George Theodorakopoulos
Orcid: 0000-0003-2701-7809Affiliations:
- Cardiff University, UK
According to our database1,
George Theodorakopoulos
authored at least 55 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Review of Existing Methods for Generating and Detecting Fake and Partially Fake Audio.
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, 2024
2023
J. Cybersecur. Priv., December, 2023
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review.
J. Cybersecur. Priv., September, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
2021
Comput. Secur., 2021
Proceedings of the 24th International Conference on Artificial Intelligence and Statistics, 2021
2020
Secur. Commun. Networks, 2020
Location histogram privacy by Sensitive Location Hiding and Target Histogram Avoidance/Resemblance.
Knowl. Inf. Syst., 2020
Modelling perceived risks to personal privacy from location disclosure on online social networks.
Int. J. Geogr. Inf. Sci., 2020
A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol.
Concurr. Comput. Pract. Exp., 2020
Proceedings of the 2020 International Symposium on Networks, Computers and Communications, 2020
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2020
Towards using differentially private synthetic data for machine learning in collaborative data science projects.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Sensors, 2019
IEEE Internet Things J., 2019
Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance (extended version).
CoRR, 2019
CoRR, 2019
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019
2018
Comput. Secur., 2018
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder.
Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services, 2018
On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy.
ACM Trans. Priv. Secur., 2017
Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems.
Future Internet, 2017
Future Internet, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
An open framework for flexible plug-in privacy mechanisms in crowdsensing applications.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, 2017
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017
2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2015
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Eighth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops, 2014
2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Traps and pitfalls of using contact traces in performance studies of opportunistic networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
2010
Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers, ISBN: 978-3-031-79983-9, 2010
2009
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles.
Proceedings of the 2009 ACM Conference on Recommender Systems, 2009
Proceedings of the Sixth International Workshop on Vehicular Ad Hoc Networks, 2009
2008
IEEE J. Sel. Areas Commun., 2008
Proceedings of the 46th Annual Allerton Conference on Communication, 2008
2007
PhD thesis, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
2006
IEEE J. Sel. Areas Commun., 2006
Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004