Loughborough University
Leicestershire, UK
LE11 3TU
+44 (0)1509 263171
Loughborough University

Loughborough University Research Publications


Publications for Yogachandran Rahulamathavan

From (year): To (year):

Download all publications as Word document


Journal Articles

Al-Obiedollah, H, Cumanan, K, Bany-Salameh, H, Lambotharan, S, Rahulamathavan, Y, Ding, Z, Dobre, OA (2021) A joint beamforming and power-splitter optimization technique for SWIPT in MISO-NOMA system, IEEE Access, 9, pp.33018-33029, ISSN: 2169-3536. DOI: 10.1109/ACCESS.2021.3060836.

Rahulamathavan, Y, Dogan, S, Shi, X, Lu, R, Rajarajan, M, Kondoz, A (2020) Scalar product lattice computation for efficient privacy-preserving systems, IEEE Internet of Things Journal, 8(3), pp.1417-1427, ISSN: 2327-4662. DOI: 10.1109/JIOT.2020.3014686.

Misra, S, Mukherjee, A, Roy, A, Saurabh, N, Rahulamathavan, Y, Rajarajan, M (2020) Blockchain at the edge: Performance of resource-constrained IoT networks, IEEE Transactions on Parallel and Distributed Systems, 32(1), pp.174-183, ISSN: 1045-9219. DOI: 10.1109/TPDS.2020.3013892.

Khan, A, Chen, G, Rahulamathavan, Y, Zheng, G, AsSadhan, B, Lambotharan, S (2020) Trusted UAV network coverage using blockchain, machine learning and auction mechanisms, IEEE Access, 8, pp.118219-118234, ISSN: 2169-3536. DOI: 10.1109/ACCESS.2020.3003894.

Khan, A, Rahulamathavan, Y, Basutli, B, Zheng, G, AsSadhan, B, Lambotharan, S (2019) Blockchain-based distributive auction for relay-assisted secure communications, IEEE Access, 7, pp.95555-95568, DOI: 10.1109/ACCESS.2019.2929136.

Rahulamathavan, Y, Kunaraj, RS, Ghosh, RI, Lu, R, Rajarajan, M (2018) Privacy-preserving iVector-based speaker verification, IEEE/ACM Transactions on Audio, Speech, and Language Processing, 27(3), pp.496-506, ISSN: 2329-9290. DOI: 10.1109/TASLP.2018.2882731.

Ray, IG, Rahulamathavan, Y, Rajarajan, M (2018) A new lightweight symmetric searchable encryption scheme for string identification, IEEE Transactions on Cloud Computing, 8(3), pp.672-684, ISSN: 2168-7161. DOI: 10.1109/TCC.2018.2820014.

Han, J, Rahulamathavan, Y, Susilo, W (2017) Preface, International Journal of Foundations of Computer Science, 28(06), pp.641-643, ISSN: 0129-0541. DOI: 10.1142/s0129054117020026.

Idrees, F, Rajarajan, M, Rahulamathavan, Y, Conti, M, Chen, T (2017) PIndroid: A novel Android malware detection system using ensemble learning, Computers and Security, 68, pp.36-46, ISSN: 0167-4048. DOI: 10.1016/j.cose.2017.03.011.

Tahir, S, Ruj, S, Rahulamathavan, Y, Rajarajan, M, Glackin, C (2017) A new secure and lightweight searchable encryption scheme over encrypted cloud data, IEEE Transactions on Emerging Topics in Computing, 7(4), pp.530-544, ISSN: 2168-6750. DOI: 10.1109/TETC.2017.2737789.

Rahulamathavan, Y, Veluru, S, Han, J, Li, F, Rajarajan, M, Lu, R (2016) User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption, IEEE Transactions on Computers, 65(9), pp.2939-2946, ISSN: 0018-9340. DOI: 10.1109/TC.2015.2510646.

Cumanan, K, Ding, ZD, Rahulamathavan, Y, Molu, MM, Chen, H-H (2016) Robust MMSE beamforming for multiantenna relay networks, IEEE Transactions on Vehicular Technology, ISSN: 0018-9545. DOI: 10.1109/TVT.2016.2601344.

