• Publications
  • Influence
A distortion-based metric for location privacy
We propose a novel framework for measuring and evaluating location privacy preserving mechanisms in mobile wireless networks. Within this framework, we first present a formal model of the system,Expand
  • 94
  • 4
  • PDF
Adaptive information-sharing for privacy-aware mobile social networks
Personal and contextual information are increasingly shared via mobile social networks. Users' locations, activities and their co-presence can be shared easily with online "friends", as theirExpand
  • 44
  • 4
  • PDF
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices
Equipped with state-of-the-art smartphones and mobile devices, today's highly interconnected urban population is increasingly dependent on these gadgets to organize and plan their daily lives. TheseExpand
  • 46
  • 3
  • PDF
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundamental theoreticalExpand
  • 56
  • 3
  • PDF
On the scalable collection of metering data in smart grids through message concatenation
Advanced Metering Infrastructure (AMI) initiatives are a popular tool to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy-efficiency targets. There is theExpand
  • 24
  • 3
  • PDF
Detecting malicious groups of agents
In this paper, we study coordinated attacks launched by multiple malicious agents and the problem of detecting malicious groups of attackers. The paper proposes a formal method and an algorithm forExpand
  • 20
  • 3
  • PDF
Privacy in Mobile Computing for Location-Sharing-Based Services
Location-Sharing-Based Services (LSBS) complement Location-Based Services by using locations from a group of users, and not just individuals, to provide some contextualized service based on theExpand
  • 52
  • 2
  • PDF
Representation and analysis of coordinated attacks
In this paper, we propose a formal model of coordinated attacks in which several attackers cooperate towards a common malicious goal. The model investigates both attack planning and vulnerabilityExpand
  • 45
  • 2
A machine-learning based approach to privacy-aware information-sharing in mobile social networks
Contextual information about users is increasingly shared on mobile social networks. Examples of such information include users' locations, events, activities, and the co-presence of others inExpand
  • 37
  • 2
  • PDF
Information Leakage through Mobile Motion Sensors: User Awareness and Concerns
Smart phones and wearable devices have replaced personal computers and desktops as the primary platform for accessing online applications and services. However, these mobile devices bring forth newExpand
  • 14
  • 2
  • PDF