Publications

Copyright Notice: Please note that the copyright of these articles belong to their respective publishers. Due to the differences (and recent changes) of the various publisher's terms and conditions regarding posting of these articles online by the authors, I have decided not to post a copy of these articles online anymore. If you need a copy, please visit the website of the respective publisher or send me an email to request a copy. Please note that this copy will be provided solely for academic and non-commercial use.

Refereed Journals

  • Bagai, R., Malik, N., and M. Jadliwala, Measuring Anonymity of Pseudonymized Data after Probabilistic Background Attacks, in the IEEE Transactions on Information Forensics and Security, 2017 (To Appear).
  • Boustani, A.; Maiti, A., Yousefian Jazi, S., Jadliwala, M., Namboodiri, V., Seer Grid: Privacy and Utility Implications of Two-Level Load Prediction in Smart Grids, in the IEEE Transactions on Parallel and Distributed Systems, 2016.
  • Karimi, B., Namboodiri, V., and Jadliwala, M., Scalable Meter Data Collection in Smart Grids through Message Concatenation, in the IEEE Transactions on Smart Grids, 2015.
  • Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., and Hubaux, J-P., A Machine-Learning Based Approach to Privacy-Aware Information-Sharing in Mobile Social Networks, in Pervasive and Mobile Computing (PMC), Elsevier, 2015.
  • Bilogrevic, I.*, Jadliwala, M.*, Joneja, V., Kalkan, K., Hubaux, J.-P. and Aad, I., Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices , accepted in IEEE Transactions on Information Forensics and Security (TIFS), 2014. (* Equally Contributing Authors)
  • Jadliwala, M., Bilogrevic, I. and Hubaux, J-P., Optimizing Mix-zone Coverage in Pervasive Wireless Networks, in the Journal of Computer Security, Vol. 21, No. 3, pp. 317-346, 2013.
  • Freudiger, J., Jadliwala, M., Hubaux, J-P., Niemi, V., and Ginzboorg, P., Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks, ACM/Springer Mobile Networks and Applications (MONET): Special Issue on Context-Awareness of Mobile Systems, 2012.
  • Bilogrevic, I., Jadliwala, M., Kumar, P., Walia, SS., Hubaux, J-P., Aad, I. and Niemi, V., Meetings through the Cloud: Privacy-Preserving Scheduling on Mobile Devices, Elsevier Journal of Systems and Software, Special Issue on Mobile Applications: Status and Trends, Vol. 84, pp. 1910-1927, 2011.
  • Jadliwala, M., Zhong, S., Upadhyaya, S., Qiao, C. and Hubaux, J-P., Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes, IEEE Transactions on Mobile Computing (TMC), Vol. 9, Nr. 6, pp. 810-823, 2010.
  • Jadliwala, M., Duan, Q., Xu, J. and Upadhyaya, S., On Extracting Consistent Graphs in Wireless Sensor Networks, International Journal of Sensor Networks (IJSNET): Special Issue on Theoretical and Algorithmic Aspects in Sensor Networks, Vol. 2, Nos. 3/4, pp.149-162, 2007.

Refereed Conferences

  • Maiti, A., Armbruster, O., Jadliwala, M., and He, J., Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms , accepted for publication in the 11th ACM Asia Conference on Computer and Communications Security (ASIACCS), Xi'an, China, May-June 2016.
  • Maiti, A., Jadliwala, M., He, J., and Bilogrevic, I., (Smart)Watch Your Taps: Side-Channel Keystroke Inference Attacks using Smartwatches , accepted for publication in the 19th annual International Symposium on Wearable Computers (ISWC), Osaka, Japan, 2015.
  • Boustani, A., Jadliwala, M., Kwon, H., and Alamatsaz, N., Optimal Resource Allocation in Cognitive Smart Grid Network, in the proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC 2015), Las Vegas, Nevada, 2015.
  • Jadliwala, M., Maiti, A. and Namboodiri, V., Social Puzzles: Context-Based Access Control in Online Social Networks , accepted for publication in the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Atlanta, Georgia, USA, 2014.
  • Alamatsaz, N., Boustani, A., Jadliwala, M. and Namboodiri, V., AgSec: Secure and Efficient CDMA-based Aggregation for Smart Metering Systems, in the proceedings of the 11th Annual IEEE Consumer Communications and Networking Conference (CCNC 2014), Las Vegas, Nevada, 2014.
  • Boustani, A., Alamatsaz, N., Jadliwala, M. and Namboodiri, V., LocJam: A Novel Jamming-based Approach to Secure Localization in Wireless Networks, in the proceedings of the 11th Annual IEEE Consumer Communications and Networking Conference (CCNC 2014), Las Vegas, Nevada, 2014.
  • Karimi, B., Namboodiri, V. and Jadliwala, M., On the Scalable Collection of Metering Data in Smart Grids through Message Concatenation , in the proceedings of the IEEE International Conference on Smart Grid Communications - Symposium on Communication Networks for Smart Grids and Smart Metering (SmartGridComm 2013), Vancouver, Canada, 2013.
  • Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M. and Hubaux, J-P., Adaptive Information-Sharing for Privacy-Aware Mobile Social Networks, in the proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), Zurich, Switzerland, 2013.
  • Badruddoza, A., Namboodiri, V. and Jadliwala, M., On the Energy Efficiency of Dynamic Spectrum Access under Dynamic Channel Conditions , in the proceedings of the 2013 International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM 2013), Washington DC, 2013.
  • Bilogrevic, I., Jadliwala, M., Lam, I., Aad, I., Ginzboorg, P., Niemi, V., Bindschaedler, L., and Hubaux, J-P., Big Brother Knows Your Friends: on Privacy of Social Communities in Pervasive Networks, in the Proceedings of the 10th International Conference on Pervasive Computing (PERVASIVE 2012), Newcastle, UK, 2012.
  • Bindschaedler*, L., Jadliwala*, M., Bilogrevic, I., Aad, I., Ginzboorg, P., Niemi, V. and Hubaux, J-P., Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks, in the Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS 2012), San Diego, USA, 2012 (* Equally Contributing Authors).
  • Jadliwala, M., Bilogrevic, I. and Hubaux, J-P., Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective, in the Proceedings of the 16th European Symposium on Research in Computer Security (ESORICS 2011), Leuven, Belgium, 2011.
  • Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, J-P. and Aad, I., Privacy in Mobile Computing for Location-Sharing-Based Services, in the Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), Waterloo, Ontario, 2011.
  • Bilogrevic, I., Jadliwala, M., Hubaux, J-P., Aad, I. and Niemi, V., Privacy-Preserving Activity Scheduling on Mobile Devices, in the Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), San Antonio, Texas, 2011.
  • Jadliwala, M., Duan, Q., Upadhyaya, S. and Xu, J., Towards a Theory for Securing Time Synchronization in Wireless Sensor Networks, in the Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec 2009), pages: 201-212, Zurich, Switzerland, 2009.
  • Zhong, S., Jadliwala, M., Upadhyaya, S. and Qiao, C., Towards a Theory of Robust Localization against Malicious Beacon Nodes, in the Proceedings of The 27th IEEE International Conference on Computer Communication (INFOCOM 2008), pages: 1391-1399, Phoenix, Arizona, April 15-17, 2008.
  • Jadliwala, M., Upadhyaya, S. and Taneja, M., ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks, in the Proceedings of The 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), pages: 3-12, Beijing, CHINA, October 10-12, 2007.
  • Virendra M., Jadliwala M., Chandrasekaran M., Upadhyaya S., Quantifying Trust in Mobile Ad-Hoc Networks, In Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-agent Systems (KIMAS’05), Waltham, MA, Apr 2005, pp. 65-71.
  • Braynov, S. and Jadliwala, M. 2004. Detecting Malicious Groups of Agents, in proceedings of the 1st IEEE Symposium on Multi-agent Security and Survivability, Drexel University, Philadelphia, PA, USA, 2004.

Refereed Workshops

  • Crager, K., Maiti, A., Jadliwala, M., He, J., Information Leakage through Mobile Motion Sensors: User Awareness and Concerns, in the Proceedings of the 2nd European Workshop on Usable Security, colocated with Euro S&P, 2017.
  • Maiti, A., Crager, K., Jadliwala, M., He, J., Kwiat, K., Kamhoua, C., RandomPad: Usability of Randomized Mobile Keypads for Defeating Inference Attacks, in the Proceedings of the 2nd International Workshop on Innovations in Mobile Privacy and Security (IMPS), colocated with Euro S&P, 2017.
  • Maiti, A., Jadliwala, M., Weber, C., Preventing Shoulder Surfing using Randomized Augmented Reality Keyboards, in the Proceedings of the 2nd IEEE PerCom Workshop on Security, Privacy and Trust in the Internet of Things (SPT-IOT), 2017.
  • Bilogrevic, I., Huguenin, K., Jadliwala, M., Lopez, F., Hubaux, J-P., Ginzboorg, P. and Niemi, V., Inferring Social Ties in Academic Networks Using Short-Range Wireless Communications, in the Proceedings of the 2013 ACM Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany, 2013.
  • Jadliwala, M., Freudiger, J., Aad, I., Hubaux, J-P. and Niemi, V., Privacy-Triggered Communications in Pervasive Social Networks, in the Proceedings of the 5th IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2011), Lucca, Italy, 2011.
  • Shokri, R., Freudiger, J., Jadliwala, M. and Hubaux, J-P., A Distortion-based Metric for Location Privacy, in the Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES), Chicago, USA, 2009.
  • Jadliwala, M., Upadhyaya, S., Rao, H.R. and Sharman, R. Security and Dependability Issues in Location Estimation for Emergency Sensor Networks, The Fourth Workshop on e-Business (WeB 2005), Venetian, Las Vegas, Nevada, USA, 2005.
  • Braynov, S. and Jadliwala, M. Representation and Analysis of Coordinated Attacks, in the Proceedings of The ACM Workshop on Formal Methods in Security Engineering (FMSE), pp.43-51, Washington D.C., USA, 2003.

Posters/Demos

  • Bilogrevic, I., Huguenin, K., Jadliwala, M., Florent Lopez, Hubaux, J-P., Ginzboorg, P. and Niemi, V. Poster and Extended Abstract: Inferring Social Ties in Pervasive Networks: An On-campus Comparative Study, in the proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), Zurich, Switzerland, 2013.
  • Jadliwala, M., Freudiger, J., Aad, I., Hubaux, J-P. and Niemi, V., Privacy-Triggered Communications in Pervasive Social Networks, at the 8th Annual International Conference on Mobile Systems, Applications and Services (ACM MobiSys), San Francisco, USA, June 15 2010.
  • Bilogrevic, I., Jadliwala, M. and Hubaux, J-P., Security Issues in Next Generation Mobile Networks: LTE and Femtocells, at the 2nd International Femtocell Workshop, Luton, UK, June 21, 2010.

Patents

  • Aad, I., Bilogrevic, I., Cristofaro, E., Durussel, A., Hubaux, J-P., Jadliwala, M., Niemi, V., Methods for preserving privacy in automated meeting scheduling, 13/032309, 2011 (Date filed: 22-Feb-2011).
  • Aad, I., Freudiger, J., Jadliwala, M., Hubaux, J-P. and Raya, M., Privacy-Triggered Communications, 12/718521, 2010 (Date filed: 05-Mar-2010).