TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks M Srivatsa, L Xiong, L Liu Proceedings of the 14th international conference on World Wide Web, 422-431, 2005 | 474 | 2005 |
Deanonymizing mobility traces: Using social network as a side-channel M Srivatsa, M Hicks Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 355 | 2012 |
Vulnerabilities and security threats in structured overlay networks: A quantitative analysis M Srivatsa, L Liu 20th Annual Computer Security Applications Conference, 252-261, 2004 | 193 | 2004 |
Structural data de-anonymization: Quantification, practice, and implications S Ji, W Li, M Srivatsa, R Beyah Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 140 | 2014 |
On generating characteristic-rich question sets for qa evaluation Y Su, H Sun, B Sadler, M Srivatsa, I Gür, Z Yan, X Yan Proceedings of the 2016 Conference on Empirical Methods in Natural Language …, 2016 | 138 | 2016 |
Supporting cooperative caching in disruption tolerant networks W Gao, G Cao, A Iyengar, M Srivatsa 2011 31st International Conference on Distributed Computing Systems, 151-161, 2011 | 134 | 2011 |
Securing publish-subscribe overlay services with eventguard M Srivatsa, L Liu Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 126 | 2005 |
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach M Srivatsa, A Iyengar, J Yin, L Liu ACM Transactions on the Web (TWEB) 2 (3), 1-49, 2008 | 109 | 2008 |
Darnet: A deep learning solution for distracted driving detection C Streiffer, R Raghavendra, T Benson, M Srivatsa Proceedings of the 18th acm/ifip/usenix middleware conference: Industrial …, 2017 | 106 | 2017 |
Cooperative caching for efficient data access in disruption tolerant networks W Gao, G Cao, A Iyengar, M Srivatsa IEEE Transactions on Mobile Computing 13 (3), 611-625, 2013 | 103 | 2013 |
System and method for obtaining network link state information from sequential distance vector routing tables D Agrawal, A Beygelzimer, BJ Ko, M Srivatsa US Patent 7,961,642, 2011 | 93 | 2011 |
Protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages AK Iyengar, M Srivatsa, J Yin US Patent 8,250,631, 2012 | 89 | 2012 |
Apoidea: A decentralized peer-to-peer architecture for crawling the world wide web A Singh, M Srivatsa, L Liu, T Miller Distributed Multimedia Information Retrieval: SIGIR 2003 Workshop on …, 2004 | 88 | 2004 |
Beyond spatial auto-regressive models: Predicting housing prices with satellite imagery AJ Bency, S Rallapalli, RK Ganti, M Srivatsa, BS Manjunath 2017 IEEE winter conference on applications of computer vision (WACV), 320-329, 2017 | 79 | 2017 |
Efficient spatial query processing for big data K Lee, RK Ganti, M Srivatsa, L Liu Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances …, 2014 | 78 | 2014 |
Eventguard: A system architecture for securing publish-subscribe networks M Srivatsa, L Liu, A Iyengar ACM Transactions on Computer Systems (TOCS) 29 (4), 1-40, 2011 | 77 | 2011 |
Structure based data de-anonymization of social networks and mobility traces S Ji, W Li, M Srivatsa, JS He, R Beyah Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014 | 76 | 2014 |
When twitter meets foursquare: tweet location prediction using foursquare K Lee, R Ganti, M Srivatsa, L Liu 11th International Conference on Mobile and Ubiquitous Systems: Computing …, 2014 | 75 | 2014 |
An access control system for web service compositions M Srivatsa, A Iyengar, T Mikalsen, I Rouvellou, J Yin IEEE International Conference on Web Services (ICWS 2007), 1-8, 2007 | 75 | 2007 |
Method for protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages AK Iyengar, M Srivatsa, J Yin US Patent 7,721,091, 2010 | 67 | 2010 |