Follow
Gunjan Verma
Gunjan Verma
Unknown affiliation
Verified email at army.mil
Title
Cited by
Cited by
Year
Unfolding WMMSE using graph neural networks for efficient power allocation
A Chowdhury, G Verma, C Rao, A Swami, S Segarra
IEEE Transactions on Wireless Communications 20 (9), 6004-6017, 2021
1172021
Wireless physical layer authentication via fingerprint embedding
LY Paul, G Verma, BM Sadler
IEEE Communications Magazine 53 (6), 48-53, 2015
892015
Error correcting output codes improve probability estimation and adversarial robustness of deep neural networks
G Verma, A Swami
Advances in Neural Information Processing Systems 32, 2019
772019
The impact of competing zealots on opinion dynamics
G Verma, A Swami, K Chan
Physica A: Statistical Mechanics and its Applications 395, 310-331, 2014
742014
Physical layer authentication via fingerprint embedding using software-defined radios
G Verma, P Yu, BM Sadler
IEEE access 3, 81-88, 2015
732015
Attribution-based confidence metric for deep neural networks
S Jha, S Raj, S Fernandes, SK Jha, S Jha, B Jalaian, G Verma, A Swami
Advances in Neural Information Processing Systems 32, 2019
712019
Effect of zealotry in high-dimensional opinion dynamics models
A Waagen, G Verma, K Chan, A Swami, R D'Souza
Physical Review E 91 (2), 022811, 2015
712015
A dynamic infrastructure for interconnecting disparate isr/istar assets (the ita sensor fabric)
J Wright, C Gibson, F Bergamaschi, K Marcus, R Pressley, G Verma, ...
2009 12th International Conference on Information Fusion, 1393-1400, 2009
632009
Distributed scheduling using graph neural networks
Z Zhao, G Verma, C Rao, A Swami, S Segarra
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
592021
Short-range low-VHF channel characterization in cluttered environments
FT Dagefu, G Verma, CR Rao, LY Paul, JR Fink, BM Sadler, K Sarabandi
IEEE Transactions on Antennas and Propagation 63 (6), 2719-2727, 2015
472015
Adaptive contention window design using deep Q-learning
A Kumar, G Verma, C Rao, A Swami, S Segarra
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
342021
Link scheduling using graph neural networks
Z Zhao, G Verma, C Rao, A Swami, S Segarra
IEEE Transactions on Wireless Communications, 2022
252022
Network traffic obfuscation: An adversarial machine learning approach
G Verma, E Ciftcioglu, R Sheatsley, K Chan, L Scott
MILCOM 2018-2018 IEEE military communications conference (MILCOM), 1-6, 2018
232018
Attribution-driven causal analysis for detection of adversarial examples
S Jha, S Raj, SL Fernandes, SK Jha, S Jha, G Verma, B Jalaian, A Swami
arXiv preprint arXiv:1903.05821, 2019
202019
Adversarial examples in constrained domains
R Sheatsley, N Papernot, M Weisman, G Verma, P McDaniel
arXiv preprint arXiv:2011.01183, 2020
182020
Efficient power allocation using graph neural networks and deep algorithm unfolding
A Chowdhury, G Verma, C Rao, A Swami, S Segarra
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
172021
Adversarial examples for network intrusion detection systems
R Sheatsley, N Papernot, MJ Weisman, G Verma, P McDaniel
Journal of Computer Security 30 (5), 727-752, 2022
162022
ML-aided power allocation for tactical MIMO
A Chowdhury, G Verma, C Rao, A Swami, S Segarra
MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 273-278, 2021
122021
Chaff allocation and performance for network traffic obfuscation
E Ciftcioglu, R Hardy, K Chan, L Scott, D Oliveira, G Verma
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
102018
Graph-based algorithm unfolding for energy-aware power allocation in wireless networks
B Li, G Verma, S Segarra
IEEE Transactions on Wireless Communications 22 (2), 1359-1373, 2022
92022
The system can't perform the operation now. Try again later.
Articles 1–20