Year |
Citation |
Score |
2018 |
Maiti A, Jadliwala M, He J, Bilogrevic I. Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches Ieee Transactions On Mobile Computing. 17: 2180-2194. DOI: 10.1109/Tmc.2018.2794984 |
0.323 |
|
2018 |
Manshaei MH, Jadliwala M, Maiti A, Fooladgar M. A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains Ieee Access. 6: 78100-78112. DOI: 10.1109/Access.2018.2884764 |
0.336 |
|
2018 |
Vinayaga-Sureshkanth N, Maiti A, Jadliwala M, Crager K, He J, Rathore H. A Practical Framework for Preventing Distracted Pedestrian-Related Incidents Using Wrist Wearables Ieee Access. 6: 78016-78030. DOI: 10.1109/Access.2018.2884669 |
0.386 |
|
2017 |
Bagai R, Malik N, Jadliwala M. Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks Ieee Transactions On Information Forensics and Security. 12: 1156-1169. DOI: 10.1109/Tifs.2017.2656458 |
0.324 |
|
2016 |
Bilogrevic I, Huguenin K, Agir B, Jadliwala M, Gazaki M, Hubaux J. A machine-learning based approach to privacy-aware information-sharing in mobile social networks Pervasive and Mobile Computing. 25: 125-142. DOI: 10.1016/J.Pmcj.2015.01.006 |
0.326 |
|
2015 |
Karimi B, Namboodiri V, Jadliwala M. Scalable Meter Data Collection in Smart Grids Through Message Concatenation Ieee Transactions On Smart Grid. DOI: 10.1109/Tsg.2015.2426020 |
0.401 |
|
2014 |
Bilogrevic I, Jadliwala M, Joneja V, Kalkan K, Hubaux J, Aad I. Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices Ieee Transactions On Information Forensics and Security. 9: 1141-1156. DOI: 10.1109/Tifs.2014.2318435 |
0.385 |
|
2013 |
Jadliwala M, Bilogrevic I, Hubaux J. Optimizing mix-zone coverage in pervasive wireless networks Journal of Computer Security. 21: 317-346. DOI: 10.3233/Jcs-130465 |
0.408 |
|
2013 |
Freudiger J, Jadliwala M, Hubaux J, Niemi V, Ginzboorg P. Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks Mobile Networks and Applications. 18: 413-428. DOI: 10.1007/S11036-012-0406-Y |
0.344 |
|
2011 |
Bilogrevic I, Jadliwala M, Kumar P, Walia SS, Hubaux J, Aad I, Niemi V. Meetings through the cloud: Privacy-preserving scheduling on mobile devices Journal of Systems and Software. 84: 1910-1927. DOI: 10.1016/J.Jss.2011.04.027 |
0.396 |
|
2010 |
Jadliwala M, Zhong S, Upadhyaya SJ, Qiao C, Hubaux J. Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes Ieee Transactions On Mobile Computing. 9: 810-823. DOI: 10.1109/Tmc.2010.20 |
0.324 |
|
2007 |
Jadliwala M, Duan Q, Xu J, Upadhyaya S. On extracting consistent graphs in wireless sensor networks International Journal of Sensor Networks. 2: 149-162. DOI: 10.1504/Ijsnet.2007.013195 |
0.451 |
|
Show low-probability matches. |