Junade Ali
Junade Ali
Unknown affiliation
Verified email at junade.com - Homepage
Title
Cited by
Cited by
Year
Protocols for checking compromised credentials
L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
242019
Coverage and mobile sensor placement for vehicles on predetermined routes: A greedy heuristic approach
J Ali, V Dyo
SCITEPRESS–Science and Technology Publications, 2017
82017
Mechanism for the prevention of password reuse through anonymized hashes
J Ali
PeerJ PrePrints 5, e3322v1, 2017
62017
Cross hashing: Anonymizing encounters in decentralised contact tracing protocols
J Ali, V Dyo
2021 International Conference on Information Networking (ICOIN), 181-185, 2021
32021
Practical hash-based anonymity for mac addresses
J Ali, V Dyo
arXiv preprint arXiv:2005.06580, 2020
32020
String similarity algorithms for a ticket classification system
M Pikies, J Ali
2019 6th International Conference on Control, Decision and Information …, 2019
32019
Mastering PHP Design Patterns
J Ali
Packt Publishing Ltd, 2016
32016
Analysis and safety engineering of fuzzy string matching algorithms
M Pikies, J Ali
ISA transactions 113, 1-8, 2021
2021
Battery-assisted Electric Vehicle Charging: Data Driven Performance Analysis
J Ali, V Dyo, S Zhang
2020 IEEE PES Innovative Smart Grid Technologies Europe (ISGT-Europe), 429-433, 2020
2020
Novel Keyword Extraction and Language Detection Approaches
M Pikies, A Riyono, J Ali
arXiv preprint arXiv:2009.11832, 2020
2020
Password Authentication Attacks at Scale
J Ali, M Pikies
International Conference on Advanced Engineering Theory and Applications …, 2019
2019
Object Oriented PHP
J Ali
Lulu. com, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–12