Mithun P. Acharya
Mithun P. Acharya
Senior Leader Scientist -- Artificial Intelligence, LexisNexis
Verified email at lexisnexis.com - Homepage
Title
Cited by
Cited by
Year
Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
D Westhoff, J Girao, M Acharya
IEEE Transactions on mobile computing 5 (10), 1417-1431, 2006
3392006
Mining API patterns as partial orders from source code: from usage scenarios to specifications
M Acharya, T Xie, J Pei, J Xu
Proceedings of the the 6th joint meeting of the European software …, 2007
3302007
Intelligent jamming in wireless networks with applications to 802.11 b and other networks
D Thuente, M Acharya
Proc. of MILCOM 6, 100, 2006
2092006
Practical change impact analysis based on static program slicing for industrial software systems
M Acharya, B Robinson
2011 33rd International Conference on Software Engineering (ICSE), 746-755, 2011
1462011
Secure comparison of encrypted data in wireless sensor networks
M Acharya, J Girao, D Westhoff
Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc …, 2005
812005
Mining API error-handling specifications from source code
M Acharya, T Xie
International Conference on Fundamental Approaches to Software Engineering …, 2009
532009
Intelligent jamming attacks, counterattacks and (counter) 2 attacks in 802.11 b wireless networks
M Acharya, D Thuente
Proceedings of the OPNETWORK-2005 Conference, Washington DC, USA, 2005
532005
Mining interface specifications for generating checkable robustness properties
M Acharya, T Xie, J Xu
2006 17th International Symposium on Software Reliability Engineering, 311-320, 2006
422006
Intelligent jamming in 802.11 b wireless networks
M Acharya, T Sharma, D Thuente, D Sizemore
Proceedings of OPNETWORK. Washington DC, USA: OPNET, 2004
342004
Impact analysis of configuration changes for test case selection
X Qu, M Acharya, B Robinson
2011 IEEE 22nd International Symposium on Software Reliability Engineering …, 2011
332011
Jamming vulnerabilities of IEEE 802.11 e
DJ Thuente, B Newlin, M Acharya
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
252007
Configuration selection using code change impact analysis for regression testing
X Qu, M Acharya, B Robinson
2012 28th IEEE International Conference on Software Maintenance (ICSM), 129-138, 2012
222012
Method for distributing keys for encrypted data transmission in a preferably wireless sensor network
J Girao, D Westhoff, MP Acharya
US Patent 7,702,905, 2010
182010
Improving software reliability and productivity via mining program source code
T Xie, M Acharya, S Thummalapenta, K Taneja
2008 IEEE International Symposium on Parallel and Distributed Processing, 1-5, 2008
152008
Oracle-based regression test selection
T Yu, X Qu, M Acharya, G Rothermel
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
132013
Effective generation of interface robustness properties for static analysis
M Acharya, T Sharma, J Xu, T Xie
21st IEEE/ACM International Conference on Automated Software Engineering …, 2006
112006
Mining health models for performance monitoring of services
M Acharya, V Kommineni
2009 IEEE/ACM International Conference on Automated Software Engineering …, 2009
102009
Code drones
MP Acharya, C Parnin, NA Kraft, A Dagnino, X Qu
Proceedings of the 38th International Conference on Software Engineering …, 2016
72016
Static detection of API error-handling bugs via mining source code
M Acharya, T Xie
North Carolina State University. Dept. of Computer Science, 2007
42007
Machine learning enhanced real-time intrusion detection using timing information
H Xu, F Mueller
International Workshop on Trustworthy & Real-time Edge Computing for Cyber …, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20