Sankardas Roy

Book Chapter

Sankardas Roy, Dewan Chaulagain, and Shiva Bhusal. Static Analysis for Security Vetting of Android Apps. Book Chapter, From Database to Cyber Security, ISBN 978-3-030-04833-4, Springer, 2018.

Sanjeev Setia, Sankardas Roy, and Sushil Jajodia. Secure Data Aggregation in Wireless Sensor Networks. Book Chapter, Wireless Sensor Network Security, J. Lopez, J. Zhou (Eds.), ISBN 978-1-58603-8137, IOS Press, 2008.

Refereed Journal Papers

Fengguo Wei, Sankardas Roy, Xinming Ou, Robby. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. ACM Trans. Priv. Secur. 21(3): 14:1-14:32 (2018).

Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva. Mitigating Congestion-based DoS Attacks with an Enhanced AQM Technique. Elsevier Journal of Computer Communications (ComCom 2015).

Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker’s Impact. IEEE Transactions on Information Forensics and Security (TIFS), 9(4): 681-694, 2014.

Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva. Mitigating Congestion Based DoS Attacks with an Enhanced AQM Technique. Elsevier Computer Communications, 2014.

Jiazhen Jhou, Sankardas Roy, Jiang Li, and Yi Qian. Minimizing the Average Delay of Messages in Pigeon Networks. Accepted by IEEE Transactions on Communication, 2013.

M Chuah, P Yang, S Roy, B Sheng. Performance Evaluation of Dissemination Schemes for Coded Packets in Heterogeneous Sparse Ad Hoc Networks. Ad Hoc & Sensor Wireless Networks 15 (2-4), 151-181, 2012.

Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. Secure Data Aggregation in Wireless Sensor Networks. IEEE Transactions on Information Forensics and Security (TIFS), 7(3): 1040-1052 (2012).

Jiazhen Jhou, Jiang Li, Yi Qian, Sankardas Roy, and Kenneth Mitchell. Quasi-Optimal Dual-phase Scheduling for Pigeon Networks. IEEE Transactions on Vehicular Technology, 61(9): 4157-4169 (2012).

Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy and Lingyu Wang. Localized Multicast: Efficient and Distributed Replica Detection in Large-scale Sensor Networks. IEEE Transactions on Mobile Computing, 9(7): 913-926 (2010).

Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. Secure Median Computation in Wireless Sensor Networks. Ad Hoc Networks 7(8): 1448-1462 (2009). (pdf).

Mauro Conti, Lei Zhang, Sankardas Roy, and Sushil Jajodia. Protecting Privacy in Data Aggregation in Sensor Networks. Security and Communication Networks 2(2): 195-213 (2009). (pdf).

Refereed Conference papers

Sankardas Roy, Daniele Tomasi, Mauro Conti, Shiva Bhusal, Arkajyoti Roy, Jiang Li. Optimizing Message Ferry Scheduling in a DTN. MobiWac, 2018.

Zhaohui Xu, Pooja Yadav, Zhizhou Zhang, Sankardas Roy, Huimin Zhang. Quantification of microbial species in solid state fermentation samples using signature genomic sequences. IEEE BIBM, 2017.

Fengguo Wei, Yuping Li, Sankardas Roy, Xinming Ou, Wu Zhou. Deep Ground Truth Analysis of Current Android Malware. DIMVA, 2017.

Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Ranganathan, Hongmin Li and Nicolais Guevara. Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2015. (pdf)

Fengguo Wei, Sankardas Roy, Xinming Ou, and Robby. Amandroid: A Precise and General Inter-component Data Flow Analysis Framework for Security Vetting of Android Apps. ACM Conference on Computer and Communications Security (CCS) 2014: 1329-1341. (pdf)

Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva. Mitigating Congestion-based Denial of Service Attacks with Active Queue Management. IEEE Global Communications Conference ( Globecom 2013).

Jiazhen Zhou, Sankardas Roy, Jiang Li, and Yi Qian. A Geographical Partitioning-based Pigeon Assignment in a Pigeon Network. IEEE International Conference on Communications (ICC 2012).

Harkeerat Bedi, Sankardas Roy, and Sajjan Shiva. Game Theory-based Defense Mechanisms against DDoS Attacks on TCP/TCP-friendly flows. Proceedings of the IEEE Symposium Series on Computational Intelligence (SSCI 2011). (pdf)

Sankardas Roy, Charles Ellis, Sajjan Shiva, Dipankar Dasgupta, Vivek Shandilya, and Qishi Wu. A Survey of Game Theory as Applied to Network Security. The 43rd Hawaii International Conference on System Sciences, 2010. (pdf)

Sajjan Shiva, Sankardas Roy, Harkeerat Bedi, Dipankar Dasgupta, and Qishi Wu. A Stochastic Game with Imperfect Information for Cyber Security. To appear in the 5th International Conference on i-Warfare & Security (ICIW), 2010. (pdf)

Qishi Wu, Sajjan Shiva, Sankardas Roy, Charles Ellis, and Vivek Datla. On Modeling and Simulation of Game Theory-based Defense Mechanisms against DoS and DDoS Attacks. Accepted by Spring Simulation Multiconference (SpringSim), 2010. (pdf)

Sankardas Roy, Mauro Conti, Sanjeev Setia, and Sushil Jajodia. Securely Computing An Approximate Median in Wireless Sensor Networks. SecureComm 2008. (pdf). More details are in a technical report.

Bo Zhu, V. Gopala Addada, Sanjeev Setia, Sushil Jajodia, and Sankardas Roy. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007 . (pdf)

Sankardas Roy, V. Gopala Addada, Sanjeev Setia, and Sushil Jajodia. Securing MAODV: Attacks and Countermeasures. IEEE SECON 2005. (pdf)

Refereed Workshop papers

Mooi Choo Chuah, Sankardas Roy, and I. Stoev. Secure Descriptive Message Dissemination in DTNs.Accepted by the Second International Workshop on Mobile Opportunistic Networking (MobiOpp), 2010. (pdf)

Sankardas Roy, Sanjeev Setia, and Sushil Jajodia. Attack-resilient Hierarchical Data Aggregation in Sensor Networks.ACM SASN 2006. (pdf)

Papers under review

None