Follow
Murtuza Jadliwala
Murtuza Jadliwala
Verified email at utsa.edu - Homepage
Title
Cited by
Cited by
Year
Quantifying trust in mobile ad-hoc networks
M Virendra, M Jadliwala, M Chandrasekaran, S Upadhyaya
International Conference on Integration of Knowledge Intensive Multi-Agent …, 2005
1612005
A distortion-based metric for location privacy
R Shokri, J Freudiger, M Jadliwala, JP Hubaux
Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, 21-30, 2009
1512009
Smartwatch-based keystroke inference attacks and context-aware protection mechanisms
A Maiti, O Armbruster, M Jadliwala, J He
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
1032016
Secure distance-based localization in the presence of cheating beacon nodes
M Jadliwala, S Zhong, SJ Upadhyaya, C Qiao, JP Hubaux
IEEE Transactions on mobile computing 9 (6), 810-823, 2010
782010
A game-theoretic analysis of shard-based permissionless blockchains
MH Manshaei, M Jadliwala, A Maiti, M Fooladgar
IEEE Access 6, 78100-78112, 2018
732018
Towards a theory of robust localization against malicious beacon nodes
S Zhong, M Jadliwala, S Upadhyaya, C Qiao
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1391-1399, 2008
712008
Privacy-preserving optimal meeting location determination on mobile devices
I Bilogrevic, M Jadliwala, V Joneja, K Kalkan, JP Hubaux, I Aad
IEEE transactions on information forensics and security 9 (7), 1141-1156, 2014
702014
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
I Bilogrevic, K Huguenin, B Agir, M Jadliwala, M Gazaki, JP Hubaux
Pervasive and Mobile Computing 25, 125-142, 2016
682016
Privacy in mobile computing for location-sharing-based services
I Bilogrevic, M Jadliwala, K Kalkan, JP Hubaux, I Aad
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
662011
Adaptive information-sharing for privacy-aware mobile social networks
I Bilogrevic, K Huguenin, B Agir, M Jadliwala, JP Hubaux
Proceedings of the 2013 ACM international joint conference on Pervasive and …, 2013
652013
Representation and analysis of coordinated attacks
S Braynov, M Jadliwala
Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003
642003
Side-channel inference attacks on mobile keypads using smartwatches
A Maiti, M Jadliwala, J He, I Bilogrevic
IEEE Transactions on Mobile Computing 17 (9), 2180-2194, 2018
602018
Security issues in next generation mobile networks: LTE and femtocells
I Bilogrevic, M Jadliwala, JP Hubaux
2nd international femtocell workshop, 2010
582010
Light ears: Information leakage via smart lights
A Maiti, M Jadliwala
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
532019
(Smart) watch your taps: Side-channel keystroke inference attacks using smartwatches
A Maiti, M Jadliwala, J He, I Bilogrevic
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 27-30, 2015
522015
Scalable meter data collection in smart grids through message concatenation
B Karimi, V Namboodiri, M Jadliwala
IEEE Transactions on Smart Grid 6 (4), 1697-1706, 2015
502015
Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks
L Bindschaedler, M Jadliwala, I Bilogrevic, I Aad, P Ginzboorg, V Niemi, ...
Proceedings of the 19th Annual Network & Distributed System Security …, 2012
472012
Preventing shoulder surfing using randomized augmented reality keyboards
A Maiti, M Jadliwala, C Weber
2017 IEEE international conference on pervasive computing and communications …, 2017
422017
Information leakage through mobile motion sensors: User awareness and concerns
K Crager, A Maiti
Proceedings of the European workshop on usable security (EuroUSEC), 2017
412017
Feasibility analysis for sybil attacks in shard-based permissionless blockchains
T Rajabi, AA Khalil, MH Manshaei, MA Rahman, M Dakhilalian, ...
Distributed Ledger Technologies: Research and Practice 2 (4), 1-21, 2023
392023
The system can't perform the operation now. Try again later.
Articles 1–20