Identity, location, disease and more: Inferring your secrets from android public resources X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 249 | 2013 |
Darknetz: towards model privacy at the edge using trusted execution environments F Mo, AS Shamsabadi, K Katevas, S Demetriou, I Leontiadis, A Cavallaro, ... Proceedings of the 18th International Conference on Mobile Systems …, 2020 | 153 | 2020 |
Free for All! Assessing User Data Exposure to Advertising Libraries on Android. S Demetriou, W Merrill, W Yang, A Zhang, CA Gunter NDSS, 2016 | 112 | 2016 |
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Bonding on Android. M Naveed, X Zhou, S Demetriou, XF Wang, CA Gunter NDSS, 2014 | 103 | 2014 |
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps S Demetriou, N Zhang, Y Lee, XF Wang, CA Gunter, X Zhou, M Grace Proceedings of the 10th ACM Conference on Security and Privacy in Wireless …, 2017 | 85* | 2017 |
Understanding iot security through the data crystal ball: Where we are now and where we are going to be N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ... arXiv preprint arXiv:1703.09809, 2017 | 81 | 2017 |
Resolving the predicament of android custom permissions GS Tuncay, S Demetriou, K Ganju, C Gunter NDSS, 2018 | 57 | 2018 |
Draco: A system for uniform and fine-grained access control for web code on android GS Tuncay, S Demetriou, CA Gunter Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 56 | 2016 |
Quantifying and Localizing Usable Information Leakage from Neural Network Gradients F Mo, A Borovykh, M Malekzadeh, S Demetriou, D Gündüz, H Haddadi arXiv preprint arXiv:2105.13929, 2021 | 39* | 2021 |
Object Removal Attacks on LiDAR-based 3D Object Detectors Z Hau, KT Co, S Demetriou, EC Lupu arXiv preprint arXiv:2102.03722, 2021 | 30 | 2021 |
Discovering the invisible city: Location-based games for learning in smart cities. C Sintoris, N Yiannoutsou, S Demetriou, NM Avouris IxD&A 16, 47-64, 2013 | 29 | 2013 |
Shadow-catcher: Looking into shadows to detect ghost objects in autonomous vehicle 3d sensing Z Hau, S Demetriou, L Munoz-González, EC Lupu 26th European Symposium on Research in Computer Security (ESORICS), 2021 | 23* | 2021 |
CoDrive: Improving Automobile Positioning via Collaborative Driving S Demetriou, P Jain, KH Kim IEEE International Conference on Computer Communications, 2018 | 21 | 2018 |
Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception C You, Z Hau, S Demetriou Proceedings of the 1st Workshop on Security and Privacy for Mobile AI, 13-18, 2021 | 17 | 2021 |
Camforensics: Understanding visual privacy leaks in the wild A Srivastava, P Jain, S Demetriou, LP Cox, KH Kim Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 1-13, 2017 | 17 | 2017 |
External resource control of mobile devices X Wang, K Yuan, X Zhou, M Naveed, S Demetriou, C Gunter US Patent 10,685,142, 2020 | 11 | 2020 |
{ServiceRouter}: Hyperscale and Minimal Cost Service Mesh at Meta H Saokar, S Demetriou, N Magerko, M Kontorovich, J Kirstein, M Leibold, ... 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2023 | 10* | 2023 |
Ghost installer in the shadow: Security analysis of app installation on android Y Lee, T Li, N Zhang, S Demetriou, M Zha, XF Wang, K Chen, X Zhou, ... 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 10 | 2017 |
Identifying JavaScript skimmers on high-value websites T Bower, S Maffeis, S Demetriou Imperial College of Science, Technology and Medicine, Imperial College …, 2019 | 8 | 2019 |
Data Augmentation for Dementia Detection in Spoken Language.}} D Woszczyk, A Hedlikova, A Akman, S Demetriou, B Schuller Proc. Interspeech 2022, 2858-2862, 2022 | 7* | 2022 |