[back to main]

Publications

Book

Path problems in networks
J. S. Baras and G. Theodorakopoulos
Synthesis Lectures on Communication Networks, Morgan&Claypool Publishers, 2010. [ bib ]

Journal

R. Shokri, G. Theodorakopoulos, and C. Troncoso.
Privacy Games Along Location Traces: A Game-Theoretic Framework for Optimizing Location Privacy.
ACM Transactions on Privacy and Security (TOPS), 19(4):1-31, December 2016. [ bib | pdf ]
R. Shokri, G. Theodorakopoulos, P. Papadimitratos, E. Kazemi, and J.-P. Hubaux.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on "Security and Privacy in Mobile Platforms", 11(3):266-279, May-June 2014. [ bib | pdf ]
G. Theodorakopoulos, J.-Y. Le Boudec, and J. S. Baras.
Selfish Response to Epidemic Propagation.
IEEE Transactions on Automatic Control, 58(2):363-376, February 2013. [ bib | pdf ]
G. Theodorakopoulos and J. S. Baras.
Game Theoretic Modeling of Malicious Users in Collaborative Networks.
IEEE Journal on Selected Areas in Communications (JSAC), 26(7):1317-1327, September 2008. [ bib | pdf ]
G. Theodorakopoulos and J. S. Baras.
On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks.
IEEE Journal on Selected Areas in Communications (JSAC), 24(2):318-328, February 2006. [ bib | pdf ]
 2007 Leonard G. Abraham Prize

Conference

G. Tsoukaneri, G. Theodorakopoulos, H. Leather, M. K. Marina.
On the Inference of User Paths from Anonymized Mobility Data.
1st IEEE European Symposium on Security and Privacy (EuroSP), March 2016. [ bib | pdf ]
G. Theodorakopoulos.
The Same-Origin Attack against Location Privacy.
ACM Workshop on Privacy in the Electronic Society (WPES), October 2015 (short paper). [ bib | pdf ]
G. Theodorakopoulos, R. Shokri, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec.
Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services.
ACM Workshop on Privacy in the Electronic Society (WPES), November 2014. [ bib | pdf ]
I. Petri, M. Punceva, O. F. Rana, G. Theodorakopoulos.
Broker Emergence in Social Clouds.
6th IEEE International Conference on Cloud Computing (CLOUD), June 2013. [ bib | doi ]
R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, and J.-Y. Le Boudec.
Protecting Location Privacy: Optimal Strategy against Localization Attacks.
19th ACM Conference on Computer and Communications Security (CCS), October 2012. [ bib | pdf ]
N. Ristanovic, G. Theodorakopoulos, and J.-Y. Le Boudec.
Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks.
31st IEEE International Conference on Computer Communications (INFOCOM), March 2012. [ bib | pdf ]
R. Shokri, P. Papadimitratos, G. Theodorakopoulos, and J.-P. Hubaux.
Collaborative Location Privacy.
8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2011. [ bib | pdf ]
N. Ristanovic, G. Theodorakopoulos, A. Chaintreau, and J.-Y. Le Boudec.
Connecting Opportunistic Users to the Internet: Twitter in the Air.
8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), October 2011. Demo. [ bib ]
R. Shokri, G. Theodorakopoulos, G. Danezis, J.-P. Hubaux, and J.-Y. Le Boudec.
Quantifying Location Privacy: The Case of Sporadic Location Exposure.
11th Privacy Enhancing Technologies Symposium (PETS), July 2011. [ bib | pdf ]
G. Theodorakopoulos, J.-Y. Le Boudec, and J. S. Baras.
Selfish Response to Epidemic Propagation.
2011 American Control Conference (ACC), June 2011. [ bib | pdf ]
R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, and J.-P. Hubaux.
Quantifying Location Privacy.
32nd IEEE Symposium on Security and Privacy (SP), May 2011. [ bib | pdf ]
 PET Award runner-up
N. Ristanovic, P. Papadimitratos, G. Theodorakopoulos, J.-P. Hubaux, and J.-Y. Le Boudec.
Adaptive Message Authentication for Multi-Hop Networks.
8th International Conference on Wireless On-demand Network Systems and Services (WONS), January 2011. [ bib | pdf ]
R. Shokri, P. Pedarsani, G. Theodorakopoulos, and J.-P. Hubaux.
Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles.
3rd ACM Conference on Recommender Systems (RECSYS), October 2009. [ bib | pdf ]
N. Ristanovic, P. Papadimitratos, G. Theodorakopoulos, J.-P. Hubaux, and J.-Y. Le Boudec.
Adaptive Message Authentication for Vehicular Networks.
6th ACM International Workshop on VehiculAr Inter-NETworking (VANET), September 2009. [ bib | pdf ]
G. Theodorakopoulos, J.-Y. Le Boudec, and J. S. Baras.
Dynamic network security deployment under partial information.
46th Annual Allerton Conference On Communication, Control, and Computing (ALLERTON), September 2008. [ bib | pdf ]
J. S. Baras, S. Radosavac, G. Theodorakopoulos, D. Sterne, P. Budulas, and R. Gopaul.
Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR.
Military Communications Conference (MILCOM), October 2007. [ bib | pdf ]
G. Theodorakopoulos and J. S. Baras.
Malicious Users in Unstructured Networks.
26th IEEE International Conference on Computer Communications (INFOCOM), May 2007. [ bib | pdf ]
G. Theodorakopoulos and J. S. Baras.
A Game for Ad Hoc Network Connectivity in the Presence of Malicious Users.
IEEE Global Communications Conference (GLOBECOM), November 2006. [ bib | pdf ]
T. Jiang, G. Theodorakopoulos, and J. S. Baras.
Coalition Formation in MANETs.
25th Army Science Conference, November 2006. [ bib | pdf ]
G. Theodorakopoulos and J. S. Baras.
A Testbed for Comparing Trust Computation Algorithms.
25th Army Science Conference, November 2006. [ bib | pdf ]
G. Theodorakopoulos and J. S. Baras.
Enhancing Benign User Cooperation in the Presence of Malicious Adversaries in Ad Hoc Networks.
2nd International Conference on Security and Privacy in Communication Networks (SECURECOMM), August 2006. [ bib | pdf ]
G. Theodorakopoulos and J. S. Baras.
Linear Iterations on Ordered Semirings for Trust Metric Computation and Attack Resiliency Evaluation.
17th International Symposium on Mathematical Theory of Networks and Systems (MTNS), July 2006. [ bib | pdf ]
J. S. Baras, T. Jiang, and G. Theodorakopoulos.
Distributed Trust Management in Wireless Autonomic Networks.
15th IST Mobile and Wireless Communications Summit, June 2006. [ bib | pdf ]
G. Theodorakopoulos and J. S. Baras.
Trust evaluation in ad-hoc networks.
ACM workshop on Wireless security, (WISE), October 2004. [ bib | pdf ]
 Best Paper Award

Dissertations and Theses

G. Theodorakopoulos.
Robust network trust establishment for collaborative applications and protocols.
PhD Dissertation, University of Maryland, College Park, MD, USA, May 2007. [ bib | http ]
G. Theodorakopoulos.
Distributed trust evaluation in ad-hoc networks.
MSc Thesis, University of Maryland, College Park, MD, USA, April 2004. [ bib | http ]
G. Theodorakopoulos.
Providing QoS in IP networks with the MDRR scheduling algorithm.
Diploma Thesis, National Technical University of Athens, Greece, July 2002. [ bib ]

Copyright Notice

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.