Murtuza Jadliwala

Orcid: 0000-0001-9316-1943

Affiliations:
  • University of Texas at San Antonio, TX, USA


According to our database1, Murtuza Jadliwala authored at least 77 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Promptly Yours? A Human Subject Study on Prompt Inference in AI-Generated Art.
CoRR, 2024

Unintentional Security Flaws in Code: Automated Defense via Root Cause Analysis.
CoRR, 2024

Spiking Neural Networks in Vertical Federated Learning: Performance Trade-offs.
CoRR, 2024

We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating LLMs.
CoRR, 2024

Causative Insights into Open Source Software Security using Large Language Code Embeddings and Semantic Vulnerability Graph.
CoRR, 2024

De-anonymizing VR Avatars using Non-VR Motion Side-channels.
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

MirageFlow: A New Bandwidth Inflation Attack on Tor.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Towards a Game-Theoretic Understanding of Explanation-Based Membership Inference Attacks.
Proceedings of the Decision and Game Theory for Security - 15th International Conference, 2024

Rider Posture-Based Continuous Authentication with Few-Shot Learning for Mobility Scooters (Student Abstract).
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Feasibility Analysis for Sybil Attacks in Shard-Based Permissionless Blockchains.
Distributed Ledger Technol. Res. Pract., December, 2023

<i>SkinSense:</i> Efficient vibration-based communications over human body using motion sensors.
Internet Things, October, 2023

OverHear: Headphone based Multi-sensor Keystroke Inference.
CoRR, 2023

TorMult: Introducing a Novel Tor Bandwidth Inflation Attack.
CoRR, 2023

SkinSense: Efficient Vibration-based Communications Over Human Body Using Motion Sensors.
CoRR, 2023

Exploiting Out-of-band Motion Sensor Data to De-anonymize Virtual Reality Users.
CoRR, 2023

Detecting and Punishing Selfish Behavior During Gossiping in Algorand Blockchain.
Proceedings of the 2023 IEEE Virtual Conference on Communications (VCC), 2023

BayBFed: Bayesian Backdoor Defense for Federated Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
An Investigative Study on the Privacy Implications of Mobile E-scooter Rental Apps.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

Impact of E-Scooters on Pedestrian Safety: A Field Study Using Pedestrian Crowd-Sensing.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

On Algorand Transaction Fees: Challenges and Mechanism Design.
Proceedings of the IEEE International Conference on Communications, 2022

Background Buster: Peeking through Virtual Backgrounds in Online Video Calls.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

2021
TangleCV: A Distributed Ledger Technique for Secure Message Sharing in Connected Vehicles.
ACM Trans. Cyber Phys. Syst., 2021

Advances in Secure Knowledge Management in the Artificial Intelligence Era.
Inf. Syst. Frontiers, 2021

Write to know: on the feasibility of wrist motion based user-authentication from handwriting.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Acoustics to the Rescue: Physical Key Inference Attack Revisited.
Proceedings of the 30th USENIX Security Symposium, 2021

Zoom on the Keystrokes: Exploiting Video Calls for Keystroke Inference Attacks.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Smart Light-based Information Leakage Attacks.
GetMobile Mob. Comput. Commun., 2020

On the Feasibility of Sybil Attacks in Shard-Based Permissionless Blockchains.
CoRR, 2020

Can Wearable Devices Facilitate a Driver's Brake Response Time in a Classic Car-Following Task?
IEEE Access, 2020

On Incentive Compatible Role-Based Reward Distribution in Algorand.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Security and Privacy Challenges in Upcoming Intelligent Urban Micromobility Transportation Systems.
Proceedings of the AutoSec@CODASPY '20: Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, 2020

2019
Light Ears: Information Leakage via Smart Lights.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Impact of Urban Micromobility Technology on Pedestrian and Rider Safety: A Field Study Using Pedestrian Crowd-Sensing.
CoRR, 2019

deWristified: handwriting inference using wrist-based motion sensors revisited.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles.
Proceedings of the ACM Workshop on Automotive Cybersecurity, 2019

2018
Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches.
IEEE Trans. Mob. Comput., 2018

A Practical Framework for Preventing Distracted Pedestrian-Related Incidents Using Wrist Wearables.
IEEE Access, 2018

A Game-Theoretic Analysis of Shard-Based Permissionless Blockchains.
IEEE Access, 2018

Towards Inferring Mechanical Lock Combinations using Wrist-Wearables as a Side-Channel.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Towards a Practical Pedestrian Distraction Detection Framework using Wearables.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops, 2018

Keystroke inference using ambient light sensor on wrist-wearables: a feasibility study.
Proceedings of the 4th ACM Workshop on Wearable Systems and Applications, 2018

2017
Seer Grid: Privacy and Utility Implications of Two-Level Load Prediction in Smart Grids.
IEEE Trans. Parallel Distributed Syst., 2017

Measuring Anonymity of Pseudonymized Data After Probabilistic Background Attacks.
IEEE Trans. Inf. Forensics Secur., 2017

A Framework for Inferring Combination Lock Codes using Smartwatches.
CoRR, 2017

Preventing shoulder surfing using randomized augmented reality keyboards.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

2016
A machine-learning based approach to privacy-aware information-sharing in mobile social networks.
Pervasive Mob. Comput., 2016

Smartwatch-Based Keystroke Inference Attacks and Context-Aware Protection Mechanisms.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Scalable Meter Data Collection in Smart Grids Through Message Concatenation.
IEEE Trans. Smart Grid, 2015

(Smart)watch your taps: side-channel keystroke inference attacks using smartwatches.
Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

Optimal resource allocation in Cognitive Smart Grid Networks.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2014

Social Puzzles: Context-Based Access Control in Online Social Networks.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

LocJam: A novel jamming-based approach to secure localization in wireless networks.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

AgSec: Secure and efficient CDMA-based aggregation for smart metering systems.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
Privacy of Community Pseudonyms in Wireless Peer-to-Peer Networks.
Mob. Networks Appl., 2013

Optimizing mix-zone coverage in pervasive wireless networks.
J. Comput. Secur., 2013

Inferring social ties in academic networks using short-range wireless communications.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

On the scalable collection of metering data in smart grids through message concatenation.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Inferring social ties in pervasive networks: an on-campus comparative study.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

Adaptive information-sharing for privacy-aware mobile social networks.
Proceedings of the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2013

On the energy efficiency of dynamic spectrum access under dynamic channel conditions.
Proceedings of the 8th International Conference on Cognitive Radio Oriented Wireless Networks, 2013

2012
Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks.
Proceedings of the Pervasive Computing - 10th International Conference, 2012

Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Meetings through the cloud: Privacy-preserving scheduling on mobile devices.
J. Syst. Softw., 2011

Privacy-triggered communications in pervasive social networks.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Privacy in Mobile Computing for Location-Sharing-Based Services.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective.
Proceedings of the Computer Security - ESORICS 2011, 2011

Privacy-preserving activity scheduling on mobile devices.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes.
IEEE Trans. Mob. Comput., 2010

2009
A distortion-based metric for location privacy.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009

Towards a theory for securing time synchronization in wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
Towards a Theory of Robust Localization Against Malicious Beacon Nodes.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
On extracting consistent graphs in wireless sensor networks.
Int. J. Sens. Networks, 2007

ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

2003
Representation and analysis of coordinated attacks.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003


  Loading...