default search action
Krishna K. Venkatasubramanian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Brittany Lewis, Piriyankan Kirupaharan, Tina-Marie Ranalli, Krishna K. Venkatasubramanian:
A3C: An Image-Association-Based Computing Device Authentication Framework for People with Upper Extremity Impairments. ACM Trans. Access. Comput. 17(2): 1-37 (2024) - 2023
- [c44]Brittany Lewis, Tina-Marie Ranalli, Alexandra Gourley, Piriyankan Kirupaharan, Krishna K. Venkatasubramanian:
"I... caught a person casing my house... and scared him off: " The Use of Security-Focused Smart Home Devices by People with Disabilities. CHI 2023: 846:1-846:16 - 2022
- [j13]Gozde Cay, Vignesh Ravichandran, Manob Jyoti Saikia, Laurie Hoffman, Abbot Laptook, James Padbury, Amy L. Salisbury, Anna Gitelson-Kahn, Krishna K. Venkatasubramanian, Yalda Shahriari, Kunal Mankodiya:
An E-Textile Respiration Sensing System for NICU Monitoring: Design and Validation. J. Signal Process. Syst. 94(6): 543-557 (2022) - [c43]Brittany Faith Lewis, Paige Courtemanche, Krishna K. Venkatasubramanian:
"Sometimes I feel that I'm being left behind": Exploring Computing Device Use by People with Upper Extremity Impairment During the COVID-19 Pandemic. CHI Extended Abstracts 2022: 390:1-390:9 - 2021
- [c42]Thomas Howard, Krishna K. Venkatasubramanian, Jeanine L. M. Skorinko, Pauline Bosma, John Mullaly, Brian Kelly, Deborah Lloyd, Mary Wishart, Emiton Alves, Nicole Jutras, Mariah Freark, Nancy A. Alterio:
Designing an App to Help Individuals with Intellectual and Developmental Disabilities to Recognize Abuse. ASSETS 2021: 11:1-11:14 - [c41]Krishna K. Venkatasubramanian, Jeanine L. M. Skorinko, Nicole Jutras, Natalia Carvajal Erker, Lara Padir:
Exploring the Requirements of Abuse Reporting for Persons with Intellectual and Developmental Disabilities. ASSETS 2021: 66:1-66:4 - [c40]Krishna K. Venkatasubramanian, Jeanine L. M. Skorinko, Mariam Kobeissi, Brittany Lewis, Nicole Jutras, Pauline Bosma, John Mullaly, Brian Kelly, Deborah Lloyd, Mariah Freark, Nancy A. Alterio:
Exploring A Reporting Tool to Empower Individuals with Intellectual and Developmental Disabilities to Self-Report Abuse. CHI 2021: 373:1-373:13 - [c39]Brittany Lewis, Krishna K. Venkatasubramanian:
"I...Got my Nose-Print. But it Wasn't Accurate": How People with Upper Extremity Impairment Authenticate on their Personal Computing Devices. CHI 2021: 379:1-379:14 - [c38]Ethan Kulman, Krishna K. Venkatasubramanian, Brittany P. Chapman, Stephanie Carreiro:
Identifying Opioid Withdrawal Using Wearable Biosensors. HICSS 2021: 1-10 - 2020
- [c37]Brittany Lewis, Joshua Hebert, Krishna K. Venkatasubramanian, Matthew Provost, Kelly Charlebois:
A New Authentication Approach for People with Upper Extremity Impairment. PerCom Workshops 2020: 1-6
2010 – 2019
- 2019
- [c36]Rohitpal Singh, Brittany Lewis, Brittany P. Chapman, Stephanie Carreiro, Krishna K. Venkatasubramanian:
A Machine Learning-based Approach for Collaborative Non-Adherence Detection during Opioid Abuse Surveillance using a Wearable Biosensor. HEALTHINF 2019: 310-318 - [p1]Hang Cai, Krishna K. Venkatasubramanian:
Data-Driven Detection of Sensor-Hijacking Attacks on Electrocardiogram Sensors. Mission-Oriented Sensor Networks and Systems (1) 2019: 757-781 - 2018
- [j12]Hang Cai, Krishna K. Venkatasubramanian:
Detecting data manipulation attacks on physiological sensor measurements in wearable medical systems. EURASIP J. Inf. Secur. 2018: 13 (2018) - [c35]Kenedi Heather, Kunal Shah, Krishna K. Venkatasubramanian, Ken Hoyme, Michael Seeberger, Grace Wiechman:
A Novel Authentication Biometric for Pacemakers. CHASE 2018: 81-87 - [c34]Brittany Lewis, Christopher J. Nycz, Gregory S. Fischer, Krishna K. Venkatasubramanian:
Authentication-Based on Biomechanics of Finger Movements Captured Using Optical Motion-Capture. ISVC 2018: 167-179 - [i1]Joshua Hebert, Brittany Lewis, Hang Cai, Krishna K. Venkatasubramanian, Matthew Provost, Kelly Charlebois:
Ballistocardiogram-based Authentication using Convolutional Neural Networks. CoRR abs/1807.03216 (2018) - 2017
- [c33]Hang Cai, Krishna K. Venkatasubramanian:
Patient Identity Verification Based on Physiological Signal Fusion. CHASE 2017: 90-95 - [c32]Hang Cai, Tianlong Yun, Josiah D. Hester, Krishna K. Venkatasubramanian:
Deploying Data-Driven Security Solutions on Resource-Constrained Wearable IoT Systems. ICDCS Workshops 2017: 199-204 - [c31]Krishna K. Venkatasubramanian, Ayan Banerjee, Sandeep K. S. Gupta, Robert J. Walls:
A cyber-physical approach to trustworthy operation of health monitoring systems. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - 2016
- [c30]Hang Cai, Krishna K. Venkatasubramanian:
Detecting Signal Injection Attack-Based Morphological Alterations of ECG Measurements. DCOSS 2016: 127-135 - [c29]A. M. Leonard, Hang Cai, Krishna K. Venkatasubramanian, M. Ali, Thomas Eisenbarth:
A honeypot system for wearable networks. Sarnoff Symposium 2016: 199-201 - [c28]Jian Xu, Krishna K. Venkatasubramanian, Vasiliki Sfyrla:
A methodology for systematic attack trees generation for interoperable medical devices. SysCon 2016: 1-7 - 2015
- [j11]Honggang Wang, Roozbeh Jafari, Gang Zhou, Krishna K. Venkatasubramanian, Jinyuan Stella Sun, Paolo Bonato, Dalei Wu:
Guest Editorial Special Issue on Internet of Things for Smart and Connected Health. IEEE Internet Things J. 2(1): 1-4 (2015) - [c27]Jian Xu, Vasiliki Sfyrla, Krishna K. Venkatasubramanian:
Methodology for generating attack trees for interoperable medical devices. ICCPS 2015: 258 - [c26]Hang Cai, Krishna K. Venkatasubramanian:
Detecting malicious morphological alterations of ECG signals in body sensor networks. IPSN 2015: 342-343 - [c25]Cynthia E. Rogers, Alexander W. Witt, Alexander D. Solomon, Krishna K. Venkatasubramanian:
An approach for user identification for head-mounted displays. ISWC 2015: 143-146 - [c24]Hang Cai, Krishna K. Venkatasubramanian:
Detecting Malicious Temporal Alterations of ECG Signals in Body Sensor Networks. NSS 2015: 531-539 - [c23]Krishna K. Venkatasubramanian, Eugene Y. Vasserman, Vasiliki Sfyrla, Oleg Sokolsky, Insup Lee:
Requirement Engineering for Functional Alarm System for Interoperable Medical Devices. SAFECOMP 2015: 252-266 - [e1]Emmanuel Baccelli, Hassan Ghasemzadeh, Gustavo Marfia, Krishna Kumar Venkatasubramanian:
Proceedings of the 2015 Workshop on Pervasive Wireless Healthcare, MobileHealth@MobiHoc 2015, Hangzhou, China, June 22, 2015. ACM 2015, ISBN 978-1-4503-3525-6 [contents] - 2014
- [j10]Krishna K. Venkatasubramanian, Tridib Mukherjee, Sandeep K. S. Gupta:
CAAC - An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures. ACM Trans. Auton. Adapt. Syst. 8(4): 20:1-20:18 (2014) - [c22]Ramyar Saeedi, Janet Purath, Krishna K. Venkatasubramanian, Hassan Ghasemzadeh:
Toward seamless wearable sensing: Automatic on-body sensor localization for physical activity monitoring. EMBC 2014: 5385-5388 - [c21]Daniel J. Robertson, Craig A. Shue, Krishna K. Venkatasubramanian, Curtis R. Taylor:
Bandwidth aggregation in allied WiFi routers. GLOBECOM Workshops 2014: 254-258 - [c20]Krishna K. Venkatasubramanian, Eugene Y. Vasserman, Oleg Sokolsky, Insup Lee:
Functional Alarms for Systems of Interoperable Medical Devices. HASE 2014: 247-248 - [c19]Curtis R. Taylor, Krishna K. Venkatasubramanian, Craig A. Shue:
Understanding the security of interoperable medical devices using attack graphs. HiCoNS 2014: 31-40 - [c18]Ryan A. Danas, Douglas T. Lally, Nathaniel W. Miller, John S. Synnott, Craig A. Shue, Hassan Ghasemzadeh, Krishna Kumar Venkatasubramanian:
Designing user-specific plug-n-play into body area networks. MobileHealth@MobiHoc 2014: 13-18 - 2013
- [j9]Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Insup Lee:
Analyzing and defending against web-based malware. ACM Comput. Surv. 45(4): 49:1-49:35 (2013) - [j8]Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Insup Lee, Boon Thau Loo, Oleg Sokolsky:
AS-CRED: Reputation and Alert Service for Interdomain Routing. IEEE Syst. J. 7(3): 396-409 (2013) - [c17]Jian Chang, Peter Gebhard, Andreas Haeberlen, Zachary G. Ives, Insup Lee, Oleg Sokolsky, Krishna K. Venkatasubramanian:
TrustForge: Flexible access control for collaborative crowd-sourced environment. PST 2013: 291-300 - [c16]Raquel G. Machado, Krishna K. Venkatasubramanian:
Short paper: Establishing trust in a vehicular network. VNC 2013: 194-197 - [c15]Ayan Banerjee, Sandeep K. S. Gupta, Krishna K. Venkatasubramanian:
PEES: physiology-based end-to-end security for mHealth. Wireless Health 2013: 2:1-2:8 - [c14]Cong Liao, Jian Chang, Insup Lee, Krishna K. Venkatasubramanian:
A trust model for vehicular network-based incident reports. WiVeC 2013: 1-5 - 2012
- [j7]Andrew G. West, Jian Chang, Krishna K. Venkatasubramanian, Insup Lee:
Trust in collaborative web applications. Future Gener. Comput. Syst. 28(8): 1238-1251 (2012) - [j6]Krishna K. Venkatasubramanian, Eugene Y. Vasserman, Oleg Sokolsky, Insup Lee:
Security and Interoperable-Medical-Device Systems, Part 1. IEEE Secur. Priv. 10(5): 61-63 (2012) - [j5]Eugene Y. Vasserman, Krishna K. Venkatasubramanian, Oleg Sokolsky, Insup Lee:
Security and Interoperable-Medical-Device Systems, Part 2: Failures, Consequences, and Classification. IEEE Secur. Priv. 10(6): 70-73 (2012) - [j4]Insup Lee, Oleg Sokolsky, Sanjian Chen, John Hatcliff, Eunkyoung Jee, BaekGyu Kim, Andrew L. King, Margaret Mullen-Fortino, Soojin Park, Alex Roederer, Krishna K. Venkatasubramanian:
