Statistics about my publications can be found on google scholar.

Patents list below


Papers in conferences and journals

 

A. Durand, M. Gasparian, T. Rouvinez, I. Aad, T. Braun, T.T. Anh,

BitWorker, a Decentralized Distributed Computing System based on BitTorrent,

Proc. of WWIC, Malaga, Spain, 2015.

 

I. Bilogrevic, M. Jadliwala, V. Joneja, K. Kalkan, J.-P. Hubaux, I. Aad,

Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices,

IEEE Transactions on Information Forensics & Security, 2014.

 

J. Laurila, D. Gatica-Perez, I. Aad, J. Blom, O. Bornet, T. Do, O. Dousse, J. Eberle, M. Miettinen,

From Big Smartphone Data to Worldwide Research: The Mobile Data Challenge,

Elsevier Pervasive and Mobile Computing, 2013.

 

D. Biswas, I. Aad, G. P. Perrucci,

Privacy Panel: Usable and Quantifiable Mobile Privacy,

ARES 2013, Regensburg, Germany.


J. Laurila, D. Gatica-Perez, I. Aad, J. Blom, O. Bornet, T. Do, O. Dousse, J. Eberle, M. Miettinen,
The Mobile Data Challenge: Big Data for Mobile Computing Research,
Nokia Mobile Data Challenge Workshop, Pervasive 2012, Newcastle, UK.

I. Bilogrevic, M. Jadliwala, I. Lam, I. Aad, P. Ginzboorg, V. Niemi, L. Bindschaedler, Jean-P. Hubaux,
Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks,
Pervasive 2012, Newcastle, UK.

L. Bindschaedler, M. Jadliwala, I. Bilogrevic, I. Aad, J.-P. Hubaux, V. Niemi, and P. Ginzboorg,
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks,
NDSS 2012.

I. Bilogrevic, M. Jadliwala, S. Walia, P. Kumar, J.-P. Hubaux, I. Aad, and V. Niemi,
Meetings through the Cloud: Privacy-Preserving Scheduling on Mobile Devices,
Special Issue of the Elsevier’s Journal of Systems and Software on “Mobile Applications: Status and Trends”.

E. De Cristofaro, A. Durussel, I. Aad,
Reclaiming Privacy for Smartphone Applications,
PerCom 2011.

I. Bilogrevic, M. Jadliwala, J.-P. Hubaux, I. Aad, V. Niemi,
Privacy-Preserving Activity Scheduling on Mobile Devices,
CODASPY 2011.

M. Jadliwala, J. Freudiger, I. Aad, J.-P. Hubaux, and V. Niemi,
Privacy-Triggered Communications in Pervasive Social Networks,
AOC 2011.

I. Bilogrevic, M. Jadliwala, K. Kalkan, J.-P. Hubaux, and I. Aad,
Privacy in Mobile Computing for Location-Sharing-Based Services,
PETS 2011.

Q. Wei, I. Aad, L. Scalia, J. Widmer, P. Hofmann, L. Loyola,
E-MAC: an elastic MAC layer for IEEE 802.11 networks,
Wireless Communications and Mobile Computing, 2011.

I. Aad and V. Niemi,
NRC Data Collection and the Privacy by Design Principles,
PhoneSense , Zurich, Switzerland, 2010.

A. Choukir, I. Aad, and J.-Y. Leboudec,
Characterizing Human Network Activity in Wireless Traffic,
technical report.

H. S. Lichte, S. Valentin, H. Karl, I. Aad, and J. Widmer,
Analyzing space/capacity tradeoffs of cooperative wireless networks using a probabilistic model of interference,
ACM MSWiM 2009.

C. Soghoian, and I. Aad,
Merx: Secure and Privacy Preserving Delegated Payments,
TRUST, April 6-8, 2009, Oxford, UK.

H. S. Lichte, S. Valentin, H. von Malm, H. Karl, A. Bin Sediq, and I. Aad,
Rate-per-link adaptation in cooperative wireless networks with multi-rate combining,
IEEE International Conference on Communications (ICC), 2009, Dresden, Germany.

S. Valentin, H. Lichte, H. Karl, I. Aad, L. Loyola, and J. Widmer,
Opportunistic relaying vs. selective cooperation: Analyzing the occurrence-conditioned outage capacity,
ACM MSWiM, October 27-31, 2008, Vancouver, Canada.

H.Lichte, S. Valentin, H. Karl, I. Aad, L.Loyola, and J. Widmer,
Design and evaluation of a routing-informed cooperative MAC protocol for ad hoc networks,
IEEE Infocom mini-track, April 13-18, 2008, Phoenix, USA.

L. Loyola, H. Lichte, I. Aad, J.Widmer, and S. Valentin,
Increasing the capacity of IEEE 802.11 Wireless LAN through cooperative coded transmissions,
IEEE VTC, May 11-14, 2008, Singapore.

I. Aad, P. Hofmann, L. Loyola, R. Farhan, and J. Widmer,
Self-organizing 802.11-compatible MAC with Elastic Realtime Scheduling
IEEE MASS, October 9-11, 2007, Pisa, Italy.

I. Aad, J.-P. Hubaux, and E. Knightly,
Impact of denial of service attacks on ad hoc networks,
IEEE/ACM Transactions on Networking, 2007.

M. Raya, P. Papadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux,
Eviction of misbehaving and faulty nodes in vehicular networks,
IEEE JSAC Special issue on vehicular networks, 2007.

I. Aad, P. Hofmann, L. Loyola, R. Farhan and J. Widmer,
E-MAC: Self-organizing 802.11-compatible MAC with elastic real-time scheduling, Poster and demo,
ACM MobiSys, June 11-14, 2007, San-Juan, Puerto-Rico.

R. Vilzmann, J. Widmer, I. Aad and C. Hartmann,
Interferer nulling based on neighborhood communication patterns,
Tyrrhenian international workshop (TIWDC), 9-12 September 2007, Naples, Italy.

P. Hofmann, C. Any, L. Loyola and I. Aad,
Analysis of UDP, TCP and Voice Performance in IEEE 802.11b Multihop Networks,
European Wireless, April 1-4, 2007, Paris, France.

S. Valentin, H. Lichte, H. Karl, G. Vivier, S. Simoens, J. Vidal, A. Agustin and I. Aad,
Cooperative wireless networking beyond store-and-forward: Perspectives for PHY and MAC design,
WWRF WG3 white paper, November 15-17, 2006, Heidelberg, Germany.

I. Aad,
DoS attacks, then what?,
CFIP, keynote speech, October 30 - November 3, 2006, Tozeur, Tunisia.

R. Vilzmann, J. Widmer, I. Aad and C. Hartmann,
Low-complexity beamforming techniques for wireless multihop networks,
IEEE SECON, September 25-28, 2006, Reston, USA.

I. Aad, C. Castelluccia and J.-P. Hubaux,
Packet coding for strong anonymity in ad hoc networks,
IEEE Securecomm, August 28 - September 1, 2006, Baltimore, USA.

M. Raya, I. Aad, J.-P. Hubaux and A. Elfawal,
DOMINO: Detecting MAC layer greedy behavior in IEEE 802.11 hotspots,
IEEE Transactions on Mobile Computing, 2006.

M. Cagalj, S. Ganeriwal, I. Aad and J.-P. Hubaux,
On selfish behavior in CSMA/CA networks,
IEEE Infocom, March 2005, Miami, USA.

I. Aad, Q. Ni, C. Barakat and T. Turletti,
Enhancing IEEE 802.11 MAC in congested environments,
Elsevier Computer Communications Journal (Special issue), 2005.

I. Aad, J.-P. Hubaux and E. Knightly,
Denial of service resilience in ad hoc networks,
ACM MobiCom, September 2004, Philadelphia, USA.

I. Aad, Q. Ni, C. Barakat and T. Turletti,
Enhancing IEEE 802.11 MAC in congested environments,
IEEE 4th workshop on applications and services in wireless networks (ASWN), August 2004, Boston, USA.

M. Raya, J.-P. Hubaux and I. Aad,
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots,
ACM MobiSys, June 2004, Boston, USA.

Q. Ni, I. Aad, C. Barakat and T. Turletti,
Modeling and analysis of slow CW decrease for IEEE 802.11 WLAN,
IEEE PIMRC, September 2003, Beijing, China.

I. Aad and C. Castelluccia,
Enhancing IEEE 802.11 performance in congested environments,
Annales des télécommunications, March-April 2003.

I. Aad and C. Castelluccia,
Priorities in WLANs,
Computer Networks magazine, vol. 41/4 pp 505 - 526, February 2003.

I. Aad, Q. Ni, C. Castelluccia and T. Turletti,
Enhancing IEEE 802.11 performance with slow CW decrease,
802.11 TGe meeting, November 2002, Hawaii, USA.

I. Aad,
Quality of service in local area networks,
Ph.D. Thesis, 2002.

I. Aad and C. Castelluccia,
Wireless networks technologies tutorial,
RHDM summer school, May 2002, Autrans, France.

I. Aad and C. Castelluccia,
Remarks on per-flow differentiation in IEEE 802.11,
European Wireless, February 2002, Florence, Italy.

I. Aad and C. Castelluccia,
Differentiation mechanisms for IEEE 802.11,
IEEE Infocom, April 2001, Anchorage, USA.

I. Aad and C. Castelluccia,
Service differentiation in IEEE 802.11,
IPCN, April 2001, Paris, France.

I. Aad and C. Castelluccia,
Introducing service differentiation into IEEE 802.11,
IEEE Symposium on Computers and Communications (ISCC), July 2000, Antibes, France.

 

T. Braun, C. Castelluccia, G. Stattenberger and I. Aad,

An analysis of the DiffServ approach in mobile environments,

IQWiM Workshop, April 1999, Aachen, Germany.

 


Patents

 

I. Aad, “Method and Apparatus for Accessing and Displaying Private User Information (A1),” Patent US2 014 081 980, May 9, 2012.

 

I. Aad, D. Biswas, G.P. Perrucci, “Method and Apparatus for Categorizing Application Access Requestson a Device (A1),” Patent US2 014 006 616, Jun. 29, 2012.

 

I. Aad, V. Niemi, A. Durussel, E. D. Cristofaro, I. Bilogrevic, M. Jadliwala, J.-P. Hubaux, “Method and Apparatus for Preserving Privacy for Appointment Scheduling (A1),” Patent US2 012 215 845, Feb. 22,2011.

 

I. Aad, N. Asokan, “Preventing unintentionally violating privacy when sharing and/or publishing content (A1),” Patent WO2 013 098 587, Dec. 27, 2011.

 

D. Biswas, G.P. Perrucci, I. Aad, “Method And Apparatus Providing Privacy Benchmarking For Mobile Application Development (A1),” Patent US2 013 185 804, Jan. 18, 2011.

 

I. Aad, D. Biswas, F. Dawson, G.P. Perrucci, “Method And Apparatus Providing Privacy Benchmarking For Mobile Application Development (A1),” Patent US2 013 198 849, Jan. 30, 2012.

 

I. Aad, I. Bilogrevic, K. Huguenin, “Methods And Apparatus For Reporting Location Privacy (A1),” Patent US2 013 344 884, Jun. 28, 2012.

 

I. Aad, D. Biswas, G.P. Perrucci, J. Eberle, “Method And Apparatus Providing Privacy Setting And Monitoring User Interface (A1),” Patent WO2 013 098 467, Dec. 30, 2010.

 

I. Aad, V. Niemi, A. Mashatan, R. Chaabouni and S. Vaudenay, “Method and Apparatus for Providing Efficient Management of Certificate Revocation (A1),” Patent WO2 012 059 794, Nov. 05, 2010.

 

I. Aad, J. Freudiger, M. Jadliwala, J.-P. Hubaux, and M. Raya, “Method and Apparatus for Triggering User Communications Based on Privacy Information (A1),” Patent US2 011 219 423, Mar. 5, 2010.

 

L. Scalia, I. Aad, J. Widmer, “Method and apparatus for traffic flow differentiation (A1),” Patent EP2 259 509, Jun. 4, 2009.

 

L. Scalia, I. Aad, and J. Widmer, “Method and apparatus for adaptively setting the carrier sense threshold (A),” Patent JP2 010 193 446, Feb. 5, 2009.

 

I. Aad, J.Widmer, and A. Zugenmaier, “Method and Apparatus for Implementing a Virtual Network (A),”Patent JP2 010 081 603, Sep. 19, 2008.

 

A. Zugenmaier, and I. Aad, “Method and Apparatus for Authenticating Broadcast Message (A),” Patent JP2 009 296 576, May 8, 2008.

 

L. Loyola, I. Aad, and J. Widmer, “Method and Device for Data Transmission in Wireless Network (A),”Patent JP2 009 260 967, Apr. 15, 2008.

 

K. Igarashi, A. Yamada, L. Loyola, I. Aad, and J. Widmer, “Radio Terminal, Radio Base Station, andRadio Communication System (A1),” Patent US2 009 257 369, Apr. 15, 2008.

 

I. Aad, L. Loyola, J. Widmer, A. Yamada, and K. Igarashi, “Radio Terminal, Radio CommunicationSystem, and Radio Communication Method (A1),” Patent US2 009 257 368, Apr. 15, 2008.

 

I. Aad and H. Berndt, “Method and an apparatus for delivering a video stream (A1),” Patent EP2 091 205,Feb. 14, 2008.

 

C. Soghoian, and I. Aad, “Method and apparatus for performing delegated transactions (A1),” PatentUS2 009 198 617, Jul. 27, 2007.

 

I. Aad, L. Loyola, P. Hofmann, and J. Widmer, “Method and Apparatus for Real Time Scheduling of Traffic in Wireless Networks (A1),” Patent US2 008 232 285, Mar. 23, 2007.

 

S. Valentin, I. Aad, and H. Karl, “Transceiver Apparatus for Cooperative Wireless Network (A),” PatentJP2 008 228 289, 21, 2007.

 

L. Loyola, I. Aad, J. Widmer, and P. Hofmann, “Relay Apparatus for Relaying a Data Packet to be Transmitted from a First partner Transceiver to a Second Partner Transceiver (A),” Patent JP2 008 131 649, Nov.20, 2006.

 

I. Aad, and C. Prehofer, “Apparatus for detecting and Bypassing Misbehaving Nodes in Distrusted AdHoc Networks (A),” Patent JP2 008 048 385, 6 19, 2006.

 

. Widmer, I. Aad, R. Vilzmann, and C. Hartmann, “Choosing the beamforming direction of smart antennas (A),” Patent JP2 007 288 786, Apr. 12, 2006.

 

M. Raya, I. Aad and J.-P. Hubaux, “Misbehaving detection method for contention-based wireless communications (domino) (A1),” Patent US2 005 185 666, Feb. 23, 2004.

This site was designed with the
.com
website builder. Create your website today.
Start Now