Wang, Y, See, J, Oh, Y-H, Phan, RC-W, Rahulamathavan, Y, Ling, H-C, Tan, S-W, Li, X (2016) Effective recognition of facial micro-expressions with video motion magnification, Multimedia Tools and Applications, ISSN: 1380-7501. DOI: 10.1007/s11042-016-4079-6.

Lu, R, Rahulamathavan, Y, Zhu, H, Xu, C, Wang, M (2016) Security and Privacy Challenges in Vehicular Cloud Computing, Mobile Information Systems, 2016, pp.1-2, ISSN: 1574-017X. DOI: 10.1155/2016/6812816.

Rahulamathavan, Y and Rajarajan, M (2015) Efficient privacy-preserving facial expression classification, IEEE Transactions on Dependable and Secure Computing, 14(3), pp.326-338, ISSN: 1545-5971. DOI: 10.1109/TDSC.2015.2453963.

Bournaka, G, Rahulamathavan, Y, Cumanan, K, Lambotharan, S, Lazarakis, F (2015) Base station beamforming technique using multiple signal-to-interference plus noise ratio balancing criteria, IET SIGNAL PROCESSING, 9(3), pp.248-259, ISSN: 1751-9675. DOI: 10.1049/iet-spr.2013.0497.

Li, F, Rahulamathavan, Y, Conti, M, Rajarajan, M (2015) Robust access control framework for mobile cloud computing network, Computer Communications, 68, pp.61-72, ISSN: 0140-3664. DOI: 10.1016/j.comcom.2015.07.005.

Weerasinghe, D, Rahulamathavan, Y, Rajarajan, M (2013) Secure trust delegation for sharing patient medical records in a mobile environment, Health Policy and Technology, 2(1), pp.36-44, ISSN: 2211-8837. DOI: 10.1016/j.hlpt.2012.12.001.

Cumanan, K, Rahulamathavan, Y, Lambotharan, S (2013) Minimum mean‐square error transceiver optimisation for downlink multiuser multiple‐input‐multiple‐output network with multiple linear transmit covariance constraints, IET Signal Processing, 7(1), pp.47-58, ISSN: 1751-9675. DOI: 10.1049/iet-spr.2011.0364.

Rahulamathavan, Y, Phan, RC-W, Chambers, JA, Parish, DJ (2013) Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis, IEEE Transactions on Affective Computing, 4(1), pp.83-92, ISSN: 1949-3045. DOI: 10.1109/t-affc.2012.33.

Rahulamathavan, Y, Veluru, S, Phan, RC-W, Chambers, J, Rajarajan, M (2013) Privacy-preserving clinical decision support system using gaussian kernel-based classification, IEEE Journal of Biomedical and Health Informatics, 18(1), pp.56-66, ISSN: 2168-2194. DOI: 10.1109/JBHI.2013.2274899.

Cumanan, K, Rahulamathavan, Y, Lambotharan, S, Ding, ZD (2013) MMSE-based beamforming techniques for relay broadcast channels, IEEE Transactions on Vehicular Technology, 62(8), pp.4045-4051, ISSN: 0018-9545. DOI: 10.1109/TVT.2013.2257906.

Rahulamathavan, Y, Phan, RC-W, Veluru, S, Cumanan, K, Rajarajan, M (2013) Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud, IEEE Transactions on Dependable and Secure Computing, 11(5), pp.467-479, ISSN: 1545-5971. DOI: 10.1109/TDSC.2013.51.

Rahulamathavan, Y, Lambotharan, S, Toker, C, Gershman, AB (2012) Suboptimal recursive optimisation framework for adaptive resource allocation in spectrum-sharing networks, IET Signal Processing, 6(1), pp.27-33, ISSN: 1751-9675. DOI: 10.1049/iet-spr.2011.0005.

Rahulamathavan, Y, Cumanan, K, Lambotharan, S (2011) A mixed SINR-balancing and SINR-target-constraints-based beamformer design technique for spectrum-sharing networks, IEEE Transactions on Vehicular Technology, 60(9), pp.4403-4414, ISSN: 0018-9545. DOI: 10.1109/TVT.2011.2171200.



Conferences

Pathmaperuma, MH, Rahulamathavan, Y, Dogan, S, Kondoz, A (2021) User mobile app encrypted activity detection. In The 3rd European Symposium on Computer and Communications (ESCC 2021), Belgrade, Serbia.