Challenges and Research Directions in Medical Cyber-Physical Systems. Proc. IEEE 100(1): 75-90 (2012) - [j3]Ayan Banerjee, Krishna K. Venkatasubramanian, Tridib Mukherjee, Sandeep K. S. Gupta:
Ensuring Safety, Security, and Sustainability of Mission-Critical Cyber-Physical Systems. Proc. IEEE 100(1): 283-299 (2012) - [c13]Jian Chang, Krishna K. Venkatasubramanian, Chinwendu Enyioha, Shreyas Sundaram, George J. Pappas, Insup Lee:
HMM-based characterization of channel behavior for networked control systems. HiCoNS 2012: 11-20 - 2011
- [c12]Andrew G. West, Jian Chang, Krishna K. Venkatasubramanian, Oleg Sokolsky, Insup Lee:
Link spamming Wikipedia for profit. CEAS 2011: 152-161 - [c11]Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Oleg Sokolsky, Myuhng Joo Kim, Insup Lee:
ToMaTo: a trustworthy code mashup development tool. Mashups/Dataview@ECOWS 2011: 5:1-5:8 - [c10]David Arney, Krishna K. Venkatasubramanian, Oleg Sokolsky, Insup Lee:
Biomedical devices and systems security. EMBC 2011: 2376-2379 - [c9]Shreyas Sundaram, Jian Chang, Krishna K. Venkatasubramanian, Chinwendu Enyioha, Insup Lee, George J. Pappas:
Reputation-based networked control with data-corrupting channels. HSCC 2011: 291-300 - [c8]Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, Insup Lee:
AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP. TRUST 2011: 262-276 - 2010
- [j2]Krishna K. Venkatasubramanian, Ayan Banerjee, Sandeep K. S. Gupta:
PSKA: usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1): 60-68 (2010) - [j1]Krishna K. Venkatasubramanian, Sandeep K. S. Gupta:
Physiological value-based efficient usable security solutions for body sensor networks. ACM Trans. Sens. Networks 6(4): 31:1-31:36 (2010)
2000 – 2009
- 2009
- [c7]Ayan Banerjee, Krishna K. Venkatasubramanian, Sandeep K. S. Gupta:
Challenges of implementing cyber-physical security solutions in body area networks. BODYNETS 2009: 18 - [c6]Krishna K. Venkatasubramanian, Ayan Banerjee, Sandeep K. S. Gupta:
Green and Sustainable Cyber-Physical Security Solutions for Body Area Networks. BSN 2009: 240-245 - 2006
- [c5]Tridib Mukherjee, Krishna K. Venkatasubramanian, Sandeep K. S. Gupta:
Performance modeling of critical event management for ubiquitous computing applications. MSWiM 2006: 12-19 - [c4]Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. Venkatasubramanian:
Criticality Aware Access Control Model for Pervasive Applications. PerCom 2006: 251-257 - [c3]Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. Venkatasubramanian, T. B. Taylor:
Proximity Based Access Control in Smart-Emergency Departments. PerCom Workshops 2006: 512-516 - 2005
- [c2]Krishna K. Venkatasubramanian, Guofeng Deng, Tridib Mukherjee, John Quintero, Valliappan Annamalai, Sandeep K. S. Gupta:
Ayushman: A Wireless Sensor Network Based Health Monitoring Infrastructure and Testbed. DCOSS 2005: 406-407 - 2003
- [c1]Sriram Cherukuri, Krishna K. Venkatasubramanian, Sandeep K. S. Gupta:
BioSec: A Biometric Based Approach for Securing Communication in Wireless Networks of Biosensors Implanted in the Human Body. ICPP Workshops 2003: 432-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint