ORCID as entered in ROS

Select Publications
2005, 'On large scale deployment of parallelized file transfer protocol', in 2005 IEEE International performance, computing and communications conference, IEEE, Arizona, USA, presented at IEEE International performance, computing and communications conference 2005, Arizona, USA, 07 April 2005 - 09 April 2005, http://dx.doi.org/10.1109/PCCC.2005.1460560
,2004, 'On-board RSVP: an extension of RSVP to support real-time services in on-board IP networks', in Proceedings of the First International Conference on Advances in Natural Computation (ICNC 2005), Part III, Lecture Notes in Computer Science 3612/2005, Springer, Berlin, Germany, presented at 6th International Workshop on Distributed Computing (IWDC 2004), Kolkata, India, 27 December 2004 - 30 December 2004, http://dx.doi.org/10.1007/b104419
,2004, 'Performance Evaluation of Select Optimal Neighbour Protocols for Ad Hoc Wireless Networks', in ATNAC 2004: Australian Telecommunication Networks and Applications Conference, Sydney, presented at ATNAC 2004: Australian Telecommunication Networks and Applications Conference, Sydney, 08 December 2004 - 10 December 2004, http://www.cse.unsw.edu.au/~salilk/papers/posters/ATNAC2004.pdf
,2002, 'On the latency bound of deficit round robin', in Proceedings International Conference on Computer Communications and Networks ICCCN, pp. 548 - 553, http://dx.doi.org/10.1109/ICCCN.2002.1043123
,2002, 'On the latency bound of pre-order deficit round robin', in Proceedings Conference on Local Computer Networks LCN, pp. 508 - 517, http://dx.doi.org/10.1109/LCN.2002.1181824
,2001, 'Fair, efficient and low-latency packet scheduling using Nested Deficit Round Robin', in 2001 IEEE Workshop on High Performance Switching and Routing, pp. 6 - 10
,2001, 'Fair, efficient and scalable scheduling without per-flow state', in IEEE International Performance Computing and Communications Conference Proceedings, pp. 181 - 187
,2000, 'A Round-Robin scheduling strategy for reduced delays in wormhole switches with virtual lanes', in DAuriol BJ; Abonamah A (ed.), CIC'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN COMPUTING, C S R E A PRESS, NV, LAS VEGAS, pp. 275 - 278, presented at International Conference on Communications in Computing (CIC 2000), NV, LAS VEGAS, 26 June 2000 - 29 June 2000
,'Fair, efficient and low-latency packet scheduling using nested deficit round robin', in 2001 IEEE Workshop on High Performance Switching and Routing (IEEE Cat. No.01TH8552), IEEE, pp. 6 - 10, presented at 2001 IEEE Workshop on High Performance Switching and Routing, http://dx.doi.org/10.1109/hpsr.2001.923594
,'Fair, efficient and scalable scheduling without per-flow state', in Conference Proceedings of the 2001 IEEE International Performance, Computing, and Communications Conference (Cat. No.01CH37210), IEEE, pp. 181 - 187, presented at 2001 IEEE International Performance, Computing, and Communications Conference, http://dx.doi.org/10.1109/ipccc.2001.918651
,2015, 'Message from the program chairs', Vol. 2015-December, http://dx.doi.org/10.1109/LCNW.2015.7365767
,2020, 'Poster abstract: Towards scalable and trustworthy decentralized collaborative intrusion detection system for IoT', pp. 256 - 257, http://dx.doi.org/10.1109/IoTDI49375.2020.00035
,2013, 'Predicting the Power Consumption of Electric Appliances through Time Series Pattern Matching', Rome, Italy, presented at 5th ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings (BuildSys), Rome, Italy, 14 November 2013 - 15 November 2013, http://dx.doi.org/10.1145/2528282.2528315
,(eds.), 2012, 'Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna', Clearwater, Florida, pp. 156 - 159, presented at 37th IEEE Conference on Local Computer Networks (LCN 2012), Clearwater, Florida, 22 October 2012 - 25 October 2012, http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6423595
,2010, 'Using bandwidth-road maps for improving vehicular Internet access', http://dx.doi.org/10.1109/COMSNETS.2010.5431969
,2009, 'Poster abstract: Ear-phone assessment of noise pollution with mobile phones', pp. 395 - 396, http://dx.doi.org/10.1145/1644038.1644119
,2009, 'Poster abstract: Multi-channel interference in wireless sensor networks', pp. 367 - 368
,(ed.), 2006, 'SkVR: Scalable knowledge-based Routing Architecture for Public Transport Networks', Los Angeles, California, presented at 3rd ACM International Workshop on Vehicular Ad-hoc Networks, Los Angeles, California, 29 September 2006, http://dx.doi.org/10.1145/1161064.1161082
