Thanassis Giannetsos

Orcid: 0000-0003-0663-2263

According to our database1, Thanassis Giannetsos authored at least 52 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Human-centric artificial intelligence architecture for industry 5.0 applications.
Int. J. Prod. Res., October, 2023

Human in the AI loop via xAI and Active Learning for Visual Inspection.
CoRR, 2023

Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security.
Proceedings of the IEEE Vehicular Networking Conference, 2023

Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets.
Proceedings of the 22nd IEEE International Conference on Trust, 2023


Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems.
Proceedings of the 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things, 2023

ZEKRA: Zero-Knowledge Control-Flow Attestation.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

RETRACT: Expressive Designated Verifier Anonymous Credentials.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems.
Sensors, 2022

Information and Future Internet Security, Trust and Privacy.
Future Internet, 2022

ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract.
Proceedings of the Blockchain Technology and Emerging Technologies, 2022

Combining ID's, Attributes, and Policies in Hyperledger Fabric.
Proceedings of the Blockchain Technology and Emerging Technologies, 2022

ZEKRO: Zero-Knowledge Proof of Integrity Conformance.
Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23, 2022

2021
A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly.
Future Internet, 2021

BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains.
CoRR, 2021

Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

A Perfect Match: Deep Learning Towards Enhanced Data Trustworthiness in Crowd-Sensing Systems.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2021

STARdom: An Architecture for Trusted and Secure Human-Centered Manufacturing Systems.
Proceedings of the Advances in Production Management Systems. Artificial Intelligence for Sustainable and Resilient Production Systems, 2021

Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems.
Proceedings of the 17th International Conference on Distributed Computing in Sensor Systems, 2021

2020
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT).
Comput. Commun., 2020

Modelling Audiological Preferences using Federated Learning.
Proceedings of the Adjunct Publication of the 28th ACM Conference on User Modeling, 2020

Orchestrating SDN Control Plane towards Enhanced IoT Security.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

CloudVaults: Integrating Trust Extensions into System Integrity Verification for Cloud-Based Environments.
Proceedings of the Computer Security - ESORICS 2020 International Workshops, 2020

2nd Workshop on Cyber-Security Arms Race (CYSARM 2020).
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019

A taxonomy and survey of attacks against machine learning.
Comput. Sci. Rev., 2019

REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems.
Comput. Commun., 2019

Secure Edge Computing with Lightweight Control-Flow Property-based Attestation.
Proceedings of the 5th IEEE Conference on Network Softwarization, 2019

CrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart Contracts.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

1st Workshop on Cyber-Security Arms Race (CYSARM 2019).
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Securing V2X Communications for the Future: Can PKI Systems offer the answer?
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Unsupervised Learning for Trustworthy IoT.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

Situational Awareness in Virtual Networks: The ASTRID Approach.
Proceedings of the 7th IEEE International Conference on Cloud Networking, 2018

2017
Privacy-enhanced capabilities for VANETs using direct anonymous attestation.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

2016
Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems.
IEEE Internet Things J., 2016

Android privacy C(R)ache: reading your external storage and sensors for fun and profit.
Proceedings of the 2nd ACM Workshop on Privacy-Aware Mobile Computing, 2016

2015
SHIELD: a data verification framework for participatory sensing systems.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2014
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks.
J. Comput. Syst. Sci., 2014

SPPEAR: security & privacy-preserving architecture for participatory-sensing applications.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Trustworthy People-Centric Sensing: Privacy, security and user incentives road-map.
Proceedings of the 13th Annual Mediterranean Ad Hoc Networking Workshop, 2014

2013
SEROSA: SERvice oriented security architecture for Vehicular Communications.
Proceedings of the 2013 IEEE Vehicular Networking Conference, 2013

2012
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
Wirel. Pers. Commun., 2012

2011
People-centric sensing in assistive healthcare: Privacy challenges and directions.
Secur. Commun. Networks, 2011

2010
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices.
Comput. J., 2010

Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2009
Cooperative Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Wireless Sensor Networks, 6th European Conference, 2009

Self-propagating worms in wireless sensor networks.
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009

2008
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

LIDeA: a distributed lightweight intrusion detection architecture for sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

2007
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2007


  Loading...