Quantifying location privacy R Shokri, G Theodorakopoulos, JY Le Boudec, JP Hubaux 2011 IEEE symposium on security and privacy, 247-262, 2011 | 930 | 2011 |
On trust models and trust evaluation metrics for ad hoc networks G Theodorakopoulos, JS Baras IEEE Journal on selected areas in Communications 24 (2), 318-328, 2006 | 768 | 2006 |
Protecting Location Privacy: Optimal Strategy against Localization Attacks R Shokri, G Theodorakopoulos, C Troncoso, JP Hubaux, JY Le Boudec ACM Conference on Computer and Communications Security (CCS), 2012 | 515 | 2012 |
A supervised intrusion detection system for smart home IoT devices E Anthi, L Williams, M Słowińska, G Theodorakopoulos, P Burnap IEEE Internet of Things Journal 6 (5), 9042-9053, 2019 | 506 | 2019 |
Trust evaluation in ad-hoc networks G Theodorakopoulos, JS Baras Proceedings of the 3rd ACM workshop on Wireless security, 1-10, 2004 | 375 | 2004 |
Hiding in the mobile crowd: Location privacy through collaboration R Shokri, G Theodorakopoulos, P Papadimitratos, E Kazemi, JP Hubaux IEEE Transactions on Dependable and Secure Computing 11 (3), 266-279, 2013 | 230 | 2013 |
Quantifying Location Privacy: The Case of Sporadic Location Exposure R Shokri, G Theodorakopoulos, G Danezis, JP Hubaux, JY Le Boudec Privacy Enhancing Technologies, 57-76, 2011 | 169 | 2011 |
Preserving privacy in collaborative filtering through distributed aggregation of offline profiles R Shokri, P Pedarsani, G Theodorakopoulos, JP Hubaux Proceedings of the third ACM conference on Recommender systems, 157-164, 2009 | 153 | 2009 |
Privacy games along location traces: A game-theoretic framework for optimizing location privacy R Shokri, G Theodorakopoulos, C Troncoso ACM Transactions on Privacy and Security (TOPS) 19 (4), 1-31, 2016 | 114 | 2016 |
Path problems in networks JS Baras, G Theodorakopoulos Synthesis Lectures on Communication Networks 3 (1), 1-77, 2010 | 106* | 2010 |
Game theoretic modeling of malicious users in collaborative networks G Theodorakopoulos, JS Baras Selected Areas in Communications, IEEE Journal on 26 (7), 1317-1327, 2008 | 99 | 2008 |
Prolonging the hide-and-seek game: Optimal trajectory privacy for location-based services G Theodorakopoulos, R Shokri, C Troncoso, JP Hubaux, JY Le Boudec Proceedings of the 13th Workshop on Privacy in the Electronic Society, 73-82, 2014 | 95 | 2014 |
Collaborative location privacy R Shokri, P Papadimitratos, G Theodorakopoulos, JP Hubaux 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011 | 79 | 2011 |
Selfish Response to Epidemic Propagation G Theodorakopoulos, JY Le Boudec, J Baras IEEE Transactions on Automatic Control 58 (2), 363--376, 2013 | 63 | 2013 |
Selfish response to epidemic propagation G Theodorakopoulos, JY Le Boudec, JS Baras American Control Conference (ACC), 2011, 4069-4074, 2011 | 63 | 2011 |
Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks N Ristanovic, G Theodorakopoulos, JY Le Boudec Computer Communications (IEEE INFOCOM 2012), 31st Annual IEEE International …, 2012 | 58 | 2012 |
GDPR compliance verification in Internet of Things M Barati, O Rana, I Petri, G Theodorakopoulos IEEE access 8, 119697-119709, 2020 | 53 | 2020 |
Malicious users in unstructured networks G Theodorakopoulos, JS Baras IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 49 | 2007 |
Detecting IoT user behavior and sensitive information in encrypted IoT-app traffic A Subahi, G Theodorakopoulos Sensors 19 (21), 2019 | 48 | 2019 |
Ensuring compliance of IoT devices with their Privacy Policy Agreement A Subahi, G Theodorakopoulos 2018 IEEE 6th International Conference on Future Internet of Things and …, 2018 | 46 | 2018 |