Guillermo Suarez-Tangil
Orcid: 0000-0002-0455-2553Affiliations:
- IMDEA Networks Institute, Spain
According to our database1,
Guillermo Suarez-Tangil
authored at least 65 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proc. ACM Hum. Comput. Interact., 2024
Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security.
Proceedings of the 33rd USENIX Security Symposium, 2024
Reversing the Virtual Maze: An Overview of the Technical and Methodological Challenges for Metaverse App Analysis.
Proceedings of the IEEE International Conference on Metaverse Computing, 2024
Proceedings of the Eighteenth International AAAI Conference on Web and Social Media, 2024
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2024
A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums.
Proceedings of the Computer Security - ESORICS 2024, 2024
I love pineapple on pizza != I hate pineapple on pizza: Stance-Aware Sentence Transformers for Opinion Mining.
Proceedings of the 2024 Conference on Empirical Methods in Natural Language Processing, 2024
Proceedings of the Business Modeling and Software Design - 14th International Symposium, 2024
2023
Analysis of security and data control in smart personal assistants from the user's perspective.
Future Gener. Comput. Syst., July, 2023
HALE-IoT: Hardening Legacy Internet of Things Devices by Retrofitting Defensive Firmware Modifications and Implants.
IEEE Internet Things J., May, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Lady and the Tramp Nextdoor: Online Manifestations of Economic Inequalities in the Nextdoor Social Network.
CoRR, 2023
Lady and the Tramp Nextdoor: Online Manifestations of Real-World Inequalities in the Nextdoor Social Network.
Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, 2023
Proceedings of the IEEE European Symposium on Security and Privacy, 2023
Proceedings of the 5th International Conference on Conversational User Interfaces, 2023
AI in the Gray: Exploring Moderation Policies in Dialogic Large Language Models vs. Human Answers in Controversial Topics.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Proc. Priv. Enhancing Technol., 2022
Expert Syst. Appl., 2022
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Proceedings of the 22nd ACM Internet Measurement Conference, 2022
Proceedings of the CUI 2022: 4th Conference on Conversational User Interfaces, Glasgow, United Kingdom, July 26, 2022
2021
Novel Tools for the Management, Representation, and Exploitation of Textual Information.
Sci. Program., 2021
ACM Comput. Surv., 2021
Proceedings of the Fifteenth International AAAI Conference on Web and Social Media, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Future Gener. Comput. Syst., 2020
Proceedings of the 23rd International Symposium on Research in Attacks, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
2019
"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks.
Proc. ACM Hum. Comput. Interact., 2019
A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth.
Proceedings of the Internet Measurement Conference, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
IET Inf. Secur., 2018
Eight Years of Rider Measurement in the Android Malware Ecosystem: Evolution and Lessons Learned.
CoRR, 2018
Proceedings of the Internet Measurement Conference 2018, 2018
2017
Comput. Secur., 2017
Euphony: harmonious unification of cacophonous anti-virus vendor labels for Android malware.
Proceedings of the 14th International Conference on Mining Software Repositories, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
IEEE Trans. Mob. Comput., 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
AVRAND: A Software-Based Defense Against Code Reuse Attacks for AVR Embedded Devices.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016
Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016
2015
Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation.
Pervasive Mob. Comput., 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
2014
Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks.
Sensors, 2014
Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families.
Expert Syst. Appl., 2014
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
2013
Proceedings of the 5th International Conference on Cyber Conflict, 2013
2011
Artificial Immunity-based Correlation System.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2011
2009
Proceedings of the Computational Intelligence in Security for Information Systems, 2009