Emiliano De Cristofaro
Title
Cited by
Cited by
Year
Practical private set intersection protocols with linear complexity
E De Cristofaro, G Tsudik
Financial Cryptography and Data Security, 143-159, 2010
3422010
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes
P Baldi, R Baronio, E De Cristofaro, P Gasti, G Tsudik
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2122011
Linear-complexity private set intersection protocols secure in malicious model
E De Cristofaro, J Kim, G Tsudik
Advances in Cryptology-ASIACRYPT 2010, 213-231, 2010
1862010
Fast and Private Computation of Cardinality of Set Intersection and Union
E De Cristofaro, P Gasti, G Tsudik
CANS 2012, 2012
153*2012
Hummingbird: Privacy at the time of Twitter
E De Cristofaro, C Soriente, G Tsudik, A Williams
IEEE Security and Privacy 2012, 2012
1462012
Mean birds: Detecting aggression and bullying on twitter
D Chatzakou, N Kourtellis, J Blackburn, E De Cristofaro, G Stringhini, ...
Proceedings of the 2017 ACM on Web Science Conference, 13-22, 2017
1382017
MamaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
E Mariconti, L Onwuzurike, P Andriotis, E De Cristofaro, G Ross, ...
24th Network and Distributed System Security Symposium (NDSS 2017), 2017
1342017
Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web
GE Hine, J Onaolapo, E De Cristofaro, N Kourtellis, I Leontiadis, ...
11th International AAAI Conference on Web and Social Media (ICWSM 2017), 2017
1112017
Privacy in Content-Oriented Networking: Threats and Countermeasures
A Chaabane, E De Cristofaro, MA Kaafar, E Uzun
Computer Communication Review 43 (3), 25-33, 2012
1082012
PEPSI---privacy-enhanced participatory sensing infrastructure
E De Cristofaro, C Soriente
Proceedings of the fourth ACM conference on Wireless network security, 23-28, 2011
107*2011
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots
E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq
IMC 2014, 2014
1052014
LOGAN: Membership Inference Attacks Against Generative Models
J Hayes, L Melis, G Danezis, E De Cristofaro
Proceedings on Privacy Enhancing Technologies 2019 (1), 133-152, 2019
92*2019
Exploiting Unintended Feature Leakage in Collaborative Learning
L Melis, C Song, E De Cristofaro, V Shmatikov
IEEE Symposium on Security and Privacy, 2019
89*2019
Participatory privacy: Enabling privacy in participatory sensing
E De Cristofaro, C Soriente
Network, IEEE 27 (1), 32-36, 2013
892013
EphPub: Toward Robust Ephemeral Publishing
C Castelluccia, E De Cristofaro, A Francillon, MA Kaafar
ICNP 2011, 2011
882011
(If) size matters: size-hiding private set intersection
G Ateniese, E De Cristofaro, G Tsudik
International Workshop on Public Key Cryptography, 156-173, 2011
822011
Experimenting with Fast Private Set Intersection
E De Cristofaro, G Tsudik
Trust and Trustworthy Computing, 55-73, 2012
70*2012
Knock Knock, Who's There? Membership Inference on Aggregate Location Data
A Pyrgelis, C Troncoso, E De Cristofaro
Network and Distributed Systems Symposium (NDSS), 2018
682018
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity
C Blundo, E De Cristofaro, P Gasti
Journal of Computer Security 22 (3), 355-381, 2014
642014
A Comparative Usability Study of Two-Factor Authentication
E De Cristofaro, H Du, J Freudiger, G Norcie
USEC 2014, 2014
63*2014
The system can't perform the operation now. Try again later.
Articles 1–20