Search Results - "Akella, Ravi"

Refine Results
  1. 1

    Analysis of information flow security in cyber–physical systems by Akella, Ravi, Tang, Han, McMillin, Bruce M.

    “…Information flow is a fundamental concept underlying the security of a system. Confidentiality of information in a system can be breached through unrestricted…”
    Get full text
    Journal Article
  2. 2

    Service Discovery for the Connected Car with Semantic Accessors by Weber, Matthew, Akella, Ravi, Lee, Edward A.

    “…Connected cars have the potential to transform a vehicle from a transportation platform to a platform for integrating humans with a city. To that end we…”
    Get full text
    Conference Proceeding
  3. 3

    A Randomized Kernel-Based Secret Image Sharing Scheme by Akella, Ravi Tej, Rekula, Raviteja, Pankajakshan, Vinod

    Published 29-09-2018
    “…This paper proposes a ($k,n$)-threshold secret image sharing scheme that offers flexibility in terms of meeting contrasting demands such as information…”
    Get full text
    Journal Article
  4. 4

    Security Middleground for Resource Protection in Measurement Infrastructure-as-a-Service by Akella, Ravi, Debroy, Saptarshi, Calyam, Prasad, Berryman, Alex, Zhu, Kunpeng, Sridharan, Mukundan

    Published in IEEE transactions on services computing (01-07-2019)
    “…Securing multi-domain network performance monitoring (NPM) systems that are being widely deployed as ‘Measurement Infrastructure-as-a-Service’ (MIaaS) in…”
    Get full text
    Journal Article
  5. 5

    Adoption patterns of an electronic patient-reported outcomes tool in oncology by Polubriaginof, Fernanda CG, Parekh, Priti K, Akella, Naga Ravi Shankar, Stetson, Peter D.

    Published in Journal of clinical oncology (20-05-2020)
    “…Abstract only e19127 Background: Patient-reported outcomes (PROs) are critical for the delivery of patient-centric care. Previous research has shown that the…”
    Get full text
    Journal Article
  6. 6

    Verification and Protection of Confidentiality in an Advanced Smart Grid by McMillin, B., Akella, R.

    “…Information flow typically refers to the explicit as well as implicit information resulting from the interaction of cyber processes constituting a system…”
    Get full text
    Conference Proceeding
  7. 7

    Reasoning with Latent Diffusion in Offline Reinforcement Learning by Venkatraman, Siddarth, Khaitan, Shivesh, Akella, Ravi Tej, Dolan, John, Schneider, Jeff, Berseth, Glen

    Published 12-09-2023
    “…Offline reinforcement learning (RL) holds promise as a means to learn high-reward policies from a static dataset, without the need for further environment…”
    Get full text
    Journal Article
  8. 8

    Verification of information flow security in cyber-physical systems by Akella, Ravi Chandra

    Published 01-01-2013
    “…With a growing number of real-world applications that are dependent on computation, securing the information space has become a challenge. The security of…”
    Get full text
    Dissertation
  9. 9

    Consistency vs. Availability in Distributed Real-Time Systems by Lee, Edward A, Akella, Ravi, Bateni, Soroush, Lin, Shaokai, Lohstroh, Marten, Menard, Christian

    Published 21-01-2023
    “…In distributed applications, Brewer's CAP theorem tells us that when networks become partitioned (P), one must give up either consistency (C) or availability…”
    Get full text
    Journal Article
  10. 10

    Enhancing Perceptual Loss with Adversarial Feature Matching for Super-Resolution by Tej, Akella Ravi, Sukanta Halder, Shirsendu, Shandeelya, Arunav Pratap, Pankajakshan, Vinod

    “…Single image super-resolution (SISR) is an ill-posed problem with an indeterminate number of valid solutions. Solving this problem with neural networks would…”
    Get full text
    Conference Proceeding
  11. 11

    A Randomized Kernel-Based Secret Image Sharing Scheme -Supplementary by Tej, Akella Ravi, Raviteja, Rekula, Pankajakshan, Vinod

    “…The proposed ( k; n ) scheme from share generation to secret reconstruction is described in the figure. Sharing the kernel not just prevents it from becoming…”
    Get full text
    Conference Proceeding
  12. 12

    A Randomized Kernel-Based Secret Image Sharing Scheme by Tej, Akella Ravi, Raviteja, Rekula, Pankajakshan, Vinod

    “…This paper proposes a (k, n)-threshold secret image sharing scheme that offers flexibility in terms of meeting contrasting demands such as information security…”
    Get full text
    Conference Proceeding
  13. 13

    Deep Bayesian Quadrature Policy Optimization by Tej, Akella Ravi, Azizzadenesheli, Kamyar, Ghavamzadeh, Mohammad, Anandkumar, Anima, Yue, Yisong

    Published 28-06-2020
    “…We study the problem of obtaining accurate policy gradient estimates using a finite number of samples. Monte-Carlo methods have been the default choice for…”
    Get full text
    Journal Article
  14. 14

    Enhancing Perceptual Loss with Adversarial Feature Matching for Super-Resolution by Tej, Akella Ravi, Halder, Shirsendu Sukanta, Shandeelya, Arunav Pratap, Pankajakshan, Vinod

    Published 15-05-2020
    “…Single image super-resolution (SISR) is an ill-posed problem with an indeterminate number of valid solutions. Solving this problem with neural networks would…”
    Get full text
    Journal Article
  15. 15

    Reinforced Multi-task Approach for Multi-hop Question Generation by Gupta, Deepak, Chauhan, Hardik, Tej, Akella Ravi, Ekbal, Asif, Bhattacharyya, Pushpak

    Published 05-04-2020
    “…Question generation (QG) attempts to solve the inverse of question answering (QA) problem by generating a natural language question given a document and an…”
    Get full text
    Journal Article
  16. 16

    Data integrity protection through security monitoring for just-in-time news feeds by Althobaiti, Abdulrahman, Calyam, Prasad, Akella, Ravi, Vallabhaneni, Prabhu

    “…There has recently been a major shift in news related media consumption trends and readers are increasingly relying on just-in-time news feeds versus the…”
    Get full text
    Conference Proceeding
  17. 17

    Model-Checking BNDC Properties in Cyber-Physical Systems by Akella, R., McMillin, B.M.

    “…In cyber-physical systems, which are the integrations of computational and physical processes, it is hard to realize certain security properties…”
    Get full text
    Conference Proceeding
  18. 18

    Distributed Power Balancing for the FREEDM System by Akella, Ravi, Fanjun Meng, Ditch, Derek, McMillin, Bruce, Crow, Mariesa

    “…The FREEDM microgrid is a test bed for a smart grid integrated with Distributed Grid Intelligence (DGI) to efficiently manage the distribution and storage of…”
    Get full text
    Conference Proceeding
  19. 19

    Verification of information flow security in cyber-physical systems by Akella, Ravi Chandra

    “…With a growing number of real-world applications that are dependent on computation, securing the information space has become a challenge. The security of…”
    Get full text
    Dissertation
  20. 20

    Distributed Grid Intelligence for future microgrid with renewable sources and storage by Fanjun Meng, Akella, Ravi, Crow, Mariesa L, McMillin, Bruce

    Published in North American Power Symposium 2010 (01-09-2010)
    “…The FREEDM microgrid is a smart grid solution with Distributed Grid Intelligence (DGI) to efficiently manage the power distribution and storage of renewable…”
    Get full text
    Conference Proceeding