Primary tabs
“Rethinking Location Privacy for Unknown Mobility Behaviors”, in IEEE European Symposium on Security and Privacy (EuroS&P), 2019. ms.pdf (634.43 KB)
, , “Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms”, in ACM Conference on Computer and Communications Security (CCS), 2017. CCSmain.pdf (1.82 MB)
, “Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017. ICASSPmain.pdf (382.42 KB)
, “Is Geo-Indistinguishability what you are looking for?”, in Workshop on Privacy in the Electronic Society (WPES), 2017. 1709.06318.pdf (822.66 KB)
, “Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, , , “Do dummies pay off? Limits of dummy traffic protection in anonymous communications”, in Privacy Enhancing Technologies Symposium, 2014. pets14.pdf (421.61 KB) Matlab files used to perform the experiments in the paper. (5.55 KB)
, “A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems”, IEEE Transactions on Information Forensics and Security, 2014. lsdaTIFS14.pdf (1.64 MB)
, “Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior”, 2014. techrep.pdf (267.69 KB)
, “Technical Report TSC/SO/02052014: Derivation of the Mean Squared Error of the Least Squares Estimator in a Timed Pool Mix with Dummy Traffic”, 2014. trpets14.pdf (205.16 KB)
, “Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks”, in IEEE Workshop on Information Forensics and Security, 2014. wifs14.pdf (347.72 KB)
, “Meet the Family of Statistical Disclosure Attacks”, in GlobalSIP, 2013. main-globalsip.pdf (115.96 KB)
,