Person

Georgios Theodorakopoulos

This person is no longer with EPFL

Related publications (25)

Hiding in the Mobile Crowd: Location Privacy through Collaboration

Jean-Pierre Hubaux, Panagiotis Papadimitratos, Reza Shokri, Georgios Theodorakopoulos, Ehsan Kazemi

Location-aware smartphones support various location-based services (LBSs): users query the LBS server and learn on the fly about their surroundings. However, such queries give away private information, enabling the LBS to track users. We address this probl ...
IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 11, no. 3, pp. 266-2792014

Hiding in the Mobile Crowd: Location Privacy through Collaboration

Jean-Pierre Hubaux, Panagiotis Papadimitratos, Reza Shokri, Georgios Theodorakopoulos, Ehsan Kazemi

Location-aware smartphones support various location-based services (LBSs): users query the LBS server and learn on the fly about their surroundings. However, such queries give away private information, enabling the LBS to track users. We address this probl ...
Ieee Computer Soc2014

Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services

Jean-Yves Le Boudec, Jean-Pierre Hubaux, Carmela González Troncoso, Reza Shokri, Georgios Theodorakopoulos

Human mobility is highly predictable. Individuals tend to only visit a few locations with high frequency, and to move among them in a certain sequence reflecting their habits and daily routine. This predictability has to be taken into account in the design ...
2014

Selfish Response to Epidemic Propagation

Jean-Yves Le Boudec, Georgios Theodorakopoulos

An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the trade-off between their perceived risk of being infected and the cost of bein ...
Institute of Electrical and Electronics Engineers2013

Selfish Response to Epidemic Propagation

Jean-Yves Le Boudec, Georgios Theodorakopoulos

An epidemic that spreads in a network calls for a decision on the part of the network users. They have to decide whether to protect themselves or not. Their decision depends on the trade-off between their perceived infection and the protection cost. Aiming ...
2013

Protecting Location Privacy: Optimal Strategy against Localization Attacks

Jean-Yves Le Boudec, Jean-Pierre Hubaux, Carmela González Troncoso, Reza Shokri, Georgios Theodorakopoulos

The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation algor ...
2012

Traps and Pitfalls of Using Contact Traces in Performance Studies of Opportunistic Networks

Jean-Yves Le Boudec, Nikodin Ristanovic, Georgios Theodorakopoulos

Contact-based simulations are a very popular tool for the analysis of opportunistic networks. They are used for evaluation of networking metrics, for quantifying the effects of infrastructure and for the design of forwarding strategies. However, little evi ...
Ieee2012

Quantifying Location Privacy: The Case of Sporadic Location Exposure

Jean-Yves Le Boudec, Jean-Pierre Hubaux, Reza Shokri, Georgios Theodorakopoulos

Mobile users expose their location to potentially untrusted entities by using location-based services. Based on the frequency of location exposure in these applications, we divide them into two main types: Continuous and Sporadic. These two location exposu ...
Springer-Verlag Berlin2011

Collaborative Location Privacy

Jean-Pierre Hubaux, Panagiotis Papadimitratos, Reza Shokri, Georgios Theodorakopoulos

Location-aware smart phones support various location-based services (LBSs): users query the LBS server and learn on the fly about their surroundings. However, such queries give away private information, enabling the LBS to identify and track users. We addr ...
2011

Quantifying Location Privacy

Jean-Yves Le Boudec, Jean-Pierre Hubaux, Reza Shokri, Georgios Theodorakopoulos

It is a well-known fact that the progress of personal communication devices leads to serious concerns about privacy in general, and location privacy in particular. As a response to these issues, a number of Location-Privacy Protection Mechanisms (LPPMs) ha ...
Ieee Computer Soc Press, Customer Service Center, Po Box 3014, 10662 Los Vaqueros Circle, Los Alamitos, Ca 90720-1264 Usa2011

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.