Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks K Akkaya, A Newell Computer Communications 32 (7-10), 1233-1244, 2009 | 140 | 2009 |
Plagiarizing smartphone applications: attack strategies and defense techniques R Potharaju, A Newell, C Nita-Rotaru, X Zhang International symposium on engineering secure software and systems, 106-120, 2012 | 122 | 2012 |
Real-time visual feedback for user positioning with respect to a camera and a display A Bud, A Newell, J Palmer US Patent 9,412,169, 2016 | 71 | 2016 |
Distributed collaborative camera actuation for redundant data elimination in wireless multimedia sensor networks A Newell, K Akkaya Ad Hoc Networks 9 (4), 514-527, 2011 | 56 | 2011 |
On the practicality of integrity attacks on document-level sentiment analysis A Newell, R Potharaju, L Xiang, C Nita-Rotaru Proceedings of the 2014 Workshop on Artificial Intelligent and Security …, 2014 | 50 | 2014 |
Increasing network resiliency by optimally assigning diverse variants to routing nodes A Newell, D Obenshain, T Tantillo, C Nita-Rotaru, Y Amir IEEE Transactions on Dependable and Secure Computing 12 (6), 602-614, 2014 | 41 | 2014 |
Optimizing distributed actor systems for dynamic interactive services A Newell, G Kliot, I Menache, A Gopalan, S Akiyama, M Silberstein Proceedings of the Eleventh European Conference on Computer Systems, 1-15, 2016 | 26 | 2016 |
Entropy attacks and countermeasures in wireless network coding AJ Newell, R Curtmola, C Nita-Rotaru Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 24 | 2012 |
Node-capture resilient key establishment in sensor networks: Design space and new protocols A Newell, H Yao, A Ryker, T Ho, C Nita-Rotaru ACM Computing Surveys (CSUR) 47 (2), 1-34, 2014 | 23 | 2014 |
Practical intrusion-tolerant networks D Obenshain, T Tantillo, A Babay, J Schultz, A Newell, ME Hoque, Y Amir, ... 2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016 | 19 | 2016 |
Split null keys: A null space based defense for pollution attacks in wireless network coding A Newell, C Nita-Rotaru 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012 | 18 | 2012 |
Providing multi-perspective event coverage in wireless multimedia sensor networks A Newell, K Akkaya, E Yildiz IEEE Local Computer Network Conference, 464-471, 2010 | 17 | 2010 |
Self-actuation of camera sensors for redundant data elimination in wireless multimedia sensor networks A Newell, K Akkaya 2009 IEEE International Conference on Communications, 1-5, 2009 | 16 | 2009 |
On the practicality of cryptographic defences against pollution attacks in wireless network coding A Newell, J Dong, C Nita-Rotaru ACM Computing Surveys (CSUR) 45 (3), 1-26, 2013 | 14 | 2013 |
Taiji: managing global user traffic for large-scale internet services at the edge D Chou, T Xu, K Veeraraghavan, A Newell, S Margulis, L Xiao, PM Ruiz, ... Proceedings of the 27th ACM Symposium on Operating Systems Principles, 430-446, 2019 | 13 | 2019 |
A stitch in time: the needlework of aging women in antebellum America AE Newell Ohio University Press, 2014 | 10 | 2014 |
" Tattered to Pieces": Amy Fiske's Sampler and the Changing Roles of Women in Antebellum New England AE Newell na, 1750 | 6 | 1750 |
RAS: Continuously Optimized Region-Wide Datacenter Resource Allocation A Newell, D Skarlatos, J Fan, P Kumar, M Khutornenko, M Pundir, ... Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles …, 2021 | 4 | 2021 |
What should we be comparing for writer identification? AJ Newell 2013 12th International Conference on Document Analysis and Recognition, 418-422, 2013 | 2 | 2013 |
Invariant encoding schemes for visual recognition AJ Newell UCL (University College London), 2012 | 2 | 2012 |