A high-rate MSR code with polynomial sub-packetization level B Sasidharan, GK Agarwal, PV Kumar 2015 IEEE International Symposium on Information Theory (ISIT), 2051-2055, 2015 | 47 | 2015 |
Codes with hierarchical locality B Sasidharan, GK Agarwal, PV Kumar 2015 IEEE International Symposium on Information Theory (ISIT), 1257-1261, 2015 | 36 | 2015 |
An alternate construction of an access-optimal regenerating code with optimal sub-packetization level GK Agarwal, B Sasidharan, PV Kumar 2015 Twenty First National Conference on Communications (NCC), 1-6, 2015 | 17 | 2015 |
Password based authentication: Philosophical survey A Sharma, RC Belwal, V Ojha, G Agarwal 2010 IEEE International Conference on Intelligent Computing and Intelligent …, 2010 | 13 | 2010 |
Secure network coding for multiple unicast: On the case of single source GK Agarwal, M Cardone, C Fragouli International Conference on Information Theoretic Security, 188-207, 2017 | 8 | 2017 |
Coding across unicast sessions can increase the secure message capacity GK Agarwal, M Cardone, C Fragouli 2016 IEEE International Symposium on Information Theory (ISIT), 2134-2138, 2016 | 7 | 2016 |
Sudden death in neurocysticercosis by trauma SK Verma, BBL Agarwal, G Agarwal Forensic science international 95 (1), 23-26, 1998 | 7 | 1998 |
A distortion based approach for protecting inferences CY Tsai, GK Agarwal, C Fragouli, S Diggavi 2017 IEEE international symposium on information theory (ISIT), 1913-1917, 2017 | 5 | 2017 |
On secure network coding for two unicast sessions: Studying butterflies GK Agarwal, M Cardone, C Fragouli 2016 IEEE Globecom Workshops (GC Wkshps), 1-6, 2016 | 5 | 2016 |
A novel approach for USB2. 0 validation on System on Chip MK Pandey, S Shekhar, J Singh, GK Agarwal, N Saxena 2013 Fourth International Conference on Computing, Communications and …, 2013 | 5 | 2013 |
Distorting an adversary's view in cyber-physical systems GK Agarwal, M Karmoose, S Diggavi, C Fragouli, P Tabuada 2018 IEEE Conference on Decision and Control (CDC), 1476-1481, 2018 | 4 | 2018 |
On secure network coding for multiple unicast traffic GK Agarwal, M Cardone, C Fragouli IEEE Transactions on Information Theory 66 (8), 5204-5227, 2020 | 2 | 2020 |
Deep reinforcement learning for single-shot diagnosis and adaptation in damaged robots S Verma, HS Nair, G Agarwal, J Dhar, A Shukla Proceedings of the 7th ACM IKDD CoDS and 25th COMAD, 82-89, 2020 | 2 | 2020 |
On information theoretic and distortion-based security GK Agarwal UCLA, 2019 | 2 | 2019 |
The Theory of Lateral Pressure: Highlights of Quantification and Empirical Analysis N Choucri, G Agarwal Oxford Research Encyclopedia of Politics, 2017 | 2 | 2017 |
Secure communication over 1-2-1 networks GK Agarwal, YH Ezzeldin, M Cardone, C Fragouli 2018 IEEE International Symposium on Information Theory (ISIT), 196-200, 2018 | 1 | 2018 |
Review Paper on Digital Steganography in Android Application D Sharma, A Sharma, G Agarwal International Academic Journal of Innovative Research, 5 (2), 9 16, 2018 | 1 | 2018 |
An Approach for In-House USB2. 0 Electrical Compliance Testing on Nanoscale SoC MK Pandey, S Shekhar, N Saxena, GK Agarwal, A Kumar 2013 14th International Workshop on Microprocessor Test and Verification, 95-99, 2013 | 1 | 2013 |
Post silicon debugging approach for usb2. 0: Case study of enumeration S Shekhar, MK Pandey, GK Agarwal, N Saxena 2013 5th International Conference and Computational Intelligence and …, 2013 | 1 | 2013 |
Transmission and System Control in Quantum Cryptography A Sharma, RC Belwal, V Ojha, G Agarwal, CH Bennet, G Brassard | 1 | 2011 |