Pathmaperuma, MH, Rahulamathavan, Y, Dogan, S, Kondoz, A (2020) In-app activity recognition from Wi-Fi encrypted traffic. In Bhatia, KASKR (ed) Science and Information Conference (SAI 2020); Intelligent Computing: Proceedings of the 2020 Computing Conference, London, UK, pp.685-697, ISBN: 9783030522483. DOI: 10.1007/978-3-030-52249-0_46.

Alattas, A, Rahulamathavan, Y, Kondoz, A (2020) A Novel Speed Estimation Algorithm for Mobile UE’s in 5G mmWave Networks. In , Advances in Intelligent Systems and Computing, pp.673-684, ISBN: 9783030522483. DOI: 10.1007/978-3-030-52249-0_45.

Al-Obiedollah, H, Cumanan, K, Burr, AG, Tang, J, Rahulamathavan, Y, DIng, Z, Dobre, OA (2019) On energy harvesting of hybrid TDMA-NOMA systems. In , 2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings,ISBN: 9781728109626. DOI: 10.1109/GLOBECOM38437.2019.9013805.

Aliyu, HT and Rahulamathavan, Y (2019) Type and Leak Your Ethnicity on Smartphones. In , ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, pp.2557-2561, ISBN: 9781479981311. DOI: 10.1109/ICASSP.2019.8682718.

Roy, A, Roy, C, Misra, S, Rahulamathavan, Y, Rajarajan, M (2018) CARE: Criticality-aware data transmission in CPS-Based Healthcare Systems. In 2018 IEEE International Conference on Communications Workshops, ICC Workshops 2018 - Proceedings, pp.1-6, ISBN: 9781538643280. DOI: 10.1109/ICCW.2018.8403540.

Mukherjee, A, Misra, S, Mangrulkar, P, Rajarajan, M, Rahulamathavan, Y (2018) SmartARM: A smartphone-based group activity recognition and monitoring scheme for military applications. In 11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017, pp.1-6, ISBN: 9781538623473. DOI: 10.1109/ANTS.2017.8384149.

Rahulamathavan, Y, Phan, RC-W, Rajarajan, M, Misra, S, Kondoz, A (2018) Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In 11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017, pp.1-6, ISBN: 9781538623473. DOI: 10.1109/ANTS.2017.8384164.

Idrees, F, Rajarajan, M, Chen, TM, Rahulamathavan, Y, Naureen, A (2017) AndroPIn: Correlating Android Permissions and Intents for Malware Detection. In Chakrabarti, S and Saha, HN (ed) 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2017 8TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), Univ British Columbia, Vancouver, CANADA, pp.394-399.

Abro, FI, Rajarajan, M, Chen, TM, Rahulamathavan, Y (2017) Android application collusion demystified. In International Conference on Future Network Systems and Security, Communications in Computer and Information Science, Gainesville, FL, USA, pp.176-187, ISBN: 9783319655475. DOI: 10.1007/978-3-319-65548-2_14.

Rahulamathavan, Y, Rajarajan, M, Phan, RCW (2016) Smart, secure and seamless access control scheme for mobile devices. In 2016 IEEE International Conference on Communications, 2016 IEEE International Conference on Communications, ICC 2016, Kuala Lumpur, Malaysia,ISBN: 9781479966646. DOI: 10.1109/ICC.2016.7510837.

Rahulamathavan, Y, Rajarajan, M, Rana, OF, Awan, MS, Burnap, P, Das, SK (2016) Assessing data breach risk in cloud systems. In Proceedings - IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015, pp.363-370, ISBN: 9781467395601. DOI: 10.1109/CloudCom.2015.58.

Rahulamathavan, Y and Rajarajan, M (2015) Hide-and-seek: face recognition in private. In IEEE International Conference on Communications, pp.7102-7107, ISBN: 9781467364324. DOI: 10.1109/ICC.2015.7249459.

Rahulamathavan, Y, Rajarajan, M, Pawar, PS, Rana, OF, Burnap, P, Spanoudakis, G (2014) Analysing security requirements in cloud-based service level agreements. In , ACM International Conference Proceeding Series, pp.73-76, ISBN: 9781450330336. DOI: 10.1145/2659651.2659735.

