George Theodorakopoulos

Affiliations:
  • Cardiff University, UK


According to our database1, George Theodorakopoulos authored at least 50 papers between 2004 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
On-the-Fly Privacy for Location Histograms.
IEEE Trans. Dependable Secur. Comput., 2022

2021
Joint obfuscation of location and its semantic information for privacy protection.
Comput. Secur., 2021

Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models.
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021

2020
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks.
Secur. Commun. Networks, 2020

Location histogram privacy by Sensitive Location Hiding and Target Histogram Avoidance/Resemblance.
Knowl. Inf. Syst., 2020

Multichain-MWPoW: A p/2 Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture.
IACR Cryptol. ePrint Arch., 2020

Modelling perceived risks to personal privacy from location disclosure on online social networks.
Int. J. Geogr. Inf. Sci., 2020

Password Managers - It's All about Trust and Transparency.
Future Internet, 2020

A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol.
Concurr. Comput. Pract. Exp., 2020

GDPR Compliance Verification in Internet of Things.
IEEE Access, 2020

Automating GDPR Compliance Verification for Cloud-hosted Services.
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020

Joint Obfuscation for Privacy Protection in Location-Based Social Networks.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020

Towards using differentially private synthetic data for machine learning in collaborative data science projects.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Detecting IoT User Behavior and Sensitive Information in Encrypted IoT-App Traffic.
Sensors, 2019

A Supervised Intrusion Detection System for Smart Home IoT Devices.
IEEE Internet Things J., 2019

Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance (extended version).
CoRR, 2019

Ultimate Power of Inference Attacks: Privacy Risks of High-Dimensional Models.
CoRR, 2019

Privacy-Aware Cloud Ecosystems and GDPR Compliance.
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019

2018
EclipseIoT: A secure and adaptive hub for the Internet of Things.
Comput. Secur., 2018

Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018

Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018

On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy.
ACM Trans. Priv. Secur., 2017

Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems.
Future Internet, 2017

Private and Secure Distribution of Targeted Advertisements to Mobile Phones.
Future Internet, 2017

Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted?
Proceedings of the Security and Privacy in Communication Networks, 2017

An open framework for flexible plug-in privacy mechanisms in crowdsensing applications.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017

Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

2016
On the Inference of User Paths from Anonymized Mobility Data.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2015
The Same-Origin Attack against Location Privacy.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

2014
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration.
IEEE Trans. Dependable Secur. Comput., 2014

Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Cognitive Structure of Collective Awareness Platforms.
Proceedings of the Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2014

2013
Selfish Response to Epidemic Propagation.
IEEE Trans. Autom. Control., 2013

Broker Emergence in Social Clouds.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Traps and pitfalls of using contact traces in performance studies of opportunistic networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Protecting location privacy: optimal strategy against localization attacks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Quantifying Location Privacy.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Quantifying Location Privacy: The Case of Sporadic Location Exposure.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Collaborative Location Privacy.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

2010
Path Problems in Networks
Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers, 2010

2009
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009

Adaptive message authentication for vehicular networks.
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009

2008
Game Theoretic Modeling of Malicious Users in Collaborative Networks.
IEEE J. Sel. Areas Commun., 2008

2007
Robust Network Trust Establishment for Collaborative Applications and Protocols.
PhD thesis, 2007

Malicious Users in Unstructured Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

2006
On trust models and trust evaluation metrics for ad hoc networks.
IEEE J. Sel. Areas Commun., 2006

Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2004
Trust evaluation in ad-hoc networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004


  Loading...