Differentiation mechanisms for IEEE 802.11 I Aad, C Castelluccia Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001 | 933 | 2001 |
The Mobile Data Challenge: Big Data for Mobile Computing Research J Eberle, O Bornet, I Aad, JK Laurila, M Miettinen, TMT Do, O Dousse, ... Pervasive Computing, 2012 | 619 | 2012 |
Eviction of misbehaving and faulty nodes in vehicular networks M Raya, P Papadimitratos, I Aad, D Jungels, JP Hubaux IEEE Journal on Selected Areas in Communications 25 (8), 1557-1568, 2007 | 546 | 2007 |
Denial of service resilience in ad hoc networks I Aad, JP Hubaux, EW Knightly Proceedings of the 10th annual international conference on Mobile computing …, 2004 | 465 | 2004 |
On selfish behavior in CSMA/CA networks M Cagalj, S Ganeriwal, I Aad, JP Hubaux Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005 | 434 | 2005 |
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots M Raya, JP Hubaux, I Aad Proceedings of the 2nd international conference on Mobile systems …, 2004 | 384 | 2004 |
Method and apparatus for categorizing application access requests on a device I Aad, D Biswas, GP Perrucci US Patent App. 13/538,348, 2012 | 324 | 2012 |
Impact of denial of service attacks on ad hoc networks I Aad, JP Hubaux, EW Knightly IEEE/ACM Transactions on networking 16 (4), 791-802, 2008 | 259 | 2008 |
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots M Raya, I Aad, JP Hubaux, A El Fawal IEEE Transactions on Mobile Computing 5 (12), 1691-1705, 2006 | 224 | 2006 |
Modeling and analysis of slow CW decrease IEEE 802.11 WLAN Q Ni, I Aad, C Barakat, T Turletti Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th …, 2003 | 178 | 2003 |
Certificate revocation in vehicular networks M Raya, D Jungels, P Papadimitratos, I Aad, JP Hubaux Laboratory for computer Communications and Applications (LCA) School of …, 2006 | 155 | 2006 |
From big smartphone data to worldwide research: The Mobile Data Challenge JK Laurila, D Gatica-Perez, I Aad, J Blom, O Bornet, TMT Do, O Dousse, ... Pervasive and Mobile Computing 9 (6), 752-771, 2013 | 133 | 2013 |
Enhancing IEEE 802.11 MAC in congested environments I Aad, Q Ni, C Barakat, T Turletti Applications and Services in Wireless Networks, 2004. ASWN 2004. 2004 4th …, 2004 | 116 | 2004 |
On cheating in CSMA/CA ad hoc networks M Cagalj, S Ganeriwal, I Aad, JP Hubaux | 80 | 2004 |
Introducing service differentiation into IEEE 802.11 I Aad, C Castelluccia Computers and Communications, 2000. Proceedings. ISCC 2000. Fifth IEEE …, 2000 | 78 | 2000 |
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices I Bilogrevic, M Jadliwala, V Joneja, K Kalkan, JP Hubaux, I Aad IEEE Transactions on Information Forensics and Security, 2014 | 70 | 2014 |
Method and apparatus for performing delegated transactions C Soghoian, I Aad US Patent App. 12/220,744, 2008 | 69 | 2008 |
Packet coding for strong anonymity in ad hoc networks I Aad, C Castelluccia, JP Huubaux Securecomm and Workshops, 2006, 1-10, 2006 | 69 | 2006 |
QoS issues and enhancements for IEEE 802.11 Wireless LAN Q Ni, L Romdhani, T Turletti, I Aad INRIA, 2002 | 67 | 2002 |
Reclaiming privacy for smartphone applications E De Cristofaro, A Durussel, I Aad Pervasive Computing and Communications (PerCom), 2011 IEEE International …, 2011 | 66 | 2011 |