Follow
Imad Aad
Imad Aad
Center for Digital Trust (C4DT), EPFL
Verified email at aad.me - Homepage
Title
Cited by
Cited by
Year
Differentiation mechanisms for IEEE 802.11
I Aad, C Castelluccia
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
9312001
The Mobile Data Challenge: Big Data for Mobile Computing Research
J Eberle, O Bornet, I Aad, JK Laurila, M Miettinen, TMT Do, O Dousse, ...
Pervasive Computing, 2012
6232012
Eviction of misbehaving and faulty nodes in vehicular networks
M Raya, P Papadimitratos, I Aad, D Jungels, JP Hubaux
IEEE Journal on Selected Areas in Communications 25 (8), 1557-1568, 2007
5512007
Denial of service resilience in ad hoc networks
I Aad, JP Hubaux, EW Knightly
Proceedings of the 10th annual international conference on Mobile computing …, 2004
4662004
On selfish behavior in CSMA/CA networks
M Cagalj, S Ganeriwal, I Aad, JP Hubaux
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
4352005
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
M Raya, JP Hubaux, I Aad
Proceedings of the 2nd international conference on Mobile systems …, 2004
3862004
Method and apparatus for categorizing application access requests on a device
I Aad, D Biswas, GP Perrucci
US Patent App. 13/538,348, 2012
3302012
Impact of denial of service attacks on ad hoc networks
I Aad, JP Hubaux, EW Knightly
IEEE/ACM Transactions on networking 16 (4), 791-802, 2008
2622008
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
M Raya, I Aad, JP Hubaux, A El Fawal
IEEE Transactions on Mobile Computing 5 (12), 1691-1705, 2006
2242006
Modeling and analysis of slow CW decrease IEEE 802.11 WLAN
Q Ni, I Aad, C Barakat, T Turletti
Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th …, 2003
1792003
Certificate revocation in vehicular networks
M Raya, D Jungels, P Papadimitratos, I Aad, JP Hubaux
Laboratory for computer Communications and Applications (LCA) School of …, 2006
1552006
From big smartphone data to worldwide research: The Mobile Data Challenge
JK Laurila, D Gatica-Perez, I Aad, J Blom, O Bornet, TMT Do, O Dousse, ...
Pervasive and Mobile Computing 9 (6), 752-771, 2013
1342013
Enhancing IEEE 802.11 MAC in congested environments
I Aad, Q Ni, C Barakat, T Turletti
Applications and Services in Wireless Networks, 2004. ASWN 2004. 2004 4th …, 2004
1162004
On cheating in CSMA/CA ad hoc networks
M Cagalj, S Ganeriwal, I Aad, JP Hubaux
812004
Introducing service differentiation into IEEE 802.11
I Aad, C Castelluccia
Computers and Communications, 2000. Proceedings. ISCC 2000. Fifth IEEE …, 2000
782000
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
I Bilogrevic, M Jadliwala, V Joneja, K Kalkan, JP Hubaux, I Aad
IEEE Transactions on Information Forensics and Security, 2014
702014
Method and apparatus for performing delegated transactions
C Soghoian, I Aad
US Patent App. 12/220,744, 2008
702008
Packet coding for strong anonymity in ad hoc networks
I Aad, C Castelluccia, JP Huubaux
Securecomm and Workshops, 2006, 1-10, 2006
692006
Reclaiming privacy for smartphone applications
E De Cristofaro, A Durussel, I Aad
Pervasive Computing and Communications (PerCom), 2011 IEEE International …, 2011
682011
QoS issues and enhancements for IEEE 802.11 Wireless LAN
Q Ni, L Romdhani, T Turletti, I Aad
INRIA, 2002
672002
The system can't perform the operation now. Try again later.
Articles 1–20