Markit: Privacy markers for protecting visual secrets N Raval, A Srivastava, K Lebeck, L Cox, A Machanavajjhala Proceedings of the 2014 ACM international joint conference on pervasive and …, 2014 | 90 | 2014 |
What you mark is what apps see N Raval, A Srivastava, A Razeen, K Lebeck, A Machanavajjhala, LP Cox Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | 76 | 2016 |
If You See Something, Swipe towards It: Crowdsourced Event Localization Using Smartphones W Ouyang, A Srivastava, P Prabahar, RR Choudhury, M Addicott, ... Ubicomp 2013, 2013 | 57 | 2013 |
eprivateeye: To the edge and beyond! C Streiffer, A Srivastava, V Orlikowski, Y Velasco, V Martin, N Raval, ... Proceedings of the Second ACM/IEEE Symposium on Edge Computing, 1-13, 2017 | 34 | 2017 |
User authentication device J Gummeson, MG Baker, A Srivastava US Patent App. 15/535,796, 2017 | 26 | 2017 |
Correlations in complex networks under attack A Srivastava, B Mitra, N Ganguly, F Peruani Physical Review E 86 (3), 036106, 2012 | 25 | 2012 |
Step-by-step detection of personally collocated mobile devices A Srivastava, J Gummeson, M Baker, KH Kim Proceedings of the 16th International Workshop on Mobile Computing Systems …, 2015 | 20 | 2015 |
Hark: A deep learning system for navigating privacy feedback at scale H Harkous, ST Peddinti, R Khandelwal, A Srivastava, N Taft 2022 IEEE Symposium on Security and Privacy (SP), 2469-2486, 2022 | 17 | 2022 |
CamForensics: Understanding visual privacy leaks in the wild A Srivastava, P Jain, S Demetriou, LP Cox, KH Kim Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 1-13, 2017 | 17 | 2017 |
Attacks on correlated peer-to-peer networks: An analytical study A Srivastava, B Mitra, F Peruani, N Ganguly 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011 | 10 | 2011 |
Controlling devices based on collocation of the devices on a user J Gummeson, MG Baker, A Srivastava, M Shrirang US Patent 10,331,916, 2019 | 6 | 2019 |
Detecting camera access breaches A Srivastava, P Jain, KH Kim US Patent 10,572,692, 2020 | 3 | 2020 |
Some issues in modeling the performance of soft keyboards with scanning S Bhattacharya, A Basu, D Samanta, S Bhattacherjee, A Srivastava FMIS 2006, 124, 2006 | 3 | 2006 |
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends O Akgul, ST Peddinti, N Taft, ML Mazurek, H Harkous, A Srivastava, ... arXiv preprint arXiv:2403.02292, 2024 | | 2024 |
Heimdall: A Case for Encrypted Displays A Srivastava Proceedings of the 20th International Workshop on Mobile Computing Systems …, 2019 | | 2019 |
Practical fine-grained access control for mobile camera A Srivastava Duke University, 2017 | | 2017 |
Protecting visual secrets with privateeye A Srivastava, L Cox Proceedings of the 12th annual international conference on Mobile systems …, 2014 | | 2014 |
Can Degree Correlation Help to Design Resilient Superpeer Networks? A Srivastava, N Ganguly, F Peruani, B Mitra 2012 IEEE Sixth International Conference on Self-Adaptive and Self …, 2012 | | 2012 |
Impact of Attacks on Correlated P2P Network Topology A Srivastava Indian Institute of Technology Kharagpur, 2012 | | 2012 |