Roksana Boreli

According to our database1, Roksana Boreli authored at least 70 papers between 2004 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

2016
Smart-Phones Attacking Smart-Homes.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

BLEST: Blocking estimation-based MPTCP scheduler for heterogeneous networks.
Proceedings of the 2016 IFIP Networking Conference, 2016

k-variates++: more pluses in the k-means++.
Proceedings of the 33nd International Conference on Machine Learning, 2016

A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
On the impact of link layer retransmission schemes on TCP over 4G satellite links.
Int. J. Satellite Communications Networking, 2015

Improving web experience on DVB-RCS2 links.
Annales des Télécommunications, 2015

Network-level security and privacy control for smart-home IoT devices.
Proceedings of the 11th IEEE International Conference on Wireless and Mobile Computing, 2015

Applying Differential Privacy to Matrix Factorization.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

An Early Look at Multipath TCP Deployment in the Wild.
Proceedings of the 6th International Workshop on Hot Topics in Planet-Scale Measurement, 2015

2014
Linking wireless devices using information contained in Wi-Fi probe requests.
Pervasive and Mobile Computing, 2014

ProfileGuard: Privacy Preserving Obfuscation for Mobile User Profiles.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Secure Evaluation Protocol for Personalized Medicine.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Information leakage through mobile analytics services.
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014

On the Effectiveness of Obfuscation Techniques in Online Social Networks.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

PrivacyCanary: Privacy-Aware Recommenders with Adaptive Input Obfuscation.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

Characterising user targeting for in-App Mobile Ads.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

DAPS: Intelligent delay-aware packet scheduling for multipath transport.
Proceedings of the IEEE International Conference on Communications, 2014

Asynchronous Covert Communication Using BitTorrent Trackers.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Loki: A privacy-conscious platform for crowdsourced surveys.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

An experimental study of security and privacy risks with emerging household appliances.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

CLIFT: A Cross-Layer InFormation Tool for latency analysis based on real satellite physical traces.
Proceedings of the 7th Advanced Satellite Multimedia Systems Conference and the 13th Signal Processing for Space Communications Workshop, 2014

2013
Resources-aware trusted node selection for content distribution in mobile ad hoc networks.
Wireless Networks, 2013

Performance Modeling and Simulation for Future Mobile Networks.
Mathematical and Computer Modelling, 2013

Revealing Social Links Between Owners of Wi-Fi Enabled Smartphones.
ERCIM News, 2013

Collaborative network outage troubleshooting with secure multiparty computation.
IEEE Communications Magazine, 2013

Differential privacy in intelligent transportation systems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
Proceedings of the SECRYPT 2013, 2013

How Much Is Too Much? Leveraging Ads Audience Estimation to Evaluate Public Profile Uniqueness.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

A Layered Secret Sharing Scheme for Automated Profile Sharing in OSN Groups.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

eCMT-SCTP: Improving performance of multipath SCTP with erasure coding over lossy links.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Private and resilient data aggregation.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

The Where and When of Finding New Friends: Analysis of a Location-based Social Discovery Network.
Proceedings of the Seventh International Conference on Weblogs and Social Media, 2013

Exposing and mitigating privacy loss in crowdsourced survey platforms.
Proceedings of the 2013 workshop on Student workhop, 2013

Federated flow-based approach for privacy preserving connectivity tracking.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

Mitigating Receiver's Buffer Blocking by Delay Aware Packet Scheduling in Multipath Data Transfer.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
On the quality of VoIP with DCCP for satellite communications.
Int. J. Satellite Communications Networking, 2012

Improving the efficiency of anonymous routing for MANETs.
Computer Communications, 2012

On the limit of fountain MDC codes for video Peer-To-Peer networks.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

I know who you will meet this evening! Linking wireless devices using Wi-Fi probe requests.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Is more always merrier?: a deep dive into online social footprints.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Big friend is watching you: analyzing online social networks tracking capabilities.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

A novel unbalanced tree structure for low-cost authentication of streaming content on mobile and sensor devices.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Enabling realistic cross-layer analysis based on satellite physical layer traces.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Heterogeneous Secure Multi-Party Computation.
Proceedings of the NETWORKING 2012, 2012

Evaluating User-Centric Multihomed Flow Management for Mobile Devices in Simulated Heterogeneous Networks.
Proceedings of the Mobile Networks and Management - 4th International Conference, 2012

Inferring user relationship from hidden information in WLANs.
Proceedings of the 31st IEEE Military Communications Conference, 2012

Performance evaluation of multipath transport protocol in heterogeneous network environments.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

On graphs supporting greedy forwarding for directional wireless networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Tree-based double-covered broadcast for wireless ad hoc networks.
Proceedings of the 9th ACM International Workshop on Mobility Management & Wireless Access, 2011

Trust-Based Content Distribution for Mobile Ad Hoc Networks.
Proceedings of the MASCOTS 2011, 2011

Environmental context aware trust in mobile P2P networks.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

User- and application-centric multihomed flow management.
Proceedings of the IEEE 36th Conference on Local Computer Networks, 2011

Xstream-X264: Real-time H.264 streaming with cross-layer integration.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

Mitigating the Impact of Packet Reordering to Maximize Performance of Multimedia Applications.
Proceedings of IEEE International Conference on Communications, 2011

Experimental evaluation of BitTorrent-like protocols for on-demand streaming.
Proceedings of the Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks, 2011

2010
TARo: Trusted Anonymous Routing for MANETs.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Optimization of WiMax modulation scheme with a cross layer erasure code.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

A cross layer scheme for maximising the combination of wireless VoIP capacity and quality.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Performance of VoIP with DCCP for Satellite Links.
Proceedings of IEEE International Conference on Communications, 2009

DART: Enhancing Data Acceleration with Compression for Satellite Links.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A mobility toolbox architecture for all-IP networks: an ambient networks approach.
IEEE Wireless Commun., 2008

Adapting TFRC to mobile networks with frequent disconnections.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
Secure Host Identity Delegation for Mobility.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2006
HarMoNy - HIP Mobile Networks.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

2005
GSA: an architecture for optimising gateway selection in dynamic routing groups.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Failover for Mobile Routers: A Vision of Resilient Ambience.
Proceedings of the Networking, 2005

Secure Identity and Location Decoupling Using Peer-to-Peer Networks.
Proceedings of the Networking, 2005

Identity Location Decoupling in Pervasive Computing Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Performance Analysis of Reliable Multicast Transport Protocols for GEO Satellite Networks.
Proceedings of the 12th International Workshop on Modeling, 2004


  Loading...