default search action
Markus Miettinen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. IEEE Trans. Emerg. Top. Comput. 12(2): 483-495 (2024) - [c36]Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
CrowdGuard: Federated Backdoor Detection in Federated Learning. NDSS 2024 - 2023
- [c35]Philipp Pütz, Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi:
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats. ACSAC 2023: 190-204 - [c34]Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi:
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. USENIX Security Symposium 2023: 4301-4318 - [i17]Phillip Rieger, Marco Chilese, Reham Mohamed, Markus Miettinen, Hossein Fereidooni, Ahmad-Reza Sadeghi:
ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks. CoRR abs/2302.07589 (2023) - [i16]Philipp Pütz, Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi:
Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats. CoRR abs/2308.12072 (2023) - 2022
- [c33]Hossein Fereidooni, Alexandra Dmitrienko, Phillip Rieger, Markus Miettinen, Ahmad-Reza Sadeghi, Felix Madlener:
FedCRI: Federated Mobile Cyber-Risk Intelligence. NDSS 2022 - [c32]Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi:
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection. NDSS 2022 - [c31]Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider:
FLAME: Taming Backdoors in Federated Learning. USENIX Security Symposium 2022: 1415-1432 - [i15]Phillip Rieger, Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi:
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection. CoRR abs/2201.00763 (2022) - [i14]Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. CoRR abs/2202.06698 (2022) - [i13]Phillip Rieger, Torsten Krauß, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi:
Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis. CoRR abs/2210.07714 (2022) - [i12]Thien Duc Nguyen, Markus Miettinen, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Ivan Visconti:
Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges. IACR Cryptol. ePrint Arch. 2022: 166 (2022) - 2021
- [j8]Hanne S. Antila, Tiago M. Ferreira, Samuli Ollila, Markus Miettinen:
Using Open Data to Rapidly Benchmark Biomolecular Simulations: Phospholipid Conformational Dynamics. J. Chem. Inf. Model. 61(2): 938-949 (2021) - [c30]Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni:
SAFELearn: Secure Aggregation for private FEderated Learning. SP (Workshops) 2021: 56-62 - [i11]Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:
FLGUARD: Secure and Private Federated Learning. CoRR abs/2101.02281 (2021) - [i10]Thien Duc Nguyen, Phillip Rieger, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Ahmad-Reza Sadeghi, Thomas Schneider, Shaza Zeitouni:
FLGUARD: Secure and Private Federated Learning. IACR Cryptol. ePrint Arch. 2021: 25 (2021) - [i9]Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Helen Möllering, Thien Duc Nguyen, Phillip Rieger, Ahmad-Reza Sadeghi, Thomas Schneider, Hossein Yalame, Shaza Zeitouni:
SAFELearn: Secure Aggregation for private FEderated Learning. IACR Cryptol. ePrint Arch. 2021: 386 (2021) - 2020
- [c29]Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. ACSAC 2020: 694-705 - [c28]Thien Duc Nguyen, Markus Miettinen, Ahmad-Reza Sadeghi:
Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic. MTD@CCS 2020: 1-9 - [c27]Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. TrustCom 2020: 458-467 - [c26]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-boo: i see your smart home activities, even encrypted! WISEC 2020: 207-218 - [i8]Lars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl:
Mind the GAP: Security & Privacy Risks of Contact Tracing Apps. CoRR abs/2006.05914 (2020) - [i7]Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. CoRR abs/2007.00500 (2020)
2010 – 2019
- 2019
- [b1]Markus Miettinen:
Context and communication profiling for IoT security and privacy: techniques and applications. Darmstadt University of Technology, Germany, 2019 - [j7]Samuel Marchal, Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan:
AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication. IEEE J. Sel. Areas Commun. 37(6): 1402-1412 (2019) - [c25]Richard Mitev, Markus Miettinen, Ahmad-Reza Sadeghi:
Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants. AsiaCCS 2019: 465-478 - [c24]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Hossein Fereidooni, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Federated Self-learning Anomaly Detection System for IoT. ICDCS 2019: 756-767 - [c23]T. J. OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, Ahmad-Reza Sadeghi:
HomeSnitch: behavior transparency and control for smart home IoT devices. WiSec 2019: 128-138 - 2018
- [j6]Markus Miettinen, N. Asokan:
Ad-hoc key agreement: A brief history and the challenges ahead. Comput. Commun. 131: 32-34 (2018) - [c22]Markus Miettinen, Ahmad-Reza Sadeghi:
Internet of things or threats?: on building trust in IoT (keynote). CODES+ISSS 2018: 1 - [c21]Markus Miettinen, Thien Duc Nguyen, Ahmad-Reza Sadeghi, N. Asokan:
Revisiting context-based authentication in IoT. DAC 2018: 32:1-32:6 - [i6]Thien Duc Nguyen, Samuel Marchal, Markus Miettinen, Minh Hoang Dang, N. Asokan, Ahmad-Reza Sadeghi:
