Bogdan Carbunar, Ph.D.

Affiliations: 
2005 Purdue University, West Lafayette, IN, United States 
Area:
Computer Science
Google:
"Bogdan Carbunar"

Parents

Sign in to add mentor
Cristina Nita-Rotaru grad student 2005 Purdue
 (Coverage problems in wireless sensor and RFID systems.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Azimpourkivi M, Topkara U, Carbunar B. (2017) Camera Based Two Factor Authentication Through Mobile and Wearable Devices Arxiv: Cryptography and Security. 1: 35
Rahman M, Azimpourkivi M, Topkara U, et al. (2017) Video Liveness for Citizen Journalism: Attacks and Defenses Ieee Transactions On Mobile Computing. 16: 3250-3263
Rahman M, Rahman M, Carbunar B, et al. (2017) Search Rank Fraud and Malware Detection in Google Play Ieee Transactions On Knowledge and Data Engineering. 29: 1329-1342
Potharaju R, Rahman M, Carbunar B. (2017) A Longitudinal Study of Google Play Ieee Transactions On Computational Social Systems. 4: 135-149
Sargolzaei A, Yen KK, Abdelghani MN, et al. (2017) Resilient Design of Networked Control Systems Under Time Delay Switch Attacks, Application in Smart Grid Ieee Access. 5: 15901-15912
Rahman M, Topkara U, Carbunar B. (2016) Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors Ieee Transactions On Mobile Computing. 15: 1197-1210
Rahman M, Carbunar B, Topkara U. (2016) Secure management of low power fitness trackers Ieee Transactions On Mobile Computing. 15: 447-459
Guo M, Jin X, Pissinou N, et al. (2015) In-network trajectory privacy preservation Acm Computing Surveys. 48
Carbunar B, Potharaju R. (2015) A longitudinal study of the Google app market Proceedings of the 2015 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2015. 242-249
Potharaju R, Carbunar B, Azimpourkivi M, et al. (2015) Infiltrating social network accounts: Attacks and defenses Secure System Design and Trustable Computing. 457-485
See more...