Other namesY Rahulamathavan
Reader in Cybersecurity and Privacy, Loughborough University, UK
Verified email at - Homepage
Cited by
Cited by
Facial Expression Recognition in the Encrypted Domain based on Local Fisher Discriminant Analysis
Y Rahulamathavan, RCW Phan, JA Chambers, DJ Parish
IEEE Transactions on Affective Computing 4 (1), 83-92, 2013
PIndroid: A novel Android malware detection system using ensemble learning methods
F Idrees, M Rajarajan, M Conti, TM Chen, Y Rahulamathavan
Computers & Security 68, 36-46, 2017
Privacy-preserving Blockchain based IoT Ecosystem using Attribute-based Encryption
Y Rahulamathavan, WP Raphael C, M Rajarajan, S Misra, A Kondoz
IEEE International Conference on Advanced Networks and Telecommunications†…, 2017
Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud
Y Rahulamathavan, R Phan, S Veluru, K Cumanan, M Rajarajan
IEEE Transactions on Dependable and Secure Computing 11 (5), 467 - 479, 2014
Effective recognition of facial micro-expressions with video motion magnification
Y Wang, J See, YH Oh, RCW Phan, Y Rahulamathavan, HC Ling, SW Tan, ...
Multimedia Tools and Applications 76, 21665-21690, 2017
Blockchain at the Edge: Performance of Resource-Constrained IoT Networks
S Misra, A Mukherjee, A Roy, N Saurabh, Y Rahulamathava, M Rajarajan
IEEE Transactions Parallel and Distributed Systems, 1-1, 2020
Privacy-Preserving Clinical Decision Support System using Gaussian Kernel based Classification
Y Rahulamathavan, S Veluru, R Phan, J Chambers, M Rajarajan
IEEE Journal of Biomedical and Health Informatics 18 (1), 56-66, 2014
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption
Y Rahulamathavan, S Veluru, J Han, R Lu, F Li, M Rajarajan
IEEE Transactions on Computers, 2016
Low complexity multi-authority attribute based encryption scheme for mobile cloud computing
F Li, Y Rahulamathavan, M Rajarajan, RCW Phan
2013 IEEE Seventh International Symposium on Service-Oriented System†…, 2013
A new secure and lightweight searchable encryption scheme over encrypted cloud data
S Tahir, S Ruj, Y Rahulamathavan, M Rajarajan, C Glackin
IEEE Transactions on Emerging Topics in Computing 7 (4), 530-544, 2017
Robust access control framework for mobile cloud computing network
F Li, Y Rahulamathavan, M Conti, M Rajarajan
Computer Communications 68, 61-72, 2015
A survey: Security, transparency, and scalability issues of nft’s and its marketplaces
S Bhujel, Y Rahulamathavan
Sensors 22 (22), 8833, 2022
Clinical information systems and artificial intelligence: recent research trends
C Combi, G Pozzi
Yearbook of medical informatics 28 (01), 083-094, 2019
Efficient Privacy-Preserving Facial Expression Classification
Y Rahulamathavan, M Rajarajan
IEEE Transactions on Dependable and Secure Computing,, 2016
Trusted UAV network coverage using blockchain, machine learning and auction mechanisms
A Khan, G Chen, Y Rahulamathavan, G Zheng, B AsSadhan, ...
IEEE Access, 2020
On energy harvesting of hybrid TDMA-NOMA systems
H Al-Obiedollah, K Cumanan, AG Burr, J Tang, Y Rahulamathavan, ...
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
Optimal subcarrier and bit allocation techniques for cognitive radio networks using integer linear programming
Y Rahulamathavan, K Cumanan, L Musavian, S Lambotharan
2009 IEEE/SP 15th Workshop on Statistical Signal Processing, 293-296, 2009
A mixed SINR-balancing and SINR-target-constraints-based beamformer design technique for spectrum-sharing networks
Y Rahulamathavan, K Cumanan, S Lambotharan
IEEE Transactions on Vehicular Technology 60 (9), 4403-4414, 2011
Fast data: A fair, secure and trusted decentralized iiot data marketplace enabled by blockchain
A Dixit, A Singh, Y Rahulamathavan, M Rajarajan
IEEE Internet of Things Journal, 2022
Privacy-preserving iVector-based speaker verification
Y Rahulamathavan, KR Sutharsini, IG Ray, R Lu, M Rajarajan
IEEE/ACM Transactions on Audio, Speech, and Language Processing 27 (3), 496-506, 2018
The system can't perform the operation now. Try again later.
Articles 1–20