,2021, 'ACM Workshop BlockSys 2021: Message from Organizers', in Sensys 2021 Proceedings of the 2021 19th ACM Conference on Embedded Networked Sensor Systems, pp. IX, http://dx.doi.org/10.1145/3485730.fm
,2009, 'MULTI CHANNEL INTERFERENCE IN WIRELESS SENSOR NETWORKS', in PROCEDINGS OF 2009 INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, ACM, USA, presented at INFORMATION PROCESSING IN SENSOR NETWORKS, SAN FRANSISCO, 13 April 2009 - 16 April 2009
,2007, 'Detection and tracking using wireless sensor networks', in Proceedings of the 5th ACM conference on embedded networked sensor systems, ACM, Sydney, presented at 5th ACM conference on embedded networked sensor systems (SenSys 2007), Sydney, 06 November 2007 - 09 November 2007, http://dx.doi.org/10.1145/1322263.1322328
,2009, Safety Assurance and Rescue Communication Systems in High-Stress Environments - A Mining Case Study, UNSW-CSE-TR-0912
,2020, Leveraging lightweight blockchain to establish data integrity for surveillance cameras, Institute of Electrical and Electronics Engineers (IEEE), http://dx.doi.org10.1109/ICBC48266.2020.9169429
,2019, Impact of consensus on appendable-block blockchain for IoT, Association for Computing Machinery (ACM), http://dx.doi.org10.1145/3360774.3360798
,2025, LSTM-H: A Hybrid Deep Learning Model for Accurate Livestock Movement Prediction in UAV-Based Monitoring Systems, http://dx.doi.org/10.20944/preprints202504.0061.v1
,2025, Revisit Time Series Classification Benchmark: The Impact of Temporal Information for Classification, http://dx.doi.org/10.48550/arxiv.2503.20264
,2025, Beyond Life: A Digital Will Solution for Posthumous Data Management, http://dx.doi.org/10.48550/arxiv.2501.04900
,2025, Predicting IoT Device Vulnerability Fix Times with Survival and Failure Time Models, http://dx.doi.org/10.48550/arxiv.2501.02520
,2024, Comparison of Multilingual and Bilingual Models for Satirical News Detection of Arabic and English, http://arxiv.org/abs/2411.10730v1
,2024, Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning, http://arxiv.org/abs/2410.11205v1
,2024, Demystifying Trajectory Recovery From Ash: An Open-Source Evaluation and Enhancement, http://dx.doi.org/10.48550/arxiv.2409.14645
,2024, Towards Weaknesses and Attack Patterns Prediction for IoT Devices, http://dx.doi.org/10.48550/arxiv.2408.13172
,2024, On the Credibility of Backdoor Attacks Against Object Detectors in the Physical World, http://dx.doi.org/10.48550/arxiv.2408.12122
,2024, Synthetic Trajectory Generation Through Convolutional Neural Networks, http://dx.doi.org/10.48550/arxiv.2407.16938
,2024, Multi-MedChain: Multi-Party Multi-Blockchain Medical Supply Chain Management System, http://dx.doi.org/10.48550/arxiv.2407.11207
,2024, Honeyfile Camouflage: Hiding Fake Files in Plain Sight, http://dx.doi.org/10.48550/arxiv.2405.04758
,2024, SoK: Trusting Self-Sovereign Identity, http://dx.doi.org/10.48550/arxiv.2404.06729
,2024, Contextual Chart Generation for Cyber Deception, http://dx.doi.org/10.48550/arxiv.2404.04854
,2024, Bayesian Learned Models Can Detect Adversarial Malware For Free, http://dx.doi.org/10.48550/arxiv.2403.18309
,2024, SoK: Can Trajectory Generation Combine Privacy and Utility?, http://dx.doi.org/10.48550/arxiv.2403.07218
,2024, BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning, http://dx.doi.org/10.48550/arxiv.2402.03740
,2024, Modern Computing: Vision and Challenges, http://dx.doi.org/10.48550/arxiv.2401.02469
,2023, Multiple Hypothesis Dropout: Estimating the Parameters of Multi-Modal Output Distributions, http://dx.doi.org/10.48550/arxiv.2312.11735
,2023, Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler, http://dx.doi.org/10.48550/arxiv.2312.04749
,2023, Local Differential Privacy for Smart Meter Data Sharing, http://dx.doi.org/10.48550/arxiv.2311.04544
,2023, Reputation Systems for Supply Chains: The Challenge of Achieving Privacy Preservation, http://dx.doi.org/10.48550/arxiv.2311.01060
,2023, Privacy Preserving Large Language Models: ChatGPT Case Study Based Vision and Framework, http://arxiv.org/abs/2310.12523v1
,2023, An Interdisciplinary Survey on Information Flows in Supply Chains, http://dx.doi.org/10.48550/arxiv.2401.01022
,2023, False Information, Bots and Malicious Campaigns: Demystifying Elements of Social Media Manipulations, http://dx.doi.org/10.48550/arxiv.2308.12497
,2023, SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing, http://dx.doi.org/10.48550/arxiv.2308.07860
,