default search action
Roksana Boreli
Person information
- affiliation: NICTA, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Imdad Ullah, Roksana Boreli, Salil S. Kanhere:
Privacy in targeted advertising on mobile devices: a survey. Int. J. Inf. Sec. 22(3): 647-678 (2023) - [j11]Imdad Ullah, Salil S. Kanhere, Roksana Boreli:
Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads. J. Netw. Comput. Appl. 211: 103559 (2023) - 2020
- [j10]Imdad Ullah, Roksana Boreli, Salil S. Kanhere, Sanjay Chawla, Tariq Ahamed Ahanger, Usman Tariq:
Protecting Private Attributes in App Based Mobile User Profiling. IEEE Access 8: 143818-143836 (2020) - [i9]Imdad Ullah, Salil S. Kanhere, Roksana Boreli:
Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads. CoRR abs/2008.10479 (2020) - [i8]Imdad Ullah, Roksana Boreli, Salil S. Kanhere:
Privacy in targeted advertising: A survey. CoRR abs/2009.06861 (2020)
2010 – 2019
- 2017
- [c60]Imdad Ullah, Babil Golam Sarwar, Roksana Boreli, Salil S. Kanhere, Stefan Katzenbeisser, Matthias Hollick:
Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval. LCN 2017: 347-355 - 2016
- [c59]Mehdi Nobakht, Vijay Sivaraman, Roksana Boreli:
A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow. ARES 2016: 147-156 - [c58]Richard Nock, Raphaël Canyasse, Roksana Boreli, Frank Nielsen:
k-variates++: more pluses in the k-means++. ICML 2016: 145-154 - [c57]Simone Ferlin, Özgü Alay, Olivier Mehani, Roksana Boreli:
BLEST: Blocking estimation-based MPTCP scheduler for heterogeneous networks. Networking 2016: 431-439 - [c56]Vijay Sivaraman, Dominic Chan, Dylan Earl, Roksana Boreli:
Smart-Phones Attacking Smart-Homes. WISEC 2016: 195-200 - [i7]Richard Nock, Raphaël Canyasse, Roksana Boreli, Frank Nielsen:
k-variates++: more pluses in the k-means++. CoRR abs/1602.01198 (2016) - 2015
- [j9]Nicolas Kuhn, Olivier Mehani, Huyen Chi Bui, Emmanuel Lochin, Jérôme Lacan, José Radzik, Roksana Boreli:
Improving web experience on DVB-RCS2 links. Ann. des Télécommunications 70(11-12): 451-463 (2015) - [j8]Nicolas Kuhn, Emmanuel Lochin, Jérôme Lacan, Roksana Boreli, Laurence Clarac:
On the impact of link layer retransmission schemes on TCP over 4G satellite links. Int. J. Satell. Commun. Netw. 33(1): 19-42 (2015) - [c55]Olivier Mehani, Ralph Holz, Simone Ferlin, Roksana Boreli:
An Early Look at Multipath TCP Deployment in the Wild. HotPlanet@MobiCom 2015: 7-12 - [c54]Arnaud Berlioz, Arik Friedman, Mohamed Ali Kâafar, Roksana Boreli, Shlomo Berkovsky:
Applying Differential Privacy to Matrix Factorization. RecSys 2015: 107-114 - [c53]Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, Olivier Mehani:
Network-level security and privacy control for smart-home IoT devices. WiMob 2015: 163-167 - 2014
- [j7]Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli:
Linking wireless devices using information contained in Wi-Fi probe requests. Pervasive Mob. Comput. 11: 56-69 (2014) - [c52]Nicolas Kuhn, Emmanuel Lochin, Jérôme Lacan, Olivier Mehani, Roksana Boreli:
CLIFT: A Cross-Layer InFormation Tool for latency analysis based on real satellite physical traces. ASMS/SPSC 2014: 182-189 - [c51]Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman, Roksana Boreli:
An experimental study of security and privacy risks with emerging household appliances. CNS 2014: 79-84 - [c50]Thivya Kandappu, Vijay Sivaraman, Arik Friedman, Roksana Boreli:
Loki: A privacy-conscious platform for crowdsourced surveys. COMSNETS 2014: 1-8 - [c49]Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli:
Asynchronous Covert Communication Using BitTorrent Trackers. HPCC/CSS/ICESS 2014: 827-830 - [c48]Nicolas Kuhn, Emmanuel Lochin, Ahlem Mifdaoui, Golam Sarwar, Olivier Mehani, Roksana Boreli:
DAPS: Intelligent delay-aware packet scheduling for multipath transport. ICC 2014: 1222-1227 - [c47]Imdad Ullah, Roksana Boreli, Mohamed Ali Kâafar, Salil S. Kanhere:
Characterising user targeting for in-App Mobile Ads. INFOCOM Workshops 2014: 547-552 - [c46]Thivya Kandappu, Arik Friedman, Roksana Boreli, Vijay Sivaraman:
PrivacyCanary: Privacy-Aware Recommenders with Adaptive Input Obfuscation. MASCOTS 2014: 453-462 - [c45]Terence Chen, Roksana Boreli, Mohamed Ali Kâafar, Arik Friedman:
On the Effectiveness of Obfuscation Techniques in Online Social Networks. Privacy Enhancing Technologies 2014: 42-62 - [c44]Terence Chen, Imdad Ullah, Mohamed Ali Kâafar, Roksana Boreli:
Information leakage through mobile analytics services. HotMobile 2014: 15:1-15:6 - [c43]Imdad Ullah, Roksana Boreli, Salil S. Kanhere, Sanjay Chawla:
ProfileGuard: Privacy Preserving Obfuscation for Mobile User Profiles. WPES 2014: 83-92 - [c42]Mentari Djatmiko, Arik Friedman, Roksana Boreli, Felix Lawrence, Brian Thorne, Stephen Hardy:
Secure Evaluation Protocol for Personalized Medicine. WPES 2014: 159-162 - 2013
- [j6]Mentari Djatmiko, Dominik Schatzmann, Xenofontas A. Dimitropoulos, Arik Friedman, Roksana Boreli:
Collaborative network outage troubleshooting with secure multiparty computation. IEEE Commun. Mag. 51(11): 78-84 (2013) - [j5]Jong-Hyouk Lee, Hae-Duck Joshua Jeong, Roksana Boreli, Krzysztof Pawlikowski:
Performance Modeling and Simulation for Future Mobile Networks. Math. Comput. Model. 57(11-12): 2718-2719 (2013) - [j4]Mentari Djatmiko, Roksana Boreli, Aruna Seneviratne, Sebastian Ries:
Resources-aware trusted node selection for content distribution in mobile ad hoc networks. Wirel. Networks 19(5): 843-856 (2013) - [c41]Golam Sarwar, Roksana Boreli, Emmanuel Lochin, Ahlem Mifdaoui, Guillaume Smith:
Mitigating Receiver's Buffer Blocking by Delay Aware Packet Scheduling in Multipath Data Transfer. AINA Workshops 2013: 1119-1124 - [c40]Thivya Kandappu, Vijay Sivaraman, Arik Friedman, Roksana Boreli:
Exposing and mitigating privacy loss in crowdsourced survey platforms. CoNEXT Student Workhop 2013: 13-16 - [c39]Mentari Djatmiko, Dominik Schatzmann, Xenofontas A. Dimitropoulos, Arik Friedman, Roksana Boreli:
Federated flow-based approach for privacy preserving connectivity tracking. CoNEXT 2013: 429-440 - [c38]Terence Chen, Mohamed Ali Kâafar, Roksana Boreli:
The Where and When of Finding New Friends: Analysis of a Location-based Social Discovery Network. ICWSM 2013 - [c37]Golam Sarwar, Pierre-Ugo Tournoux, Roksana Boreli, Emmanuel Lochin:
eCMT-SCTP: Improving performance of multipath SCTP with erasure coding over lossy links. LCN 2013: 476-483 - [c36]Mathieu Cunche, Cédric Lauradoux, Marine Minier, Roksana Boreli:
Private and resilient data aggregation. LCN 2013: 759-762 - [c35]Guillaume Smith, Roksana Boreli, Mohamed Ali Kâafar:
A Layered Secret Sharing Scheme for Automated Profile Sharing in OSN Groups. MobiQuitous 2013: 487-499 - [c34]Terence Chen, Chaabane Abdelberi, Pierre-Ugo Tournoux, Mohamed Ali Kâafar, Roksana Boreli:
How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness. Privacy Enhancing Technologies 2013: 225-244 - [c33]Golam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed Ali Kâafar:
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices. SECRYPT 2013: 461-468 - [c32]Frank Kargl, Arik Friedman, Roksana Boreli:
Differential privacy in intelligent transportation systems. WISEC 2013: 107-112 - [i6]Olivier Mehani, Roksana Boreli, Guillaume Jourjon, Thierry Ernst:
Rate Control Adaptation for Heterogeneous Handovers. CoRR abs/1310.5446 (2013) - [i5]Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli:
Revealing Social Links Between Owners of Wi-Fi Enabled Smartphones. ERCIM News 2013(93) (2013) - 2012
- [j3]Jiefeng (Terence) Chen, Roksana Boreli, Vijay Sivaraman:
Improving the efficiency of anonymous routing for MANETs. Comput. Commun. 35(5): 619-627 (2012) - [j2]Golam Sarwar, Roksana Boreli, Emmanuel Lochin:
On the quality of VoIP with DCCP for satellite communications. Int. J. Satell. Commun. Netw. 30(4): 163-180 (2012) - [c31]Weisheng Si, Bernhard Scholz, Joachim Gudmundsson, Guoqiang Mao, Roksana Boreli, Albert Y. Zomaya:
On graphs supporting greedy forwarding for directional wireless networks. ICC 2012: 751-756 - [c30]Golam Sarwar, Roksana Boreli, Emmanuel Lochin, Ahlem Mifdaoui:
Performance evaluation of multipath transport protocol in heterogeneous network environments. ISCIT 2012: 985-990 - [c29]Ningning Cheng, Prasant Mohapatra, Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli, Srikanth V. Krishnamurthy:
Inferring user relationship from hidden information in WLANs. MILCOM 2012: 1-6 - [c28]Xi Li, Olivier Mehani, Ramón Agüero, Roksana Boreli, Yasir Zaki, Umar Toseef:
Evaluating User-Centric Multihomed Flow Management for Mobile Devices in Simulated Heterogeneous Networks. MONAMI 2012: 84-98 - [c27]Mentari Djatmiko, Mathieu Cunche, Roksana Boreli, Aruna Seneviratne:
Heterogeneous Secure Multi-Party Computation. Networking (2) 2012: 198-210 - [c26]Nicolas Kuhn, Emmanuel Lochin, Jérôme Lacan, Roksana Boreli, Caroline Bes, Laurence Clarac:
Enabling realistic cross-layer analysis based on satellite physical layer traces. PIMRC 2012: 285-290 - [c25]Thivya Kandappu, Vijay Sivaraman, Roksana Boreli:
A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices. SECON 2012: 488-496 - [c24]Chaabane Abdelberi, Mohamed Ali Kâafar, Roksana Boreli:
Big friend is watching you: analyzing online social networks tracking capabilities. WOSN 2012: 7-12 - [c23]Terence Chen, Mohamed Ali Kâafar, Arik Friedman, Roksana Boreli:
Is more always merrier?: a deep dive into online social footprints. WOSN 2012: 67-72 - [c22]Mathieu Cunche, Mohamed Ali Kâafar, Roksana Boreli:
I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests. WOWMOM 2012: 1-9 - [c21]Guillaume Smith, Pierre-Ugo Tournoux, Roksana Boreli, Jérôme Lacan, Emmanuel Lochin:
On the limit of fountain MDC codes for video Peer-To-Peer networks. WOWMOM 2012: 1-6 - [i4]Thava Iyer, Robert Hsieh, Nikzad Babaii Rizvandi, Benoy Varghese, Roksana Boreli:
Mobile P2P Trusted On-Demand Video Streaming. CoRR abs/1204.0094 (2012) - [i3]Nicolas Kuhn, Emmanuel Lochin, Jérôme Lacan, Roksana Boreli, Caroline Bes, Laurence Clarac:
Enabling Realistic Cross-Layer Analysis based on Satellite Physical Layer Traces. CoRR abs/1205.3831 (2012) - [i2]Nicolas Kuhn, Emmanuel Lochin, Jérôme Lacan, Roksana Boreli, Caroline Bes, Laurence Clarac:
CLIFT: a Cross-Layer InFormation Tool to perform cross-layer analysis based on real physical traces. CoRR abs/1206.5459 (2012) - 2011
- [c20]Benoy Varghese, Roksana Boreli, Anirban Mahanti:
Experimental evaluation of BitTorrent-like protocols for on-demand streaming. IEEE ANTS 2011: 1-3 - [c19]Golam Sarwar, Emmanuel Lochin, Roksana Boreli:
Mitigating the Impact of Packet Reordering to Maximize Performance of Multimedia Applications. ICC 2011: 1-5 - [c18]Golam Sarwar, Roksana Boreli, Emmanuel Lochin:
Xstream-X264: Real-time H.264 streaming with cross-layer integration. ICME 2011: 1-4 - [c17]Olivier Mehani, Roksana Boreli, Michael J. Maher, Thierry Ernst:
User- and application-centric multihomed flow management. LCN 2011: 26-34 - [c16]Upendra Rathnayake, Vijay Sivaraman, Roksana Boreli:
Environmental context aware trust in mobile P2P networks. LCN 2011: 324-332 - [c15]Mentari Djatmiko, Roksana Boreli, Aruna Seneviratne, Sebastian Ries:
Trust-Based Content Distribution for Mobile Ad Hoc Networks. MASCOTS 2011: 433-436 - [c14]Weisheng Si, Roksana Boreli, Anirban Mahanti, Albert Y. Zomaya:
Tree-based double-covered broadcast for wireless ad hoc networks. MOBIWAC 2011: 45-52 - [i1]Jochen Eisl, Michael Georgiades, Tony Jokikyyny, Roksana Boreli, Eranga Perera, Kostas Pentikousis:
Management of Multiple Mobility Protocols and Tools in Dynamically Configurable Networks. CoRR abs/1105.1518 (2011) - 2010
- [c13]Jiefeng (Terence) Chen, Roksana Boreli, Vijay Sivaraman:
TARo: Trusted Anonymous Routing for MANETs. EUC 2010: 756-762
2000 – 2009
- 2009
- [c12]Thava Iyer, Roksana Boreli, Golam Sarwar, Christoph Dwertmann:
DART: Enhancing Data Acceleration with Compression for Satellite Links. GLOBECOM 2009: 1-6 - [c11]Golam Sarwar, Roksana Boreli, Emmanuel Lochin:
Performance of VoIP with DCCP for Satellite Links. ICC 2009: 1-5 - [c10]Terence Chen, Roksana Boreli, Thava Iyer:
A cross layer scheme for maximising the combination of wireless VoIP capacity and quality. IWCMC 2009: 148-153 - [c9]Lei Zhang, Patrick Sénac, Roksana Boreli, Michel Diaz:
Optimization of WiMax modulation scheme with a cross layer erasure code. WOWMOM 2009: 1-9 - 2008
- [j1]Eranga Perera, Roksana Boreli, Stephen Herborn, Michael Georgiades, Jochen Eisl, Eleanor Hepworth:
A mobility toolbox architecture for all-IP networks: an ambient networks approach. IEEE Wirel. Commun. 15(2): 8-16 (2008) - [c8]Olivier Mehani, Roksana Boreli:
Adapting TFRC to mobile networks with frequent disconnections. CoNEXT 2008: 37 - 2007
- [c7]Stephen Herborn, Andreas Huber, Roksana Boreli, Aruna Seneviratne:
Secure Host Identity Delegation for Mobility. COMSWARE 2007 - 2006
- [c6]Stephen Herborn, Luke Haslett, Roksana Boreli, Aruna Seneviratne:
HarMoNy - HIP Mobile Networks. VTC Spring 2006: 871-875 - 2005
- [c5]Stephen Herborn, Roksana Boreli, Aruna Seneviratne:
Identity Location Decoupling in Pervasive Computing Networks. AINA 2005: 610-615 - [c4]Eranga Perera, Aruna Seneviratne, Roksana Boreli, Michael Eyrich, Michael Wolf, Tim Leinmüller:
Failover for Mobile Routers: A Vision of Resilient Ambience. ICN (2) 2005: 192-201 - [c3]Stephen Herborn, Tim Hsin-Ting Hu, Roksana Boreli, Aruna Seneviratne:
Secure Identity and Location Decoupling Using Peer-to-Peer Networks. ICN (2) 2005: 617-624 - [c2]Michael Eyrich, Mikko Majanen, Eranga Perera, Ralf Toenjes, Roksana Boreli, Tim Leinmüller:
GSA: an architecture for optimising gateway selection in dynamic routing groups. PIMRC 2005: 2675-2679 - 2004
- [c1]Prawit Chumchu, Roksana Boreli, Aruna Seneviratne:
Performance Analysis of Reliable Multicast Transport Protocols for GEO Satellite Networks. MASCOTS 2004: 318-326
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint