Secrecy Capacity Analysis Over Fading Channels H Lei, IS Ansari, G Pan, B Alomair, MS Alouini IEEE Communications Letters 21 (6), 1445-1448, 2017 | 183 | 2017 |
On secure NOMA systems with transmit antenna selection schemes H Lei, J Zhang, KH Park, P Xu, IS Ansari, G Pan, B Alomair, MS Alouini IEEE Access 5, 17450-17464, 2017 | 168 | 2017 |
Scalable RFID systems: a privacy-preserving protocol with constant-time identification B Alomair, A Clark, J Cuellar, R Poovendran IEEE Transactions on Parallel and Distributed Systems 23 (8), 1536-1550, 2011 | 141* | 2011 |
Toward a statistical framework for source anonymity in sensor networks B Alomair, A Clark, J Cuellar, R Poovendran IEEE Transactions on Mobile Computing 12 (2), 248-260, 2011 | 100 | 2011 |
Minimizing convergence error in multi-agent systems via leader selection: A supermodular optimization approach A Clark, B Alomair, L Bushnell, R Poovendran IEEE Transactions on Automatic Control 59 (6), 1480-1494, 2014 | 86 | 2014 |
Submodularity in dynamics and control of networked systems A Clark, B Alomair, L Bushnell, R Poovendran Springer International Publishing, 2016 | 67 | 2016 |
Information Theoretically Secure Encryption with Almost Free Authentication. B Alomair, R Poovendran J. Univers. Comput. Sci. 15 (15), 2937-2956, 2009 | 58 | 2009 |
Statistical framework for source anonymity in sensor networks B Alomair, A Clark, J Cuellar, R Poovendran 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 55 | 2010 |
Privacy versus scalability in radio frequency identification systems B Alomair, R Poovendran Computer Communications 33 (18), 2155-2163, 2010 | 53 | 2010 |
Efficient authentication for mobile and pervasive computing B Alomair, R Poovendran IEEE Transactions on Mobile Computing 13 (3), 469-481, 2014 | 52 | 2014 |
Securing low-cost RFID systems: An unconditionally secure approach B Alomair, L Lazos, R Poovendran Journal of Computer Security 19 (2), 229-257, 2011 | 51 | 2011 |
Passive attacks on a class of authentication protocols for RFID B Alomair, L Lazos, R Poovendran Information Security and Cryptology-ICISC 2007: 10th International …, 2007 | 44 | 2007 |
The power of primes: security of authentication based on a universal hash-function family B Alomair, A Clark, R Poovendran Journal of Mathematical Cryptology 4 (2), 121-148, 2010 | 42 | 2010 |
Submodularity in input node selection for networked linear systems: Efficient algorithms for performance and controllability A Clark, B Alomair, L Bushnell, R Poovendran IEEE Control Systems Magazine 37 (6), 52-74, 2017 | 40 | 2017 |
Leader selection in multi-agent systems for smooth convergence via fast mixing A Clark, B Alomair, L Bushnell, R Poovendran 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), 818-824, 2012 | 35 | 2012 |
E-MACs: Toward More Secure and More Efficient Constructions of Secure Channels B Alomair, R Poovendran IEEE transactions on computers 63 (1), 204-217, 2014 | 26 | 2014 |
Efficient generic forward-secure signatures and proxy signatures B Alomair, K Sampigethaya, R Poovendran Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice …, 2008 | 24 | 2008 |
Input selection for performance and controllability of structured linear descriptor systems A Clark, B Alomair, L Bushnell, R Poovendran SIAM Journal on Control and Optimization 55 (1), 457-485, 2017 | 21 | 2017 |
Jatmo: Prompt injection defense by task-specific finetuning J Piet, M Alrashed, C Sitawarin, S Chen, Z Wei, E Sun, B Alomair, ... arXiv preprint arXiv:2312.17673, 2023 | 20 | 2023 |
Efficient authentication for mobile and pervasive computing R Poovendran, B Alomair US Patent 9,166,793, 2015 | 20 | 2015 |