default search action
Vijay K. Gurbani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Amirreza Payandeh, Dan Pluth, Jordan Hosier, Xuesu Xiao, Vijay K. Gurbani:
How Susceptible Are LLMs to Logical Fallacies? LREC/COLING 2024: 8276-8286 - [i22]Chirag Chhablani, Nikhita Sharma, Jordan Hosier, Vijay K. Gurbani:
Digits micro-model for accurate and secure transactions. CoRR abs/2402.01931 (2024) - 2023
- [i21]Amirreza Payandeh, Dan Pluth, Jordan Hosier, Xuesu Xiao, Vijay K. Gurbani:
How susceptible are LLMs to Logical Fallacies? CoRR abs/2308.09853 (2023) - 2022
- [c35]Yu Zhou, B. Chandra Mouli, Vijay K. Gurbani:
A low latency technique for speaker detection from a large negative list. ICNLSP 2022: 202-211 - 2021
- [c34]Jordan Hosier, Yu Zhou, Nikhita Sharma, Vijay K. Gurbani:
Lightweight domain adaptation: A filtering pipeline to improve accuracy of an Automatic Speech Recognition (ASR) engine. ACAI 2021: 95:1-95:9 - [c33]Sam Davidson, Jordan Hosier, Yu Zhou, Vijay K. Gurbani:
Improved Named Entity Recognition for Noisy Call Center Transcripts. W-NUT 2021: 361-370 - [c32]Elizabeth Soper, Jordan Hosier, Dustin Bales, Vijay K. Gurbani:
Semantic Search Pipeline: From Query Expansion to Concept Forging. ICDE 2021: 2309-2314 - [c31]Shivam Kulkarni, Luis Barbado, Jordan Hosier, Yu Zhou, Siddharth Rajagopalan, Vijay K. Gurbani:
Project Vāc: Can a Text-to-Speech Engine Generate Human Sentiments? SpeD 2021: 103-108 - 2020
- [c30]Sean Rivera, Vijay K. Gurbani, Sofiane Lagraa, Antonio Ken Iannillo, Radu State:
Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries. ARES 2020: 78:1-78:10 - [c29]Jordan Hosier, Jordan Kalfen, Nikhita Sharma, Vijay K. Gurbani:
A Systematic Study of Open Source and Commercial Text-to-Speech (TTS) Engines. TDS 2020: 312-320
2010 – 2019
- 2019
- [c28]Jordan Hosier, Vijay K. Gurbani, Neil Milstead:
Disambiguation and Error Resolution in Call Transcripts. IEEE BigData 2019: 4602-4607 - 2018
- [j35]Xutao Zhou, Diego R. López, Vijay K. Gurbani, Jan Seedorf, Alexey Melnikov, Kenny Paterson, Avri Doria, Laurent Ciavaglia, Lisandro Zambenedetti Granville, Vincent Roca, Marie-José Montpetit, Ari Keränen, Carsten Bormann, Marco Carugi, Gyu Myoung Lee, Okan Geray:
Standards News. IEEE Commun. Stand. Mag. 2(1): 12-18 (2018) - [c27]Srinivasan Iyengar, Vijay K. Gurbani, Yu Zhou, Sameerkumar Sharma:
Opportunistic Prefetching of Cellular Internet of Things (cIoT) Device Contexts. ICCCN 2018: 1-6 - [i20]Mirja Kühlewind, Brian Trammell, Tobias Bühler, Gorry Fairhurst, Vijay K. Gurbani:
Challenges in Network Management of Encrypted Traffic. CoRR abs/1810.09272 (2018) - 2017
- [j34]Carol Davids, Vijay K. Gurbani, Salvatore Loreto, Ravi Subramanyan:
Next Generation 911: Where Are We? What Have We Learned? What Lies Ahead? IEEE Commun. Mag. 55(1): 130-131 (2017) - [j33]Vijay K. Gurbani, Salvatore Loreto, Ravi Subramanyan:
Design and Implementation. IEEE Commun. Mag. 55(4): 114 (2017) - [j32]Vijay K. Gurbani, Salvatore Loreto, Ravi Subramanyan:
Mobile Bandwidth Improvement Techniques. IEEE Commun. Mag. 55(10): 118 (2017) - [j31]Eric Falk, Vijay K. Gurbani, Radu State:
Query-able Kafka: An agile data analytics pipeline for mobile wireless networks. Proc. VLDB Endow. 10(12): 1646-1657 (2017) - [c26]Vijay K. Gurbani, Dan Kushnir, Veena B. Mendiratta, Chitra Phadke, Eric Falk, Radu State:
Detecting and predicting outages in mobile networks with log data. ICC 2017: 1-7 - [c25]Eric Falk, Ramiro Camino, Radu State, Vijay K. Gurbani:
On non-parametric models for detecting outages in the mobile network. IM 2017: 1139-1142 - 2016
- [j30]Carol Davids, Vijay K. Gurbani, Gaston Ormazabal, Andrew Rollins, Kundan Singh, Radu State:
Research topics related to real-time communications over 5G networks. Comput. Commun. Rev. 46(3): 8:1-8:6 (2016) - [c24]Samuel Jero, Vijay K. Gurbani, Ray Miller, Bruce Cilli, Charles Payette, Sameer Sharma:
Dynamic control of real-time communication (RTC) using SDN: A case study of a 5G end-to-end service. NOMS 2016: 895-900 - [i19]Olle E. Johansson, Gonzalo Salgueiro, Vijay K. Gurbani, Dale R. Worley:
Locating Session Initiation Protocol (SIP) Servers in a Dual-Stack IP Network. RFC 7984: 1-10 (2016) - 2015
- [j29]Vijay K. Gurbani, Salvatore Loreto, Ravi Subrahmanyan:
Design and Implementation [Series Editorial]. IEEE Commun. Mag. 53(4): 226 (2015) - [j28]Samuel Marchal, Anil Mehta, Vijay K. Gurbani, Radu State, Tin Kam Ho, Flavia Sancier-Barbosa:
Mitigating Mimicry Attacks Against the Session Initiation Protocol. IEEE Trans. Netw. Serv. Manag. 12(3): 467-482 (2015) - [c23]Vijay K. Gurbani, Angelo Migliosi, Radu State, Charles Payette, Bruce Cilli, Thomas Engel:
A characterization of short-video and distributed hot-spot activity in Instagram. IPTComm 2015: 28-34 - [c22]Lalita Jagadeesan, Alan McBride, Vijay K. Gurbani, Jie Yang:
Cognitive Security: Security Analytics and Autonomics for Virtualized Networks. IPTComm 2015: 43-50 - [c21]Thomas Fossati, Vijay K. Gurbani, Vladimir Kolesnikov:
Love All, Trust Few: on Trusting Intermediaries in HTTP. HotMiddlebox@SIGCOMM 2015: 1-6 - [i18]Carol Davids, Vijay K. Gurbani, Scott Poretsky:
Terminology for Benchmarking Session Initiation Protocol (SIP) Devices: Basic Session Setup and Registration. RFC 7501: 1-20 (2015) - [i17]Carol Davids, Vijay K. Gurbani, Scott Poretsky:
Methodology for Benchmarking Session Initiation Protocol (SIP) Devices: Basic Session Setup and Registration. RFC 7502: 1-21 (2015) - 2014
- [j27]Vijay K. Gurbani, Salvatore Loreto:
Design and implementation: dealing with large-scale bug traces. IEEE Commun. Mag. 52(4): 110 (2014) - [j26]Vijay K. Gurbani, Salvatore Loreto:
Design and implementation: Dealing with large-scale bug traces. IEEE Commun. Mag. 52(10): 126 (2014) - [c20]Vijay K. Gurbani, David Goergen, Radu State, Thomas Engel:
Making historical connections: Building Application Layer Traffic Optimization (ALTO) network and cost maps from public broadband data. CNSM 2014: 193-198 - [c19]David Goergen, Angelo Migliosi, Vijay K. Gurbani, Radu State, Thomas Engel:
Spatial and temporal analysis of Twitter: a tale of two countries. IPTComm 2014: 5:1-5:6 - [i16]Vijay K. Gurbani, Volker Hilt, Henning Schulzrinne:
Session Initiation Protocol (SIP) Overload Control. RFC 7339: 1-38 (2014) - 2013
- [j25]Salvatore Loreto, Vijay K. Gurbani, Jörg Ott:
Web-based communications [Guest editorial]. IEEE Commun. Mag. 51(4): 18-19 (2013) - [j24]Vijay K. Gurbani, Salvatore Loreto, Saverio Niccolini:
Design and implementations [Series Editorial]. IEEE Commun. Mag. 51(4): 120-121 (2013) - [j23]Vijay K. Gurbani, Salvatore Loreto, Saverio Niccolini:
Telecommunication service creation: a work in progress [Series Editorial]. IEEE Commun. Mag. 51(10): 130-131 (2013) - [j22]Anirban Basu, Simon Fleming, James Stanier, Stephen Naicken, Ian Wakeman, Vijay K. Gurbani:
The state of peer-to-peer network simulators. ACM Comput. Surv. 45(4): 46:1-46:25 (2013) - [c18]Michael Scharf, Vijay K. Gurbani, Thomas Voith, Manuel Stein, William D. Roome, Greg Soprovich, Volker Hilt:
Dynamic VPN Optimization by ALTO Guidance. EWSDN 2013: 13-18 - [i15]Vijay K. Gurbani, Eric William Burger, Tricha Anjali, Humberto J. Abdelnur, Olivier Festor:
The Common Log Format (CLF) for the Session Initiation Protocol (SIP): Framework and Information Model. RFC 6872: 1-39 (2013) - [i14]Gonzalo Salgueiro, Vijay K. Gurbani, Adam B. Roach:
Format for the Session Initiation Protocol (SIP) Common Log Format (CLF). RFC 6873: 1-28 (2013) - 2012
- [j21]John F. Buford, Vijay K. Gurbani, Anand R. Prasad:
Guest Editorial. J. Commun. 7(2): 87-88 (2012) - [j20]Salman Abdul Baset, Vijay K. Gurbani, Alan B. Johnston, Hadriel Kaplan, Brian Rosen, Jonathan D. Rosenberg:
The Session Initiation Protocol (SIP): An Evolutionary Study. J. Commun. 7(2): 89-105 (2012) - [c17]Derar K. Al-Omari, Vijay K. Gurbani, Tricha Anjali:
A novel architecture for a computer network defense (CND) system using Content Addressable Networks (CAN). GLOBECOM Workshops 2012: 758-762 - [c16]Anil Mehta, Neda Hantehzadeh, Vijay K. Gurbani, Tin Kam Ho, Flavia Sander:
On using multiple classifier systems for Session Initiation Protocol (SIP) anomaly detection. ICC 2012: 1101-1106 - [c15]Vijay K. Gurbani, Michael Scharf, T. V. Lakshman, Volker Hilt, Enrico Marocco:
Abstracting network state in Software Defined Networks (SDN) for rendezvous services. ICC 2012: 6627-6632 - [c14]Michael Scharf, Thomas Voith, William D. Roome, Bob Gaglianello, Moritz Steiner, Volker Hilt, Vijay K. Gurbani:
Monitoring and abstraction for networked clouds. ICIN 2012: 80-85 - [c13]Moritz Steiner, Bob Gaglianello, Vijay K. Gurbani, Volker Hilt, William D. Roome, Michael Scharf, Thomas Voith:
Network-aware service placement in a distributed cloud environment. SIGCOMM 2012: 73-74 - [i13]Enrico Marocco, Antonio Fusco, Ivica Rimac, Vijay K. Gurbani:
Improving Peer Selection in Peer-to-peer Applications: Myths vs. Reality. RFC 6821: 1-16 (2012) - 2011
- [j19]Thierry Bessis, Vijay K. Gurbani, Ashwin Rana:
Session Initiation Protocol firewall for the IP Multimedia Subsystem core. Bell Labs Tech. J. 15(4): 169-187 (2011) - [j18]Vijay K. Gurbani, Vladimir Kolesnikov:
A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP). IEEE Commun. Surv. Tutorials 13(2): 183-198 (2011) - [c12]Anil Mehta, Neda Hantehzadeh, Vijay K. Gurbani, Tin Kam Ho, Jun Koshiko, Ramanarayanan Viswanathan:
On the inefficacy of Euclidean classifiers for detecting self-similar Session Initiation Protocol (SIP) messages. Integrated Network Management 2011: 329-336 - [c11]Neda Hantehzadeh, Anil Mehta, Vijay K. Gurbani, Lalit Gupta, Tin Kam Ho, Gayan Wilathgamuwa:
Statistical Analysis of Self-Similar Session Initiation Protocol (SIP) Messages for Anomaly Detection. NTMS 2011: 1-5 - [i12]Gonzalo Camarillo, Karim El-Malki, Vijay K. Gurbani:
IPv6 Transition in the Session Initiation Protocol (SIP). RFC 6157: 1-15 (2011) - 2010
- [j17]Vijay K. Gurbani, Anita Garvert, James D. Herbsleb:
Managing a corporate open source software asset. Commun. ACM 53(2): 155-159 (2010) - [c10]Vijay K. Gurbani, Vladimir Kolesnikov:
A secure and lightweight scheme for media keying in the session initiation protocol (SIP): work in progress. IPTComm 2010: 32-41 - [c9]Vijay K. Gurbani, Eric William Burger, Carol Davids, Tricha Anjali:
SIP CLF: A Common Log Format (CLF) for the Session Initiation Protocol (SIP). SLAML 2010 - [e1]Georg Carle, Helmut Reiser, Gonzalo Camarillo, Vijay K. Gurbani:
Principles, Systems and Applications of IP Telecommunications. Fourth International Conference, IPTComm 2010, Munich, Germany, August 2-4, 2010. Proceedings. ACM 2010, ISBN 978-1-4503-0631-7 [contents] - [i11]Vijay K. Gurbani, Scott D. Lawrence, Alan S. A. Jeffrey:
Domain Certificates in the Session Initiation Protocol (SIP). RFC 5922: 1-17 (2010) - [i10]Vijay K. Gurbani, Rohan Mahy, Brett Tate:
Connection Reuse in the Session Initiation Protocol (SIP). RFC 5923: 1-19 (2010) - [i9]Scott D. Lawrence, Vijay K. Gurbani:
Extended Key Usage (EKU) for Session Initiation Protocol (SIP) X.509 Certificates. RFC 5924: 1-8 (2010) - [i8]Vijay K. Gurbani, Brian E. Carpenter, Brett Tate:
Essential Correction for IPv6 ABNF and URI Comparison in RFC 3261. RFC 5954: 1-7 (2010) - [i7]Ivica Rimac, Volker Hilt, Marco Tomsu, Vijay K. Gurbani, Enrico Marocco:
A Survey on Research on the Application-Layer Traffic Optimization (ALTO) Problem. RFC 6029: 1-19 (2010)
2000 – 2009
- 2009
- [j16]Vijay K. Gurbani, Volker Hilt, Ivica Rimac, Marco Tomsu, Enrico Marocco:
A survey of research on the application-layer traffic optimization problem and the need for layer cooperation. IEEE Commun. Mag. 47(8): 107-112 (2009) - [j15]Debra L. Cook, Vijay K. Gurbani, Michael Daniluk:
Phishwish: a simple and stateless phishing filter. Secur. Commun. Networks 2(1): 29-43 (2009) - 2008
- [c8]Debra L. Cook, Vijay K. Gurbani, Michael Daniluk:
Phishwish: A Stateless Phishing Filter Using Minimal Rules. Financial Cryptography 2008: 182-186 - [i6]Vijay K. Gurbani, Chris Boulton, Robert J. Sparks:
Session Initiation Protocol (SIP) Torture Test Messages for Internet Protocol Version 6 (IPv6). RFC 5118: 1-18 (2008) - [i5]Cullen Jennings, Vijay K. Gurbani:
The Internet Assigned Number Authority (IANA) tel Uniform Resource Identifier (URI) Parameter Registry. RFC 5341: 1-7 (2008) - 2007
- [j14]Vijay K. Gurbani, Andrew R. McGee:
An early application of the Bell Labs Security framework to analyze vulnerabilities in the Internet telephony domain. Bell Labs Tech. J. 12(3): 7-19 (2007) - [c7]Vijay K. Gurbani, Dean Willis, François Audet:
Cryptographically Transparent Session Initiation Protocol (SIP) Proxies. ICC 2007: 1185-1190 - [c6]Vijay K. Gurbani, Debra L. Cook, Lawrence E. Menten, Thomas B. Reddington:
A Case Study on Constructing a Security Event Management System. IMF 2007: 83-102 - [i4]Vijay K. Gurbani, Cullen Jennings:
Representing Trunk Groups in tel/sip Uniform Resource Identifiers (URIs). RFC 4904: 1-19 (2007) - 2006
- [c5]Vijay K. Gurbani, Anita Garvert, James D. Herbsleb:
A case study of a corporate open source development model. ICSE 2006: 472-481 - [i3]Henning Schulzrinne, Vijay K. Gurbani, Paul Kyzivat, Jonathan D. Rosenberg:
RPID: Rich Presence Extensions to the Presence Information Data Format (PIDF). RFC 4480: 1-37 (2006) - 2005
- [j13]Vijay K. Gurbani, Xian-He Sun, Alec Brusilovsky:
Inhibitors for ubiquitous deployment of services in the next-generation network. IEEE Commun. Mag. 43(9): 116-121 (2005) - [j12]Vijay K. Gurbani, Xian-He Sun:
A systematic approach for closer integration of cellular and Internet services. IEEE Netw. 19(1): 26-32 (2005) - [j11]Vijay K. Gurbani, Anita Garvert, James D. Herbsleb:
A case study of open source tools and practices in a commercial setting. ACM SIGSOFT Softw. Eng. Notes 30(4): 1-6 (2005) - [c4]Vijay K. Gurbani, Lalita Jagadeesan, Veena B. Mendiratta:
Characterizing Session Initiation Protocol (SIP) Network Performance and Reliability. ISAS 2005: 196-211 - [i2]Vijay K. Gurbani, Frans Haerens, Vidhi Rastogi:
Interworking SIP and Intelligent Network (IN) Applications. RFC 3976: 1-25 (2005) - 2004
- [j10]Vijay K. Gurbani, Rajnish Jain:
Transport protocol considerations for session initiation protocol networks. Bell Labs Tech. J. 9(1): 83-97 (2004) - [j9]Ganesh Jayadevan, Vijay K. Gurbani, Robert M. Arlein:
Adapting SIP for application server requirements in 3G networks. Bell Labs Tech. J. 9(3): 57-71 (2004) - [j8]Robert M. Arlein, Vijay K. Gurbani:
An extensible framework for constructing SIP user agents. Bell Labs Tech. J. 9(3): 87-100 (2004) - [j7]Vijay K. Gurbani, Rajnish Jain:
Contemplating some open challenges in SIP. Bell Labs Tech. J. 9(3): 255-269 (2004) - [j6]Vijay K. Gurbani, Xian-He Sun:
Terminating telephony services on the internet. IEEE/ACM Trans. Netw. 12(4): 571-581 (2004) - [c3]Vijay K. Gurbani, Xian-He Sun:
Extensions to an Internet signaling protocol to support telecommunication services. GLOBECOM 2004: 1640-1644 - [i1]Vijay K. Gurbani, Alec Brusilovsky, Igor Faynberg, Jorge Gato, Hui-Lan Lu, Musa R. Unmehopa:
The SPIRITS (Services in PSTN requesting Internet Services) Protocol. RFC 3910: 1-50 (2004) - 2003
- [j5]Vijay K. Gurbani, Kim Q. Liu:
Session initiation protocol: Service residency and resiliency. Bell Labs Tech. J. 8(1): 83-94 (2003) - [c2]Vijay K. Gurbani, Xian-He Sun:
Services spanning heterogeneous networks. ICC 2003: 764-768 - [c1]Vijay K. Gurbani, Xian-He Sun:
Accessing telephony services from the Internet. ICCCN 2003: 517-523 - 2002
- [j4]Janet R. Dianda, Vijay K. Gurbani, Mark Hedley Jones:
Session initiation protocol services architecture. Bell Labs Tech. J. 7(1): 3-23 (2002) - [j3]Tsun-Chieh Chiang, Vijay K. Gurbani, John B. Reid:
The need for third-party call control. Bell Labs Tech. J. 7(1): 41-46 (2002) - 2001
- [j2]Vijay K. Gurbani, Tsun-Chieh Chiang, Suresh Kumar:
SIP: A routing protocol. Bell Labs Tech. J. 6(2): 136-152 (2001) - 2000
- [j1]Tsun-Chieh Chiang, Janet Douglas, Vijay K. Gurbani, Warren A. Montgomery, William F. Opdyke, Jaya Reddy, Kumar Vemuri:
IN services for converged (Internet) telephony. IEEE Commun. Mag. 38(6): 108-115 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-11 00:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint