Julinda Stefa

Orcid: 0000-0001-5718-3408

According to our database1, Julinda Stefa authored at least 41 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations.
ACM Trans. Internet Techn., 2023

2022
Nationality and Geolocation-Based Profiling in the Dark(Web).
IEEE Trans. Serv. Comput., 2022

2020
GDPR: When the Right to Access Personal Data Becomes a Threat.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

A Light in the Dark Web: Linking Dark Web Aliases to Real Internet Identities.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
Scan-and-Pay on Android is Dangerous.
CoRR, 2019

Catch me if you can: how geo-indistinguishability affects utility in mobility-based geographic datasets.
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Location-based Recommendations, 2019

Cross-Domain Authorship Attribution Combining Instance Based and Profile-Based Features.
Proceedings of the Working Notes of CLEF 2019, 2019

Bot and Gender Detection of Twitter Accounts Using Distortion and LSA.
Proceedings of the Working Notes of CLEF 2019, 2019

2018
Uncovering hidden social relationships through location-based services: The Happn case study.
Proceedings of the IEEE INFOCOM 2018, 2018

Time-Zone Geolocation of Crowds in the Dark Web.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

2017
Anonymous end-to-end communications in adversarial mobile clouds.
Pervasive Mob. Comput., 2017

Using hover to compromise the confidentiality of user input on Android.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Consensus Robustness and Transaction De-Anonymization in the Ripple Currency Exchange System.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study.
IEEE Netw., 2016

Count on me: Reliable broadcast and efficient routing in DTNs through social skeletons.
J. Parallel Distributed Comput., 2016

Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android.
CoRR, 2016

Mind your probes: De-anonymization of large crowds through smartphone WiFi probe requests.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Social-Aware Stateless Routingin Pocket Switched Networks.
IEEE Trans. Parallel Distributed Syst., 2015

2014
An Anonymous End-to-End Communication Protocol for Mobile Cloud Environments.
IEEE Trans. Serv. Comput., 2014

Large-Scale Synthetic Social Mobile Networks with SWIM.
IEEE Trans. Mob. Comput., 2014

Data offloading in social mobile networks through VIP delegation.
Ad Hoc Networks, 2014

Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Supporting interoperability of things in IoT systems.
Proceedings of the 11th ACM Conference on Embedded Network Sensor Systems, 2013

StreamSmart: P2P video streaming for smartphones through the cloud.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

To offload or not to offload? The bandwidth and energy costs of mobile cloud computing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Signals from the crowd: uncovering social relationships through smartphone probes.
Proceedings of the 2013 Internet Measurement Conference, 2013

Preserving Smartphone Users' Anonymity in Cloudy Days.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud.
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing, 2013

2012
Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals.
IEEE Trans. Dependable Secur. Comput., 2012

CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud.
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012

2011
Social-aware stateless forwarding in pocket switched networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

FAN: friendship based anonymous routing in wireless social mobile networks of malicious communities.
Proceedings of the 3rd Extreme Conference on Communication - The Amazon Expedition, 2011

Social-Aware Forwarding Improves Routing Performance in Pocket Switched Networks.
Proceedings of the Algorithms - ESA 2011, 2011

VIP delegation: Enabling VIPs to offload data in wireless social mobile networks.
Proceedings of the Distributed Computing in Sensor Systems, 2011

2010
Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

2009
Routing in Outer Space: Fair Traffic Load in Multihop Wireless Networks.
IEEE Trans. Computers, 2009

SWIM: A Simple Model to Generate Small Mobile Worlds.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

2008
Routing in outer space: fair traffic load in multi-hop wireless networks.
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2008

Routing in Outer Space.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

2007
Routing in Outer Space: Improved Security and Energy-Efficiency in Multi-Hop Wireless Networks
CoRR, 2007


  Loading...