default search action
Ritu Chadha
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c61]Bleema Rosenfeld, Sridhar Venkatesan, Rauf Izmailov, Matthew Yudin, Constantin Serban, Ritu Chadha:
Data-Driven Constraint Mining for Realizable Adversarial Samples. MILCOM 2023: 7-12 - 2022
- [c60]Samson Ho, Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov, Ritu Chadha, Alina Oprea:
Data Sanitization Approach to Mitigate Clean-Label Attacks Against Malware Detection Systems. MILCOM 2022: 993-998 - 2021
- [c59]Sridhar Venkatesan, Harshvardhan Sikka, Rauf Izmailov, Ritu Chadha, Alina Oprea, Michael J. De Lucia:
Poisoning Attacks and Data Sanitization Mitigations for Machine Learning Models in Network Intrusion Detection Systems. MILCOM 2021: 874-879 - 2020
- [c58]Luan Huy Pham, Massimiliano Albanese, Ritu Chadha, Cho-Yu Jason Chiang, Sridhar Venkatesan, Charles A. Kamhoua, Nandi Leslie:
A Quantitative Framework to Model Reconnaissance by Stealthy Attackers and Support Deception-Based Defenses. CNS 2020: 1-9 - [c57]Gi Tae Kim, Constantin Serban, Ritu Chadha:
Attack-Resistant Routing : a Framework for Enhancing Routing Robustness in Wireless Ad-hoc Networks. NOMS 2020: 1-7 - [p1]Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha:
A Framework for Studying Autonomic Computing Models in Cyber Deception. Adaptive Autonomous Secure Cyber Systems 2020: 89-107
2010 – 2019
- 2019
- [c56]Sridhar Venkatesan, E. Allison Newcomb, Blaine Hoffman, Norbou Buchler, Jason A. Youzwak, Shridatt Sugrim, Cho-Yu Jason Chiang, Alexander Poylisher, Matthew Witkowski, Gary Walther, Michelle Wolberg, Ritu Chadha:
VulnerVAN: A Vulnerable Network Generation Tool. MILCOM 2019: 1-6 - 2018
- [j9]Sridhar Venkatesan, Massimiliano Albanese, Cho-Yu Jason Chiang, Angelo Sapello, Ritu Chadha:
DeBot: A novel network-based mechanism to detect exfiltration by architectural stealthy botnets. Secur. Priv. 1(6) (2018) - [c55]Shridatt Sugrim, Sridhar Venkatesan, Jason A. Youzwak, Cho-Yu Jason Chiang, Ritu Chadha, Massimiliano Albanese, Hasan Cam:
Measuring the Effectiveness of Network Deception. ISI 2018: 142-147 - [c54]Cho-Yu Jason Chiang, Sridhar Venkatesan, Shridatt Sugrim, Jason A. Youzwak, Ritu Chadha, Edward I. Colbert, Hasan Cam, Massimiliano Albanese:
On Defensive Cyber Deception: A Case Study Using SDN. MILCOM 2018: 110-115 - [c53]Todd P. Huster, Cho-Yu Jason Chiang, Ritu Chadha, Ananthram Swami:
Towards the Development of Robust Deep Neural Networks in Adversarial Settings. MILCOM 2018: 419-424 - [c52]Rauf Izmailov, Shridatt Sugrim, Ritu Chadha, Patrick D. McDaniel, Ananthram Swami:
Enablers of Adversarial Attacks in Machine Learning. MILCOM 2018: 425-430 - [c51]Sridhar Venkatesan, Shridatt Sugrim, Rauf Izmailov, Cho-Yu Jason Chiang, Ritu Chadha, Bharat Doshi, Blaine Hoffman, E. Allison Newcomb, Norbou Buchler:
On Detecting Manifestation of Adversary Characteristics. MILCOM 2018: 431-437 - [c50]Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha:
Limitations of the Lipschitz Constant as a Defense Against Adversarial Examples. Nemesis/UrbReas/SoGood/IWAISe/GDM@PKDD/ECML 2018: 16-29 - [i1]Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha:
Limitations of the Lipschitz constant as a defense against adversarial examples. CoRR abs/1807.09705 (2018) - 2017
- [j8]Stefan Achleitner, Thomas F. La Porta, Patrick D. McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, Ritu Chadha:
Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies. IEEE Trans. Netw. Serv. Manag. 14(4): 1098-1112 (2017) - [c49]Angelo Sapello, Constantin Serban, Ritu Chadha, Rauf Izmailov:
Application of Learning Using Privileged Information(LUPI): Botnet Detection. ICCCN 2017: 1-8 - 2016
- [c48]Stefan Achleitner, Thomas La Porta, Patrick D. McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, Ritu Chadha:
Cyber Deception: Virtual Networks to Defend Insider Reconnaissance. MIST@CCS 2016: 57-68 - [c47]Azeem Aqil, Ahmed Osama Fathy Atya, Srikanth V. Krishnamurthy, Paul L. Yu, Ananthram Swami, Jeff Rowe, Karl N. Levitt, Alexander Poylisher, Constantin Serban, Ritu Chadha:
Automated cross layer feature selection for effective intrusion detection in networked systems. CNS 2016: 270-278 - [c46]Z. Berkay Celik, Nan Hu, Yun Li, Nicolas Papernot, Patrick D. McDaniel, Robert J. Walls, Jeff Rowe, Karl N. Levitt, Novella Bartolini, Thomas F. La Porta, Ritu Chadha:
Mapping sample scenarios to operational models. MILCOM 2016: 7-12 - [c45]Tom Bowen, Alexander Poylisher, Constantin Serban, Ritu Chadha, Cho-Yu Jason Chiang, Lisa M. Marvel:
Enabling reproducible cyber research - four labeled datasets. MILCOM 2016: 539-544 - [c44]Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Shridatt James Sugrim, Ritu Chadha, Constantin Serban, Alexander Poylisher, Lisa M. Marvel, Jonathan Santos:
ACyDS: An adaptive cyber deception system. MILCOM 2016: 800-805 - [c43]Ritu Chadha, Thomas Bowen, Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Alexander Poylisher, Angelo Sapello, Constantin Serban, Shridatt Sugrim, Gary Walther, Lisa M. Marvel, E. Allison Newcomb, Jonathan Santos:
CyberVAN: A Cyber Security Virtual Assured Network testbed. MILCOM 2016: 1125-1130 - 2015
- [c42]Roberto Pagliari, Abhrajit Ghosh, Yitzchak M. Gottlieb, Ritu Chadha, Akshay Vashist, Gregory Hadynski:
Insider attack detection using weak indicators over network flow data. MILCOM 2015: 1-6 - [c41]Ritu Chadha, Abhrajit Ghosh, Alexander Poylisher, Constantin Serban:
TREND: Trust estimation system for wireless networks via multi-pronged detection. MILCOM 2015: 13-18 - [c40]Constantin Serban, Alexander Poylisher, Angelo Sapello, Yitzchak M. Gottlieb, C. Jason Chiang, Ritu Chadha:
Testing android devices for tactical networks: A hybrid emulation testbed approach. MILCOM 2015: 489-494 - [c39]Siun-Chuon Mau, Latha A. Kant, Gi Tae Kim, Ritu Chadha:
Nature inspired collaborative team autonomy (NICiTA). MILCOM 2015: 756-761 - 2014
- [j7]Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang:
Sophisticated Access Control via SMT and Logical Frameworks. ACM Trans. Inf. Syst. Secur. 16(4): 17 (2014) - 2013
- [j6]Jason Perry, Konstantine Arkoudas, C. Jason Chiang, Ritu Chadha, Daniel Apgar, Keith Whittaker:
Modular natural language interfaces to logic-based policy frameworks. Comput. Stand. Interfaces 35(5): 417-427 (2013) - [c38]Ritu Chadha, Alexander Poylisher, Constantin Serban:
Reliability estimation in mobile ad hoc networks. CNSM 2013: 189-192 - 2012
- [c37]Jeffrey Boksiner, Yuriy Posherstnik, Howard McDonald, Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang, Apurva N. Mody, Matthew Sherman:
Policy-based spectrum management architecture. MILCOM 2012: 1-6 - [c36]Alexander Poylisher, Yitzchak M. Gottlieb, Constantin Serban, Keith Whittaker, James H. Nguyen, Chris Scilla, John Lee, Florin Sultan, Ritu Chadha, Cho-Yu Jason Chiang:
Building an operation support system for a fast reconfigurable network experimentation testbed. MILCOM 2012: 1-6 - [c35]Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Abhrajit Ghosh, Yitzchak M. Gottlieb, Michael Kaplan, Kathleen Kurachik, Gary Levin, Yow-Jia Lin, Alexander Poylisher, Angelo Sapello, Florin Sultan, Akshay Vashist, Michelle Wolberg, Kimberly Moeltner:
TITAN: Integrated network management in tactical mobile ad hoc networks. MILCOM 2012: 1-6 - [c34]Constantin Serban, Ritu Chadha, C. Jason Chiang, Feng Ge, Yitzchak M. Gottlieb, Angelo Sapello, Kaustubh Sinkar, Kimberly Moeltner:
A GNU-based packet radio for network management field testing. MILCOM 2012: 1-6 - [c33]Florin Sultan, Alexander Poylisher, Constantin Serban, John Lee, Ritu Chadha, C. Jason Chiang:
TimeSync: Virtual time for scalable, high-fidelity hybrid network emulation. MILCOM 2012: 1-6 - [c32]Akshay Vashist, Ritu Chadha, Michael Kaplan, Kimberly Moeltner:
Detecting communication anomalies in tactical networks via graph learning. MILCOM 2012: 1-6 - [c31]Florin Sultan, Alexander Poylisher, John Lee, Constantin Serban, C. Jason Chiang, Ritu Chadha, Keith Whittaker, Chris Scilla, Syeed E. Ali:
TimeSync: enabling scalable, high-fidelity hybrid network emulation. MSWiM 2012: 185-194 - [c30]Akshay Vashist, Rauf Izmailov, Kyriakos Manousakis, Ritu Chadha, C. Jason Chiang, Constantin Serban, Syeed E. Ali:
Towards network invariant fault diagnosis in MANETs via statistical modeling: The global strength of local weak decisions. NOMS 2012: 981-987 - [c29]Konstantine Arkoudas, Shoshana Loeb, Ritu Chadha, C. Jason Chiang, Keith Whittaker:
Automated Policy Analysis. POLICY 2012: 1-8 - 2011
- [c28]Siun-Chuon Mau, Akshay Vashist, Alexander Poylisher, Ritu Chadha, Cho-Yu Jason Chiang:
Criticality avoidance: A new paradigm for congestion control based on science of phase transition. CNSM 2011: 1-6 - [c27]Konstantine Arkoudas, Ritu Chadha, C. Jason Chiang:
An Application of Formal Methods to Cognitive Radios. DIFTS@FMCAD 2011 - [c26]Feng Ge, Cho-Yu Jason Chiang, Yitzchak M. Gottlieb, Ritu Chadha:
GNU Radio-Based Digital Communications: Computational Analysis of a GMSK Transceiver. GLOBECOM 2011: 1-6 - [c25]Akshay Vashist, Siun-Chuon Mau, Alexander Poylisher, Ritu Chadha, Abhrajit Ghosh:
Leveraging social network for predicting demand and estimating available resources for communication network management. Integrated Network Management 2011: 547-554 - [c24]Michelle Wolberg, Ritu Chadha, C. Jason Chiang, Kathleen Kurachik, Marcus Pang, Gregory Hadynski:
Using an adaptive management plane for policy-based network management traffic in MANETs. MILCOM 2011: 1133-1138 - [c23]Latha A. Kant, Anthony J. McAuley, Kyriakos Manousakis, Ritu Chadha, C. Jason Chiang, Yitzchak M. Gottlieb, Charles Graff, Mitesh P. Patel, J. Bowcock, Kimberly Moeltner, David Yee:
On the application of cognitive network design to MANET Network Management. MILCOM 2011: 1428-1433 - [c22]Kyriakos Manousakis, Yitzchak M. Gottlieb, Ritu Chadha, C. Jason Chiang, Kimberly Moeltner:
Mission-driven tactical network management. MILCOM 2011: 1466-1471 - [c21]Alexander Poylisher, Florin Sultan, Abhrajit Ghosh, Shiwei Li, C. Jason Chiang, Ritu Chadha, Kimberly Moeltner, Kimberly Jakubowski:
QAM: A comprehensive QoS-aware Middleware suite for tactical communications. MILCOM 2011: 1586-1591 - 2010
- [j5]Alexander Poylisher, Constantin Serban, John Lee, Taichuan Lu, Ritu Chadha, Cho-Yu Jason Chiang, Robert Orlando, Kimberly Jakubowski:
A virtual ad hoc network testbed. Int. J. Commun. Networks Distributed Syst. 5(1/2): 5-24 (2010) - [j4]Pratik K. Biswas, Alexander Poylisher, Ritu Chadha, Abhrajit Ghosh:
Integrated network experimentation for QoS measurements in opaque MANETs. Int. J. Netw. Manag. 20(4): 199-218 (2010) - [c20]Angelo Sapello, Adarsh S. Sethi, Marian H. Nodine, Ritu Chadha:
Application of time series analysis to fault management in MANETs. CNSM 2010: 150-157 - [c19]Akshay Vashist, Siun-Chuon Mau, Alexander Poylisher, Ritu Chadha, Abhrajit Ghosh:
Predicting End-to-end Network Load. ICMLA 2010: 917-920
2000 – 2009
- 2009
- [c18]Cho-Yu Jason Chiang, Gary Levin, Shihwei Li, Constantin Serban, Michelle Wolberg, Ritu Chadha, Gregory Hadynski, Lee LaBarre:
Enabling Distributed Management for Dynamic Airborne Networks. POLICY 2009: 102-105 - [c17]Pratik K. Biswas, Constantin Serban, Alexander Poylisher, John Lee, Siun-Chuon Mau, Ritu Chadha, Cho-Yu Jason Chiang, Robert Orlando, Kimberly Jakubowski:
An integrated testbed for Virtual Ad Hoc Networks. TRIDENTCOM 2009: 1-10 - 2008
- [c16]Alexander Poylisher, Ritu Chadha:
PBNM Technology Evaluation: Practical Criteria. POLICY 2008: 105-108 - [c15]Ritu Chadha, Cho-Yu Jason Chiang:
DRAMA: Distributed Policy Management for MANETs. POLICY 2008: 235-237 - [c14]Pratik K. Biswas, Alexander Poylisher, Ritu Chadha, Abhrajit Ghosh:
Hybrid testbeds for QoS management in opaque MANETS. WICON 2008: 72 - [c13]Latha A. Kant, Ritu Chadha:
MANET management: Industry challenges & potential solutions. WOWMOM 2008: 1-8 - 2007
- [c12]Cho-Yu Jason Chiang, Gary Levin, Yitzchak M. Gottlieb, Ritu Chadha, Shihwei Li, Alexander Poylisher, Scott Newman, Richard Lo:
On Automated Policy Generation for Mobile Ad Hoc Networks. POLICY 2007: 256-260 - 2006
- [c11]Ritu Chadha:
Beyond the Hype: Policies for Military Network Operations. ICSNC 2006: 38 - 2005
- [c10]Kong E. Cheng, Ritu Chadha, Hong Cheng, Marc Pucci:
Feature Interactions in Overlay Networks. FIW 2005: 91-297 - 2004
- [c9]Ritu Chadha:
Applications of policy-based network management. NOMS (1) 2004: 907-908 - [c8]Ritu Chadha:
Managing mobile ad hoc networks. NOMS (1) 2004: 922 - [c7]Ritu Chadha, Hong Cheng, Yuu-Heng Cheng, Cho-Yu Jason Chiang, A. Ghetie, Gary Levin, Harshad Tanna:
Policy-Based Mobile Ad Hoc Network Management. POLICY 2004: 35-44 - 2003
- [c6]Ritu Chadha, Yuu-Heng Cheng, Thanh Cheng, Shrirang Gadgil, Abdelhakim Hafid, Keith Kim, Gary Levin, Narayanan Natarajan, Kirthika Parmeswaran, Alexander Poylisher, John Unger:
PECAN: Policy-Enabled Configuration Across Networks. POLICY 2003: 52-62 - 2002
- [j3]Ritu Chadha, George Lapiotis, Steven Wright:
Guest editorial - policy-based networking. IEEE Netw. 16(2): 8-9 (2002)
1990 – 1999
- 1994
- [j2]Ritu Chadha, David A. Plaisted:
Correctness of Unification Without Occur Check in Prolog. J. Log. Program. 18(2): 99-122 (1994) - [c5]Ritu Chadha, Isil Sebüktekin:
Symbolic simulation: theory and application to protocol modeling and validation. ICNP 1994: 117-125 - 1993
- [j1]Ritu Chadha, David A. Plaisted:
On the Mechanical Derivation of Loop Invariants. J. Symb. Comput. 15(5/6): 705-744 (1993) - [c4]Sanjai Narain, Orville Cockings, Ritu Chadha:
A Formal Model of SONET's Alarm-Surveillance Procedures and their Simulation. FORTE 1993: 235-250 - [c3]Ritu Chadha, David A. Plaisted:
Finding Logical Consequences Using Unskolemization. ISMIS 1993: 255-264
1980 – 1989
- 1989
- [c2]Donald C. S. Allison, Ritu Chadha:
An O(N log N) expected time merge heuristic for the planar ETSP. ACM Conference on Computer Science 1989: 472 - 1988
- [c1]Ritu Chadha, Donald C. S. Allison:
Partitioning rectilinear figures into rectangles. ACM Conference on Computer Science 1988: 102-106
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint