Name
Affiliation
Papers
MURTUZA JADLIWALA
Wichita State University, Wichita, KS, USA
52
Collaborators
Citations 
PageRank 
71
266
25.26
Referers 
Referees 
References 
762
1339
692
Search Limit
1001000
Title
Citations
PageRank
Year
Write to know: on the feasibility of wrist motion based user-authentication from handwriting00.342021
Advances In Secure Knowledge Management In The Artificial Intelligence Era00.342021
Acoustics to the Rescue: Physical Key Inference Attack Revisited00.342021
TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles00.342021
Zoom On The Keystrokes: Exploiting Video Calls For Keystroke Inference Attacks10.372021
SMART LIGHT-BASED INFORMATION LEAKAGE ATTACKS00.342020
Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, SKM 2019, Goa, India, December 21-22, 2019, Proceedings00.342020
Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems.00.342020
Can Wearable Devices Facilitate A Drivers Brake Response Time In A Classic Car-Following Task ?00.342020
On Incentive Compatible Role-Based Reward Distribution in Algorand00.342020
Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach00.342019
TangleCV - Decentralized Technique for Secure Message Sharing in Connected Vehicles.00.342019
deWristified: handwriting inference using wrist-based motion sensors revisited00.342019
Side-Channel Inference Attacks on Mobile Keypads using Smartwatches.30.422018
Light Ears: Information Leakage via Smart Lights.30.382018
Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel.00.342018
A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables.00.342018
Towards A Practical Pedestrian Distraction Detection Framework Using Wearables00.342018
Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study.00.342018
A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains.20.372018
A Framework for Inferring Combination Lock Codes using Smartwatches.00.342017
Preventing Shoulder Surfing Using Randomized Augmented Reality Keyboards00.342017
Seer Grid: Privacy and Utility Implications of Two-Level Load Prediction in Smart Grids.10.352017
Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks.10.372017
A machine-learning based approach to privacy-aware information-sharing in mobile social networks.140.612016
Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms.130.552016
(Smart)watch your taps: side-channel keystroke inference attacks using smartwatches160.592015
Scalable Meter Data Collection in Smart Grids Through Message Concatenation70.482015
Optimal resource allocation in Cognitive Smart Grid Networks20.352015
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices110.562014
AgSec: Secure and efficient CDMA-based aggregation for smart metering systems00.342014
Social Puzzles: Context-Based Access Control in Online Social Networks00.342014
LocJam: A novel jamming-based approach to secure localization in wireless networks20.382014
On the scalable collection of metering data in smart grids through message concatenation.20.422013
Inferring social ties in pervasive networks: an on-campus comparative study30.412013
Inferring social ties in academic networks using short-range wireless communications60.462013
Optimizing mix-zone coverage in pervasive wireless networks30.392013
On the energy efficiency of dynamic spectrum access under dynamic channel conditions10.352013
Adaptive information-sharing for privacy-aware mobile social networks210.822013
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks20.382013
Big brother knows your friends: on privacy of social communities in pervasive networks50.432012
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.141.112012
Meetings through the cloud: Privacy-preserving scheduling on mobile devices140.702011
Optimizing mixing in pervasive networks: a graph-theoretic perspective50.552011
Privacy-preserving activity scheduling on mobile devices60.482011
Privacy in mobile computing for location-sharing-based services230.932011
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes80.672010
Towards a theory for securing time synchronization in wireless sensor networks30.542009
A distortion-based metric for location privacy441.782009
ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks20.392007
  • 1
  • 2