George Theodorakopoulos
George Theodorakopoulos
Verified email at cardiff.ac.uk - Homepage
Title
Cited by
Cited by
Year
On trust models and trust evaluation metrics for ad hoc networks
G Theodorakopoulos, JS Baras
IEEE Journal on selected areas in Communications 24 (2), 318-328, 2006
6262006
Quantifying location privacy
R Shokri, G Theodorakopoulos, JY Le Boudec, JP Hubaux
2011 IEEE symposium on security and privacy, 247-262, 2011
6192011
Trust evaluation in ad-hoc networks
G Theodorakopoulos, JS Baras
Proceedings of the 3rd ACM workshop on Wireless security, 1-10, 2004
3472004
Protecting Location Privacy: Optimal Strategy against Localization Attacks
R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec
ACM Conference on Computer and Communications Security (CCS), 2012
3232012
Hiding in the mobile crowd: Locationprivacy through collaboration
R Shokri, G Theodorakopoulos, P Papadimitratos, E Kazemi, JP Hubaux
IEEE transactions on dependable and secure computing 11 (3), 266-279, 2013
1522013
Quantifying Location Privacy: The Case of Sporadic Location Exposure
R Shokri, G Theodorakopoulos, G Danezis, JP Hubaux, JY Le Boudec
Privacy Enhancing Technologies, 57-76, 2011
1292011
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles
R Shokri, P Pedarsani, G Theodorakopoulos, JP Hubaux
Proceedings of the third ACM conference on Recommender systems, 157-164, 2009
1212009
Game theoretic modeling of malicious users in collaborative networks
G Theodorakopoulos, JS Baras
Selected Areas in Communications, IEEE Journal on 26 (7), 1317-1327, 2008
942008
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services
G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014
632014
Path problems in networks
JS Baras, G Theodorakopoulos
Synthesis Lectures on Communication Networks 3 (1), 1-77, 2010
602010
Collaborative location privacy
R Shokri, P Papadimitratos, G Theodorakopoulos, JP Hubaux
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
542011
Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks
N Ristanovic, G Theodorakopoulos, JY Le Boudec
Computer Communications (IEEE INFOCOM 2012), 31st Annual IEEE International …, 2012
532012
Privacy games along location traces: A game-theoretic framework for optimizing location privacy
R Shokri, G Theodorakopoulos, C Troncoso
ACM Transactions on Privacy and Security (TOPS) 19 (4), 1-31, 2016
502016
Malicious users in unstructured networks
G Theodorakopoulos, JS Baras
IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007
502007
Selfish Response to Epidemic Propagation
G Theodorakopoulos, JY Le Boudec, J Baras
IEEE Transactions on Automatic Control 58 (2), 363--376, 2013
452013
Selfish response to epidemic propagation
G Theodorakopoulos, JY Le Boudec, JS Baras
American Control Conference (ACC), 2011, 4069-4074, 2011
452011
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
JS Baras, S Radosavac, G Theodorakopoulos, D Sterne, P Budulas, ...
MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007
442007
On the inference of user paths from anonymized mobility data
G Tsoukaneri, G Theodorakopoulos, H Leather, MK Marina
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 199-213, 2016
182016
Adaptive message authentication for multi-hop networks
N Ristanovic, P Papadimitratos, G Theodorakopoulos, JP Hubaux, ...
2011 Eighth International Conference on Wireless On-Demand Network Systems …, 2011
182011
A testbed for comparing trust computation algorithms
G Theodorakopoulos, JS Baras
25th Army Science Conference, 2006
162006
The system can't perform the operation now. Try again later.
Articles 1–20