Publications

Copyright Notice: Please note that the copyright of these articles belong to their respective publishers. Due to the differences (and recent changes) of the various publisher's terms and conditions regarding posting of these articles online by the authors, I have decided not to post a copy of these articles online anymore. If you need a copy, please visit the website of the respective publisher or send me an email to request a copy. Please note that this copy will be provided solely for academic and non-commercial use.

Refereed Journals

  • Maiti, A., and Jadliwala, M., Light Ears: Information Leakage via Smart Lights , in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, Volume 3, Number 3, Article 98, 2019 (to be Presented at ACM UbiComp 2019, September 2019, London, UK).
  • Vinayaga-Sureshkanth, N., Maiti, A., Jadliwala, M., Crager, K., He, J., and Rathore, H., A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables, in IEEE Access, 2018.
  • Manshaei, M.H., Jadliwala, M., Maiti, A., and Fooladgar, M., A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains, in IEEE Access, 2018.
  • Maiti, A., Jadliwala, M., He, J., and Bilogrevic, I., Side-Channel Inference Attacks on Mobile Keypads using Smartwatches, in the IEEE Transactions on Mobile Computing, 2018.
  • He, J., McCarley, J., Crager, K., Jadliwala, M., and Hua, L., Do Wearable Devices Bring Distraction Closer to Drivers? Comparing Smartphones and Google Glass, in Applied Ergonomics, 2018.
  • Bagai, R., Malik, N., and Jadliwala, M., Measuring Anonymity of Pseudonymized Data after Probabilistic Background Attacks, in the IEEE Transactions on Information Forensics and Security, Vol. 12, Nr. 5, pp. 1156-1169, May 2017.
  • Boustani, A.; Maiti, A., Yousefian Jazi, S., Jadliwala, M., and Namboodiri, V., Seer Grid: Privacy and Utility Implications of Two-Level Load Prediction in Smart Grids, in the IEEE Transactions on Parallel and Distributed Systems, 2016.
  • Karimi, B., Namboodiri, V., and Jadliwala, M., Scalable Meter Data Collection in Smart Grids through Message Concatenation, in the IEEE Transactions on Smart Grids, 2015.
  • Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., and Hubaux, J-P., A Machine-Learning Based Approach to Privacy-Aware Information-Sharing in Mobile Social Networks, in Pervasive and Mobile Computing (PMC), Elsevier, 2015.
  • Bilogrevic, I.*, Jadliwala, M.*, Joneja, V., Kalkan, K., Hubaux, J.-P. and Aad, I., Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices , accepted in IEEE Transactions on Information Forensics and Security (TIFS), 2014. (* Equally Contributing Authors)
  • Jadliwala, M., Bilogrevic, I. and Hubaux, J-P., Optimizing Mix-zone Coverage in Pervasive Wireless Networks, in the Journal of Computer Security, Vol. 21, No. 3, pp. 317-346, 2013.
  • Freudiger, J., Jadliwala, M., Hubaux, J-P., Niemi, V., and Ginzboorg, P., Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks, ACM/Springer Mobile Networks and Applications (MONET): Special Issue on Context-Awareness of Mobile Systems, 2012.
  • Bilogrevic, I., Jadliwala, M., Kumar, P., Walia, SS., Hubaux, J-P., Aad, I. and Niemi, V., Meetings through the Cloud: Privacy-Preserving Scheduling on Mobile Devices, Elsevier Journal of Systems and Software, Special Issue on Mobile Applications: Status and Trends, Vol. 84, pp. 1910-1927, 2011.
  • Jadliwala, M., Zhong, S., Upadhyaya, S., Qiao, C. and Hubaux, J-P., Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes, IEEE Transactions on Mobile Computing (TMC), Vol. 9, Nr. 6, pp. 810-823, 2010.
  • Jadliwala, M., Duan, Q., Xu, J. and Upadhyaya, S., On Extracting Consistent Graphs in Wireless Sensor Networks, International Journal of Sensor Networks (IJSNET): Special Issue on Theoretical and Algorithmic Aspects in Sensor Networks, Vol. 2, Nos. 3/4, pp.149-162, 2007.

Refereed Conferences

  • Kumari, K., Jadliwala, M., Maiti, A., and Manshaei, M.H., Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach, in the proceedings of the Conference on Decision and Game Theory for Security (GameSec 2019), Stockholm, Sweden, October 2019.
  • Wijewickrama, R., Maiti, A., and Jadliwala, M., deWristified: Handwriting Inference Using Wrist-Based Motion Sensors Revisited, in the proceedings of the 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2019), Miami, US, May 2019.
  • Maiti, A., Heard, R., Sabra, M., and Jadliwala, M., Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel, in the proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2018), Stockholm, Sweden, June 2018.
  • Maiti, A., Armbruster, O., Jadliwala, M., and He, J., Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms , in the Proceedings of the 11th ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), Xi'an, China, May-June 2016.
  • Maiti, A., Jadliwala, M., He, J., and Bilogrevic, I., (Smart)Watch Your Taps: Side-Channel Keystroke Inference Attacks using Smartwatches , in the Proceedings of the 19th annual International Symposium on Wearable Computers (ISWC 2015), Osaka, Japan, 2015.
  • Boustani, A., Jadliwala, M., Kwon, H., and Alamatsaz, N., Optimal Resource Allocation in Cognitive Smart Grid Network, in the Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference (CCNC 2015), Las Vegas, Nevada, 2015.
  • Jadliwala, M., Maiti, A. and Namboodiri, V., Social Puzzles: Context-Based Access Control in Online Social Networks , in the Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2014), Atlanta, Georgia, USA, 2014.
  • Alamatsaz, N., Boustani, A., Jadliwala, M. and Namboodiri, V., AgSec: Secure and Efficient CDMA-based Aggregation for Smart Metering Systems, in the Proceedings of the 11th Annual IEEE Consumer Communications and Networking Conference (CCNC 2014), Las Vegas, Nevada, 2014.
  • Boustani, A., Alamatsaz, N., Jadliwala, M. and Namboodiri, V., LocJam: A Novel Jamming-based Approach to Secure Localization in Wireless Networks, in the Proceedings of the 11th Annual IEEE Consumer Communications and Networking Conference (CCNC 2014), Las Vegas, Nevada, 2014.
  • Karimi, B., Namboodiri, V. and Jadliwala, M., On the Scalable Collection of Metering Data in Smart Grids through Message Concatenation , in the Proceedings of the IEEE International Conference on Smart Grid Communications - Symposium on Communication Networks for Smart Grids and Smart Metering (SmartGridComm 2013), Vancouver, Canada, 2013.
  • Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M. and Hubaux, J-P., Adaptive Information-Sharing for Privacy-Aware Mobile Social Networks, in the Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), Zurich, Switzerland, 2013.
  • Badruddoza, A., Namboodiri, V. and Jadliwala, M., On the Energy Efficiency of Dynamic Spectrum Access under Dynamic Channel Conditions , in the Proceedings of the International Conference on Cognitive Radio Oriented Wireless Networks (CROWNCOM 2013), Washington DC, 2013.
  • Bilogrevic, I., Jadliwala, M., Lam, I., Aad, I., Ginzboorg, P., Niemi, V., Bindschaedler, L., and Hubaux, J-P., Big Brother Knows Your Friends: on Privacy of Social Communities in Pervasive Networks, in the Proceedings of the 10th International Conference on Pervasive Computing (PERVASIVE 2012), Newcastle, UK, 2012.
  • Bindschaedler*, L., Jadliwala*, M., Bilogrevic, I., Aad, I., Ginzboorg, P., Niemi, V. and Hubaux, J-P., Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks, in the Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS 2012), San Diego, USA, 2012 (* Equally Contributing Authors).
  • Jadliwala, M., Bilogrevic, I. and Hubaux, J-P., Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective, in the Proceedings of the 16th European Symposium on Research in Computer Security (ESORICS 2011), Leuven, Belgium, 2011.
  • Bilogrevic, I., Jadliwala, M., Kalkan, K., Hubaux, J-P. and Aad, I., Privacy in Mobile Computing for Location-Sharing-Based Services, in the Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), Waterloo, Ontario, 2011.
  • Bilogrevic, I., Jadliwala, M., Hubaux, J-P., Aad, I. and Niemi, V., Privacy-Preserving Activity Scheduling on Mobile Devices, in the Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY 2011), San Antonio, Texas, 2011.
  • Jadliwala, M., Duan, Q., Upadhyaya, S. and Xu, J., Towards a Theory for Securing Time Synchronization in Wireless Sensor Networks, in the Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec 2009), pages: 201-212, Zurich, Switzerland, 2009.
  • Zhong, S., Jadliwala, M., Upadhyaya, S. and Qiao, C., Towards a Theory of Robust Localization against Malicious Beacon Nodes, in the Proceedings of The 27th IEEE International Conference on Computer Communication (INFOCOM 2008), pages: 1391-1399, Phoenix, Arizona, April 15-17, 2008.
  • Jadliwala, M., Upadhyaya, S. and Taneja, M., ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks, in the Proceedings of The 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007), pages: 3-12, Beijing, CHINA, October 10-12, 2007.
  • Virendra M., Jadliwala M., Chandrasekaran M., Upadhyaya S., Quantifying Trust in Mobile Ad-Hoc Networks, In Proceedings of the IEEE International Conference on Integration of Knowledge Intensive Multi-agent Systems (KIMAS 2005), Waltham, MA, Apr 2005, pp. 65-71.
  • Braynov, S. and Jadliwala, M. 2004. Detecting Malicious Groups of Agents, in proceedings of the 1st IEEE Symposium on Multi-agent Security and Survivability, Drexel University, Philadelphia, PA, USA, 2004.

