Year |
Citation |
Score |
2017 |
Azimpourkivi M, Topkara U, Carbunar B. Camera Based Two Factor Authentication Through Mobile and Wearable Devices Arxiv: Cryptography and Security. 1: 35. DOI: 10.1145/3131904 |
0.349 |
|
2017 |
Rahman M, Azimpourkivi M, Topkara U, Carbunar B. Video Liveness for Citizen Journalism: Attacks and Defenses Ieee Transactions On Mobile Computing. 16: 3250-3263. DOI: 10.1109/Tmc.2017.2687922 |
0.311 |
|
2017 |
Rahman M, Rahman M, Carbunar B, Chau DH. Search Rank Fraud and Malware Detection in Google Play Ieee Transactions On Knowledge and Data Engineering. 29: 1329-1342. DOI: 10.1109/Tkde.2017.2667658 |
0.302 |
|
2017 |
Potharaju R, Rahman M, Carbunar B. A Longitudinal Study of Google Play Ieee Transactions On Computational Social Systems. 4: 135-149. DOI: 10.1109/Tcss.2017.2732167 |
0.682 |
|
2017 |
Sargolzaei A, Yen KK, Abdelghani MN, Sargolzaei S, Carbunar B. Resilient Design of Networked Control Systems Under Time Delay Switch Attacks, Application in Smart Grid Ieee Access. 5: 15901-15912. DOI: 10.1109/Access.2017.2731780 |
0.405 |
|
2016 |
Rahman M, Topkara U, Carbunar B. Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors Ieee Transactions On Mobile Computing. 15: 1197-1210. DOI: 10.1109/Tmc.2015.2456904 |
0.354 |
|
2016 |
Rahman M, Carbunar B, Topkara U. Secure management of low power fitness trackers Ieee Transactions On Mobile Computing. 15: 447-459. DOI: 10.1109/Tmc.2015.2418774 |
0.409 |
|
2015 |
Guo M, Jin X, Pissinou N, Zanlongo S, Carbunar B, Iyengar SS. In-network trajectory privacy preservation Acm Computing Surveys. 48. DOI: 10.1145/2818183 |
0.534 |
|
2015 |
Carbunar B, Potharaju R. A longitudinal study of the Google app market Proceedings of the 2015 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2015. 242-249. DOI: 10.1145/2808797.2808823 |
0.668 |
|
2015 |
Potharaju R, Carbunar B, Azimpourkivi M, Vasudevan V, Iyengar SS. Infiltrating social network accounts: Attacks and defenses Secure System Design and Trustable Computing. 457-485. DOI: 10.1007/978-3-319-14971-4_15 |
0.739 |
|
2014 |
Carbunar B, Potharaju R, Pearce M, Vasudevan V, Needham M. Errata for: A Framework for Network Aware Caching for Video on Demand Systems Acm Transactions On Multimedia Computing, Communications, and Applications. 11: 23. DOI: 10.1145/2661298 |
0.688 |
|
2014 |
Ballesteros J, Carbunar B, Rahman M, Rishe N, Iyengar SS. Towards safe cities: A mobile and social networking approach Ieee Transactions On Parallel and Distributed Systems. 25: 2451-2462. DOI: 10.1109/Tpds.2013.190 |
0.494 |
|
2014 |
Carbunar B, Sion R, Potharaju R, Ehsan M. Private badges for geosocial networks Ieee Transactions On Mobile Computing. 13: 2382-2396. DOI: 10.1109/Tmc.2013.95 |
0.746 |
|
2014 |
Carbunar B, Rahman M, Ballesteros J, Rishe N, Vasilakos AV. PROFILR: Toward preserving privacy and functionality in geosocial networks Ieee Transactions On Information Forensics and Security. 9: 709-718. DOI: 10.1109/Tifs.2014.2307697 |
0.516 |
|
2013 |
Carbunar B, Potharaju R, Pearce M, Vasudevan V, Needham M. A framework for network aware caching for video on demand systems Acm Transactions On Multimedia Computing, Communications and Applications. 9. DOI: 10.1145/2501643.2501652 |
0.733 |
|
2013 |
Rahman M, Ballesteros J, Carbunar B, Rishe N, Vasilakos AV. Toward preserving privacy and functionality in geosocial networks Proceedings of the Annual International Conference On Mobile Computing and Networking, Mobicom. 207-209. DOI: 10.1145/2500423.2504577 |
0.433 |
|
2013 |
Carbunar B, Rahman M, Pissinou N, Vasilakos AV. A survey of privacy vulnerabilities and defenses in geosocial networks Ieee Communications Magazine. 51: 114-119. DOI: 10.1109/Mcom.2013.6658662 |
0.548 |
|
2013 |
Ballesteros J, Carbunar B, Rahman M, Rishe N. Yelp events: Making bricks without clay? Proceedings - International Conference On Distributed Computing Systems. 156-161. DOI: 10.1109/ICDCSW.2013.5 |
0.322 |
|
2012 |
Carbunar B, Rahman M, Rishe N, Ballesteros J. Private location centric profiles for GeoSocial networks Gis: Proceedings of the Acm International Symposium On Advances in Geographic Information Systems. 458-461. DOI: 10.1145/2424321.2424389 |
0.479 |
|
2012 |
Carbunar B, Potharaju R, Pearce M, Vasudevan V. Network aware caching for video on demand systems 2012 Ieee International Symposium On a World of Wireless, Mobile and Multimedia Networks, Wowmom 2012 - Digital Proceedings. DOI: 10.1109/WoWMoM.2012.6263704 |
0.739 |
|
2012 |
Carbunar B, Chen Y, Sion R. Tipping pennies? Privately practical anonymous micropayments Ieee Transactions On Information Forensics and Security. 7: 1628-1637. DOI: 10.1109/Tifs.2012.2204982 |
0.423 |
|
2012 |
Carbunar B, Potharaju R. You unlocked the Mt. Everest badge on foursquare! Countering location fraud in GeoSocial networks Mass 2012 - 9th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 182-190. DOI: 10.1109/MASS.2012.6502516 |
0.742 |
|
2012 |
Ballesteros J, Rahman M, Carbunar B, Rishe N. Safe cities. A participatory sensing approach Proceedings - Conference On Local Computer Networks, Lcn. 626-634. DOI: 10.1109/LCN.2012.6423684 |
0.353 |
|
2012 |
Carbunar B, Sion R, Potharaju R, Ehsan M. The shy mayor: Private badges in geosocial networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7341: 436-454. DOI: 10.1007/978-3-642-31284-7_26 |
0.751 |
|
2011 |
Carbunar B, Sion R. Private geosocial networking Gis: Proceedings of the Acm International Symposium On Advances in Geographic Information Systems. 365-368. DOI: 10.1145/2093973.2094024 |
0.472 |
|
2011 |
Carbunar B, Sion R. Write-once read-many oblivious RAM Ieee Transactions On Information Forensics and Security. 6: 1394-1403. DOI: 10.1109/Tifs.2011.2160169 |
0.347 |
|
2011 |
Carbunar B, Pearce M, Vasudevan V, Needham M. Predictive caching for video on demand CDNs Globecom - Ieee Global Telecommunications Conference. DOI: 10.1109/GLOCOM.2011.6133574 |
0.342 |
|
2010 |
Potharaju R, Carbunar B, Nita-Rotaru C. IFriendU: Leveraging 3-cliques to enhance infiltration attacks in online social networks Proceedings of the Acm Conference On Computer and Communications Security. 723-725. DOI: 10.1145/1866307.1866410 |
0.758 |
|
2010 |
Carbunar B, Yu Y, Shi W, Pearce M, Vasudevan V. Query privacy in wireless sensor networks Acm Transactions On Sensor Networks. 6. DOI: 10.1145/1689239.1689244 |
0.493 |
|
2010 |
Carbunar B, Pearce M, Mohapatra S, Rittle LJ, Vasudevan V, Carbunar O. Secure synchronization of periodic updates in Ad hoc networks Ieee Transactions On Parallel and Distributed Systems. 21: 1060-1073. DOI: 10.1109/Tpds.2009.169 |
0.393 |
|
2009 |
Chen Y, Sion R, Carbunar B. XPay: Practical anonymous payments for tor routing and other networked services Proceedings of the Acm Conference On Computer and Communications Security. 41-50. DOI: 10.1145/1655188.1655195 |
0.34 |
|
2009 |
Nita-Rotaru C, Carbunar B, Ioannis I. JANUS: A framework for scalable and secure routing in hybrid Wireless networks Ieee Transactions On Dependable and Secure Computing. 6: 295-308. DOI: 10.1109/Tdsc.2008.14 |
0.719 |
|
2009 |
Bhatt S, Sion R, Carbunar B. A personal mobile DRM manager for smartphones Computers and Security. 28: 327-340. DOI: 10.1016/J.Cose.2009.03.001 |
0.322 |
|
2008 |
Carbunar B, Pearce M, Mohapatra S, Rittle LJ, Vasudevan V. byzantine resilient synchronization for content and presence updates in MANETS Proceedings - International Conference On Network Protocols, Icnp. 268-277. DOI: 10.1109/ICNP.2008.4697045 |
0.334 |
|
2005 |
Ioannidis I, Carbunar B, Nita-Rotaru C. High throughput routing in hybrid cellular and Ad-Hoc networks Proceedings - 6th Ieee International Symposium On a World of Wireless Mobile and Multimedia Networks, Wowmom 2005. 171-176. DOI: 10.1109/WOWMOM.2005.51 |
0.689 |
|
2004 |
Carbunar B, Valente MT, Vitek J. Coordination and mobility in CoreLime Mathematical Structures in Computer Science. 14: 397-419. DOI: 10.1017/S0960129504004177 |
0.357 |
|
2004 |
Carbunar B, Ioannidis I, Nita-Rotaru C. JANUS: Towards robust and malicious resilient routing in hybrid wireless networks Proceedings of the 2004 Acm Workshop On Wireless Security, Wise. 11-20. |
0.668 |
|
2004 |
Carbunar B, Grama A, Vitek J. A public key algorithm for ad-hoc networks Ieee International Performance, Computing and Communications Conference, Proceedings. 23: 319-320. |
0.394 |
|
2004 |
Ioannidis I, Carbunar B. Scalable routing in hybrid cellular and ad-hoc networks 2004 Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 522-524. |
0.468 |
|
Show low-probability matches. |