Follow
Mudhakar Srivatsa
Mudhakar Srivatsa
Research Scientist of Computer Science, IBM T. J. Watson Research Center
Verified email at us.ibm.com
Title
Cited by
Cited by
Year
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
M Srivatsa, L Xiong, L Liu
Proceedings of the 14th international conference on World Wide Web, 422-431, 2005
4742005
Deanonymizing mobility traces: Using social network as a side-channel
M Srivatsa, M Hicks
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
3562012
Vulnerabilities and security threats in structured overlay networks: A quantitative analysis
M Srivatsa, L Liu
20th Annual Computer Security Applications Conference, 252-261, 2004
1932004
Structural data de-anonymization: Quantification, practice, and implications
S Ji, W Li, M Srivatsa, R Beyah
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1412014
On generating characteristic-rich question sets for qa evaluation
Y Su, H Sun, B Sadler, M Srivatsa, I Gür, Z Yan, X Yan
Proceedings of the 2016 Conference on Empirical Methods in Natural Language …, 2016
1392016
Supporting cooperative caching in disruption tolerant networks
W Gao, G Cao, A Iyengar, M Srivatsa
2011 31st International Conference on Distributed Computing Systems, 151-161, 2011
1342011
Securing publish-subscribe overlay services with eventguard
M Srivatsa, L Liu
Proceedings of the 12th ACM conference on Computer and communications …, 2005
1262005
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
M Srivatsa, A Iyengar, J Yin, L Liu
ACM Transactions on the Web (TWEB) 2 (3), 1-49, 2008
1092008
Darnet: A deep learning solution for distracted driving detection
C Streiffer, R Raghavendra, T Benson, M Srivatsa
Proceedings of the 18th acm/ifip/usenix middleware conference: Industrial …, 2017
1062017
Cooperative caching for efficient data access in disruption tolerant networks
W Gao, G Cao, A Iyengar, M Srivatsa
IEEE Transactions on Mobile Computing 13 (3), 611-625, 2013
1032013
System and method for obtaining network link state information from sequential distance vector routing tables
D Agrawal, A Beygelzimer, BJ Ko, M Srivatsa
US Patent 7,961,642, 2011
932011
Protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages
AK Iyengar, M Srivatsa, J Yin
US Patent 8,250,631, 2012
892012
Apoidea: A decentralized peer-to-peer architecture for crawling the world wide web
A Singh, M Srivatsa, L Liu, T Miller
Distributed Multimedia Information Retrieval: SIGIR 2003 Workshop on …, 2004
882004
Beyond spatial auto-regressive models: Predicting housing prices with satellite imagery
AJ Bency, S Rallapalli, RK Ganti, M Srivatsa, BS Manjunath
2017 IEEE winter conference on applications of computer vision (WACV), 320-329, 2017
802017
Efficient spatial query processing for big data
K Lee, RK Ganti, M Srivatsa, L Liu
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances …, 2014
782014
Eventguard: A system architecture for securing publish-subscribe networks
M Srivatsa, L Liu, A Iyengar
ACM Transactions on Computer Systems (TOCS) 29 (4), 1-40, 2011
772011
Structure based data de-anonymization of social networks and mobility traces
S Ji, W Li, M Srivatsa, JS He, R Beyah
Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014
762014
When twitter meets foursquare: tweet location prediction using foursquare
K Lee, R Ganti, M Srivatsa, L Liu
11th International Conference on Mobile and Ubiquitous Systems: Computing …, 2014
752014
An access control system for web service compositions
M Srivatsa, A Iyengar, T Mikalsen, I Rouvellou, J Yin
IEEE International Conference on Web Services (ICWS 2007), 1-8, 2007
752007
Method for protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages
AK Iyengar, M Srivatsa, J Yin
US Patent 7,721,091, 2010
672010
The system can't perform the operation now. Try again later.
Articles 1–20