| TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks M Srivatsa, L Xiong, L Liu Proceedings of the 14th international conference on World Wide Web, 422-431, 2005 | 476 | 2005 |
| Deanonymizing mobility traces: Using social network as a side-channel M Srivatsa, M Hicks Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 358 | 2012 |
| Vulnerabilities and security threats in structured overlay networks: A quantitative analysis M Srivatsa, L Liu 20th Annual Computer Security Applications Conference, 252-261, 2004 | 183 | 2004 |
| On generating characteristic-rich question sets for qa evaluation Y Su, H Sun, B Sadler, M Srivatsa, I Gür, Z Yan, X Yan Proceedings of the 2016 Conference on Empirical Methods in Natural Language …, 2016 | 160 | 2016 |
| Structural data de-anonymization: Quantification, practice, and implications S Ji, W Li, M Srivatsa, R Beyah Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 140 | 2014 |
| Supporting cooperative caching in disruption tolerant networks W Gao, G Cao, A Iyengar, M Srivatsa 2011 31st International Conference on Distributed Computing Systems, 151-161, 2011 | 131 | 2011 |
| Securing publish-subscribe overlay services with eventguard M Srivatsa, L Liu Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 126 | 2005 |
| Darnet: A deep learning solution for distracted driving detection C Streiffer, R Raghavendra, T Benson, M Srivatsa Proceedings of the 18th acm/ifip/usenix middleware conference: Industrial …, 2017 | 114 | 2017 |
| Mitigating application-level denial of service attacks on Web servers: A client-transparent approach M Srivatsa, A Iyengar, J Yin, L Liu ACM Transactions on the Web (TWEB) 2 (3), 1-49, 2008 | 113 | 2008 |
| Cooperative caching for efficient data access in disruption tolerant networks W Gao, G Cao, A Iyengar, M Srivatsa IEEE Transactions on Mobile Computing 13 (3), 611-625, 2013 | 103 | 2013 |
| Beyond spatial auto-regressive models: Predicting housing prices with satellite imagery AJ Bency, S Rallapalli, RK Ganti, M Srivatsa, BS Manjunath 2017 IEEE winter conference on applications of computer vision (WACV), 320-329, 2017 | 95 | 2017 |
| Protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages AK Iyengar, M Srivatsa, J Yin US Patent 8,250,631, 2012 | 94 | 2012 |
| System and method for obtaining network link state information from sequential distance vector routing tables D Agrawal, A Beygelzimer, BJ Ko, M Srivatsa US Patent 7,961,642, 2011 | 94 | 2011 |
| Unsupervised learning to simplify distributed systems management R Raghavendra, M Srivatsa, JM Rosenkranz, C Streiffer US Patent 12,034,747, 2024 | 89 | 2024 |
| Apoidea: A decentralized peer-to-peer architecture for crawling the world wide web A Singh, M Srivatsa, L Liu, T Miller Workshop on Distributed Information Retrieval, 126-142, 2003 | 87 | 2003 |
| Efficient spatial query processing for big data K Lee, RK Ganti, M Srivatsa, L Liu Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances …, 2014 | 79 | 2014 |
| Eventguard: A system architecture for securing publish-subscribe networks M Srivatsa, L Liu, A Iyengar ACM Transactions on Computer Systems (TOCS) 29 (4), 1-40, 2011 | 78 | 2011 |
| Structure based data de-anonymization of social networks and mobility traces S Ji, W Li, M Srivatsa, JS He, R Beyah International Conference on Information Security, 237-254, 2014 | 77 | 2014 |
| An access control system for web service compositions M Srivatsa, A Iyengar, T Mikalsen, I Rouvellou, J Yin IEEE International Conference on Web Services (ICWS 2007), 1-8, 2007 | 76 | 2007 |
| Method for protecting against denial of service attacks using trust, quality of service, personalization, and hide port messages AK Iyengar, M Srivatsa, J Yin US Patent 7,721,091, 2010 | 71 | 2010 |