Ioannou, A., Blackburn, J., Stringhini, G., De Cristofaro, E., Kourtellis, N., Sirivianos, M. (2018). From risk factors to detection and intervention: a practical proposal for future work on cyberbullying. Behaviour and Information Technology, doi:10.1080/0144929X.2018.1432688 |
Pyrgelis, A., Troncoso, C., De Cristofaro, E. (2018). Knock Knock, Who's There? Membership Inference on Aggregate Location Data. |
Zannettou, S., Bradlyn, B., De Cristofaro, E., Sirivianos, M., Stringhini, G., Kwak, H., Blackburn, J. (2018). What is Gab? A Bastion of Free Speech or an Alt-Right Echo Chamber?. |
Acs, G., Melis, L., Castelluccia, C., Cristofaro, E.D. (2017). Differentially Private Mixture of Generative Neural Networks. |
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A. (2017). Measuring #GamerGate: A Tale ofrought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking. |
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A. (2017). Mean birds: Detecting aggression and bullying on Twitter. |
Chatzakou, D., Kourtellis, N., Blackburn, J., De Cristofaro, E., Stringhini, G., Vakali, A. (2017). Hate is not binary: Studying abusive behavior of #GamerGate on Twitter. |
Farooqi, S., Ikram, M., De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M.A., ...Zaffar, F. (2017). Characterizing Key Stakeholders in an Online Black-Hat Marketplace. PROCEEDINGS OF THE 2017 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), 17-27. doi:10.1109/ECRIME.2017.7945050 |
Hayes, J., Melis, L., Danezis, G., Cristofaro, E.D. (2017). LOGAN: Evaluating Privacy Leakage of Generative Models Using Generative Adversarial Networks. . |
Hine, G., Onaolapo, J., De Cristofaro, E., Kourtellis, N., Leontiadis, I., Samaras, R., ...Blackburn, J. (2017). Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and its Effects on the Web. |
Mariconti, E., Onwuzurike, L., Andriotis, P., De Cristofaro, E., Ross, G., Stringhini, G. (2017). MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models. |
Sajadmanesh, S., Jafarzadeh, S., Osia, S.A., Rabiee, H.R., Haddadi, H., Mejova, Y., ...Stringhini, G. (2017). Kissing Cuisines: Exploring Worldwide Culinary Habits on the Web. |
Ayday, E., De Cristofaro, E., Hubaux, J.-.P., Tsudik, G. (2015). Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?. COMPUTER, 48 (2), 58-66. doi:10.1109/MC.2015.59 |
De Cristofaro, E., Malin, B. (Eds.), (2015). Proceedings of the 2nd International Workshop on Genome Privacy and Security (GenoPri'15). . |
Freudiger, J., De Cristofaro, E., Brito, A. (2015). Controlled Data Sharing for Collaborative Predictive Blacklisting. |
Nagy, M., Bui, T., De Cristofaro, E., Asokan, N., Ott, J., Sadeghi, A.R. (2015). How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL. |
Onwuzurike, L., De Cristofaro, E. (2015). Danger is my middle name: Experimenting with SSL Vulnerabilities in Android Apps. |
Beato, F., De Cristofaro, E., Rasmussen, K.B. (2014). Undetectable Communication: The Online Social Networks Case. |
Bilogrevic, I., Freudiger, J., De Cristofaro, E., Uzun, E. (2014). What’s the Gist? Privacy-Preserving Aggregation of User Profiles. |
Blundo, C., De Cristofaro, E., Gasti, P. (2014). EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity. Journal of Computer Security, 22 355-381. |
Chaabane, A., Chen, T., Cunche, M., De Cristofaro, E., Friedman, A., Kafaar, M.-.A. (2014). Censorship in the Wild: Analyzing Internet Filtering in Syria. |
Danezis, G., Cristofaro, E.D. (2014). Fast and Private Genomic Testing for Disease Susceptibility. |
Danezis, G., De Cristofaro, E. (2014). Simpler protocols for privacy-preserving disease susceptibility testing. |
De Cristofaro, E. (2014). An Exploratory Ethnographic Study of Issues and Concerns with Whole Genome Sequencing. |
De Cristofaro, E. (2014). Genomic Privacy and the Rise of a New Research Community. IEEE Security & Privacy, 12 80-83. |
De Cristofaro, E., Du, H., Freudiger, J., Norcie, G. (2014). A Comparative Usability Study of Two-Factor Authentication. |
De Cristofaro, E., Friedman, A., Jourjon, G., Kaafar, M.A., Shafiq, M.Z. (2014). