Information theory, coding and cryptography R Bose McGraw-Hill, 2003 | 243 | 2003 |
Sequence CLEAN: A modified deconvolution technique for microwave images of contiguous targets R Bose, A Freedman, BD Steinberg IEEE Transactions on Aerospace and Electronic Systems 38 (1), 89-97, 2002 | 160 | 2002 |
A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system R Bose, S Pathak IEEE Transactions on Circuits and Systems I: Regular Papers 53 (4), 848-857, 2006 | 132 | 2006 |
Joint-transformation-based detection of false data injection attacks in smart grid SK Singh, K Khanna, R Bose, BK Panigrahi, A Joshi IEEE Transactions on Industrial Informatics 14 (1), 89-97, 2017 | 103 | 2017 |
A framework for energy-consumption-based design space exploration for wireless sensor nodes S Chouhan, R Bose, M Balakrishnan IEEE transactions on Computer-aided design of integrated circuits and …, 2009 | 88 | 2009 |
Integrated energy analysis of error correcting codes and modulation for energy efficient wireless sensor nodes S Chouhan, R Bose, M Balakrishnan IEEE Transactions on Wireless Communications 8 (10), 5348-5355, 2009 | 77 | 2009 |
Virtual labs project: A paradigm shift in internet-based remote experimentation R Bose IEEE access 1, 718-725, 2013 | 72 | 2013 |
Secrecy outage of dual-hop regenerative multi-relay system with relay selection C Kundu, S Ghose, R Bose IEEE Transactions on Wireless Communications 14 (8), 4614-4625, 2015 | 65 | 2015 |
Novel public key encryption technique based on multiple chaotic systems R Bose Physical review letters 95 (9), 098702, 2005 | 62 | 2005 |
A smart technique for determining base-station locations in an urban environment R Bose Vehicular Technology, IEEE Transactions on 50 (1), 43-47, 2001 | 60 | 2001 |
The VLAB OER experience: Modeling potential-adopter student acceptance R Raman, K Achuthan, P Nedungadi, S Diwakar, R Bose IEEE Transactions on Education 57 (4), 235-241, 2014 | 50 | 2014 |
Entropy‐based electricity theft detection in AMI network SK Singh, R Bose, A Joshi IET Cyber‐Physical Systems: Theory & Applications 3 (2), 99-105, 2018 | 48 | 2018 |
Implementing symmetric cryptography using chaos functions R Bose, A Banerjee Proceedings of the 7th International Conference on Advanced Computing and …, 1999 | 42 | 1999 |
Secrecy outage of dual-hop AF relay system with relay selection without eavesdropper's CSI A Jindal, C Kundu, R Bose IEEE Communications Letters 18 (10), 1759-1762, 2014 | 41 | 2014 |
Secrecy performance of dual‐hop decode‐and‐forward relay system with diversity combining at the eavesdropper S Ghose, C Kundu, R Bose IET Communications 10 (8), 904-914, 2016 | 30 | 2016 |
Lean CLEAN: Deconvolution algorithm for radar imaging of contiguous targets R Bose IEEE Transactions on Aerospace and Electronic Systems 47 (3), 2190-2199, 2011 | 30 | 2011 |
Energy theft detection for AMI using principal component analysis based reconstructed data SK Singh, R Bose, A Joshi IET Cyber‐Physical Systems: Theory & Applications 4 (2), 179-185, 2019 | 26 | 2019 |
Thinned stepped frequency waveforms to furnish existing radars with imaging capability A Freedman, R Bose, BD Steinberg IEEE Aerospace and Electronic Systems Magazine 11 (11), 39-43, 1996 | 26 | 1996 |
Resource allocation for secure multicarrier AF relay system under total power constraint A Jindal, R Bose IEEE Communications Letters 19 (2), 231-234, 2014 | 25 | 2014 |
Energy theft detection in advanced metering infrastructure SK Singh, R Bose, A Joshi 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 529-534, 2018 | 24 | 2018 |