default search action
George Theodorakopoulos 0001
Person information
- affiliation: Cardiff University, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Abdulazeez AlAli, George Theodorakopoulos:
Review of Existing Methods for Generating and Detecting Fake and Partially Fake Audio. IWSPA@CODASPY 2024: 35-36 - [i9]Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. CoRR abs/2401.10765 (2024) - [i8]Abdulazeez AlAli, George Theodorakopoulos:
An RFP dataset for Real, Fake, and Partially fake audio detection. CoRR abs/2404.17721 (2024) - [i7]Aydin Abadi, Bradley Doyle, Francesco Gini, Kieron Guinamard, Sasi Kumar Murakonda, Jack Liddell, Paul Mellor, Steven J. Murdoch, Mohammad Naseri, Hector Page, George Theodorakopoulos, Suzanne Weller:
Starlit: Privacy-Preserving Federated Learning to Enhance Financial Fraud Detection. IACR Cryptol. ePrint Arch. 2024: 90 (2024) - 2023
- [j20]Turki Al lelah, George Theodorakopoulos, Philipp Reinecke, Amir Javed, Eirini Anthi:
Abuse of Cloud-Based and Public Legitimate Services as Command-and-Control (C&C) Infrastructure: A Systematic Literature Review. J. Cybersecur. Priv. 3(3): 558-590 (2023) - [j19]Turki Al lelah, George Theodorakopoulos, Amir Javed, Eirini Anthi:
Machine Learning Detection of Cloud Services Abuse as C&C Infrastructure. J. Cybersecur. Priv. 3(4): 858-881 (2023) - 2022
- [j18]George Theodorakopoulos, Emmanouil Panaousis, Kaitai Liang, George Loukas:
On-the-Fly Privacy for Location Histograms. IEEE Trans. Dependable Secur. Comput. 19(1): 566-578 (2022) - 2021
- [j17]Behnaz Bostanipour, George Theodorakopoulos:
Joint obfuscation of location and its semantic information for privacy protection. Comput. Secur. 107: 102310 (2021) - [c29]Sasi Kumar Murakonda, Reza Shokri, George Theodorakopoulos:
Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models. AISTATS 2021: 2287-2295 - 2020
- [j16]Masoud Barati, Omer F. Rana, Ioan Petri, George Theodorakopoulos:
GDPR Compliance Verification in Internet of Things. IEEE Access 8: 119697-119709 (2020) - [j15]Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos:
A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol. Concurr. Comput. Pract. Exp. 32(19) (2020) - [j14]Fahad Alodhyani, George Theodorakopoulos, Philipp Reinecke:
Password Managers - It's All about Trust and Transparency. Future Internet 12(11): 189 (2020) - [j13]Fatma Alrayes, Alia I. Abdelmoty, W. B. El-Geresy, George Theodorakopoulos:
Modelling perceived risks to personal privacy from location disclosure on online social networks. Int. J. Geogr. Inf. Sci. 34(1): 150-176 (2020) - [j12]Grigorios Loukides, George Theodorakopoulos:
Location histogram privacy by Sensitive Location Hiding and Target Histogram Avoidance/Resemblance. Knowl. Inf. Syst. 62(7): 2613-2651 (2020) - [j11]Baskoro Adi Pratomo, Pete Burnap, George Theodorakopoulos:
BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks. Secur. Commun. Networks 2020: 8826038:1-8826038:15 (2020) - [c28]Michael Holmes, George Theodorakopoulos:
Towards using differentially private synthetic data for machine learning in collaborative data science projects. ARES 2020: 28:1-28:6 - [c27]Behnaz Bostanipour, George Theodorakopoulos:
Joint Obfuscation for Privacy Protection in Location-Based Social Networks. DPM/CBT@ESORICS 2020: 111-127 - [c26]Masoud Barati, George Theodorakopoulos, Omer F. Rana:
Automating GDPR Compliance Verification for Cloud-hosted Services. ISNCC 2020: 1-6 - [i6]Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos:
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol. CoRR abs/2003.06990 (2020) - [i5]Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos:
