Murtuza S. Jadliwala, Ph.D.
Affiliations: | 2008 | Computer Science and Engineering | State University of New York, Buffalo, Buffalo, NY, United States |
Area:
Computer ScienceGoogle:
"Murtuza Jadliwala"Parents
Sign in to add mentorShambhu Upadhyaya | grad student | 2008 | SUNY Buffalo | |
(Security and robustness of localization techniques for emergency sensor networks.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Maiti A, Jadliwala M, He J, et al. (2018) Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches Ieee Transactions On Mobile Computing. 17: 2180-2194 |
Manshaei MH, Jadliwala M, Maiti A, et al. (2018) A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains Ieee Access. 6: 78100-78112 |
Vinayaga-Sureshkanth N, Maiti A, Jadliwala M, et al. (2018) A Practical Framework for Preventing Distracted Pedestrian-Related Incidents Using Wrist Wearables Ieee Access. 6: 78016-78030 |
Bagai R, Malik N, Jadliwala M. (2017) Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks Ieee Transactions On Information Forensics and Security. 12: 1156-1169 |
Bilogrevic I, Huguenin K, Agir B, et al. (2016) A machine-learning based approach to privacy-aware information-sharing in mobile social networks Pervasive and Mobile Computing. 25: 125-142 |
Karimi B, Namboodiri V, Jadliwala M. (2015) Scalable Meter Data Collection in Smart Grids Through Message Concatenation Ieee Transactions On Smart Grid |
Bilogrevic I, Jadliwala M, Joneja V, et al. (2014) Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices Ieee Transactions On Information Forensics and Security. 9: 1141-1156 |
Jadliwala M, Bilogrevic I, Hubaux J. (2013) Optimizing mix-zone coverage in pervasive wireless networks Journal of Computer Security. 21: 317-346 |
Freudiger J, Jadliwala M, Hubaux J, et al. (2013) Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks Mobile Networks and Applications. 18: 413-428 |
Bilogrevic I, Jadliwala M, Kumar P, et al. (2011) Meetings through the cloud: Privacy-preserving scheduling on mobile devices Journal of Systems and Software. 84: 1910-1927 |