Bogdan Carbunar
Bogdan Carbunar | |
---|---|
Born | Romania |
🏳️ Nationality | Romanian American |
🎓 Alma mater | Politehnica University of Bucharest Purdue University (PhD) |
💼 Occupation | |
🌐 Website | users |
Bogdan Carbunar is a Romanian computer scientist and a professor of computer science in FIU's School of Computing and Information Sciences since 2011.[8] His research centers on security, privacy, online social networks, distributed system and wireless networks.[9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33]
Education[edit]
Carbunar graduated in computer science at Politehnica University of Bucharest in 1999 and earned a Ph.D. degree in computer science from the Purdue University in 2005.[34][35]
Research[edit]
Carbunar is best known for some of his fundamental early work on wireless sensor networks and RFIDs and authored several book and book chapters.[36][37][38][39] He is the founder and director of Cyber Security and Privacy Research (CaSPR) Lab at FIU.[40][41][42][43][44] He and his Ph.D. students from CaSPR Lab developed SensCrypt, an encryption protocol designed specifically for low-energy fitness trackers using symmetric key encryption to protect against remote attacks that reduces communications costs. [45][46][47][48][49][50] He and his students developed a new technology to make fraudulent cell phone video easier to detect using sensor data.[51][52] He and his student developed a new camera based two-factor authentication (2FA) system Pixie that depends on an individual taking a picture of a personal object as a means to provide a more convenient and potentially secure alternative to traditional authentication processes.[53][54][55][56][57][58][59][60][61] He and his student recently developed a tool named AbuSniff that automatically protects Facebook users from data privacy abuse.[62][63][64][65]
References[edit]
- ↑ https://users.cs.fiu.edu/~carbunar/resume.pdf
- ↑ http://users.cis.fiu.edu/~mrahm004/
- ↑ http://users.cs.fiu.edu/~mazim003/
- ↑ http://users.cis.fiu.edu/~mrahm031/
- ↑ http://users.cis.fiu.edu/~stalu001/
- ↑ https://nhern121scisfiu.weebly.com
- ↑ http://latinsec.blogspot.com
- ↑ https://www.cis.fiu.edu/faculty-staff/carbunar-bogdan/
- ↑ Potharaju, Rahul; Rahman, Mizanur; Carbunar, Bogdan (2017). "A Longitudinal Study of Google Play". IEEE Transactions on Computational Social Systems (TCSS). 4 (3): 135–149. doi:10.1109/TCSS.2017.2732167.
- ↑ Rahman, Mahmudur; Azimpourkivi, Mozhgan; Topkara, Umut; Carbunar, Bogdan (2017). "Video Liveness for Citizen Journalism: Attacks and Defenses". IEEE Transactions on Mobile Computing. 16 (11): 3250–3263. doi:10.1109/TMC.2017.2687922.
- ↑ Rahman, Mahmudur; Rahman, Mizanur; Carbunar, Bogdan; Chau, Duen Horng (Polo) (2017). "Search Rank Fraud and Malware Detection in Google Play". IEEE Transactions on Knowledge and Data Engineering (TKDE). 29 (6): 1329–1342. doi:10.1109/TKDE.2017.2667658.
- ↑ Rahman, Mahmudur; Topkara, Umut; Carbunar, Bogdan (2016). "Movee: Video Liveness Verification for Mobile Devices Using Built-In Motion Sensors". IEEE Transactions on Mobile Computing (TMC). 15 (5): 197–1210. doi:10.1109/TMC.2015.2456904.
- ↑ Rahman, Mahmudur; Carbunar, Bogdan; Topkara, Umut (2016). "SecureManagement of Low Power Fitness Trackers". IEEE Transactions on Mobile Computing (TMC). 15 (2): 447–459. doi:10.1109/TMC.2015.2418774.
- ↑ Guo, Mingming; Jin, Xinyu; Pissinou, Niki; Zanlongo, Sebastian; Carbunar, Bogdan; Iyengar, S. S. (2015). "In-Network Trajectory Privacy Preservation". ACM Computing Surveys. 48 (2): 1–29. doi:10.1145/2818183. ISSN 0360-0300.
- ↑ Rahman, Mahmudur; Carbunar, Bogdan; Ballesteros, Jaime; Chau, Duen Horng Polo (2015). "To catch a fake: Curbing deceptive Yelp ratings and venues". Statistical Analysis and Data Mining: The ASA Data Science Journal. 8 (3): 147–161. doi:10.1002/sam.11264. ISSN 1932-1864.
- ↑ Ballesteros, Jaime; Carbunar, Bogdan; Rahman, Mahmudur; Rishe, Naphtali; Iyengar, S. S. (2014). "Towards Safe Cities: A Mobile and Social Networking Approach". IEEE Transactions on Parallel and Distributed Systems. 25 (9): 2451–2462. doi:10.1109/TPDS.2013.190. ISSN 1045-9219.
- ↑ Carbunar, Bogdan; Sion, Radu; Potharaju, Rahul; Ehsan, Moussa (2014). "Private Badges for Geosocial Networks". IEEE Transactions on Mobile Computing. 13 (10): 2382–2396. doi:10.1109/TMC.2013.95. ISSN 1536-1233.
- ↑ Carbunar, Bogdan; Rahman, Mahmudur; Ballesteros, Jaime; Rishe, Naphtali; Vasilakos, Athanasios V. (2014). "ProfilR: Toward Preserving Privacy and Functionality in Geosocial Networks". IEEE Transactions on Information Forensics and Security. 9 (4): 709–718. doi:10.1109/TIFS.2014.2307697. ISSN 1556-6013.
- ↑ Carbunar, Bogdan; Rahman, Mahmudur; Pissinou, Niki (2013). "A survey of privacy vulnerabilities and defenses in geosocial networks". IEEE Communications Magazine. 51 (11): 114–119. doi:10.1109/MCOM.2013.6658662. ISSN 0163-6804.
- ↑ Carbunar, Bogdan; Potharaju, Rahul; Pearce, Michael; Vasudevan, Venu (2012). "Network Aware Caching for Video on Demand systems": 1–9. doi:10.1109/WoWMoM.2012.6263704.
- ↑ Carbunar, Bogdan; Chen, Yao; Sion, Radu (2012). "Tipping Pennies? Privately Practical Anonymous Micropayments". IEEE Transactions on Information Forensics and Security. 7 (5): 1628–1637. doi:10.1109/TIFS.2012.2204982. ISSN 1556-6013.
- ↑ Carbunar, Bogdan; Sion, Radu (2012). "Toward Private Joins on Outsourced Data". IEEE Transactions on Knowledge and Data Engineering. 24 (9): 1699–1710. doi:10.1109/TKDE.2011.142. ISSN 1041-4347.
- ↑ Carbunar, Bogdan; Tripunitara, Mahesh V. (2012). "Payments for Outsourced Computations". IEEE Transactions on Parallel and Distributed Systems. 23 (2): 313–320. doi:10.1109/TPDS.2011.163. ISSN 1045-9219.
- ↑ Carbunar, Bogdan; Sion, Radu (2011). "Write-Once Read-Many Oblivious RAM". IEEE Transactions on Information Forensics and Security. 6 (4): 1394–1403. doi:10.1109/TIFS.2011.2160169. ISSN 1556-6013.
- ↑ Carbunar, Bogdan; Pearce, Michael; Mohapatra, Shivajit; Rittle, Loren J; Vasudevan, Venu; Carbunar, Octavian (2010). "Secure Synchronization of Periodic Updates in Ad Hoc Networks". IEEE Transactions on Parallel and Distributed Systems. 21 (8): 1060–1073. doi:10.1109/TPDS.2009.169. ISSN 1045-9219.
- ↑ Carbunar, Bogdan; Yu, Yang; Shi, Larry; Pearce, Michael; Vasudevan, Venu (2007). "Query privacy in wireless sensor networks": 203–212. doi:10.1109/SAHCN.2007.4292832.
- ↑ Carbunar, B.; Ioannidis, I.; Nita-Rotaru, C. (2009). "JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks". IEEE Transactions on Dependable and Secure Computing. 6 (4): 295–308. doi:10.1109/TDSC.2008.14. ISSN 1545-5971.
- ↑ Bhatt, Siddharth; Sion, Radu; Carbunar, Bogdan (2009). "A personal mobile DRM manager for smartphones". Computers & Security. 28 (6): 327–340. doi:10.1016/j.cose.2009.03.001. ISSN 0167-4048.
- ↑ Carbunar, Bogdan; Ramanathan, Murali Krishna; Koyutürk, Mehmet; Jagannathan, Suresh; Grama, Ananth (2009). "Efficient tag detection in RFID systems". Journal of Parallel and Distributed Computing. 69 (2): 180–196. doi:10.1016/j.jpdc.2008.06.013. ISSN 0743-7315.
- ↑ Cărbunar, Bogdan; Grama, Ananth; Vitek, Jan; Cărbunar, Octavian (2006). "Redundancy and coverage detection in sensor networks". ACM Transactions on Sensor Networks. 2 (1): 94–128. doi:10.1145/1138127.1138131. ISSN 1550-4859.
- ↑ Carbunar, Bogdan; Valente, Marco Tulio; Vitek, Jan (2004). "Coordination and mobility in CoreLime". Mathematical Structures in Computer Science. 14 (3): 397–419. doi:10.1017/S0960129504004177. ISSN 0960-1295.
- ↑ Azimpourkivi, Mozhgan; Topkara, Umut; Carbunar, Bogdan (2017). "Camera Based Two Factor Authentication Through Mobile and Wearable Devices". Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies. 1 (3): 1–37. doi:10.1145/3131904. ISSN 2474-9567.
- ↑ Recabarren, Ruben; Carbunar, Bogdan (2017). "Hardening Stratum, the Bitcoin Pool Mining Protocol". Proceedings on Privacy Enhancing Technologies. 2017 (3). doi:10.1515/popets-2017-0028. ISSN 2299-0984.
- ↑ "Bogdan Carbunar". users.cs.fiu.edu. Retrieved 2018-04-23.
- ↑ https://users.cs.fiu.edu/~carbunar/resume.pdf
- ↑ https://www.amazon.com/Coverage-Problems-Wireless-Sensor-Systems/dp/3639121562?tag=everybodywikien-20
- ↑ Optimal Tag Coverage and Tag Report Elimination
- ↑ https://link.springer.com/chapter/10.1007/978-3-319-14971-4_15
- ↑ https://scholar.google.com/citations?user=B7BCFdoAAAAJ&hl=en
- ↑ https://users.cs.fiu.edu/~carbunar/caspr.lab/caspr.html
- ↑ https://www.nsf.gov/awardsearch/showAward?AWD_ID=1450619
- ↑ http://thefc2.org/news/capacity-building-program-recipients.aspx
- ↑ https://www.bizjournals.com/southflorida/news/2017/03/06/recipients-of-600k-cybersecurity-grant-announced.html
- ↑ http://sigmm.org/news/sigmm_nicolas_georganas_award_2014
- ↑ http://www.vnews.com/Archives/2015/08/c2-WEARABLES-SECURITY-epk-vn
- ↑ https://www.nature.com/news/what-could-derail-the-wearables-revolution-1.18263
- ↑ https://phys.org/news/2015-08-wearable-devices.html
- ↑ http://www.post-gazette.com/news/surveillance-society/2015/08/03/Surveillance-Society-Wearable-fitness-devices-often-carry-security-risks/stories/201508030023
- ↑ http://enterprise.vnews.com/2015/08/09/hacking-into-your-fitbit/
- ↑ https://www.digi24.ro/magazin/timp-liber/vacante/destinatii-de-vacanta-locurile-pe-care-numai-caii-ti-le-arata-776003
- ↑ https://phys.org/news/2015-09-tech-authenticate-citizen-journalists-cellphone.html
- ↑ https://news.fiu.edu/2015/09/new-tech-to-authenticate-citizen-journalists-cellphone-footage/92222
- ↑ https://it.slashdot.org/story/17/10/29/235244/researchers-devise-2fa-system-that-relies-on-taking-photos-of-ordinary-objects
- ↑ https://www.cyberscoop.com/pixie-android-app-two-factor-authentication/
- ↑ https://www.bleepingcomputer.com/news/security/researchers-devise-2fa-system-that-relies-on-taking-photos-of-ordinary-objects/
- ↑ https://www.theverge.com/2017/10/26/16553900/2fa-two-factor-authentication-pixie-mobile-devices
- ↑ https://www.zdnet.com/article/how-to-turn-your-watch-shoes-or-junk-into-a-password/
- ↑ https://sdtimes.com/mobile-devices/researchers-add-physical-objects-two-factor-authentication/
- ↑ http://in.pcmag.com/news/117368/pixie-keeps-accounts-secure-using-pictures-of-personal-objec
- ↑ https://securityintelligence.com/news/photo-based-pixie-2fa-system-takes-authentication-to-a-new-dimension/
- ↑ https://www.theregister.co.uk/2017/10/25/pixie_2fa_project/
- ↑ https://www.nbcmiami.com/news/local/Facebook-Quizzes-Give-Personal-Data-to-Obscure-Companies-459217673.html
- ↑ https://www.cis.fiu.edu/nbc-6-discusses-dangers-facebook-quizzes-fiu-scis-ph-d-students/
- ↑ https://1fortlauderdale.com/facebook-quizzes-can-give-personal-data-to-obscure-companies/
- ↑ https://www.academia.edu/36252923/AbuSniff_Automatic_Detection_and_Defenses_Against_Abusive_Facebook_Friends
This article "Bogdan Carbunar" is from Wikipedia. The list of its authors can be seen in its historical and/or the page Edithistory:Bogdan Carbunar. Articles copied from Draft Namespace on Wikipedia could be seen on the Draft Namespace of Wikipedia and not main one.