XPay: practical anonymous payments for tor routing and other networked services

Yao Chen , Radu Sion , Bogdan Carbunar
workshop on privacy in the electronic society 41 -50

30
2009
Stateless Puzzles for Real Time Online Fraud Preemption

Mizanur Rahman , Ruben Recabarren , Bogdan Carbunar , Dongwon Lee
arXiv: Social and Information Networks

2
2017
Verifiable Credit Based Transfers in Wireless Ad Hoc Networks

Bogdan Carbunar , Brett Lindsley , Michael Pearce , Venu Vasudevan
international parallel and distributed processing symposium 1 -10

2007
Infiltrating Social Network Accounts: Attacks and Defenses

Rahul Potharaju , Bogdan Carbunar , Mozhgan Azimpourkivi , Venugopal Vasudevan
Springer, Cham 457 -485

2
2016
Seeing is not believing: visual verifications through liveness analysis using mobile devices

Mahmudur Rahman , Umut Topkara , Bogdan Carbunar
annual computer security applications conference 239 -248

9
2013
Liveness verifications for citizen journalism videos

Mahmudur Rahman , Mozhgan Azimpourkivi , Umut Topkara , Bogdan Carbunar
wireless network security 17

2
2015
A Study of Friend Abuse Perception in Facebook

Sajedul Talukder , Bogdan Carbunar
ACM Transactions on Social Computing 3 ( 4) 1 -34

2
2020
iFriendU: leveraging 3-cliques to enhance infiltration attacks in online social networks

Rahul Potharaju , Bogdan Carbunar , Cristina Nita-Rotaru
computer and communications security 723 -725

10
2010
Conditional E-cash

Larry Shi , Bogdan Carbunar , Radu Sion ,
financial cryptography 4886 15 -28

23
2007
Personal digital rights management for mobile cellular devices

Siddharth Bhatt , Bogdan Carbunar , Radu Sion , Venu Vasudevan
financial cryptography 4886 246 -246

2007
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display

Tao Feng , Ziyi Liu , Bogdan Carbunar , Dainis Boumber
international symposium on microarchitecture 55 -62

18
2012
To catch a fake: Curbing deceptive Yelp ratings and venues

Mahmudur Rahman , Bogdan Carbunar , Jaime Ballesteros , Duen Horng Polo Chau
Statistical Analysis and Data Mining 8 ( 3) 147 -161

17
2015
In-Network Trajectory Privacy Preservation

Mingming Guo , Xinyu Jin , Niki Pissinou , Sebastian Zanlongo
ACM Computing Surveys 48 ( 2) 1 -29

17
2015
Resilient Design of Networked Control Systems Under Time Delay Switch Attacks, Application in Smart Grid

Arman Sargolzaei , Kang K. Yen , Mohamed N. Abdelghani , Saman Sargolzaei
IEEE Access 5 15901 -15912

70
2017
3-clique attacks in online social networks

Rahul Potharaju , Bogdan Carbunar , Cristina Nita-Rotaru
Smpte Journal

2
2011
2012 Index IEEE Transactions on Knowledge and Data Engineering Vol. 24

Serge Abiteboul , Gediminas Adomavicius , Pankaj K Agarwal , Aijun An
IEEE Transactions on Knowledge and Data Engineering 25 ( 1) 1

2013
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage

Peter Williams , Radu Sion , Bogdan Carbunar
Smpte Journal 139 -148

313
2008
LCN program committee and demo board

Mehran Abolhasan , Mustafa Akbaş , Karl Andersson , Nils Aschenbruck
Smpte Journal

Spotting suspicious reviews via (quasi-) clique extraction

Paras Jain , Shang-Tse Chen , Mozhgan Azimpourkivi , Duen Horng Chau
arXiv preprint arXiv:1509.05935

4
2015
Poster: Spotting Suspicious Reviews via (Quasi-) clique Extraction

Paras Jain , Shang-Tse Chen , Mozhgan Azimpourkivi , Duen Horng Chau