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices. CoRR abs/1804.07474 (2018) - [i5]Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac:
Peek-a-Boo: I see your smart home activities, even encrypted! CoRR abs/1808.02741 (2018) - [i4]Markus Miettinen, Paul C. van Oorschot, Ahmad-Reza Sadeghi:
Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. CoRR abs/1808.03071 (2018) - 2017
- [c20]Hossein Fereidooni, Tommaso Frassetto, Markus Miettinen, Ahmad-Reza Sadeghi, Mauro Conti:
Fitness Trackers: Fit for Health but Unfit for Security and Privacy. CHASE 2017: 19-24 - [c19]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2177-2184 - [c18]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, Tommaso Frassetto, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT. ICDCS 2017: 2511-2514 - [c17]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. RAID 2017: 48-69 - [i3]Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records without Moving: Reverse Engineering and Spoofing Fitbit. CoRR abs/1706.09165 (2017) - 2016
- [j5]Marc Lacoste, Markus Miettinen, Nuno Neves, Fernando M. V. Ramos, Marko Vukolic, Fabien Charmet, Reda Yaich, Krzysztof Oborzynski, Gitesh Vernekar, Paulo Sousa:
User-Centric Security and Dependability in the Clouds-of-Clouds. IEEE Cloud Comput. 3(5): 64-75 (2016) - [c16]Markus Miettinen, Jialin Huang, Thien Duc Nguyen, N. Asokan, Ahmad-Reza Sadeghi:
POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments. WISEC 2016: 225-226 - [i2]Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma:
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT. CoRR abs/1611.04880 (2016) - 2015
- [j4]Jérémie Mortier, Elisabeth K. Nyakatura, Oliver Reimann, Susanne Huhmann, Jan O. Daldrop, Carsten Baldauf, Gerhard Wolber, Markus Miettinen, Beate Koksch:
Coiled-Coils in Phage Display Screening: Insight into Exceptional Selectivity Provided by Molecular Dynamics. J. Chem. Inf. Model. 55(3): 495-500 (2015) - [j3]Trinh Minh Tri Do, Olivier Dousse, Markus Miettinen, Daniel Gatica-Perez:
A probabilistic kernel method for human mobility prediction with smartphones. Pervasive Mob. Comput. 20: 13-28 (2015) - [c15]Markus Miettinen, N. Asokan, Farinaz Koushanfar, Thien Duc Nguyen, Jon Rios, Ahmad-Reza Sadeghi, Majid Sobhani, Sudha Yellapantula:
I Know Where You are: Proofs of Presence Resilient to Malicious Provers. AsiaCCS 2015: 567-577 - [c14]Heidi Laine, Leo Lahti, Anne Lehto, Samuli Ollila, Markus Miettinen:
Beyond open access: the changing culture of producing and disseminating scientific knowledge. MindTrek 2015: 202-205 - 2014
- [j2]Jérémie Mortier, Elisabeth K. Nyakatura, Markus Miettinen, Carsten Baldauf, Gerhard Wolber, Beate Koksch:
Balancing selectivity vs stability using molecular dynamics and umbrella sampling. J. Cheminformatics 6(S-1): 22 (2014) - [c13]Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan:
ConXsense: automated context classification for context-aware access control. AsiaCCS 2014: 293-304 - [c12]Markus Miettinen, N. Asokan, Thien Duc Nguyen, Ahmad-Reza Sadeghi, Majid Sobhani:
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices. CCS 2014: 880-891 - 2013
- [j1]Juha K. Laurila, Daniel Gatica-Perez, Imad Aad, Jan Blom, Olivier Bornet, Trinh Minh Tri Do, Olivier Dousse, Julien Eberle, Markus Miettinen:
From big smartphone data to worldwide research: The Mobile Data Challenge. Pervasive Mob. Comput. 9(6): 752-771 (2013) - [i1]Markus Miettinen, Stephan Heuser, Wiebke Kronz, Ahmad-Reza Sadeghi, N. Asokan:
ConXsense - Context Sensing for Adaptive Usable Access Control. CoRR abs/1308.2903 (2013) - 2012
- [c11]Aditi Gupta, Markus Miettinen, Marcin Nagy, N. Asokan, Alexandre Wetzel:
PeerSense: Who is near you? PerCom Workshops 2012: 516-518 - [c10]Aditi Gupta, Markus Miettinen, N. Asokan, Marcin Nagy:
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling. SocialCom/PASSAT 2012: 471-480 - 2011
- [c9]Yiyun Shen, Markus Miettinen, Pirjo Moen, Lea Kutvonen:
Privacy Preservation Approach in Service Ecosystems. EDOCW 2011: 283-292 - [c8]Aditi Gupta, Markus Miettinen, N. Asokan:
Using context-profiling to aid access control decisions in mobile devices. PerCom Workshops 2011: 310-312 - 2010
- [c7]Markus Miettinen, N. Asokan:
Towards security policy decisions based on context profiling. AISec 2010: 19-23
2000 – 2009
- 2009
- [c6]Perttu Halonen, Markus Miettinen, Kimmo Hätönen:
Computer Log Anomaly Detection Using Frequent Episodes. AIAI 2009: 417-422 - 2007
- [c5]Agathe Battestini, Christian Del Rosso, Adrian Flanagan, Markus Miettinen:
Creating Next Generation Applications and Services for Mobile Devices: Challenges and Opportunities. PIMRC 2007: 1-4 - 2006
- [c4]Markus Miettinen, Perttu Halonen:
Host-Based Intrusion Detection for Advanced Mobile Devices. AINA (2) 2006: 72-76 - 2004
- [c3]Kimmo Hätönen, Mika Klemettinen, Markus Miettinen:
Remarks on the Industrial Application of Inductive Database Technologies. Constraint-Based Mining and Inductive Databases 2004: 196-215 - 2003
- [c2]Kimmo Hätönen, Jean-François Boulicaut, Mika Klemettinen, Markus Miettinen, Cyrille Masson:
Comprehensive Log Compression with Frequent Patterns. DaWaK 2003: 360-370 - [c1]Kimmo Hätönen, Perttu Halonen, Mika Klemettinen, Markus Miettinen:
Queryable Lossless Log Database Compression. KDID 2003: 70-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint