- Cardiff University, UK
According to our database1, George Theodorakopoulos authored at least 50 papers between 2004 and 2022.
Legend:Book In proceedings Article PhD thesis Other
IEEE Trans. Dependable Secur. Comput., 2022
Comput. Secur., 2021
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021
Secur. Commun. Networks, 2020
Location histogram privacy by Sensitive Location Hiding and Target Histogram Avoidance/Resemblance.
Knowl. Inf. Syst., 2020
Multichain-MWPoW: A p/2 Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture.
IACR Cryptol. ePrint Arch., 2020
Modelling perceived risks to personal privacy from location disclosure on online social networks.
Int. J. Geogr. Inf. Sci., 2020
A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol.
Concurr. Comput. Pract. Exp., 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
Towards using differentially private synthetic data for machine learning in collaborative data science projects.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
IEEE Internet Things J., 2019
Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance (extended version).
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019
Comput. Secur., 2018
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy.
ACM Trans. Priv. Secur., 2017
Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems.
Future Internet, 2017
Future Internet, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
An open framework for flexible plug-in privacy mechanisms in crowdsensing applications.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
IEEE Trans. Dependable Secur. Comput., 2014
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2014
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
Traps and pitfalls of using contact traces in performance studies of opportunistic networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers, 2010
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009
IEEE J. Sel. Areas Commun., 2008
PhD thesis, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
IEEE J. Sel. Areas Commun., 2006
Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004