Quantifying trust in mobile ad-hoc networks M Virendra, M Jadliwala, M Chandrasekaran, S Upadhyaya International Conference on Integration of Knowledge Intensive Multi-Agent …, 2005 | 161 | 2005 |
A distortion-based metric for location privacy R Shokri, J Freudiger, M Jadliwala, JP Hubaux Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, 21-30, 2009 | 151 | 2009 |
Smartwatch-based keystroke inference attacks and context-aware protection mechanisms A Maiti, O Armbruster, M Jadliwala, J He Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 103 | 2016 |
Secure distance-based localization in the presence of cheating beacon nodes M Jadliwala, S Zhong, SJ Upadhyaya, C Qiao, JP Hubaux IEEE Transactions on mobile computing 9 (6), 810-823, 2010 | 78 | 2010 |
A game-theoretic analysis of shard-based permissionless blockchains MH Manshaei, M Jadliwala, A Maiti, M Fooladgar IEEE Access 6, 78100-78112, 2018 | 73 | 2018 |
Towards a theory of robust localization against malicious beacon nodes S Zhong, M Jadliwala, S Upadhyaya, C Qiao IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1391-1399, 2008 | 71 | 2008 |
Privacy-preserving optimal meeting location determination on mobile devices I Bilogrevic, M Jadliwala, V Joneja, K Kalkan, JP Hubaux, I Aad IEEE transactions on information forensics and security 9 (7), 1141-1156, 2014 | 70 | 2014 |
A machine-learning based approach to privacy-aware information-sharing in mobile social networks I Bilogrevic, K Huguenin, B Agir, M Jadliwala, M Gazaki, JP Hubaux Pervasive and Mobile Computing 25, 125-142, 2016 | 68 | 2016 |
Privacy in mobile computing for location-sharing-based services I Bilogrevic, M Jadliwala, K Kalkan, JP Hubaux, I Aad Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011 | 66 | 2011 |
Adaptive information-sharing for privacy-aware mobile social networks I Bilogrevic, K Huguenin, B Agir, M Jadliwala, JP Hubaux Proceedings of the 2013 ACM international joint conference on Pervasive and …, 2013 | 65 | 2013 |
Representation and analysis of coordinated attacks S Braynov, M Jadliwala Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003 | 64 | 2003 |
Side-channel inference attacks on mobile keypads using smartwatches A Maiti, M Jadliwala, J He, I Bilogrevic IEEE Transactions on Mobile Computing 17 (9), 2180-2194, 2018 | 60 | 2018 |
Security issues in next generation mobile networks: LTE and femtocells I Bilogrevic, M Jadliwala, JP Hubaux 2nd international femtocell workshop, 2010 | 58 | 2010 |
Light ears: Information leakage via smart lights A Maiti, M Jadliwala Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019 | 53 | 2019 |
(Smart) watch your taps: Side-channel keystroke inference attacks using smartwatches A Maiti, M Jadliwala, J He, I Bilogrevic Proceedings of the 2015 ACM International Symposium on Wearable Computers, 27-30, 2015 | 52 | 2015 |
Scalable meter data collection in smart grids through message concatenation B Karimi, V Namboodiri, M Jadliwala IEEE Transactions on Smart Grid 6 (4), 1697-1706, 2015 | 50 | 2015 |
Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks L Bindschaedler, M Jadliwala, I Bilogrevic, I Aad, P Ginzboorg, V Niemi, ... Proceedings of the 19th Annual Network & Distributed System Security …, 2012 | 47 | 2012 |
Preventing shoulder surfing using randomized augmented reality keyboards A Maiti, M Jadliwala, C Weber 2017 IEEE international conference on pervasive computing and communications …, 2017 | 42 | 2017 |
Information leakage through mobile motion sensors: User awareness and concerns K Crager, A Maiti Proceedings of the European workshop on usable security (EuroUSEC), 2017 | 41 | 2017 |
Feasibility analysis for sybil attacks in shard-based permissionless blockchains T Rajabi, AA Khalil, MH Manshaei, MA Rahman, M Dakhilalian, ... Distributed Ledger Technologies: Research and Practice 2 (4), 1-21, 2023 | 39 | 2023 |