default search action
Tejasvi Alladi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Devika S, Rishi Rakesh Shrivastava, Pratik Narang, Tejasvi Alladi, F. Richard Yu:
VADGAN: An Unsupervised GAN Framework for Enhanced Anomaly Detection in Connected and Autonomous Vehicles. IEEE Trans. Veh. Technol. 73(9): 12458-12467 (2024) - [j19]Amit Chougule, Ishan Kulkarni, Tejasvi Alladi, Vinay Chamola, Fei Richard Yu:
HybridSecNet: In-Vehicle Security on Controller Area Networks Through a Hybrid Two-Step LSTM-CNN Model. IEEE Trans. Veh. Technol. 73(10): 14580-14591 (2024) - 2023
- [j18]Tejasvi Alladi, Varun Kohli, Vinay Chamola, F. Richard Yu:
A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems. Digit. Commun. Networks 9(5): 1113-1122 (2023) - [j17]Tejasvi Alladi, Ayush Agrawal, Bhavya Gera, Vinay Chamola, F. Richard Yu:
Ambient Intelligence for Securing Intelligent Vehicular Networks: Edge-Enabled Intrusion and Anomaly Detection Strategies. IEEE Internet Things Mag. 6(1): 128-132 (2023) - [j16]Kushagra Raina, Tejasvi Alladi, Vinay Chamola, Fei Richard Yu:
Detecting UAV Presence Using Convolution Feature Vectors in Light Gradient Boosting Machine. IEEE Trans. Veh. Technol. 72(4): 4332-4341 (2023) - [c4]Divya Pathak, Ranjitha K., Krishna Sai Modali, Praveen Tammana, A. Antony Franklin, Tejasvi Alladi:
Accelerating PUF-based Authentication Protocols Using Programmable Switch. NOMS 2023: 1-10 - 2022
- [j15]Tejasvi Alladi, Vinay Chamola, Nishad Sahu, Vishnu Venkatesh, Adit Goyal, Mohsen Guizani:
A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks. IEEE Commun. Surv. Tutorials 24(2): 1212-1239 (2022) - [j14]Kushagra Agrawal, Tejasvi Alladi, Ayush Agrawal, Vinay Chamola, Abderrahim Benslimane:
NovelADS: A Novel Anomaly Detection System for Intra-Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(11): 22596-22606 (2022) - [c3]Ranjitha K., Divya Pathak, Praveen Tammana, A. Antony Franklin, Tejasvi Alladi:
Accelerating PUF-based UAV Authentication Protocols Using Programmable Switch. COMSNETS 2022: 309-313 - [i1]Tejasvi Alladi, Vinay Chamola, Nishad Sahu, Vishnu Venkatesh, Adit Goyal, Mohsen Guizani:
A Comprehensive Survey on the Applications of Blockchain for Securing Vehicular Networks. CoRR abs/2201.04803 (2022) - 2021
- [j13]Tejasvi Alladi, Varun Kohli, Vinay Chamola, F. Richard Yu:
Securing the Internet of Vehicles: A Deep Learning-Based Classification Framework. IEEE Netw. Lett. 3(2): 94-97 (2021) - [j12]Harsh Grover, Tejasvi Alladi, Vinay Chamola, Dheerendra Singh, Kim-Kwang Raymond Choo:
Edge Computing and Deep Learning Enabled Secure Multitier Network for Internet of Vehicles. IEEE Internet Things J. 8(19): 14787-14796 (2021) - [j11]Tejasvi Alladi, Vinay Chamola, Naren Naren:
HARCI: A Two-Way Authentication Protocol for Three Entity Healthcare IoT Networks. IEEE J. Sel. Areas Commun. 39(2): 361-369 (2021) - [j10]Tejasvi Alladi, Bhavya Gera, Ayush Agrawal, Vinay Chamola, Fei Richard Yu:
DeepADV: A Deep Neural Network Framework for Anomaly Detection in VANETs. IEEE Trans. Veh. Technol. 70(11): 12013-12023 (2021) - [j9]Tejasvi Alladi, Varun Kohli, Vinay Chamola, F. Richard Yu, Mohsen Guizani:
Artificial Intelligence (AI)-Empowered Intrusion Detection Architecture for the Internet of Vehicles. IEEE Wirel. Commun. 28(3): 144-149 (2021) - [c2]Tejasvi Alladi, Ayush Agrawal, Bhavya Gera, Vinay Chamola, Biplab Sikdar, Mohsen Guizani:
Deep Neural Networks for Securing IoT Enabled Vehicular Ad-Hoc Networks. ICC 2021: 1-6 - [c1]Tejasvi Alladi, Vishnu Venkatesh, Vinay Chamola, Nitin Chaturvedi:
Drone-MAP: A Novel Authentication Scheme for Drone-Assisted 5G Networks. INFOCOM Workshops 2021: 1-6 - 2020
- [j8]Tejasvi Alladi, Vinay Chamola, Biplab Sikdar, Kim-Kwang Raymond Choo:
Consumer IoT: Security Vulnerability Case Studies and Solutions. IEEE Consumer Electron. Mag. 9(2): 17-25 (2020) - [j7]Tejasvi Alladi, Vinay Chamola, Sherali Zeadally:
Industrial Control Systems: Cyberattack trends and countermeasures. Comput. Commun. 155: 1-8 (2020) - [j6]Tejasvi Alladi, Vinay Chamola, Naren Naren, Neeraj Kumar:
PARTH: A two-stage lightweight mutual authentication protocol for UAV surveillance networks. Comput. Commun. 160: 81-90 (2020) - [j5]Tejasvi Alladi, Sombuddha Chakravarty, Vinay Chamola, Mohsen Guizani:
A Lightweight Authentication and Attestation Scheme for In-Transit Vehicles in IoV Scenario. IEEE Trans. Veh. Technol. 69(12): 14188-14197 (2020) - [j4]Tejasvi Alladi, Naren Naren, Gaurang Bansal, Vinay Chamola, Mohsen Guizani:
SecAuthUAV: A Novel Authentication Scheme for UAV-Ground Station and UAV-UAV Communication. IEEE Trans. Veh. Technol. 69(12): 15068-15077 (2020) - [j3]Tejasvi Alladi, Vinay Chamola, Nishad Sahu, Mohsen Guizani:
Applications of blockchain in unmanned aerial vehicles: A review. Veh. Commun. 23: 100249 (2020)
2010 – 2019
- 2019
- [j2]Tejasvi Alladi, Vinay Chamola, Reza M. Parizi, Kim-Kwang Raymond Choo:
Blockchain Applications for Industry 4.0 and Industrial IoT: A Review. IEEE Access 7: 176935-176951 (2019) - [j1]Tejasvi Alladi, Vinay Chamola, Joel J. P. C. Rodrigues, Sergei A. Kozlov:
Blockchain in Smart Grids: A Review on Different Use Cases. Sensors 19(22): 4862 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint