Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
geoffrey e hinton
Osama E. Gouda
Claudia Calabrese
Özgür Erçetin
Hao Mao
Peter Malec
Yassine Bessadi
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
JULINDA STEFA
Author Info
Open Visualization
Name
Affiliation
Papers
JULINDA STEFA
Univ Roma La Sapienza, Dept Comp Sci, Rome, Italy
35
Collaborators
Citations
PageRank
60
477
25.18
Referers
Referees
References
1316
725
389
Search Limit
100
1000
Publications (35 rows)
Collaborators (60 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
GDPR: When the Right to Access Personal Data Becomes a Threat
1
0.35
2020
A Light in the Dark Web: Linking Dark Web Aliases to Real Internet Identities
0
0.34
2020
Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations
0
0.34
2020
Bot and Gender Detection of Twitter Accounts Using Distortion and LSA.
0
0.34
2019
Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.
0
0.34
2019
Catch me if you can - how geo-indistinguishability affects utility in mobility-based geographic datasets.
0
0.34
2019
Scan-and-Pay on Android is Dangerous.
0
0.34
2019
Time-Zone Geolocation of Crowds in the Dark Web
1
0.36
2018
Uncovering hidden social relationships through location-based services: The Happn case study
0
0.34
2018
Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System
1
0.36
2017
Anonymous end-to-end communications in adversarial mobile clouds.
2
0.37
2017
Using hover to compromise the confidentiality of user input on Android
1
0.35
2017
Count on me: Reliable broadcast and efficient routing in DTNs through social skeletons.
0
0.34
2016
Mind Your Probes: De-Anonymization Of Large Crowds Through Smartphone Wifi Probe Requests
6
0.53
2016
Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study.
64
1.59
2016
Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android.
0
0.34
2016
Social-Aware Stateless Routingin Pocket Switched Networks
20
0.63
2015
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments
15
0.75
2014
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system
19
0.97
2014
Data offloading in social mobile networks through VIP delegation.
19
0.72
2014
Large-Scale Synthetic Social Mobile Networks with SWIM
28
0.79
2014
Preserving Smartphone Users' Anonymity in Cloudy Days.
4
0.46
2013
Supporting interoperability of things in IoT systems
0
0.34
2013
Signals from the crowd: uncovering social relationships through smartphone probes
43
1.93
2013
StreamSmart: P2P video streaming for smartphones through the cloud
1
0.39
2013
To Offload Or Not To Offload? The Bandwidth And Energy Costs Of Mobile Cloud Computing
107
3.81
2013
Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud.
8
0.63
2013
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals
46
1.62
2012
CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud
3
0.45
2012
Social-aware stateless forwarding in pocket switched networks.
28
0.84
2011
Social-aware forwarding improves routing performance in pocket switched networks
7
0.58
2011
VIP delegation: Enabling VIPs to offload data in wireless social mobile networks
5
0.48
2011
Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking
32
1.81
2010
Routing in Outer Space: Fair Traffic Load in Multihop Wireless Networks
16
0.69
2009
Routing in Outer Space: Improved Security and Energy-Efficiency in Multi-Hop Wireless Networks
0
0.34
2007
1