Imad Aad
Imad Aad
Center for Digital Trust (C4DT), EPFL
Verified email at - Homepage
Cited by
Cited by
Differentiation mechanisms for IEEE 802.11
I Aad, C Castelluccia
Proceedings IEEE INFOCOM 2001. Conference on Computer Communications …, 2001
The Mobile Data Challenge: Big Data for Mobile Computing Research
J Eberle, O Bornet, I Aad, JK Laurila, M Miettinen, TMT Do, O Dousse, ...
Pervasive Computing, 2012
Eviction of misbehaving and faulty nodes in vehicular networks
M Raya, P Papadimitratos, I Aad, D Jungels, JP Hubaux
IEEE Journal on Selected Areas in Communications 25 (8), 1557-1568, 2007
Denial of service resilience in ad hoc networks
I Aad, JP Hubaux, EW Knightly
Proceedings of the 10th annual international conference on Mobile computing …, 2004
On selfish behavior in CSMA/CA networks
M Cagalj, S Ganeriwal, I Aad, JP Hubaux
Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and …, 2005
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
M Raya, JP Hubaux, I Aad
Proceedings of the 2nd international conference on Mobile systems …, 2004
Method and apparatus for categorizing application access requests on a device
I Aad, D Biswas, GP Perrucci
US Patent App. 13/538,348, 2012
Impact of denial of service attacks on ad hoc networks
I Aad, JP Hubaux, EW Knightly
IEEE/ACM Transactions on networking 16 (4), 791-802, 2008
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots
M Raya, I Aad, JP Hubaux, A El Fawal
IEEE Transactions on Mobile Computing 5 (12), 1691-1705, 2006
Modeling and analysis of slow CW decrease IEEE 802.11 WLAN
Q Ni, I Aad, C Barakat, T Turletti
Personal, Indoor and Mobile Radio Communications, 2003. PIMRC 2003. 14th …, 2003
Certificate revocation in vehicular networks
M Raya, D Jungels, P Papadimitratos, I Aad, JP Hubaux
Laboratory for computer Communications and Applications (LCA) School of …, 2006
From big smartphone data to worldwide research: The Mobile Data Challenge
JK Laurila, D Gatica-Perez, I Aad, J Blom, O Bornet, TMT Do, O Dousse, ...
Pervasive and Mobile Computing 9 (6), 752-771, 2013
Enhancing IEEE 802.11 MAC in congested environments
I Aad, Q Ni, C Barakat, T Turletti
Applications and Services in Wireless Networks, 2004. ASWN 2004. 2004 4th …, 2004
On cheating in CSMA/CA ad hoc networks
M Cagalj, S Ganeriwal, I Aad, JP Hubaux
Introducing service differentiation into IEEE 802.11
I Aad, C Castelluccia
Computers and Communications, 2000. Proceedings. ISCC 2000. Fifth IEEE …, 2000
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
I Bilogrevic, M Jadliwala, V Joneja, K Kalkan, JP Hubaux, I Aad
IEEE Transactions on Information Forensics and Security, 2014
Packet coding for strong anonymity in ad hoc networks
I Aad, C Castelluccia, JP Huubaux
Securecomm and Workshops, 2006, 1-10, 2006
Method and apparatus for performing delegated transactions
C Soghoian, I Aad
US Patent App. 12/220,744, 2008
QoS issues and enhancements for IEEE 802.11 Wireless LAN
Q Ni, L Romdhani, T Turletti, I Aad
INRIA, 2002
Reclaiming privacy for smartphone applications
E De Cristofaro, A Durussel, I Aad
Pervasive Computing and Communications (PerCom), 2011 IEEE International …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20