Follow
Murtuza Jadliwala
Murtuza Jadliwala
Verified email at utsa.edu - Homepage
Title
Cited by
Cited by
Year
Quantifying trust in mobile ad-hoc networks
M Virendra, M Jadliwala, M Chandrasekaran, S Upadhyaya
International Conference on Integration of Knowledge Intensive Multi-Agent …, 2005
1592005
A distortion-based metric for location privacy
R Shokri, J Freudiger, M Jadliwala, JP Hubaux
Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, 21-30, 2009
1512009
Smartwatch-based keystroke inference attacks and context-aware protection mechanisms
A Maiti, O Armbruster, M Jadliwala, J He
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
822016
Secure distance-based localization in the presence of cheating beacon nodes
M Jadliwala, S Zhong, SJ Upadhyaya, C Qiao, JP Hubaux
IEEE Transactions on mobile computing 9 (6), 810-823, 2010
792010
Towards a theory of robust localization against malicious beacon nodes
S Zhong, M Jadliwala, S Upadhyaya, C Qiao
IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 1391-1399, 2008
712008
Privacy-preserving optimal meeting location determination on mobile devices
I Bilogrevic, M Jadliwala, V Joneja, K Kalkan, JP Hubaux, I Aad
IEEE transactions on information forensics and security 9 (7), 1141-1156, 2014
692014
Adaptive information-sharing for privacy-aware mobile social networks
I Bilogrevic, K Huguenin, B Agir, M Jadliwala, JP Hubaux
Proceedings of the 2013 ACM international joint conference on Pervasive and …, 2013
642013
Privacy in mobile computing for location-sharing-based services
I Bilogrevic, M Jadliwala, K Kalkan, JP Hubaux, I Aad
Privacy Enhancing Technologies: 11th International Symposium, PETS 2011 …, 2011
642011
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
I Bilogrevic, K Huguenin, B Agir, M Jadliwala, M Gazaki, JP Hubaux
Pervasive and Mobile Computing 25, 125-142, 2016
632016
Representation and analysis of coordinated attacks
S Braynov, M Jadliwala
Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003
632003
A game-theoretic analysis of shard-based permissionless blockchains
MH Manshaei, M Jadliwala, A Maiti, M Fooladgar
IEEE Access 6, 78100-78112, 2018
592018
Security issues in next generation mobile networks: LTE and femtocells
I Bilogrevic, M Jadliwala, JP Hubaux
2nd international femtocell workshop, 2010
572010
Side-channel inference attacks on mobile keypads using smartwatches
A Maiti, M Jadliwala, J He, I Bilogrevic
IEEE Transactions on Mobile Computing 17 (9), 2180-2194, 2018
502018
Scalable meter data collection in smart grids through message concatenation
B Karimi, V Namboodiri, M Jadliwala
IEEE Transactions on Smart Grid 6 (4), 1697-1706, 2015
482015
(Smart) watch your taps: Side-channel keystroke inference attacks using smartwatches
A Maiti, M Jadliwala, J He, I Bilogrevic
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 27-30, 2015
472015
Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks
L Bindschaedler, M Jadliwala, I Bilogrevic, I Aad, P Ginzboorg, V Niemi, ...
Proceedings of the 19th Annual Network & Distributed System Security …, 2012
462012
Light ears: Information leakage via smart lights
A Maiti, M Jadliwala
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2019
402019
Method and apparatus for triggering user communications based on privacy information
I Aad, J Freudiger, M Jadliwala, JP Hubaux, M Raya, K Leppänen, ...
US Patent App. 12/718,521, 2011
392011
Information leakage through mobile motion sensors: User awareness and concerns
K Crager, A Maiti
Proceedings of the European Workshop on Usable Security (EuroUSEC), 2017
382017
Does wearable device bring distraction closer to drivers? Comparing smartphones and Google Glass
J He, JS McCarley, K Crager, M Jadliwala, L Hua, S Huang
Applied ergonomics 70, 156-166, 2018
362018
The system can't perform the operation now. Try again later.
Articles 1–20