Veluru, S, Rahulamathavan, Y, Manandhar, S, Rajarajan, M (2014) Correlated community estimation models over a set of names. In , Proceedings of 2014 Science and Information Conference, SAI 2014, pp.291-301, ISBN: 9780989319317. DOI: 10.1109/SAI.2014.6918203.

Li, F, Rahulamathavan, Y, Rajarajan, M (2014) LSD-ABAC: Lightweight static and dynamic attributes based access control scheme for secure data access in mobile environment. In , Proceedings - Conference on Local Computer Networks, LCN, pp.354-361, ISBN: 9781479937806. DOI: 10.1109/LCN.2014.6925791.

Rahulamathavan, Y, Moonsamy, V, Batten, L, Shunliang, S, Rajarajan, M (2014) An analysis of tracking settings in blackberry 10 and windows phone 8 smartphones. In , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp.430-437, ISBN: 9783319083438. DOI: 10.1007/978-3-319-08344-5_29.

Veluru, S, Rahulamathavan, Y, Viswanath, P, Longley, P, Rajarajan, M (2013) E-mail address categorization based on semantics of surnames. In , Proceedings of the 2013 IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2013 - 2013 IEEE Symposium Series on Computational Intelligence, SSCI 2013, pp.222-229, ISBN: 9781467358958. DOI: 10.1109/CIDM.2013.6597240.

Burnett, C, Edwards, P, Norman, TJ, Chen, L, Rahulamathavan, Y, Jaffray, M, Pignotti, E (2013) TRUMP: A trusted mobile platform for self-management of chronic illness in rural areas. In , Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp.142-150, ISBN: 9783642389078. DOI: 10.1007/978-3-642-38908-5_11.

Cumanan, K, Rahulamathavan, Y, Lambotharan, S, Ding, Z (2013) A mixed quality of service based linear transceiver design for a multiuser MIMO network with linear transmit covariance constraints. In , IEEE Wireless Communications and Networking Conference, WCNC, pp.3895-3899, ISBN: 9781467359399. DOI: 10.1109/WCNC.2013.6555197.

Li, F, Rahulamathavan, Y, Rajarajan, M, Phan, RCW (2013) Low complexity multi-authority attribute based encryption scheme for mobile cloud computing. In , Proceedings - 2013 IEEE 7th International Symposium on Service-Oriented System Engineering, SOSE 2013, pp.573-577, ISBN: 9780769549446. DOI: 10.1109/SOSE.2013.12.

Zaidi, K, Rahulamathavan, Y, Rajarajan, M (2013) DIVA - Digital Identity in VANETs: A multi-authority framework for VANETs. In , IEEE International Conference on Networks, ICON,ISBN: 9781479920846. DOI: 10.1109/ICON.2013.6781979.

Rahulamathavan, Y and Lambotharan, S (2011) A Rate Balancing Technique for MIMO-Cognitive Radio Network Under a Mixed QoS Requirement. In IEEE Globecom, Houston, pp.1-5.

Rahulamathavan, Y, Cumanan, K, Lambotharan, S (2011) An SINR balancing based beamforming technique for cognitive radio networks with mixed quality of service requirements. In , IEEE International Conference on Communications,ISBN: 9781612842332. DOI: 10.1109/icc.2011.5962587.

Rahulamathavan, Y, Dong, Y, Cumanan, K, Lambotharan, S, Nandi, AK (2010) Adaptive rate balancing techniques in cognitive radio networks. In , 2010 International Workshop on Cognitive Radio, IWCR 2010,ISBN: 9781424490998. DOI: 10.1109/IWCR.2010.5730214.

Cumanan, K, Rahulamathavan, Y, Lambotharan, S (2010) Linear transceiver design for multiuser spectrum sharing MIMO networks. In , 2010 International Workshop on Cognitive Radio, IWCR 2010,ISBN: 9781424490998. DOI: 10.1109/IWCR.2010.5730215.

Tang, J, Yogachandran, R, Lambotharan, S (2010) Optimal Adaptive Bit Loading and Subcarrier Allocation Techniques for OFDM based Cognitive Radio Systems. In IEEE International Conference on Communication Technology (ICCT), Nanjing, pp.454-457.

Hu, JC, Xiong, Z, Rahulamathavan, Y, Cumanan, K, Lambotharan, S (2010) Optimization Techniques For Two-Way Relaying Based Multiuser Multiplexing. In IEEE Signal Processing Advances in Wireless Communications (IEEE SPAWC), Marrakech, pp.1-5.

