![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Tanya G. Roosta
Person information
Refine list
![note](https://dblp1.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c14]Christophe Dupuy, Jimit Majmudar, Jixuan Wang, Tanya G. Roosta, Rahul Gupta, Clement Chung, Jie Ding, Salman Avestimehr:
Quantifying Catastrophic Forgetting in Continual Federated Learning. ICASSP 2023: 1-5 - [i4]Manas Ranjan Mohanty, Tanya G. Roosta, Peyman Passban:
What is Lost in Knowledge Distillation? CoRR abs/2311.04142 (2023) - 2022
- [c13]Christophe Dupuy, Tanya G. Roosta, Leo Long, Clement Chung, Rahul Gupta, Salman Avestimehr:
Learnings from Federated Learning in The Real World. ICASSP 2022: 8767-8771 - [c12]Peyman Passban, Tanya G. Roosta, Rahul Gupta, Ankit Chadha, Clement Chung:
Training Mixed-Domain Translation Models via Federated Learning. NAACL-HLT 2022: 2576-2586 - [i3]Christophe Dupuy, Tanya G. Roosta, Leo Long, Clement Chung, Rahul Gupta, Salman Avestimehr:
Learnings from Federated Learning in the Real world. CoRR abs/2202.03925 (2022) - [i2]Peyman Passban, Tanya G. Roosta, Rahul Gupta, Ankit Chadha, Clement Chung:
Training Mixed-Domain Translation Models via Federated Learning. CoRR abs/2205.01557 (2022) - 2021
- [i1]Tanya G. Roosta, Peyman Passban, Ankit Chadha:
Communication-Efficient Federated Learning for Neural Machine Translation. CoRR abs/2112.06135 (2021)
2000 – 2009
- 2009
- [j4]Alvaro A. Cárdenas
, Tanya G. Roosta, Shankar Sastry:
Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems. Ad Hoc Networks 7(8): 1434-1447 (2009) - 2008
- [j3]Sameer Pai, Sergio A. Bermudez, Stephen B. Wicker, Marci Meingast, Tanya G. Roosta, Shankar Sastry, Deirdre K. Mulligan:
Transactional Confidentiality in Sensor Networks. IEEE Secur. Priv. 6(4): 28-35 (2008) - [j2]Annarita Giani, Gabor Karsai, Tanya G. Roosta, Aakash Shah, Bruno Sinopoli, Jon Wiley:
A testbed for secure and robust SCADA systems. SIGBED Rev. 5(2): 4 (2008) - [j1]Tanya G. Roosta, Martin J. Wainwright
, Shankar S. Sastry:
Convergence Analysis of Reweighted Sum-Product Algorithms. IEEE Trans. Signal Process. 56(9): 4293-4305 (2008) - [c11]Tanya G. Roosta, Dennis K. Nilsson, Ulf Lindqvist
, Alfonso Valdes:
An intrusion detection system for wireless process control systems. MASS 2008: 866-872 - [c10]Annarita Giani, Tanya G. Roosta, Shankar Sastry:
Integrity checker for wireless sensor networks in health care applications. PervasiveHealth 2008: 135-138 - [c9]Tanya G. Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shankar Sastry:
Testbed Implementation of a Secure Flooding Time Synchronization Protocol. WCNC 2008: 3157-3162 - [c8]Dennis K. Nilsson, Tanya G. Roosta, Ulf Lindqvist
, Alfonso Valdes:
Key management and secure software updates in wireless process control environments. WISEC 2008: 100-108 - 2007
- [c7]Sameer Pai, Tanya G. Roosta, Stephen B. Wicker, Shankar Sastry:
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust. AINA Workshops (1) 2007: 443-450 - [c6]Tanya G. Roosta, Sameer Pai, Phoebus Chen, Shankar Sastry, Stephen B. Wicker:
Inherent Security of Routing Protocols in Ad-Hoc and Sensor Networks. GLOBECOM 2007: 1273-1278 - [c5]Tanya G. Roosta, Martin J. Wainwright
, Shankar Sastry:
Convergence Analysis of Reweighted Sum-Product Algorithms. ICASSP (2) 2007: 541-544 - [p1]Tanya G. Roosta, Michael Manzo, Shankar Sastry:
Time Synchronization Attacks in Sensor Networks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 325-345 - 2006
- [c4]Marci Meingast, Tanya G. Roosta, Shankar Sastry:
Security and Privacy Issues with Health Care Information Technology. EMBC 2006: 5453-5458 - [c3]Tanya G. Roosta, Shridhar M. Mishra, Ali Ghazizadeh:
Robust Estimation and Detection in Ad Hoc and Sensor Networks. MASS 2006: 236-245 - [c2]Tanya G. Roosta, Marci Meingast, Shankar Sastry:
Distributed Reputation System for Tracking Applications in Sensor Networks. MobiQuitous 2006: 1-8 - 2005
- [c1]Michael Manzo, Tanya G. Roosta, Shankar Sastry:
Time synchronization attacks in sensor networks. SASN 2005: 107-116
Coauthor Index
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-09 03:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint