Personal profile
Research Interests
Computer Engineering
Fingerprint
Dive into the research topics where Renuka A is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
-
Exploring Attack Detection in Autonomous Vehicles: A Pilot Study Using CrySyS Dataset
Verma, A., Renuka, A. & Vanajakshi, J., 2026, Intelligent Control, Robotics, and Industrial Automation - Proceedings of International Conference, RCAAI 2024. Bhiradi, I. & Machado, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 511-520 10 p. (Lecture Notes in Electrical Engineering; vol. 1492 LNEE).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Exploring Security Vulnerabilities in Robot Operating System Communication Using Jetson Nano
Vanajakshi, J., Renuka, A., Adesh, N. D. & Vidya Kamath, K., 2026, Intelligent Control, Robotics, and Industrial Automation - Proceedings of International Conference, RCAAI 2024. Bhiradi, I. & Machado, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 453-463 11 p. (Lecture Notes in Electrical Engineering; vol. 1492 LNEE).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Application of Federated Learning in IOT Security for Signature Based Attacks
Damodar Prabhu, K., Renuka, A. & Vanajakshi, J., 2025, 2025 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2025 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 433-438 6 p. (2025 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics, DISCOVER 2025 - Proceedings).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Pro-CHASER: A Prototype Testbed for Car Hacking Attack Simulation and Evaluation Using Raspberry Pi to Investigate Threat Landscape
Vanajakshi, J., Renuka, A., Kamath, V. & Adesh, N. D., 2025, In: IEEE Access. 13, p. 36401-36420 20 p.Research output: Contribution to journal › Article › peer-review
Open Access1 Link opens in a new tab Citation (Scopus) -
VireNet-SSD: object detection model for resource-constrained applications based on self-organized operational neural networks
Kamath, V. & Renuka, A., 2025, (Accepted/In press) In: Neural Computing and Applications. 37, 14, p. 8547-8569 23 p., 109311.Research output: Contribution to journal › Article › peer-review
Open Access3 Link opens in a new tab Citations (Scopus)