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol. IACR Cryptol. ePrint Arch. 2020: 323 (2020)
2010 – 2019
- 2019
- [j10]Eirini Anthi, Lowri Williams, Malgorzata Slowinska, George Theodorakopoulos, Pete Burnap:
A Supervised Intrusion Detection System for Smart Home IoT Devices. IEEE Internet Things J. 6(5): 9042-9053 (2019) - [j9]Alanoud Subahi, George Theodorakopoulos:
Detecting IoT User Behavior and Sensitive Information in Encrypted IoT-App Traffic. Sensors 19(21): 4777 (2019) - [c25]Masoud Barati, Omer F. Rana, George Theodorakopoulos, Peter Burnap:
Privacy-Aware Cloud Ecosystems and GDPR Compliance. FiCloud 2019: 117-124 - [i4]Sasi Kumar Murakonda, Reza Shokri, George Theodorakopoulos:
Ultimate Power of Inference Attacks: Privacy Risks of High-Dimensional Models. CoRR abs/1905.12774 (2019) - [i3]Grigorios Loukides, George Theodorakopoulos:
Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance (extended version). CoRR abs/1912.00055 (2019) - 2018
- [j8]Eirini Anthi, Shazaib Ahmad, Omer F. Rana, George Theodorakopoulos, Pete Burnap:
EclipseIoT: A secure and adaptive hub for the Internet of Things. Comput. Secur. 78: 477-490 (2018) - [c24]Rajkarn Singh, George Theodorakopoulos, Mahesh K. Marina, Myrto Arapinis:
On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory Data Sharing. CNS 2018: 1-9 - [c23]Baskoro Adi Pratomo, Pete Burnap, George Theodorakopoulos:
Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic with Autoencoder. Cyber Security 2018: 1-8 - [c22]Alanoud Subahi, George Theodorakopoulos:
Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement. FiCloud 2018: 100-107 - [e2]Philipp Reinecke, Naghmeh Moradpoor, George Theodorakopoulos:
Proceedings of the 11th International Conference on Security of Information and Networks, SIN 2018, Cardiff, United Kingdom, September 10-12, 2018. ACM 2018, ISBN 978-1-4503-6608-3 [contents] - 2017
- [j7]Stylianos S. Mamais, George Theodorakopoulos:
Private and Secure Distribution of Targeted Advertisements to Mobile Phones. Future Internet 9(2): 16 (2017) - [j6]Stylianos S. Mamais, George Theodorakopoulos:
Behavioural Verification: Preventing Report Fraud in Decentralized Advert Distribution Systems. Future Internet 9(4): 88 (2017) - [j5]Reza Shokri, George Theodorakopoulos, Carmela Troncoso:
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy. ACM Trans. Priv. Secur. 19(4): 11:1-11:31 (2017) - [c21]Eirini Anthi, Amir Javed, Omer F. Rana, George Theodorakopoulos:
Secure Data Sharing and Analysis in Cloud-Based Energy Management Systems. IISSC/CN4IoT 2017: 228-242 - [c20]Manos Katsomallos, Spyros Lalis, Thanasis G. Papaioannou, George Theodorakopoulos:
An open framework for flexible plug-in privacy mechanisms in crowdsensing applications. PerCom Workshops 2017: 237-242 - [c19]Eirini Anthi, George Theodorakopoulos:
Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted? ATCS/SePrIoT@SecureComm 2017: 301-319 - 2016
- [c18]Galini Tsoukaneri, George Theodorakopoulos, Hugh Leather, Mahesh K. Marina:
On the Inference of User Paths from Anonymized Mobility Data. EuroS&P 2016: 199-213 - 2015
- [c17]George Theodorakopoulos:
The Same-Origin Attack against Location Privacy. WPES@CCS 2015: 49-53 - [e1]M. H. R. Khouzani, Emmanouil A. Panaousis, George Theodorakopoulos:
Decision and Game Theory for Security - 6th International Conference, GameSec 2015, London, UK, November 4-5, 2015, Proceedings. Lecture Notes in Computer Science 9406, Springer 2015, ISBN 978-3-319-25593-4 [contents] - 2014
- [j4]Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, Jean-Pierre Hubaux:
Hiding in the Mobile Crowd: LocationPrivacy through Collaboration. IEEE Trans. Dependable Secur. Comput. 11(3): 266-279 (2014) - [c16]Franco Bagnoli, Andrea Guazzini, Giovanna Pacini, Ioannis Stavrakakis, Evangelia Kokolaki, George Theodorakopoulos:
Cognitive Structure of Collective Awareness Platforms. SASO Workshops 2014: 96-101 - [c15]George Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services. WPES 2014: 73-82 - [i2]George Theodorakopoulos, Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services. CoRR abs/1409.1716 (2014) - 2013
- [j3]George Theodorakopoulos, Jean-Yves Le Boudec, John S. Baras:
Selfish Response to Epidemic Propagation. IEEE Trans. Autom. Control. 58(2): 363-376 (2013) - [c14]Ioan Petri, Magdalena Punceva, Omer F. Rana, George Theodorakopoulos:
Broker Emergence in Social Clouds. IEEE CLOUD 2013: 669-676 - 2012
- [c13]Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Protecting location privacy: optimal strategy against localization attacks. CCS 2012: 617-627 - [c12]Nikodin Ristanovic, George Theodorakopoulos, Jean-Yves Le Boudec:
Traps and pitfalls of using contact traces in performance studies of opportunistic networks. INFOCOM 2012: 1377-1385 - 2011
- [c11]George Theodorakopoulos, Jean-Yves Le Boudec, John S. Baras:
Selfish response to epidemic propagation. ACC 2011: 4069-4074 - [c10]Reza Shokri, Panos Papadimitratos, George Theodorakopoulos, Jean-Pierre Hubaux:
Collaborative Location Privacy. MASS 2011: 500-509 - [c9]Reza Shokri, George Theodorakopoulos, George Danezis, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Quantifying Location Privacy: The Case of Sporadic Location Exposure. PETS 2011: 57-76 - [c8]Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux:
Quantifying Location Privacy. IEEE Symposium on Security and Privacy 2011: 247-262 - 2010
- [b2]John S. Baras, George Theodorakopoulos:
Path Problems in Networks. Synthesis Lectures on Communication Networks, Morgan & Claypool Publishers 2010, ISBN 978-3-031-79982-2 - [i1]George Theodorakopoulos, Jean-Yves Le Boudec, John S. Baras:
Selfish Response to Epidemic Propagation. CoRR abs/1010.0609 (2010)
2000 – 2009
- 2009
- [c7]Nikodin Ristanovic, Panos Papadimitratos, George Theodorakopoulos, Jean-Pierre Hubaux, Jean-Yves Le Boudec:
Adaptive message authentication for vehicular networks. Vehicular Ad Hoc Networks 2009: 121-122 - [c6]Reza Shokri, Pedram Pedarsani, George Theodorakopoulos, Jean-Pierre Hubaux:
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles. RecSys 2009: 157-164 - 2008
- [j2]George Theodorakopoulos, John S. Baras:
Game Theoretic Modeling of Malicious Users in Collaborative Networks. IEEE J. Sel. Areas Commun. 26(7): 1317-1327 (2008) - [c5]George Theodorakopoulos, John S. Baras, Jean-Yves Le Boudec:
Dynamic network security deployment under partial information. Allerton 2008: 261-267 - 2007
- [b1]Georgios Efthymios Theodorakopoulos:
Robust Network Trust Establishment for Collaborative Applications and Protocols. University of Maryland, College Park, MD, USA, 2007 - [c4]George Theodorakopoulos, John S. Baras:
Malicious Users in Unstructured Networks. INFOCOM 2007: 884-891 - 2006
- [j1]George Theodorakopoulos, John S. Baras:
On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2): 318-328 (2006) - [c3]George Theodorakopoulos, John S. Baras:
A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users. GLOBECOM 2006 - [c2]George Theodorakopoulos, John S. Baras:
Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks. SecureComm 2006: 1-6 - 2004
- [c1]George Theodorakopoulos, John S. Baras:
Trust evaluation in ad-hoc networks. Workshop on Wireless Security 2004: 1-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 01:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint