Rahul Potharaju, Ph.D. - Publications

Affiliations: 
2014 Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science, Information Science, Information Technology

28 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Potharaju R, Rahman M, Carbunar B. A Longitudinal Study of Google Play Ieee Transactions On Computational Social Systems. 4: 135-149. DOI: 10.1109/Tcss.2017.2732167  0.92
2016 Hoque E, Lee H, Potharaju R, Killian C, Nita-Rotaru C. Automated Adversarial Testing of Unmodified Wireless Routing Implementations Ieee/Acm Transactions On Networking. DOI: 10.1109/Tnet.2016.2520474  0.92
2015 Miao R, Potharaju R, Yu M, Jain N. The dark menace: Characterizing network-based attacks in the cloud Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 2015: 169-182. DOI: 10.1145/2815675.2815707  0.92
2015 Carbunar B, Potharaju R. A longitudinal study of the Google app market Proceedings of the 2015 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2015. 242-249. DOI: 10.1145/2808797.2808823  0.92
2015 Hoque E, Potharaju R, Nita-Rotaru C, Sarkar S, Venkatesh SS. Taming epidemic outbreaks in mobile adhoc networks Ad Hoc Networks. 24: 57-72. DOI: 10.1016/j.adhoc.2014.07.031  0.92
2015 Potharaju R, Carbunar B, Azimpourkivi M, Vasudevan V, Iyengar SS. Infiltrating social network accounts: Attacks and defenses Secure System Design and Trustable Computing. 457-485. DOI: 10.1007/978-3-319-14971-4_15  0.92
2015 Potharaju R, Chan J, Hu L, Nita-Rotaru C, Wang M, Zhang L, Jain N. Confseer: Leveraging customer support knowledge bases for automated misconfiguration detection Proceedings of the Vldb Endowment. 8: 1828-1839.  0.92
2014 Newell A, Potharaju R, Xiang L, Nita-Rotaru C. On the practicality of integrity attacks on document-level sentiment analysis Proceedings of the Acm Conference On Computer and Communications Security. 2014: 83-93. DOI: 10.1145/2666652.2666661  0.92
2014 Carbunar B, Potharaju R, Pearce M, Vasudevan V, Needham M. Errata for: A Framework for Network Aware Caching for Video on Demand Systems Acm Transactions On Multimedia Computing, Communications, and Applications. 11: 23. DOI: 10.1145/2661298  0.92
2014 Carbunar B, Sion R, Potharaju R, Ehsan M. Private badges for geosocial networks Ieee Transactions On Mobile Computing. 13: 2382-2396. DOI: 10.1109/Tmc.2013.95  0.92
2014 Gates CS, Li N, Peng H, Sarma B, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I. Generating summary risk scores for mobile applications Ieee Transactions On Dependable and Secure Computing. 11: 238-251. DOI: 10.1109/Tdsc.2014.2302293  0.92
2014 Chen K, Choffnes DR, Potharaju R, Chen Y, Bustamante FE, Pei D, Zhao Y. Where the sidewalk ends: Extending theinternet as graph using traceroutesfrom P2P users Ieee Transactions On Computers. 63: 1021-1036. DOI: 10.1109/Tc.2013.149  0.92
2013 Potharaju R, Jain N. When the network crumbles: An empirical study of cloud network failures and their impact on services Proceedings of the 4th Annual Symposium On Cloud Computing, Socc 2013. DOI: 10.1145/2523616.2523638  0.92
2013 Carbunar B, Potharaju R, Pearce M, Vasudevan V, Needham M. A framework for network aware caching for video on demand systems Acm Transactions On Multimedia Computing, Communications and Applications. 9. DOI: 10.1145/2501643.2501652  0.92
2013 Potharaju R, Jain N. An empirical analysis of intra- and inter-datacenter network failures for geo-distributed services Performance Evaluation Review. 41: 335-336. DOI: 10.1145/2494232.2465749  0.92
2013 Hoque ME, Lee H, Potharaju R, Killian CE, Nita-Rotaru C. Adversarial testing of wireless routing implementations Wisec 2013 - Proceedings of the 6th Acm Conference On Security and Privacy in Wireless and Mobile Networks. 143-148. DOI: 10.1145/2462096.2462120  0.92
2013 Potharaju R, Jain N. Demystifying the dark side of the middle: A field study of middlebox failures in datacenters Proceedings of the Acm Sigcomm Internet Measurement Conference, Imc. 9-22.  0.92
2012 Peng H, Gates C, Sarma B, Li N, Qi Y, Potharaju R, Nita-Rotaru C, Molloy I. Using probabilistic generative models for ranking risks of Android apps Proceedings of the Acm Conference On Computer and Communications Security. 241-252. DOI: 10.1145/2382196.2382224  0.92
2012 Sarma B, Li N, Gates C, Potharaju R, Nita-Rotaru C, Molloy I. Android permissions: A perspective combining risks and benefits Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 13-22. DOI: 10.1145/2295136.2295141  0.92
2012 Carbunar B, Potharaju R, Pearce M, Vasudevan V. Network aware caching for video on demand systems 2012 Ieee International Symposium On a World of Wireless, Mobile and Multimedia Networks, Wowmom 2012 - Digital Proceedings. DOI: 10.1109/WoWMoM.2012.6263704  0.92
2012 Potharaju R, Hoque E, Nita-Rotaru C, Sarkar S, Venkatesh SS. Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks Mass 2012 - 9th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 200-208. DOI: 10.1109/MASS.2012.6502518  0.92
2012 Carbunar B, Potharaju R. You unlocked the Mt. Everest badge on foursquare! Countering location fraud in GeoSocial networks Mass 2012 - 9th Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 182-190. DOI: 10.1109/MASS.2012.6502516  0.92
2012 Carbunar B, Sion R, Potharaju R, Ehsan M. The shy mayor: Private badges in geosocial networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7341: 436-454. DOI: 10.1007/978-3-642-31284-7_26  0.92
2012 Potharaju R, Newell A, Nita-Rotaru C, Zhang X. Plagiarizing smartphone applications: Attack strategies and defense techniques Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7159: 106-120. DOI: 10.1007/978-3-642-28166-2_11  0.92
2011 Miller JS, Mondal A, Potharaju R, Dinda PA, Kuzmanovic A. Understanding end-user perception of network problems Proceedings of the 1st Acm Sigcomm Workshop On Measurements Up the Stack, W-Must'11. 43-48. DOI: 10.1145/2018602.2018613  0.92
2011 Potharaju R, Seibert J, Fahmy S, Nita-Rotaru C. Omnify: Investigating the visibility and effectiveness of copyright monitors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6579: 122-132. DOI: 10.1007/978-3-642-19260-9_13  0.92
2010 Potharaju R, Carbunar B, Nita-Rotaru C. IFriendU: Leveraging 3-cliques to enhance infiltration attacks in online social networks Proceedings of the Acm Conference On Computer and Communications Security. 723-725. DOI: 10.1145/1866307.1866410  0.92
2009 Chen K, Choffnes DR, Potharaju R, Chen Y, Bustamante FE, Pei D, Zhao Y. Where the sidewalk ends: Extending the internet as graph using traceroutes from P2P users Conext'09 - Proceedings of the 2009 Acm Conference On Emerging Networking Experiments and Technologies. 217-228. DOI: 10.1145/1658939.1658964  0.92
Show low-probability matches.