Bogdan Carbunar, Ph.D.
Affiliations: | 2005 | Purdue University, West Lafayette, IN, United States |
Area:
Computer ScienceGoogle:
"Bogdan Carbunar"Parents
Sign in to add mentorCristina Nita-Rotaru | grad student | 2005 | Purdue | |
(Coverage problems in wireless sensor and RFID systems.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Azimpourkivi M, Topkara U, Carbunar B. (2017) Camera Based Two Factor Authentication Through Mobile and Wearable Devices Arxiv: Cryptography and Security. 1: 35 |
Rahman M, Azimpourkivi M, Topkara U, et al. (2017) Video Liveness for Citizen Journalism: Attacks and Defenses Ieee Transactions On Mobile Computing. 16: 3250-3263 |
Rahman M, Rahman M, Carbunar B, et al. (2017) Search Rank Fraud and Malware Detection in Google Play Ieee Transactions On Knowledge and Data Engineering. 29: 1329-1342 |
Potharaju R, Rahman M, Carbunar B. (2017) A Longitudinal Study of Google Play Ieee Transactions On Computational Social Systems. 4: 135-149 |
Sargolzaei A, Yen KK, Abdelghani MN, et al. (2017) Resilient Design of Networked Control Systems Under Time Delay Switch Attacks, Application in Smart Grid Ieee Access. 5: 15901-15912 |
Rahman M, Topkara U, Carbunar B. (2016) Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors Ieee Transactions On Mobile Computing. 15: 1197-1210 |
Rahman M, Carbunar B, Topkara U. (2016) Secure management of low power fitness trackers Ieee Transactions On Mobile Computing. 15: 447-459 |
Guo M, Jin X, Pissinou N, et al. (2015) In-network trajectory privacy preservation Acm Computing Surveys. 48 |
Carbunar B, Potharaju R. (2015) A longitudinal study of the Google app market Proceedings of the 2015 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2015. 242-249 |
Potharaju R, Carbunar B, Azimpourkivi M, et al. (2015) Infiltrating social network accounts: Attacks and defenses Secure System Design and Trustable Computing. 457-485 |