CV (pdf) - School of Electrical and Computer Engineering

Curriculum Vitae
November 1, 2014
Subhash Kak, Ph.D.
Regents Professor
School of Electrical and Computer Engineering
310 Engineering South
Oklahoma State University
Stillwater, OK 74078
(405) 744-6096 (office)
(225) 223-3684 (cell)
E-mail: [email protected]
EDUCATION
Doctor of Philosophy, Department of Electrical Engineering (1971), Indian Institute of Technology, Delhi
Dissertation Title: Studies in Signal Theory (1970). P.V. Indiresan, Advisor
Bachelor of Engineering (Electrical Engineering) (1967)
Jammu and Kashmir University, Srinagar, India
PROFESSIONAL EMPLOYMENT
Oklahoma State University, Stillwater, Regents Professor, (2010--); Professor and Head of Computer
Science Department (2007- 2013); Regents Professor in the School of Electrical and Computer
Engineering (2014 - )
Curtin University, Perth, Australia. Visiting Research Professor, July 2014.
Louisiana State University, Baton Rouge, Donald C. & Elaine T. Delaune Distinguished Professor of
Electrical and Computer Engineering (2003-2007), Professor (1983-2007); Associate Professor (19801983); Visiting Associate Professor, (1979-1980) of Electrical and Computer Engineering
Indian Institute of Technology Delhi, Visiting Professor (Dec. 1985 - Jan. 1986), Assistant Professor (19741979); Lecturer (1971-1974) of Electrical Engineering
Indian Institute of Advanced Study, Shimla, National Fellow, 2001-2002.
Harvard University/ MGH, Cambridge, MA, Visiting Professor (January 1996 – May 1996): Sabbatical
Leave (Professor Jeffrey P. Sutton’s group)
UNESCO Fellow, Fall 1986 Sabbatical Leave
Tata Institute of Fundamental Research, Bombay, December 1977.
Bell Laboratories, Murray Hill, N.J., Guest Researcher, Acoustics and Signal Processing Department,
June 1976 – August 1976.
Imperial College, Department of Electrical Engineering, University of London, London, U.K. Academic
Visitor, November 1975 - June 1976
HONORS AND AWARDS
President’s Cup Promoting Creative Interdisciplinarity, OSU. Member of the Team. interdisciplinary Center
for Research Excellence in Science & Technology (iCREST), Bioinformatics & Computational Biology
(2013)
Subhash Kak
Regents Professor, Oklahoma State University (2010)
Delaune Distinguished Professor of Electrical and Computer Engineering, Louisiana State University, 2002.
Distinguished Alumni Award, Indian Institute of Technology Delhi, 2002.
National Fellow, Indian Institute of Advanced Study, 2001
IEEE-HKN (LSU) Favorite Professor of the Year of Electrical and Computer Engineering Department, 1989.
UNDP Tokten Fellow, 1986.
Halliburton Award, 1982.
Krantzberg Chair of Electronics by Technion, Israel Institute of Technology, 1977 (declined)
Science Academy Medal of the Indian National Science Academy, 1977.
Kothari Prize, India, 1977.
British Council Fellow, 1975-1976.
Designated Nominator, Kyoto Prize, the 50 million yen annual award given by the Inamori Foundation which
is generally considered to be the Japanese equivalent of the Nobel Prize.
INDUSTRY
Advisory Board, Nexus Clinical, Miami, 2010- .
Chief Scientist, Total Clarity, Inc., Boston, 2002 - 2008.
Member of the Advisory Board, Redwood Investment Systems, Boston, 1999 - 2000.
Director, Saisoftek, Inc., Piscataway, NJ, 2000.
PROFESSIONAL ACTIVITIES
Member of the External Review Committee of IIT Delhi, 2014.
Member of the Academic Advisory Board of the Smithsonian Project Home-Spun 2010-2013.
Panelist (on many occasions), NSF.
Editor, UNESCO's ICOMOS project on archaeoastronomy which was a cornerstone project in the
International Year of Astronomy 2009.
Keynote Speaker, Astronomy and Civilization Conference (co-directed by Paul Davies and Attila
Grandpierre), celebrating the International Year of Astronomy, Budapest, August 10-13, 2009.
Keynote Speaker, RSA Data Security Conference, San Jose, 2006.
Member Advisory Board, Lifeboat Foundation, 2005
2
Subhash Kak
Co-Founder and Co-Chairman, Series of International Conferences on Computational Intelligence and
Neuroscience, Sept 1995, Mar 1997, Oct 1998, North Carolina; March 2000, Atlantic City; March 2002,
August 2003, Durham; August 2005, Salt Lake City.
Member, Intelligence Advisory Board, NIST, 2001- 2007.
Member, Information Technology Master Planning Task Force, LSU, 1999-2001.
Member of the Board of Governors, Association for Intelligent Machinery, 1998- 2006.
Convener (Organizer), National Systems Conference, New Delhi, 1974; Chairman of sessions at numerous
international conferences.
Graduate Coordinator, Electrical and Computer Engineering Department, Louisiana State University 1982 1986.
UNDP Consultant, 1989-1990, for C-DAC (Centre for Development of Advanced Computing), Pune.
EDITORSHIP
Advisory Editor, Circuits, Systems, and Signal Processing, 1998 - present.
Co-Guest Editor, Quantum Computing and Neural Information Processing, Information Sciences, 2000.
Editorial Associate, Brain and Behavior Science (Cambridge University Press), 2000 - present.
Guest Editor, IEEE Computer, Data Security in Computer Networks, February 1983.
Guest Editor, 1993, Neural Networks and AI, Information Sciences.
Co-Guest Editor, 1993, Networks for Neural Processing, Circuits, Systems, and Signal Processing.
Associate Editor, Information Sciences, 1993-2008.
Member Editorial Board, Journal of Combinatorics, Information, & System Science, 1995-present.
Executive Editor, Journal of Cosmology, 2009 - present.
Member, Editorial Board, Bulletin of the Allahabad Mathematical Society, 2006 - present.
Editor, Journal of Universal Computer Science, 2007 - present.
Associate Editor, Ganita Bharati, 2007 - present.
Member, Editorial Board, Neuroquantology, 2003– present.
PATENTS
Methods and apparatus for secure quantum communication, Disclosure filed, November 2011.
Neural networks and methods for training neural networks (with J. Pastor), U.S. Patent No. 5,426,721, June
20, 1995.
Uniform permutation privacy system (with N.S. Jayant), US Patent No. 4,100,374, July 11, 1978.
Instantaneous training of neural networks, Invention disclosure, July 13, 1995.
Improved corner-classification neural networks (with Kun-Won Tang), Invention disclosure, February 1997.
Anvish, a new metasearch engine for the internet (with Bo Shu), copyright filed August, 1998. (Neural
Technologies, Inc, Kansas City, licensed the technology of the previous 4 items. This technology has been
3
Subhash Kak
used for creation of several companies. One of these, www.solosearch.com, was purchased by another
company (PanInternational Gaming) for $15 million.)
Polarization modulation for gigabit communication, Invention disclosure, April, 2000.
WordWarp -- A system for automatic classification of text, Invention disclosure, June, 2000.
COMMUNITY
Invited lectures around the world; newspaper and magazine articles and interviews including San Francisco
Chronicle and Huffington Post.
Discovery Channel, History Channel and other TV companies in the US, Europe, and India have showcased
research. Several interviews on the long-running PBS show called Closer to Truth.
Dutch Public TV has made two shows on contributions to philosophy of science and technology, 2004, 2005.
Invited Speaker, CREC Regional Leadership Summit, Stillwater, 2008.
Member of the Advocate, Baton Rouge's 2000 Business Panel on Information Technology.
RECENT GRANTS at OSU
At OSU:
2014-2015 Neural Networks, Artificial Intelligence and Consciousness. PI. Federico and Elvia Faggin
Foundation, San Francisco.
2014-2015 SBIR Phase I: Fiber Optic Polarization-based Intrusion Detection System. Consultant. National
Science Foundation.
2011-2015 Exploring a Robust Quantum Cryptography Protocol for Securing Optical Burst Switching
Networks. PI. September 2011 - August 2015. National Science Foundation.
2011-2014 Acquisition of a High Performance Compute Cluster for Multidisciplinary Research. Sr
Investigator. September 2011 - August 2014. National Science Foundation.
2009-2013 Enabling Petascale Ensemble-based Data Assimilation for Numerical Analysis and Prediction of
High-Impact Weather. PI. September 2009 - August 2013. National Science Foundation.
2009-2010 Learning tacit knowledge for network and information security. PI. August 2009 - May 2010.
CTANS / Department of Justice.
2009-2012 An optical motion capture system for human-centered computing research. co-PI, August 2009 July 2012. National Science Foundation.
2009 Implicit security using data partitioning. Jun 2009-Dec 2009. PI. CTANS/SPAWAR, Dept of Defense.
2011-2012 Indo-US Bilateral Conference on Cloud Computing and Web Services. PI. Indo-US Science and
Technology Forum (IUSSTF).
2008-2010 Social network computing with the rural America perspective. PI. Central Rural Electric
Cooperative, Stillwater.
4
Subhash Kak
2009 Offline file-based data stream verification. PI. DCA Inc, Cushing, Oklahoma, August - December
2009.
At LSU: Grants from NASA, NSA, NIH and private sources and I was the original author of the proposal
that was adopted by the State of Louisiana to become $25 million per year Information Technology Initiative
SCHOLARSHIP
Publications
Books (Selected)
1. The Nature of Physical Reality. Peter Lang, New York, 1986. Revised edition, 2011.
2. Advances in Communications and Signal Processing (edited with W. A. Porter). Springer-Verlag,
1989.
3. Advances in Computing and Control (edited with W.A. Porter & J.L. Aravena). Springer-Verlag,
1989.
4. The Architecture of Knowledge. CDC, New Delhi, 2004.
Book chapters (Selected)
1. Communication languages and agents in biological systems. In Biocommunications, R. Gordon and
J. Seckbach (editors). University of Chicago Press, 2015.
2. How mind creates its reality. In Brain, Mind and Cosmos. Edited by D. Chopra. Trident Media
Group, August 2014.
3. Social network dynamics: an attention economics perspective (with S. Yu). In Social Networks: A
Framework of Computational Intelligence. Edited by Witold Pedrycz and Shyi-Ming Chen, Springer
Verlag, 2014, pp. 225-258.
4. A new small world lattice (with A. Parakh). In Advanced Computing, Networking and Security. P.S.
Thilagam, A. Roshan Pais, K. Chandrasekaran, and V. Krishnan (eds.), Lecture Notes in Computer
Science, Volume 7135, 2012, pp. 1-8.
5. Berry like phase and gauge field in quantum computing (with A. Bruno, A. Capolupo, G. Raimondo,
and G. Vitiello). In G. Minat, M. Abram, E. Pessa (eds.), Methods, Models, Simulations and
Approaches Towards a General Theory of Change. World Scientific, Singapore, 2012.
6. New key agreement techniques for sensor networks (with A. Parakh). Lecture Notes in Computer
Science, Springer, 2012.
7. Hidden order and the origin of complex structures. In Origin(s) of Design in Nature. L. Swan, R.
Gordon and J. Seckbach, (editors). Dordrecht: Springer, 2012, pp. 643-652.
8. Information-centric framework for micro assembly (with R. Gunda, J. Cecil). In On the Move to
Meaningful Internet Systems. R. Meersman, T. Dillon, and P. Ferrerro (eds.). Lecture Notes in
Computer Science 7046. Springer–Verlag, 2011, pp. 93-101.
9. [Archaeoastronomy in] India. In Heritage Sites of Astronomy and Archaeoastronomy, C. Ruggles
and M. Cotte (editors). ICMS, Paris, 2011, pp. 101-114.
10. Observers, freedom, and the cosmos. In A.-T. Tymieniecka and A. Grandpierre (editors), Astronomy
and Civilization in the New Enlightenment. Springer, 2011, pp. 47-60.
11. The golden mean and the physics of aesthetics. In B.S. Yadav and M. Mohan (editor), Ancient Indian
Leaps into Mathematics. Springer, 2010, pp. 111-120. (Also in Foarm Magazine, 5, 73-81, 2006.)
12. Machines and consciousness. In P.K. Sengupta (editor), History of Science and Philosophy of
Science. CSC and Pearson Longman, 2010, pp. 559-584.
13. Terrestrial and celestial aspects of natural sciences. In P.K. Sengupta (editor), History of Science and
Philosophy of Science. CSC and Pearson Longman, 2010, pp. 83-108.
14. A distributed data storage scheme for sensor networks (with A. Parakh). In Security and Privacy in
Mobile Information and Communication Systems. Volume 17, LNICST, Springer, 2009, pp. 14-22.
5
Subhash Kak
15. Logic in Indian thought, In Andrew Schumann (editor), Logic in Religious Discourse. Ontos Verlag,
Frankfurt and Paris, 2009, pp. 20-33.
16. Quantum mechanics and artificial intelligence. In Intelligent Computing Everywhere. A. Schuster
(editor), Springer-Verlag, 2007.
17. Encounter with the worlds of commonsense and science. In The Enworlded Subjectivity: Its Three
Worlds and Beyond, R. Balasubramaniam (editor), CSC, 2006, pp. 173-201.
18. Babylonian and Indian astronomy. In The Golden Chain of Civilizations. G.C. Pande (editor), CSC,
2005.
19. Complex valued instantaneously trained neural networks. (with P. Rajagopal) In Complex-valued
Neural Networks: Theories and Applications. Akira Hirose (editor), World Scientific Publishing,
Singapore, 2003.
20. Data security in computer networks, in Computers and Network Security. D. Abrams and H.J. Podell
(editors). Washington: IEEE Computer Society Press, 1986.
21. Multilayered array computing and The Paninian Approach to natural language processing. In Pattern
Directed Information Analysis, D. Dutta Majumder (editor). New Delhi: Wiley Eastern, 1987.
22. Shift invariant associative memory, with D. Prados in VLSI for Artificial Intelligence, Delgado-Frias
and W. Moore (editors). Boston MA: Kluwer, 1989.
23. A new training algorithm for feedforward neural networks. In Advances in Fuzzy Theory and
Techniques, P.P. Wang (editor), Durham NC: Bookwright Press, 1993.
24. Quantum neural computing, In Advances in Imaging and Electron Physics, vol. 94, P. Hawkes
(editor). Academic Press, 1995, pp. 259-313.
25. The three languages of the brain: quantum, reorganizational, and associative. In Learning as SelfOrganization, K. Pribram and J. King (editors). Lawrence Erlbaum Associates, Mahwah, NJ, 1996,
pp. 185-219.
26. Reflections in clouded mirrors: Selfhood in animals and machines. In Learning as Self-Organization,
K. Pribram and J. King (editors). Lawrence Erlbaum Associates, Mahwah, NJ, 1996, pp. 511-534.
Refereed Journal Articles (Selected)
1.
S. Kak, Orthogonal residue sequences. Circuits, Systems and Signal Processing, vol. 34, 2015.
2.
S. Kak, Goldbach partitions and sequences. Resonance (Springer), vol. 19, pp. 1028-1037,
November 2014.
3.
S. Kak, Measurement complexity and oracle quantum computing. NeuroQuantology, vol. 12, pp.
374-381, 2014.
4.
S. Kak, D. Chopra, M. Kafatos, Perceived reality, quantum mechanics, and consciousness. J. of
Cosmology, vol. 18, pp. 231-245, 2014.
5.
S. Kak and M. Prabhu, Cryptography applications of primitive Pythagorean triples. Cryptologia,
vol. 38, pp. 215-222, 2014.
6.
S. Kak, The number theoretic Hilbert transform. Circuits, Systems and Signal Processing, vol. 33,
pp. 2539-2548, 2014.
7.
S. Kak, The piggy bank cryptographic trope. Infocommunications Journal, vol. 6, pp. 22-25,
March 2014.
8.
S. Kak, From the no-signaling theorem to veiled non-locality. NeuroQuantology, vol. 12, pp. 1220, 2014.
9.
S. Kak, Observability and computability in physics. Quantum Matter, vol. 3, number 3, pp. 172176, 2014.
10.
A. Gautam and S. Kak, Symbols, meaning, and origins of mind. Biosemiotics, vol. 6, number 3,
pp. 301-309, 2013.
11.
S. Kak, Probability constraints and the classical/quantum divide. NeuroQuantology, vol. 11, pp.
600-606, 2013.
12.
S. Kak, Biological memories and agents as quantum collectives. NeuroQuantology, vol. 11, pp.
391-398, 2013.
6
Subhash Kak
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
S. Kak, The problem of testing a quantum gate. Infocommunications Journal, vol. 4, number 4, pp.
18-22, 2012.
A. Parakh and S. Kak, Space efficient secret sharing for implicit data security. Information
Sciences, vol. 181, pp. 335-341, 2011.
S. Kak, Information and intuition. Paritantra: Journal of Systems Science and Engineering, vol. 20,
pp. 1-14, 2011.
S. Kak, Information and learning in neural networks (Invited paper for the Pioneers Special Issue).
NeuroQuantology, vol. 9, pp. 393-401, 2011.
A. Bruno, A. Capolupo, S. Kak, G. Raimondo and G. Vitielli, Gauge theory and two level systems.
Mod. Phys. Lett. B, vol. 25, pp. 1661-1670, 2011.
S. Kak, Extra-rational reality and science. La Nuova Critica, Italy, Quaderno 57-58, pp. 127-140,
2011.
J. Cecil and S. Kak, Designing an interdisciplinary undergraduate engineering curriculum in
information-centric engineering. World Innovations in Engineering Education and Research 2011,
pp. 227-239, 2011.
Y. Chen, S. Kak, and L. Wang, Hybrid neural network architecture for on-line learning. Intelligent
Information Management, vol. 2, pp. 253-261, 2010.
A. Parakh and S. Kak, Internet voting protocol based on improved implicit security. Cryptologia,
vol. 34, pp. 258-268, 2010.
S. Kak, Visions of the cosmos. Journal of Cosmology, vol. 9, pp. 2063-2077, 2010.
A. Parakh and S. Kak, Challenges facing electronic voting. Seminar, no. 609, pp. 78-80, 2010.
N. Dalal, P. Dalal, S. Kak, P. Antonenko, and S. Stansberry, Rapid digital game creation for
broadening participation in computing and fostering crucial thinking skills. International Journal of
Social and Humanistic Computing, vol. 1, pp. 123-137, 2009.
A. Parakh and S. Kak, Online data storage using implicit security. Information Sciences, vol. 179,
pp. 3323-3331, 2009.
Y. Chen, P. Verma, and S. Kak, Embedded security framework for integrated classical and
quantum cryptography in optical burst switching networks. Security and Communication
Networks, vol. 2, pp. 546-554, 2009.
S. Kak, The universe, quantum physics, and consciousness. Journal of Cosmology, vol. 3, pp. 500510, 2009.
M. Satti and S. Kak, Multilevel indexed quasigroup encryption for data and speech. IEEE Trans.
on Broadcasting, vol. 55, pp. 270-281, 2009.
S. Kak, A cubic public-key transformation. Circuits, Systems and Signal Processing, vol. 26, pp.
353-359, 2007.
A. Parthasarathy and S. Kak, An improved method of content based image watermarking. IEEE
Trans on Broadcasting, vol. 53, pp. 468-479, 2007.
S. Kak, Quantum information and entropy. International Journal of Theoretical Physics, vol. 46,
pp. 860-876, 2007.
S. Kak, Moving observers in an isotropic universe. International Journal of Theoretical Physics,
vol. 46, pp. 1424-1430, 2007.
A. Parakh and S. Kak, How to enhance the security of electronic voting? ACM Ubiquity, vol. 8,
2007.
S. Kak, Information complexity of quantum gates. International Journal of Theoretical Physics,
vol. 45, pp. 933-941, 2006.
S. Kak, On the realizability of quantum computers. ACM Ubiquity, vol. 7, issue 11, pp. 1-9, 2006.
S. Kak, A three-stage quantum cryptography protocol. Foundations of Physics Letters, vol. 19, pp.
293-296, 2006.
K. Penumarthi and S. Kak, Augmented watermarking. Cryptologia, vol. 30, pp. 173-180, 2006.
S. Kak, Artificial and biological intelligence. ACM Ubiquity, vol. 6, issue 42, pp. 1-22, 2005.
N. Mandhani and S. Kak, Watermarking using decimal sequences. Cryptologia, vol. 29, pp. 50-58,
2005.
7
Subhash Kak
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
59.
60.
61.
62.
63.
64.
65.
66.
67.
S. Kak, Early art and architecture. Migration and Diffusion: An international journal, vol. 6, pp. 627, 2004.
S. Kak, General qubit errors cannot be corrected. Information Sciences, vol. 152, pp. 195-202,
2003.
S. Kak, A class of instantaneously trained neural networks. Information Sciences, vol. 148, pp. 97102, 2002.
K.W. Tang and S. Kak, Fast classification networks for signal processing. Circuits, Systems,
Signal Processing, vol. 21, pp. 207-224, 2002.
M. Gnanaguruparan and S. Kak, Recursive hiding of secrets in visual cryptography. Cryptologia,
vol. 26, pp. 68-76, 2002.
S. Kak, Statistical constraints in starting a quantum computation. Pramana, Journal of Physics, vol.
57, pp. 683-688, 2001.
S. Kak, An interesting combinatoric sutra. Indian Journal of History of Science, vol. 35, 2000, pp.
123-127.
S. Kak, Indian binary numbers and the Katapayadi notation. Annals of the BORI, vol 81, pp. 269272, 2000.
S. Kak, Rotating a qubit. Information Sciences, vol. 128, pp. 149-154, 2000.
S. Kak, Active agents, intelligence, and quantum computing. Information Sciences, vol. 128, pp. 117, 2000.
S. Kak, Quantum key distribution using three basis states. Pramana, Journal of Physics, vol. 47, pp.
709-713, 2000.
B. Shu and S. Kak, A neural-network based intelligent metasearch engine. Information Sciences,
vol. 120, pp. 1-11, 1999.
S. Kak, Faster web search and prediction using instantaneously trained neural networks. IEEE
Intelligent Systems, vol. 14, pp. 79-82, November/December 1999.
S. Kak, The initialization problem in quantum computing. Foundations of Physics, vol. 29, pp.
267-279, 1999.
S. Tejomurtula and S. Kak, Inverse kinematics in robotics using neural networks. Information
Sciences, vol. 116, pp. 147-164, 1999.
S. Kak, Quantum computing and artificial intelligence. IEEE Intelligent Systems, vol. 14, pp. 9-11,
July/August 1999.
G. Millar and S. Kak, A fire altar explains a solar equation in Angkor Wat. Journal of the Royal
Astronomical Society of Canada, vol. 93, pp. 216-220, 1999.
S. Kak, The solar equation in Angkor Wat. Indian Journal of History of Science, vol. 34, pp. 17126, 1999.
K.-W. Tang and S. Kak, A new corner classification approach to neural network training. Circuits,
Systems, and Signal Processing, vol. 17, pp. 459-469, 1998.
S. Kak, On generalization by neural networks. Information Sciences, vol. 111, pp. 293-302, 1998.
S. Kak, Quantum information in a distributed apparatus. Foundations of Physics, vol. 28, pp. 10051012, 1998.
S. Kak, Three old Indian values of pi. Indian Journal of History of Science, vol. 32, pp. 307-314,
1997.
S. Kak, Knowledge of planets in the third millennium BC. Quarterly Journal of the Royal
Astronomical Society, vol. 37, pp. 709-715, 1996
S. Kak, Information, physics and computation. Foundations of Physics, vol. 26, pp. 127-137, 1996.
S. Kak, Can we define levels of artificial intelligence? Journal of Intelligent Systems, vol. 6, pp.
133-144, 1996.
S. Kak, Speed of computation and simulation. Foundations of Physics, vol. 26, pp. 1375-1386,
1996.
S. Kak, An Indus-Sarasvati signboard. Cryptologia, vol. 20, pp. 275-279, 1996.
S. Kak, On the classification of Indic languages. Annals of the Bhandarkar Oriental Institute, vol.
75, pp. 185-195, 1994.
8
Subhash Kak
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
79.
80.
81.
82.
83.
84.
85.
86.
87.
88.
89.
90.
91.
92.
93.
94.
95.
96.
97.
98.
99.
100.
101.
102.
S. Kak, The evolution of writing. Indian Journal of History of Science, vol. 28, pp. 375-388, 1994.
S. Kak, The astronomy of the age of geometric altars. Quarterly Journal of the Royal Astronomical
Society, vol. 36, pp. 385-396, 1995.
S. Kak, On quantum neural computing. Information Sciences, vol. 83, pp. 143-160, 1995.
S. Kak, On van Nooten's paper on binary numbers. IEEE Annals of the History of Computing, vol.
17, p. 79, 1995.
S. Kak, Quantum neural computing. Advances in Imaging and Electron Physics, vol. 94, pp. 259313, 1995.
S. Kak, New algorithms for training feedforward neural networks. Pattern Recognition Letters, vol.
15, pp. 295-298, 1994.
S. Kak, Astronomy of the Vedic altars. Vistas in Astronomy, vol. 36, pp. 117-140, 1993.
S. Kak, On training feedforward neural networks. Pramana, vol. 40, pp. 35-42, 1993.
S. Kak, Feedback neural networks: new characteristics and a generalization. Circuits, Systems, and
Signal Processing, vol. 12, pp. 263-278, 1993.
S. Kak, Neural networks and artificial intelligence. Information Sciences, vol. 70, pp. 1-3, 1993.
S. Bhate and S. Kak, Panini's grammar and computer science. Annals of the BORI, vol. 72, pp. 7994, 1993.
S. Kak, State generators and complex neural memories. Pramana, vol. 38, pp. 271-278, 1992.
S. Kak, The Vararuchi cipher. Cryptologia, vol. 14, pp. 79-83, 1990.
S. Kak, Indus and Brahmi - further connections, Cryptologia, vol. 14, pp. 169-183, 1990.
S. Kak, Self-indexing of neural memories, Physics Letters A, vol. 143, pp. 293-296, 1990.
S. Kak, The sign for zero. Mankind Quarterly, vol. 30, pp. 199-204, 1990
S. Kak, A new method for coin flipping by telephone. Cryptologia, vol. 13, pp. 73-78, 1989.
C.H. Youn and S. Kak, Continuous unlearning in neural networks. Electronics Letters, vol. 25, pp.
202-203, 1989.
S. Kak and M.C. Stinson, A bicameral neural network where information can be indexed.
Electronics Letters, vol. 25, pp. 203-205, 1989.
D.L. Prados and S. Kak, Neural network capacity using the delta rule. Electronics Letters, vol. 25,
pp. 197-199, 1989.
S. Kak, The Brahmagupta algorithm for square rooting. Ganita Bharati, vol. 11, pp. 27-29, 1989.
M.C. Stinson and S. Kak, Bicameral neural computing. Lecture Notes in Computing and Control,
vol. 130, pp. 85-96, 1989.
D. Prados and S. Kak, Non-binary neural networks. Lecture Notes in Computing and Control, vol.
130, pp. 97-104, 1989.
C.H. Youn and S. Kak, New learning and control algorithms for neural networks. Lecture Notes in
Computing and Control, vol. 130, pp. 105-116, 1989.
S. Kak, A two-layered mesh array for matrix multiplication. Parallel Computing, vol. 6, pp. 383385, 1988.
S. Kak, The Aryabhata cipher. Cryptologia, vol. 12, pp. 113-117, 1988.
S. Kak, The use of determinatives in NLP. AI Magazine, vol. 9, pp. 10-12, Summer 1988.
S. Kak, A frequency analysis of the Indus script. Cryptologia, vol. 12, pp. 129-143, 1988.
S. Kak, Multilayered array computing. Information Sciences, vol. 45, pp. 347-365, 1988.
S. Kak, The Paninian approach to natural language processing. International Journal of
Approximate Reasoning, vol. 1, pp. 117-130, 1987.
S. Kak, Generating d-sequences. Electronics Letters, vol. 23, pp. 202-203, 1987.
S. Kak, A new result on d-sequences. Electronics Letters, vol. 23, p. 617, 1987.
S. Kak, The Aryabhata algorithms for polynomials. Electronics Letters, vol. 23, pp. 838-839, 1987.
S. Kak, Computational aspects of the Aryabhata algorithm. Indian Journal of History of Science,
vol. 21, pp. 62-71, 1986.
S. Kak, On secret hardware, public-key cryptography. Computers and Digital Technique (Proc.
IEE - Part E), vol. 133, pp. 94-96, 1986.
9
Subhash Kak
103.
104.
105.
106.
107.
108.
109.
110.
111.
112.
113.
114.
115.
116.
117.
118.
119.
120.
121.
122.
123.
124.
125.
126.
127.
128.
129.
130.
S. Kak, Encryption and error-correction using d-sequences. IEEE Trans. On Computers, vol. C-34,
pp. 803-809, 1985.
S. Kak, How to detect tampering of data. Information Processing Letters, vol. 20, 109-110, 1985.
S. Kak, Threshold detection error bounds. Journal of the Inst. of Electronics and Telecomm.
Engineers, vol. 30, pp. 29-35, 1984.
S. Kak, On information associated with an object. Proceedings Indian National Science Academy,
vol. 50, pp. 386-396, 1984.
S. Kak, On the method of puzzles for key distribution. International Journal of Comp. and Inf.
Sciences, vol. 13, 1984, pp. 103-109.
S. Kak, Data security in computer networks - Guest Editor's Introduction, Computer, vol. 16, pp.
8-10, February 1983.
S. Kak, Strings of first digits of powers of a number, Indian Journal of Pure and Applied
Mathematics, vol. 14, pp. 896-907, July 1983.
S. Kak, An overview of analog encryption, Proceedings IEE, vol. 130, Pt. F, pp. 399-404, August
1983.
S. Kak, A structural redundancy in d-sequences, IEEE Transactions on Computers, vol. C-32, pp.
1069-1070, November 1983.
S. Kak, Exponentiation modulo a polynomial for data security. International Journal of Computer
and Inf. Science, vol. 12, pp. 337-346, 1983.
A.K. Raina and S. Kak, Data security: a cryptographic approach. Proceedings Indian Academy of
Sciences (Engineering Sciences), vol. 5, Part 1, pp. 65-83, March 1982.
S. Kak and A. Chatterjee, On decimal sequences. IEEE Transactions on Information Theory, vol.
IT-27, pp. 647-652, September 1981.
S. Kak, Masking ciphers. Proceedings IEE (Inst. of Electrical Engineers), vol. 127, pp. 185-189,
June 1980.
S. Kak, On efficiency of chemical homeostasis. IEEE Trans. on Systems, Man & Cybernetics, vol.
SMC-9, pp. 160-163, March 1979.
S. Kak, Encryption of signals using data transpositions. Proceedings of the IEE, vol. 125, pp.
1327-1328, 1978.
S. Kak, On quantum numbers and uncertainty II. Nuovo Cimento, vol. 41B, pp. 1-6, 1977.
S. Kak, Sampling and redundancy," Journal Inst. of Elect. and Telecom. Engineers, vol. 23, pp.
336-340, 1977.
S. Kak and N.S. Jayant, Speech encryption using waveform scrambling. Bell System Technical
Journal, vol. 56, pp. 781-808, May-June 1977.
S. Kak, The discrete finite Hilbert transform. Indian Journal Pure and Applied Maths, vol. 8, pp.
1385-1390, November 1977.
S. Kak, On quantum numbers and uncertainty. Nuovo Cimento, vol. 33B, pp. 530-534, 1976.
S. Kak, On bicirculant matrices. Proc. Indian National Science Academy, Series A., vol. 41, no. 3,
1975.
S. Kak, Binary sequences and redundancy. IEEE Trans. on Systems, Man and Cybernetics, vol.
SMC-4, pp. 399-401, July 1974.
S. Kak, Sociological ideas of Ivan Illich, Social Scientist, vol. 2, no. 11, 1974.
S. Kak, Reliability with an evolutionary failure rate. IEEE Trans. on Reliability, vol. R-22, pp.
239-240, October 1973.
S. Kak, Hilbert transformation for discrete data. International Journal of Electronics, vol. 34, pp.
177-183, February 1973.
S. Kak, A two-valued evolutionary process. Proc. IEEE (Inst. of Electrical and Electronics
Engineers), vol. 69, pp. 1005-1006, 1972.
S. Kak, Causality and limits on frequency functions. International Journal of Electronics, vol. 30,
pp. 41-47, January 1971.
S. Kak, Probability distribution to characterize clipped waves. Proc. IEEE (Inst. of Electrical and
Electronics Engineers), vol. 59, pp. 1534-1535, October 1971.
10
Subhash Kak
131.
132.
133.
S. Kak, The discrete Hilbert transform. Proc. IEEE (Inst. of Electrical and Electronics Engineers),
vol. 58, pp. 585-586, April 1970.
S. Kak, Sampling theorem in Walsh-Fourier analysis. Electronics Letters, vol. 6, pp. 447-448, July
1970.
S. Kak, Classification of random binary sequences using Walsh-Fourier analysis. IEEE Trans. on
EMC, vol. EMC-13, pp. 74-77, August 1970.
Selected Conference Proceedings
1. S. Ji, T. Chen, S. Zhong, S. Kak, DAWN: Defending against wormhole attacks in wireless network
coding systems. INFOCOM 2014.
2. Y. Chen, S. Kak, P. K. Verma, G. Macdonald, M. El Rifai, N. Punekar, Multi-photon tolerant secure
quantum communication -- from theory to practice. Proceedings International Communications
Conference (ICC), Budapest, 2013.
3. S. Mandal, G. Macdonald, M. El Rifai, N. Punekar, F. Zamani, Y. Chen, S. Kak, P.K. Verma, R.C
Huck, J. Sluss, Multi-photon implementation of three-stage quantum cryptography protocol.
International Conference on Information Networking, Bangkok, 2013.
4. S. Yu and S. Kak, An empirical study on how users adopt famous entities. International Conference
on Future Generation Communication Technologies, London, December 2012.
5. E. Chan-Tin, T. Chen, S. Kak, A comprehensive security model for networking applications.
MobiPST, Munich, July 30- Aug 2, 2012.
6. N. Dalal, S. Kak, S. Sohoni, Rapid digital game creation for learning object-oriented concepts.
Proceedings of Informing Science & IT Education Conference (InSITE), June 23-26, 2012.
7. R. Gunda, J. Cecil, P. Calyam, S. Kak, Information centric framework for micro assembly. In On
the Move to Meaningful Internet Systems. R. Meersman, T. Dillon, and P. Ferrerro (eds.). OTM
2011 Workshops, Greece, pp. 93-101.
8. A. Parakh and S. Kak, Matrix based key agreement algorithms for sensor networks. Proceedings of
IEEE Advanced Networks and Telecommunications Conference (ANTS 2011), Bangalore.
9. A. Parakh and S. Kak, New key agreement techniques for sensor networks. Proceedings of IEEE
Advanced Networks and Telecommunications Conference (ANTS 2011).
10. S. Kak, P. Verma, and G. MacDonald, Cryptography and state estimation using polarization states.
SPIE Conference on The Nature of Light: What are Photons IV? August 2011.
11. S. Kak, The nature of light and epistemology. SPIE Conference on The Nature of Light: What are
Photons IV? August 2011.
12. A. Parakh and S. Kak, Efficient key management in sensor networks. IEEE Globecom, Miami,
December 2010.
13. A. Bruno, A. Capolupo, S. Kak, G. Raimondo, and G. Vitiello, Geometric phase and gauge theory
structure in quantum computing. Fifth International Workshop DICE2010: Space-Time-Matter current issues in quantum mechanics and beyond, Castiglioncello (Tuscany), September 13-17, 2010
14. A. Bruno, A. Capolupo, S. Kak, G. Raimondo, and G. Vitiello, Berry-like phase and gauge field in
quantum computing. Quinto congresso nazionale di sistemica, Associazione Italiana per le Ricerca
sui Sistemi, Universit Politecnica delle Marche, Facolt di Ingegneria Sede di Fermo, October 2010.
15. S. Kak, Y. Chen, L. Wang, Data mining using surface and deep agents based on neural networks.
16th Americas Conference on Information Systems. Lima, Peru, August 2010.
16. A. Parakh and S. Kak, A tree based recursive information hiding scheme. IEEE ICC 2010 Communication and Information System Security Symposium, Cape Town, May 2010.
17. A. Parakh and S. Kak, Recursive secret sharing for distributed storage and information hiding. 3rd
IEEE International Symposium on Advanced Networks and Telecommunication Systems (ANTS),
New Delhi, India, Dec 14-16, 2009.
18. A. Parakh and S. Kak, A key distribution scheme for sensor networks Using Structured Graphs.
IEEE Electro-09, Varanasi, Dec 22-24, 2009.
19. S. Kak, Observers, freedom, and the cosmos. International Year of Astronomy 2009, Astronomy and
the Cosmos. Keynote Speech. Budapest, August 2009.
11
Subhash Kak
20. S. Kak, The transactional nature of quantum information. 11th International Conference on Squeezed
States and Uncertainty Relations (ICCSUR)/4th Feynman festival, June 22-26, 2009, in Olomouc,
Czech Republic.
21. A. Parakh and S. Kak, A distributed data storage scheme for sensor networks. Proceedings MobiSec,
Turin, June 2009. Also in Security and Privacy in Mobile Information and Communication Systems.
Volume 17, pages 14-22, LNICST, Springer, 2009.
22. A. Parakh and S. Kak, Space efficient secret sharing. Proceedings of CSRC 09, Norman, Oklahoma,
April 18, 2009.
23. P. Dalal, N. Dalal, and S. Kak, Learning computer programming with game design. CSEDU 2009:
International Conference on Computer Supported Education, Lisbon. March 23-26, 2009.
24. S. Kak, Social networks and security. 3rd Oklahoma Computer Conference, Durant, 6 March 2009.
25. S. Kak, Time, space and structure. International Conference on the Sindhu-Sarasvati Civilization - A
Reappraisal. Los Angeles, Feb 21-22, 2009.
26. S. Kak, Prospects for quantum computing. Proc. CIFAR Nanotechnology Meeting, Halifax, Canada,
14-16 November, 2008.
27. A. Parakh and S. Kak, Internet voting protocol based on implicit data security. in Proceedings of the
17th IEEE ICCCN 2008. August 2008, Virgin Islands.
28. S. Kak, Art, science and consciousness. Invited lecture at Symposium on Mind, Consciousness, and
Time. Univ of Mass at Dartmouth, Aug 9-10, 2008.
29. S. Kak, How much of information in a photon? Proc. SPIE, Vol. 6664, 666403, Aug 31, 2007. San
Diego, August 2007.
30. S. Kak, Instantaneously trained neural networks. Fifth International Conference on Computational
Intelligence and Neuroscience, NC, March 2002.
31. S. Kak, Rotating a qubit. Proceedings of the Fourth International Conference on Computational
Intelligence and Neuroscience, NC, February 2000.
32. S.C. Kak, Quantum computing and artificial intelligence, Plenary Lecture, Proceedings of the Fourth
International Conference on Computational Intelligence and Neuroscience, NC, February 2000.
33. S. Kak, The initialization problem in quantum computing, Proceedings of the Third International
Conference on Computational Intelligence and Neuroscience, NC, October 1998.
34. G. de Souza and S.C. Kak, Dynamic radius allocation in corner classification neural networks,"
Proceedings of the Third International Conference on Computational Intelligence and Neuroscience,
NC, October 1998.
35. S. Kak, On masks of mind, International Seminar on Mind, Man and Mask, New Delhi, Feb 24-28,
1998.
36. K.-W. Tang and S. Kak, Corner classification neural networks where the output weights are learnt,
Second International Conference on Computational Intelligence and Neuroscience, NC, March 1997.
37. S. Kak, Does quantum mechanics have relevance in neuroscience? Second International Conference
on Computational Intelligence and Neuroscience, NC, March 1997.
38. S. Kak, Why machines cannot be conscious. Towards a Science of Consciousness (Tucson II), April
1996.
39. S. Kak, Neural nets, information, and intelligence, (Invited Paper). Second World Congress of
Nonlinear Analysis, Athens, Greece, July 1996.
40. S. Kak, The three languages of the brain, (Invited Paper). Fourth Appalachian Conference on
Behavioral Neurodynamics, Radford, September 22-25, 1995.
41. S. Kak, On generalization by neural networks. First International Conference on Computational
Intelligence and Neuroscience, NC, October 1995.
42. S. Kak, New directions in neural network research. Joint Conference on Information Sciences, NC,
November 1994.
43. P. Raina, J. Christiansen, T. Clacko, S. Kak, Financial data modeling using feedforward neural
networks, Joint Conference on Information Sciences, NC, November 1994.
44. S. Kak, Reflections in clouded mirrors: selfhood in animals and machines, Symposium on Aliens,
Apes, and Artificial Intelligence, Univ of Alabama, February 13, 1993.
12
Subhash Kak
45. S. Das and S. Kak, The polynomial neural network, Second International Conference on Fuzzy
Theory and Technology, Durham, NC, October 1993.
46. D. Young and S. Kak, Feature based retrieval in neural networks, Proceedings IEEE Southeastcon,
1992.
47. S. Kak, Learning and generalization in feedforward neural networks, First International Conference
on Fuzzy Theory and Technology, Durham, NC, October 1992.
48. S. Kak and S. Das, Storing pattern pairs in a bicameral neural network, Proceedings IEEE
Southeastern Conference, New Orleans, April 1990.
49. S. Kak, Neural computing with structured information, 2nd International Conference on Tools for
Artificial Intelligence, Washington, D.C., November 1990.
50. S. Kak and A.O. Barbir, The Brahmagupta algorithm for square rooting, Proceedings of the 21st
Southeastern Symposium on System Theory, Tallahassee, March 1989.
51. M.C. Stinson, S. Kak, and D.G. Foster, The bicameral neural network model: an application of
conditional rule structure to speech perception, Proceedings of the Workshop on Natural Language
Processing for Artificial Intelligence, Roorkee, Jan. 14-15, 1989.
52. S. Kak, On stochastic computing, Proceedings of the 22nd Annual Conference on Information
Sciences and Systems, Princeton, N.J., pp. 131-133, March 1988.
53. M.C. Stinson and S. Kak, Techniques to improve convergence of neural networks, Proceedings of
the 22nd Annual Conference on Information Sciences and Systems, Princeton, N.J., p. 275, March
1988.
54. M.C. Stinson and S. Kak, Asynchronous controller to improve the convergence of neural nets.
Proceedings of the 26th Annual ACM Conference of the Southeast Region, pp. 410-413, April 2122, 1988.
55. D. Prados and S. Kak, Shift invariant associative memory using VLSI, Proceedings of the
International Workshop on VLSI for Artificial Intelligence , Oxford, U.K., 1988.
56. M.C. Stinson and S. Kak, On bicameral neural networks, 1st International Neural Networks Society
(INNS) Conference, Boston, September 1988.
57. M.C. Stinson and S. Kak, Bicameral neural computing, Proceedings ComCon 1988, (2nd
International Conference on Advances in Communications and Controls), Baton Rouge, LA, Oct.
1988.
58. C.H. Youn and S. Kak, New learning and control algorithms for neural networks, Proceedings
ComCon 1988 (2nd International Conference on Advances in Communications and Controls), Baton
Rouge, Oct. 1988.
59. D.L. Prados and S. Kak, Nonbinary neural networks. Proceedings ComCon 1988 (2nd International
Conference on Advances in Communications and Controls), Baton Rouge, Oct. 1988.
60. D.P. Norton and S. Kak, On shuffling of 2-D data. Proceedings of the 20th Annual Conference on
Information Science and Systems, Princeton, N.J., pp. 552-556, March 19-21, 1986.
61. S. Kak, Multilayered array computing, Proceedings of the 20th Annual Conference on Information
Sciences and Systems, Princeton, N.J., pp. 436-441, March 19-21, 1986.
62. S. Kak, D.P. Norton and A. El-Amawy, An efficient implementation of the Aryabhata algorithm.
Proceedings of the 20th Annual Conference on Information Sciences and Systems, Princeton, N.J.,
pp. 790-792, 1986.
63. S. Kak, Digital signatures in networks, Proceeding of the IEEE International Conference on Systems,
Man and Cybernetics, India, pp. 968-971, December 1983-January 1984.
64. S. Kak, Joint encryption and error-correction coding, Proceedings of the IEEE Symposium on
Security and Privacy, Oakland, CA, pp. 55-60, April 1983.
65. S. Kak, Information and complexity with applications to digital fault testing. Proceedings of the
IEEE Southeastcon, pp. 62-65, April 1982.
66. S. Kak and A.K. Sood, On a class of interconnection networks. Proceedings IEEE Southeastcon, pp.
232-236, 1981.
67. S. Kak, Decimal sequences and their applications in communications. Proceedings International
Conference in Communications, Denver, June 1981.
13
Subhash Kak
68. S. Kak, Error bounds for a spread spectrum multiple access system. Proceedings of the National
Telecommunications Conference, New Orleans, pp. G 3.4.1-G 3.4.4, 1981.
69. S. Kak, Further results on maximum length decimal sequences. IEEE Intl. Symposium on
Information Theory, Santa Monica, February 1981.
70. S. Kak, Scrambling and randomization. IEEE Workshop on Communications Security (Crypto 81),
University of California, Santa Barbara, pp. 59-63, August 1981.
71. S. Kak and A Chatterjee, Theory and application of maximum length decimal sequences.
Proceedings 14th Annual Conference on Information Sciences and Systems, Princeton, N.J., pp. 618623, March 1980.
72. S. Kak & B. Sathiapalan, An algorithmic information approach to cryptography. Proceedings 14th
Annual Conference on Information Sciences and Systems, Princeton, N.J., March 1980.
73. S. Kak, Real-time encryption of signals - a review, Proceedings 22nd Midwest Symposium on
Circuits and Systems, Philadelphia, U.S., June 1979.
74. S. Kak, Product formulas for Walsh functions, Proceedings Walsh Symposium at Washington, D.C.,
April 1973.
75. S. Kak, On the discrete Hilbert transformation, Proceedings 5th Hawaii Conf. on System Science,
January 1972.
76. S. Kak, On matrices with Walsh vectors as the eigenvectors, Proc. Walsh Symposium, Washington,
D.C., April 1972.
77. S. Kak, On classification of binary sequences, Proceedings Walsh Symposium at Washington, D.C.,
April 1972.
INVITED LECTURES
2014. NIIT University, Neemrana, India, September 2, 2014.
2013. Computer Science Department, University of Minnesota, Nov 22, 2013; Keynote Speaker on Quantum
Mechanics of Macroscopic Systems, 20th Conference on Towards a Science of Consciousness (TSC). Agra,
India. March 4-9, 2013; Invited Speaker at the Sages and Scientists Conference in Carlsbad, CA on August
15-17, 2013; Invited speaker at Univ of South Carolina, Columbia, August 26, 2013; Port of Spain, Trinidad
September 14, 2013.
2012. Imperial College, London, December 2012; Curtin University, Perth, Australia, October 2012; Gandhi
Center, Bethesda, MD, March 2012.
2011. Sandia Laboratories, Albuquerque, NM, April 2011.
2010. Barcelos Lecture. Invited lecture at the City Hall of the City of Barcelos, Portugal, April 16; Golden
Jubilee Distinguished Lecture at Indian Institute of Technology, Delhi, November 8, 2010; Invited lectures in
Toronto, Port of Spain, Trinidad, and Netherlands.
2009. Keynote speech at the Astronomy and Civilization Conference in Budapest, August 10-13, a
Conference to celebrate the International Year of Astronomy; Syracuse University, October; Madhavan
Lecture, San Diego State University, October; University of Arkansas, Fayetteville, October; Univ of
Massachusetts, Dartmouth, November.
2008. University of Cincinnati, October; University of Massachusetts at Dartmouth, August.
2007. Tulsa Chamber of Commerce & Tulsa University, October; Wellesley College, March.
14
Subhash Kak
2006. University of Bergamo, Italy, December; Baton Rouge Astronomical Society, Lecture on Quantum
reality, multiple universes, information. September 11; a follow up lecture in July 2007; Patanjali Lecture,
University of Massachusetts at Dartmouth, May; RSA Data Security Conference, San Jose, Keynote speech,
February.
2005. National Heritage Museum, Lexington, December 17; Harvard University Foundation Invited Lecture,
December 16; Houston Museum of Fine Arts, Houston, November; University of Connecticut Health
Sciences Center, Hartford, Summer; Rochester Institute of Technology, Rochester, Spring; Dutch Public TV
OHM's National Convention, Keynote speech, Spring; Pennsylvania State University, State College, Spring;
Washington University, St. Louis, Spring.
2004. University of Minnesota, Minneapolis, Fall 2004; University of California, Berkeley, Fall 2004.
2003. University of Missouri, Columbia, Spring 2003.
2002. University of Minnesota, Minneapolis (Fall 2002); National Heritage Museum, Lexington, Mass
(Summer 2002); UCLA, Los Angeles (Spring 2002); University of Houston, Houston, Spring 2002.
2001. Duke University, Durham (Spring 2001)
2000. USF Medical School, Tampa (Fall 2000); University of Missouri, Kansas City (Fall 2000); University
of Utah, Salt Lake City (Fall 2000); University of California, Irvine (Spring 2000); Stanford University
(Spring 2000); University of California, Berkeley (Spring 2000)
1999. Georgia Tech (Fall 1999); Univ of Illinois at Urbana (Fall 1999); Univ of Wisconsin (Fall 1999);
Concordia Univ, Montreal (Fall 1999); Univ of Miami, Miami, January 18, 1999.
1998. Georgia Tech, Atlanta, January 18, 1998.
1997. Indira Gandhi National Centre for the Arts, Delhi, March 26; Indian Institute of Technology, Delhi,
March 27; Southern University, Baton Rouge, April 24; Festival of India at Atlanta, August 17, 1997;
Massachusetts Institute of Technology, Boston, September 27.
1996. The views of Janus: looking behind and looking ahead at science. Philosophy Foundation, Boston,
April 20, 1996.
1995. Quantum computing. IIT Delhi, August.
1994. Neural networks, learning, and artificial intelligence. Duke Electrical Engineering Colloquium, Duke
University, November 16.
1993. Challenges facing the modern university. Luncheon Speech at the inauguration celebrations for Dr
Lyons, the incoming president of Jackson State University, Jackson, Mississippi, March 18.
1992. University of Michigan, Ann Arbor, February 7; George Washington University, Washington, D.C.,
April 12.
1991. Self-indexing in neural computations. University of New Orleans, New Orleans, March 1991.
1989. Bicameral neural computing. Tulane University, New Orleans, April 6; Neural computing with
structured information. Cambridge University, Cambridge, U.K., December 20.
15
Subhash Kak
1986. India International Center, New Delhi, January 3, 1986; India International Center, New Delhi,
September 18, 1986.
1983. Computer security, Special Library Association Conference, New Orleans; Coding and cryptography
using D sequences, IBM TJ Watson Center, 1983.
1979. Principal Speaker at Einstein's Centenary Meeting. AIIMS, New Delhi.
Also seminars at ULL, NC State, IIT Delhi, IIT Bombay, Wayne State University, TIFR, Indian Telephone
Industries (Bangalore), Regional Engineering College, Srinagar, Telecommunications Research Centre.
STUDENT SUPERVISION
Ph.D. Students
1. Sheng Yu (2014), Social Network Dynamics. (In process of completion)
2. Abhishek Parakh (2011), New Results on Information Dispersal Algorithms for Trustworthy
Computing (Parakh is assistant professor at University of Nebraska, Omaha)
3. Will Scott (2003), Block Level DCT Coefficients for Autonomic Image Recognition with
Applications to Face Recognition (Scott is on the research staff at IBM, Austin)
4. Kun-Won Tang (1999), Instantaneously Trained Neural Networks (Tang is Director and Owner,
General Microsystems, Malaysia)
5. David Young (1997), A Theory of Cortical Neural Processing (Young was faculty in the industrial
engineering department of the Louisiana State University)
6. Parvin Hashemian (1996), Solving Classification Problems using Modular Approaches in
Feedforward Neural Networks (Hashemian was faculty at Univ of Louisiana, Lafayette)
7. Sanjoy Das (1994), Second Order Neural Networks (Das is associate professor of electrical and
computer engineering at Kansas State University)
8. George Georgiou (1992, Tulane University, Special Examiner), Parallel Distributed Processing in
the Complex Domain (Georgiou is professor of computer science and engineering at California State
University at San Bernardino)
9. Chung Youn (1989), New Control and Learning Algorithms for Neural Networks (Youn is professor
of computer science in South Korea)
10. D.L. Prados (1989), The Capacity of Artificial Neural Networks Using the Delta Rule (Prados is
research computer scientist at the NASA Stennis Center)
11. M.C. Stinson (1988), Neural Networks with Asynchronous Control (Stinson is professor of computer
science at Central Michigan Univ)
12. I. Dabipi (1987), Fail-safe Local Area Networking Using Channel redundancy (Dabipi is professor
of electrical engineering at Univ of Maryland)
16
Subhash Kak
MS Thesis Supervision at LSU and OSU
1. Navya Chodisetti (2014). Sealed bid auction using digital knapsacks.
2. Vamsi Kotagiri (2014). Information processing using circulant matrices.
3. Antony Akshay (2014). Using primitive Pythagorean triples and the Blom’s scheme in the 4-way
handshake wireless security protocol.
4. Matt Stowe (2013). Neural network capacity for multilevel inputs.
5. V. Spoorthy Ella (2013). Generating target events using probability distributions and the oblivious
transfer protocol.
6. S. Chitikela (2013). Methods to counter attacks on quantum cryptography protocols.
7. M. Prabhu (2013). Key distribution using primitive Pythagorean triples.
8. K. Kanchu (2013) Secure key distribution protocol using Goldbach sequences.
9. S. Sukumar (2013). Modified Blom’s scheme for better key management in wireless sensor
networks.
10. G. Talati (2013). Quartic, quintic and sextic public key transformation.
11. D. Cherlopalle (2013). Key distribution using Goldbach triples.
12. S. H. Chidananda (2013). Data representation and sequence alignment in bioinformatics.
13. N. Poulose (2013). Retrieval of stored memories from fragments.
14. M. Rojas (2012). A semantic association page rank algorithm for web search engines.
15. M. Lavale (2012). Security strengthening of the three-stage quantum cryptography protocol.
16. S.R. Bheemireddy (2012). A smart clustering-based contention free protocol in wireless sensor
networks.
17. A. Reddy Aileni (2011). Key management in static and mobile sensor networks.
18. S. R. R. Reddy (2011). Key management and encryption in wireless sensor networks.
19. Y. Kothapalli (2011). Primitive Pythagorean triples in key management of sensor networks.
20. P. Laddha (2011), Memory retrieval in B-Matrix neural networks.
21. P. Kuruvada (2011), Memory storage in a variable threshold neural network.
22. C. Chakradhara Reddy (2011), Two-dimensional random patterns.
23. V. Paruchuri (2011), Approximate string matching and applications to Indian scripts.
24. P. Dantala (2011), Authentication for multi-located parties and wireless ad hoc networks.
25. S. Rangineni (2011). Cryptographic strengthening of random sequences.
26. S. Katta (2011). New results in visual cryptography.
27. S. Peruru (2010), A reliable and scalable addressing scheme for data distribution.
28. K. Lingashetty (2010), Active sites model for implementing the B-matrix approach.
29. S. Thippireddy (2009), Models for evolution and joining of small world networks.
30. S. Gangasani (2008), Generalization and efficient implementation of CC4 neural network.
31. P. Koduru (2008), Dynamics of joining social networks.
32. S. Chalasani (2008), The value of a social network.
33. P. Basuchowdhury (2008), Enhancing security in quantum cryptography.
34. M. Satti (2007), Quasigroup based symmetric cryptosystem.
35. A. Parakh (2007), Oblivious transfer using secure communication.
36. C. Iombo (2007), Predictive data compression using adaptive arithmetic coding.
37. M. Riyazuddin (2006), Information analysis of DNA sequences.
38. A. Parthasarathy (2006), Improved content based watermarking for images.
39. A. Rishiyur (2006), Instantaneously trained neural networks with complex and quaternion inputs.
40. K. Penumarthi (2005), Augmented watermarking.
41. S. A. Naveed (2005), Improved watermarking scheme using decimal sequences.
42. T. Malik (2005), Adaptive target tracking in wireless sensor networks.
43. N. Mandhani (2004), Watermarking using decimal sequences.
44. P. Rajagopal (2003), Instantaneously trained neural networks with complex inputs.
45. R. Vaddiraja (2003), Generalized d-sequences and their applications to CDMA systems.
46. A. Penumarthy (2001), Title missing.
17
Subhash Kak
47. R. Malla (2001). Achieving interoperability between XML/RPC based protocols and Object based
protocols.
48. N. Natarajan (2001), Title missing.
49. V.R. Admal (2001). Text compression using instantaneously trained neural networks.
50. Meenakshi Gnanaguruparan (2000). Recursive hiding of secrets in visual cryptography.
51. Sharath Kumar (2000). Title missing.
52. Savitha Pinnepalli (1999). Neural network approach to data compression.
53. Asheesh Mehta (1997). Use of CC networks in extrapolation of financial time-series.
54. Sreenivas Tejomurtula (1997). Inverse kinematics in robotics using neural networks.
55. Kun-Won Tang (1997). Corner classification applied to neural network learning.
56. Ravi Jayanthi (1995). Efficient residue arithmetic algorithms.
57. Lianjiang Chen (1994). Title missing.
58. U. Devanagudy (1994). Matrix multiplication arrays and their implementation.
59. P. Raina (1994). Comparison of learning and generalization capabilities of two learning algorithms.
60. G. Subramanya (1994). New clustering algorithm using feedforward neural networks.
61. K. Madineni (1994). Two corner classification algorithms for training feedforward neural networks.
62. P.Paragi (1993). Time series trend predictions using neural networks.
63. R. Guddanti (1993). Application of the Kak algorithm to time series and pattern recognition
problems.
64. S. Joshi (1992). Computer hardware reliability
65. R. Gopal (1992). Networks of complex neurons.
66. M. Khondker (1991). Optical communications system
67. P. Merritt (1991). Title missing.
68. A. Palekar (1990). 3-D knowledge representation using neural networks.
69. David Young (1989). Study of recall in neural networks.
70. K.W. Cheong (1986). Title missing.
71. Tse Sai-On (1984). Discrete Hilbert transform: software and hardware approaches.
72. S.R. Sweha (1982). A study of interconnection networks.
73. I. Dabipi (1981). An arithmetic-sequence-based spread spectrum multiple access.
74. G. Economides (1980). Application of d-sequences in spread spectrum systems.
18