Soteris Demetriou

Orcid: 0000-0003-0318-9171

According to our database1, Soteris Demetriou authored at least 37 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech.
CoRR, 2024

Prosody-Driven Privacy-Preserving Dementia Detection.
CoRR, 2024

Adversarial 3D Virtual Patches using Integrated Gradients.
Proceedings of the IEEE Security and Privacy, 2024

MobileConfig: Remote Configuration Management for Mobile Apps at Hyperscale.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

Username Squatting on Online Social Networks: A Study on X.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Evaluating User Behavior in Smartphone Security: A Psychometric Perspective.
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023


ServiceRouter: Hyperscale and Minimal Cost Service Mesh at Meta.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Conveyor: One-Tool-Fits-All Continuous Software Deployment at Meta.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

2022
Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception.
Proceedings of the 43rd IEEE Security and Privacy, 2022

Data Augmentation for Dementia Detection in Spoken Language.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems.
Proceedings of the EuroUSEC 2022: European Symposium on Usable Security, Karlsruhe, Germany, September 29, 2022

2021
Open, Sesame! Introducing Access Control to Voice Services.
CoRR, 2021

Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception.
CoRR, 2021

Quantifying Information Leakage from Gradients.
CoRR, 2021

Object Removal Attacks on LiDAR-based 3D Object Detectors.
CoRR, 2021

Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
Proceedings of the Computer Security - ESORICS 2021, 2021

Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Layer-wise Characterization of Latent Information Leakage in Federated Learning.
CoRR, 2020

GhostBuster: Looking Into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing.
CoRR, 2020

Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security.
CoRR, 2020

DarkneTZ: towards model privacy at the edge using trusted execution environments.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

2019
BEEER: distributed record and replay for medical devices in hospital operating rooms.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

2018
Analyzing & designing the security of shared resources on smartphone operating systems
PhD thesis, 2018

Resolving the Predicament of Android Custom Permissions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

CoDrive: Improving Automobile Positioning via Collaborative Driving.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017

Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness.
CoRR, 2017

HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

CamForensics: Understanding Visual Privacy Leaks in the Wild.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Ghost Installer in the Shadow: Security Analysis of App Installation on Android.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Free for All! Assessing User Data Exposure to Advertising Libraries on Android.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

2014
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Discovering the invisible city: Location-based games for learning in smart cities.
IxD&A, 2013

Identity, location, disease and more: inferring your secrets from android public resources.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...