George Theodorakopoulos
George Theodorakopoulos
Verified email at cardiff.ac.uk - Homepage
Title
Cited by
Cited by
Year
Quantifying location privacy
R Shokri, G Theodorakopoulos, JY Le Boudec, JP Hubaux
2011 IEEE symposium on security and privacy, 247-262, 2011
6492011
On trust models and trust evaluation metrics for ad hoc networks
G Theodorakopoulos, JS Baras
IEEE Journal on selected areas in Communications 24 (2), 318-328, 2006
6392006
Trust evaluation in ad-hoc networks
G Theodorakopoulos, JS Baras
Proceedings of the 3rd ACM workshop on Wireless security, 1-10, 2004
3482004
Protecting Location Privacy: Optimal Strategy against Localization Attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
ACM Conference on Computer and Communications Security (CCS), 2012
3342012
Hiding in the mobile crowd: Locationprivacy through collaboration
R Shokri, G Theodorakopoulos, P Papadimitratos, E Kazemi, JP Hubaux
IEEE transactions on dependable and secure computing 11 (3), 266-279, 2013
1622013
Quantifying Location Privacy: The Case of Sporadic Location Exposure
R Shokri, G Theodorakopoulos, G Danezis, JP Hubaux, JY Le Boudec
Privacy Enhancing Technologies, 57-76, 2011
1322011
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles
R Shokri, P Pedarsani, G Theodorakopoulos, JP Hubaux
Proceedings of the third ACM conference on Recommender systems, 157-164, 2009
1242009
Game theoretic modeling of malicious users in collaborative networks
G Theodorakopoulos, JS Baras
Selected Areas in Communications, IEEE Journal on 26 (7), 1317-1327, 2008
932008
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
682014
Path problems in networks
JS Baras, G Theodorakopoulos
Synthesis Lectures on Communication Networks 3 (1), 1-77, 2010
632010
Collaborative location privacy
R Shokri, P Papadimitratos, G Theodorakopoulos, JP Hubaux
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
582011
Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks
N Ristanovic, G Theodorakopoulos, JY Le Boudec
Computer Communications (IEEE INFOCOM 2012), 31st Annual IEEE International …, 2012
542012
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos, C Troncoso
ACM Transactions on Privacy and Security (TOPS) 19 (4), 1-31, 2016
532016
Selfish Response to Epidemic Propagation
G Theodorakopoulos, JY Le Boudec, J Baras
IEEE Transactions on Automatic Control 58 (2), 363--376, 2013
492013
Selfish response to epidemic propagation
G Theodorakopoulos, JY Le Boudec, JS Baras
American Control Conference (ACC), 2011, 4069-4074, 2011
492011
Malicious users in unstructured networks
G Theodorakopoulos, JS Baras
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
472007
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
JS Baras, S Radosavac, G Theodorakopoulos, D Sterne, P Budulas, ...
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
422007
Adaptive message authentication for multi-hop networks
N Ristanovic, P Papadimitratos, G Theodorakopoulos, JP Hubaux, ...
2011 Eighth International Conference on Wireless On-Demand Network Systems …, 2011
192011
On the inference of user paths from anonymized mobility data
G Tsoukaneri, G Theodorakopoulos, H Leather, MK Marina
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 199-213, 2016
182016
A supervised intrusion detection system for smart home IoT devices
E Anthi, L Williams, M Słowińska, G Theodorakopoulos, P Burnap
IEEE Internet of Things Journal 6 (5), 9042-9053, 2019
172019
The system can't perform the operation now. Try again later.
Articles 1–20