protocol for open spectrum wireless networks.30.522005
Robust encryption for secure image transmission over wireless channels90.672005
On the choice of risk optimal data embedding strategy, safe embedding rate, and passive steganalysis00.342005
Studying Energy Trade Offs in Offloading Computation/Compilation in Java-Enabled Mobile Devices372.042004
On Information Hiding With Incomplete Information About Steganalysis30.732004
Current trends in steganalysis: a critical survey151.032004
Web Search Steganalysis: Some Challenges And Approaches60.602004
Distributed discrete power control for bursty transmissions over wireless data networks173.652004
On the complexity and hardness of the steganography embedding problem10.372004
Locally most-powerful detector for secret key estimation in spread spectrum image steganography10.382004
An adaptive energy-efficient link layer protocol using stochastic learning control113.362003
A mathematical framework for active steganalysis201.362003
Waterfilling: a connection between information theoretic and perceptually based watermarking10.372002
Adaptive steganography.00.342002
Mathematical approach to steganalysis50.502002
Power efficient adaptive M-QAM design using adaptive pipelined analog-to-digital converter.00.342002
Average power in digital CMOS circuits using least square estimation20.392001
  • 1
  • 2