Rahulamathavan, Y, Cumanan, K, Lambotharan, S (2010) Optimal Resource Allocation Techniques For MIMO-OFDMA Based Cognitive Radio Networks Using Integer Linear Programming. In IEEE Signal Processing Advances in Wireless Communications (IEEE SPAEC), Marrakech, pp.1-5.

Xiong, Z, Cumanan, K, Rahulamathavan, Y, Lambotharan, S (2010) A robust SINR Balancing Technique for a Multiuser MIMO Cognitive Radio Network. In IEEE, (ed) IEEE Signal Processing Advances in Wireless Communications (IEEE SPAWC), Marrakech, pp.1-5.

Rahulamathavan, Y, Cumanan, K, Krishna, R, Lambotharan, S (2009) Adaptive subcarrier and bit allocation techniques for MIMO-OFDMA based uplink cognitive radio networks. In , Proceedings - 2009 1st UK-India International Workshop on Cognitive Wireless Systems, UKIWCWS 2009,ISBN: 9781457701832. DOI: 10.1109/UKIWCWS.2009.5749387.

Rahulamathavan, Y, Cumanan, K, Musavian, L, Lambotharan, S (2009) Optimal Subcarrier And Bit Allocation Techniques For Cognitive Rdio Networks Using Integer Linear Programming. In IEEE Statistical Signal Processing Workshop, Cardiff, pp.293-296.



Chapters

Veluru, S, Rahulamathavan, Y, Gupta, BB, Rajarajan, M (2015) Privacy preserving text analytics: Research challenges and strategies in name analysis. In Standards and Standardization: Concepts, Methodologies, Tools, and Applications, pp.1415-1435, ISBN: 9781466681118. DOI: 10.4018/978-1-4666-8111-8.ch066.

Veluru, S, Rahulamathavan, Y, Gupta, BB, Rajarajan, M (2014) Privacy preserving text analytics: Research challenges and strategies in name analysis. In Handbook of Research on Securing Cloud-Based Databases with Biometric Applications, pp.364-385, ISBN: 9781466665590. DOI: 10.4018/978-1-4666-6559-0.ch017.



School/Dept Working Papers

Grosman, A, Rahulamathavan, Y, Suryawanshi, P (2019) Multi-modal Data Processing Model for Exchange Rate Prediction.



Other

Gupta, BB, Rahulamathavan, Y, Yamaguchi, S, Brooks, T, Yan, Z (2019) IEEE Access Special Section Editorial: Recent Advances in Computational Intelligence Paradigms for Security and Privacy for Fog and Mobile Edge Computing, Today, cloud computing services are undeniably becoming parts of modern information and communication systems in our daily lives. Cloud computing has proven to be an incredible technology for provisioning quickly deployed and scalable information technology (IT) solutions at reduced infrastructure costs. Cloud computing is unable to meet the requirements of low latency, location awareness, and mobility support. To solve this problem, researchers have introduced a trusted and dependable solution through fog and mobile edge computing (FMEC) to put the services and resources of the cloud closer to users, which facilitates the leveraging of available services and resources in the edge networks. Organizations are beginning to look at FMEC as the answer to the cloud computing problem. FMEC consists of putting micro data centers or even small, purpose-built high-performance data analytics machines in remote offices and locations in order to gain real-time insights from the data collected, or to promote data thinning at the edge, by dramatically reducing the amount of data that needs to be transmitted to a central data center. Without having to move unnecessary data to a central data center, analytics at the edge can simplify and drastically speed analysis while also cutting costs. FMEC pushes applications, data, and computing power (services) away from centralized points to the logical extremes of a network. FMEC replicates fragments of information across distributed networks of web servers, which may be vast. As a topological paradigm, edge computing is also referred to as mesh computing, peer-to-peer computing, autonomic (self-healing) computing, grid computing, and other names implying non-centralized, node-less availability. DOI: 10.1109/ACCESS.2019.2940302.



Getting in touch

Research Office
Loughborough University
Loughborough
Leicestershire
LE11 3TU
researchpolicy@lboro.ac.uk
+44 (0)1509 222453

Research Repository
University Library
Loughborough University
Loughborough
LE11 3TU
repository@lboro.ac.uk
+44 (0)1509 222338 / 222414