Raj Jain

Raj Jain
Washington University in St. Louis | WUSTL , Wash U · Department of Computer Science and Engineering

Ph.D.

About

504
Publications
240,100
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
25,611
Citations
Introduction
Raj Jain is currently the Barbara J. and Jerome R. Cox, Jr., Professor of Computer Science and Engineering at Washington University in St. Louis. Dr. Jain is a Life Fellow of IEEE, a Fellow of ACM, a Fellow of AAAS, a winner of 2017 ACM SIGCOMM Life-Time Achievement Award and ranks among the Most Cited Authors in Computer Science. Previously, he was one of the Co-founders of Nayna Networks, a Senior Consulting Engineer at Digital Equipment Corporation in Littleton, Mass and then a professor of Computer and Information Sciences at the Ohio State University, Columbus, Ohio.
Additional affiliations
August 2005 - present
Washington University in St. Louis
Position
  • Professor (Full)
April 2000 - August 2007
Nayna Networks, Inc
Position
  • Chief Technology Officer
April 1994 - August 2002
The Ohio State University
Position
  • Professor (Full)
Education
September 1974 - May 1978
Harvard University
Field of study
  • Applied Math (Computer Science)
August 1972 - May 1974
Indian Institute of Science
Field of study
  • Automation
August 1967 - May 1972
APS University
Field of study
  • Electrical Engineering

Publications

Publications (504)
Article
Full-text available
Driven by the rapid progress in quantum hardware, recent years have witnessed a furious race for quantum technologies in both academia and industry. Universal quantum computers have supported up to hundreds of qubits, while the scale of quantum annealers has reached three orders of magnitude (i.e., thousands of qubits). Quantum computing power keep...
Article
Full-text available
In light of the advancement of the technologies used in industrial control systems, securing their operation has become crucial, primarily since their activity is consistently associated with integral elements related to the environment, the safety and health of people, the economy, and many others. This work presents a distributed, machine learnin...
Article
Crowdsourcing applications, such as Uber for ride-sharing, enable distributed problem-solving. A subset of these applications is intelligent crowd-forecasting applications, e.g., Virustotal, for malware detection. In crowd-forecasting applications, multiple agents respond with predictions about potential future event outcome(s). These responses are...
Article
Full-text available
Blockchains have gained substantial attention from academia and industry for their ability to facilitate decentralized trust and communications. However, the rapid progress of quantum computing poses a significant threat to the security of existing blockchain technologies. Notably, the emergence of Shors and Grovers algorithms raises concerns regar...
Article
Intrusion detection systems (IDS) for the Internet of Things (IoT) systems can use AI-based models to ensure secure communications. IoT systems tend to have many connected devices producing massive amounts of data with high dimensionality, which requires complex models. Complex models have notorious problems such as overfitting, low interpretabilit...
Article
Full-text available
FinTech has proven its true potential in traditional financial offerings by delivering digital financial services to individuals worldwide. The pandemic has accelerated how people interact with financial services and has resulted in long-term changes to societies and economies. FinTech has expanded access to financial services and has made such cha...
Preprint
Full-text available
Despite AI's significant growth, its "black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical systems, and financial applications, etc. Explainable AI (XAI) has emerged to help with this problem. However, d...
Preprint
Full-text available
When dealing with the Internet of Things (IoT), especially industrial IoT (IIoT), two manifest challenges leap to mind. First is the massive amount of data streaming to and from IoT devices, and second is the fast pace at which these systems must operate. Distributed computing in the form of edge/cloud structure is a popular technique to overcome t...
Article
With the increase in sophistication and connectedness of the healthcare networks, their attack surfaces and vulnerabilities increase significantly. Malicious agents threaten patients’ health and life by stealing or altering data as it flows among the multiple domains of healthcare networks. The problem is likely to exacerbate with the increasing us...
Article
Full-text available
Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains' nature of distributed, secured, and peer-to-peer storage. One of its technical pillars is using public-key cryptography and hash functions, which promise a secure, pseudo-...
Article
Full-text available
Despite AI’s significant growth, its “black box" nature creates challenges in generating adequate trust. Thus, it is seldom utilized as a standalone unit in IoT high-risk applications, such as critical industrial infrastructures, medical systems, and financial applications, etc. Explainable AI (XAI) has emerged to help with this problem. However, d...
Article
Full-text available
Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides broader coverage and lower power consumption, which are desirable properties for low-cost IoT applications. However, low-power an...
Article
Full-text available
Abstract Intrusion detection in supervisory control and data acquisition (SCADA) systems is integral because of the critical roles of these systems in industries. However, available approaches in the literature lack representative flow‐based datasets and reliable real‐time adaption and evaluation. A publicly available labelled dataset to support fl...
Article
Full-text available
The importance of the security of building management systems (BMSs) has increased given the advances in the technologies used. Since the Heating, Ventilation, and Air Conditioning (HVAC) system in buildings accounts for about 40% of the total energy consumption, threats targeting the HVAC system can be quite severe and costly. Given the limitation...
Article
With the rapid advancement in the industrial control technologies and the increased deployment of the industrial Internet of Things (IoT) in the buildings sector, this work presents an analysis of the security of the Heating, Ventilation, and Air Conditioning (HVAC) system which is a major component of the Building Management System (BMS), has beco...
Article
Full-text available
The rapid evolutions in micro-computing, minihardware manufacturing, and machine to machine (M2M) communications have enabled novel Internet of Things (IoT) solutions to reshape many networking applications. Healthcare systems are among these applications that have been revolutionized with IoT, introducing an IoT branch known as the Internet of Med...
Article
Full-text available
Machine learning studies have traditionally used accuracy, F1 score, etc. to measure the goodness of models. We show that these conventional metrics do not necessarily represent risks in security applications and may result in models that are not optimal. This letter proposes ‘Safety score’ as an evaluation metric that incorporates the cost associa...
Article
Full-text available
Introducing IoT systems to healthcare applications has made it possible to remotely monitor patients’ information and provide proper diagnostics whenever needed. However, providing high-security features that guarantee the correctness and confidentiality of patients’ data is a significant challenge. Any alteration to the data could affect the patie...
Preprint
Full-text available
Federal Aviation Administration (FAA) of the United States is considering Remote ID systems for unmanned aerial vehicles (UAVs). These systems act as license plates used on automobiles, but they transmit information using radio waves. To be useful, the transmissions in such systems need to reach long distances to minimize the number of ground stati...
Article
Full-text available
The cybersecurity of industrial control systems (ICSs) is becoming increasingly critical under the current advancement in the cyber activity and the Internet of Things (IoT) technologies, and their direct impact on several life aspects such as safety, economy, and security. This paper presents a novel semi-supervised dual isolation forests-based (D...
Preprint
Full-text available
Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). ICSs are often found in the industrial sectors and critical infrastructures, such as nuclear and thermal plan...
Article
Full-text available
Reverse Osmosis (RO) is an evolving membrane-based technology for water desalination that started to gain increased popularity in the light of the increased global water demand due its high efficiency and low carbon footprint. This paper presents a full-scale Seawater Reverse Osmosis (SWRO) desalination plant simulator using MATLAB/Simulink, which...
Preprint
Full-text available
This survey studies the potential data link candidates for unmanned aircraft vehicles (UAVs). There has been tremendous growth in different applications of UAVs such as lifesaving and rescue missions, commercial use, recreations, etc. Unlike the traditional wireless communications, the data links for these systems do not have any general standardiz...
Article
Full-text available
This survey studies the potential data link candidates for unmanned aircraft vehicles (UAVs). There has been tremendous growth in different applications of UAVs such as lifesaving and rescue missions, commercial use, recreations, etc. Unlike the traditional wireless communications, the data links for these systems do not have any general standardiz...
Preprint
Full-text available
Aeronautical Mobile Airport Communications System (AeroMACS) is based on the IEEE 802.16e mobile wireless standard commonly known as WiMAX. It is expected to be the main part of the next-generation aviation communication system to support fixed and mobile services for manned and unmanned applications. AeroMACS will be an essential technology helpin...
