“Back to the Drawing Board: Revisiting the Design of Optimal Location Privacy-preserving Mechanisms”, in ACM Conference on Computer and Communications Security (CCS), 2017. CCSmain.pdf (1.82 MB)
, “Design of pool mixes against profiling attacks in real conditions”, IEEE/ACM Transactions on Networking, vol. 24, no. 6, pp. 3662-3675, 2016. TNET2547391_author_version.pdf (1.96 MB)
, “Do dummies pay off? Limits of dummy traffic protection in anonymous communications”, in Privacy Enhancing Technologies Symposium, 2014. pets14.pdf (421.61 KB) Matlab files used to perform the experiments in the paper. (5.55 KB)
, “Filter design for delay-based anonymous communications”, in IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2017. ICASSPmain.pdf (382.42 KB)
, “Is Geo-Indistinguishability what you are looking for?”, in Workshop on Privacy in the Electronic Society (WPES), 2017. 1709.06318.pdf (822.66 KB)
, “A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems”, IEEE Transactions on Information Forensics and Security, 2014. lsdaTIFS14.pdf (1.64 MB)
, “Meet the Family of Statistical Disclosure Attacks”, in GlobalSIP, 2013. main-globalsip.pdf (115.96 KB)
, “Rethinking Location Privacy for Unknown Mobility Behaviors”, in IEEE European Symposium on Security and Privacy (EuroS&P), 2019. ms.pdf (634.43 KB)
, ,
“Technical Report for ID TNET-2015-00294 “Optimal delay characteristic when the number of users is comparable to the number of rounds"”, 2016. TechRepToN2016.pdf (406.11 KB)
, “Technical Report TSC/FPG/20032014: Performance Analysis of the Least Squares Disclosure Attack with Time-Varying User Behavior”, 2014. techrep.pdf (267.69 KB)
, , , “Understanding the Effects of Real-World Behavior in Statistical Disclosure Attacks”, in IEEE Workshop on Information Forensics and Security, 2014. wifs14.pdf (347.72 KB)
,