Refereed Workshops

  • Rathore, H., Samant, A., Jadliwala, M., and Mohamed, A., TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles, in the proceedings of the ACM Workshop on Automotive Cybersecurity (AutoSec 2019), In conjuction with ACM CODASPY 2019, Dallas, Texas, March 2019.
  • Sabra, M., Maiti, A., and Jadliwala, M., Keystroke Inference Using Ambient Light Sensor on Wrist-Wearables: A Feasibility Study, in the Proceedings of the 4th Workshop on Wearable Systems and Applications (WearSys), colocated with ACM MobiSys 2018, Munich, Germany, June 2018.
  • Vinayaga-Sureshkanth, N., Maiti, A., Jadliwala, M., Crager, K., He, J., and Rathore, H., Towards a Practical Pedestrian Distraction Detection Framework using Wearables, in the Proceedings of the Workshop on Sensing Systems and Applications Using Wrist Worn Smart Devices (WristSense), colocated with IEEE PerCom, 2018. (Best Paper Award)
  • Crager, K., Maiti, A., Jadliwala, M., He, J., Information Leakage through Mobile Motion Sensors: User Awareness and Concerns, in the Proceedings of the 2nd European Workshop on Usable Security, colocated with Euro S&P, 2017.
  • Maiti, A., Crager, K., Jadliwala, M., He, J., Kwiat, K., Kamhoua, C., RandomPad: Usability of Randomized Mobile Keypads for Defeating Inference Attacks, in the Proceedings of the 2nd International Workshop on Innovations in Mobile Privacy and Security (IMPS), colocated with Euro S&P, 2017.
  • Maiti, A., Jadliwala, M., Weber, C., Preventing Shoulder Surfing using Randomized Augmented Reality Keyboards, in the Proceedings of the 2nd IEEE PerCom Workshop on Security, Privacy and Trust in the Internet of Things (SPT-IOT), 2017.
  • Bilogrevic, I., Huguenin, K., Jadliwala, M., Lopez, F., Hubaux, J-P., Ginzboorg, P. and Niemi, V., Inferring Social Ties in Academic Networks Using Short-Range Wireless Communications, in the Proceedings of the 2013 ACM Workshop on Privacy in the Electronic Society (WPES 2013), Berlin, Germany, 2013.
  • Jadliwala, M., Freudiger, J., Aad, I., Hubaux, J-P. and Niemi, V., Privacy-Triggered Communications in Pervasive Social Networks, in the Proceedings of the 5th IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC 2011), Lucca, Italy, 2011.
  • Shokri, R., Freudiger, J., Jadliwala, M. and Hubaux, J-P., A Distortion-based Metric for Location Privacy, in the Proceedings of the ACM Workshop on Privacy in the Electronic Society (WPES), Chicago, USA, 2009.
  • Jadliwala, M., Upadhyaya, S., Rao, H.R. and Sharman, R. Security and Dependability Issues in Location Estimation for Emergency Sensor Networks, The Fourth Workshop on e-Business (WeB 2005), Venetian, Las Vegas, Nevada, USA, 2005.
  • Braynov, S. and Jadliwala, M. Representation and Analysis of Coordinated Attacks, in the Proceedings of The ACM Workshop on Formal Methods in Security Engineering (FMSE), pp.43-51, Washington D.C., USA, 2003.

Posters/Demos

  • Bilogrevic, I., Huguenin, K., Jadliwala, M., Florent Lopez, Hubaux, J-P., Ginzboorg, P. and Niemi, V. Poster and Extended Abstract: Inferring Social Ties in Pervasive Networks: An On-campus Comparative Study, in the proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013), Zurich, Switzerland, 2013.
  • Jadliwala, M., Freudiger, J., Aad, I., Hubaux, J-P. and Niemi, V., Privacy-Triggered Communications in Pervasive Social Networks, at the 8th Annual International Conference on Mobile Systems, Applications and Services (ACM MobiSys), San Francisco, USA, June 15 2010.
  • Bilogrevic, I., Jadliwala, M. and Hubaux, J-P., Security Issues in Next Generation Mobile Networks: LTE and Femtocells, at the 2nd International Femtocell Workshop, Luton, UK, June 21, 2010.

Patents

  • Aad, I., Bilogrevic, I., Cristofaro, E., Durussel, A., Hubaux, J-P., Jadliwala, M., Niemi, V., Methods for preserving privacy in automated meeting scheduling, 13/032309, 2011 (Date filed: 22-Feb-2011).
  • Aad, I., Freudiger, J., Jadliwala, M., Hubaux, J-P. and Raya, M., Privacy-Triggered Communications, 12/718521, 2010 (Date filed: 05-Mar-2010).