Preprint
Full-text available
Machine learning algorithms have been shown to be suitable for securing platforms for IT systems. However, due to the fundamental differences between the industrial internet of things (IIoT) and regular IT networks, a special performance review needs to be considered. The vulnerabilities and security requirements of IIoT systems demand different co...
Preprint
Full-text available
It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning and big data analytics are the two powerful leverages for analyzing and securing the Internet of Things (IoT) technology. By extension, these techniques can help improve the security of the...
Article
Full-text available
Industrial Control System (ICS) is a general term that includes supervisory control & data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). ICSs are often found in the industrial sectors and critical infrastructures, such as nuclear and thermal plan...
Article
Full-text available
Federal Aviation Administration (FAA) of the United States is considering Remote ID systems for unmanned aerial vehicles (UAVs). These systems act as license plates used on automobiles, but they transmit information using radio waves. To be useful, the transmissions in such systems need to reach long distances to minimize the number of ground stati...
Article
Full-text available
Efficient provisioning of 5G network slices is a major challenge for 5G network slicing technology. Previous slice provisioning methods have only considered network resource attributes and ignored network topology attributes. These methods may result in a decrease in the slice acceptance ratio and the slice provisioning revenue. To address these is...
Article
Full-text available
Network slicing in 5G is expected to essentially change the way in which network operators deploy and manage vertical services with different performance requirements. Efficient and secure slice provisioning algorithms are important since network slices share the limited resources of the physical network. In this article, we first analyze the secur...
Article
Full-text available
Carriers find Network Function Virtualization (NFV) and multi-cloud computing a potent combination for deploying their network services. The resulting virtual network services (VNS) offer great flexibility and cost advantages to them. However, vesting such services with a level of performance and availability akin to traditional networks has proved...
Article
Full-text available
It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning and big data analytics are the two powerful leverages for analyzing and securing the Internet of Things (IoT) technology. By extension, these techniques can help improve the security of the...
Conference Paper
Full-text available
Fault and performance management systems, in the traditional carrier networks, are based on rule-based diagnostics that correlate alarms and other markers to detect and localize faults and performance issues. As carriers move to Virtual Network Services, based on Network Function Virtualization and multi-cloud deployments, the traditional methods f...
Article
Full-text available
Carriers’ network services are distributed, dynamic, and investment intensive. Deploying them as virtual network services (VNS) brings the promise of low-cost agile deployments, which reduce time to market new services. If these virtual services are hosted dynamically over multiple clouds, greater flexibility in optimizing performance and cost can...
Preprint
Full-text available
The rapid growth in technology and internet connected devices has enabled Internet of Things (IoT) to be one of the important fields in computing. Standards, technologies and platforms targeting IoT ecosystem are being developed at a very fast pace. IoT enables things to communicate and coordinate decisions for many different types of applications...
Presentation
Full-text available
Slides of a lecture in the graduate class CSE 574: Wireless and Mobile Networks
Presentation
Full-text available
Slides of a lecture in the graduate class CSE 574: Wireless and Mobile Networks
Conference Paper
Full-text available
A blockchain provides a secured paradigm to achieve consensus using a distributed and peer-to-peer network in which no trusted central party is required. As a result, it has the potential to resolve many challenges that are faced with current centralized controllers in globally distributed applications. To date, the blockchain technology has been u...
Presentation
Full-text available
Blockchains are used for distributed consensus where all nodes agree on the validity of transactions in a block without needing a central trusted party. This has found numerous applications in Fintech, Supply chains, and contracts. The consensus is binary - agree or disagree - True or False. In this talk, we present our recent extensions that allow...
Presentation
Full-text available
Slides of a lecture in the graduate class CSE 591: Introduction to Graduate Study in CSE
Article
Full-text available
Network slicing for 5G is receiving significant attention from the telecommunications industry as a means to provide network as a service (NaaS) for different use cases. Network slicing is a technology which allows network operators to build multiple virtual networks on a shared infrastructure. With network slicing, service providers can deploy the...
Article
Full-text available
This paper presents the development of a Supervisory Control and Data Acquisition (SCADA) system testbed used for cybersecurity research. The testbed consists of a water storage tank’s control system, which is a stage in the process of water treatment and distribution. Sophisticated cyber-attacks were conducted against the testbed. During the attac...
Article
Full-text available
This article surveys blockchain-based approaches for several security services. These services include authentication, confidentiality, privacy and access control list (ACL), data and resource provenance, and integrity assurance. All these services are critical for the current distributed applications, especially due to the large amount of data bei...
Article
Full-text available
With the enhancements in the field of software‐defined networking and virtualization technologies, novel networking paradigms such as network function virtualization and the Internet of Things are rapidly gaining ground. The development of Internet of Things and 5G networks and explosion in online services has resulted in an exponential growth of d...
Article
Full-text available
Aeronautical Mobile Airport Communications System (AeroMACS) is based on the IEEE 802.16e mobile wireless standard commonly known as WiMAX. It is expected to be the main part of next-generation aviation communication system to support fixed and mobile services for manned and unmanned applications. AeroMACS will be an essential technology helping pa...
Conference Paper
Full-text available
Aeronautical Mobile Airport Communications System (AeroMACS) is based on the IEEE 802.16e mobile wireless standard commonly known as WiMAX. It is expected to be a main part of next-generation aviation communication system to support fixed and mobile services for manned and unmanned applications. AeroMACS will be an essential technology helping pave...
Article
Full-text available
The new generation of 5G mobile services places stringent requirements for cellular network operators in terms of latency and costs. The latest trend in radio access networks (RANs) is to pool the baseband units (BBUs) of multiple radio base stations and to install them in a centralized infrastructure, such as a cloud, for statistical multiplexing...
Conference Paper
Traditionally, in cellular networks, users communicate with the base station that serves the particular cell under coverage. The main functions of a base station can be divided into two, which are the baseband unit (BBU) functionalities and the remote radio head (RRH) functionalities. The RRH module is responsible for digital processing, frequency...
Article
Full-text available
Deployment of network function virtualization (NFV) over multiple clouds accentuates its advantages such as flexibility of virtualization, proximity to customers and lower total cost of operation. However, NFV over multiple clouds has not yet attained the level of performance to be a viable replacement for traditional networks. One of the reasons i...
Conference Paper
Full-text available
Recently, advances in machine learning techniques have attracted the attention of the research community to build intrusion detection systems (IDS) that can detect anomalies in the network traffic. Most of the research works, however, do not differentiate among different types of attacks. This is, in fact, necessary for appropriate countermeasures...