Follow
Ranjan Bose
Title
Cited by
Cited by
Year
Information theory, coding and cryptography
R Bose
McGraw-Hill, 2003
2432003
Sequence CLEAN: A modified deconvolution technique for microwave images of contiguous targets
R Bose, A Freedman, BD Steinberg
IEEE Transactions on Aerospace and Electronic Systems 38 (1), 89-97, 2002
1602002
A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system
R Bose, S Pathak
IEEE Transactions on Circuits and Systems I: Regular Papers 53 (4), 848-857, 2006
1322006
Joint-transformation-based detection of false data injection attacks in smart grid
SK Singh, K Khanna, R Bose, BK Panigrahi, A Joshi
IEEE Transactions on Industrial Informatics 14 (1), 89-97, 2017
1032017
A framework for energy-consumption-based design space exploration for wireless sensor nodes
S Chouhan, R Bose, M Balakrishnan
IEEE transactions on Computer-aided design of integrated circuits and …, 2009
882009
Integrated energy analysis of error correcting codes and modulation for energy efficient wireless sensor nodes
S Chouhan, R Bose, M Balakrishnan
IEEE Transactions on Wireless Communications 8 (10), 5348-5355, 2009
772009
Virtual labs project: A paradigm shift in internet-based remote experimentation
R Bose
IEEE access 1, 718-725, 2013
722013
Secrecy outage of dual-hop regenerative multi-relay system with relay selection
C Kundu, S Ghose, R Bose
IEEE Transactions on Wireless Communications 14 (8), 4614-4625, 2015
652015
Novel public key encryption technique based on multiple chaotic systems
R Bose
Physical review letters 95 (9), 098702, 2005
622005
A smart technique for determining base-station locations in an urban environment
R Bose
Vehicular Technology, IEEE Transactions on 50 (1), 43-47, 2001
602001
The VLAB OER experience: Modeling potential-adopter student acceptance
R Raman, K Achuthan, P Nedungadi, S Diwakar, R Bose
IEEE Transactions on Education 57 (4), 235-241, 2014
502014
Entropy‐based electricity theft detection in AMI network
SK Singh, R Bose, A Joshi
IET Cyber‐Physical Systems: Theory & Applications 3 (2), 99-105, 2018
482018
Implementing symmetric cryptography using chaos functions
R Bose, A Banerjee
Proceedings of the 7th International Conference on Advanced Computing and …, 1999
421999
Secrecy outage of dual-hop AF relay system with relay selection without eavesdropper's CSI
A Jindal, C Kundu, R Bose
IEEE Communications Letters 18 (10), 1759-1762, 2014
412014
Secrecy performance of dual‐hop decode‐and‐forward relay system with diversity combining at the eavesdropper
S Ghose, C Kundu, R Bose
IET Communications 10 (8), 904-914, 2016
302016
Lean CLEAN: Deconvolution algorithm for radar imaging of contiguous targets
R Bose
IEEE Transactions on Aerospace and Electronic Systems 47 (3), 2190-2199, 2011
302011
Energy theft detection for AMI using principal component analysis based reconstructed data
SK Singh, R Bose, A Joshi
IET Cyber‐Physical Systems: Theory & Applications 4 (2), 179-185, 2019
262019
Thinned stepped frequency waveforms to furnish existing radars with imaging capability
A Freedman, R Bose, BD Steinberg
IEEE Aerospace and Electronic Systems Magazine 11 (11), 39-43, 1996
261996
Resource allocation for secure multicarrier AF relay system under total power constraint
A Jindal, R Bose
IEEE Communications Letters 19 (2), 231-234, 2014
252014
Energy theft detection in advanced metering infrastructure
SK Singh, R Bose, A Joshi
2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 529-534, 2018
242018
The system can't perform the operation now. Try again later.
Articles 1–20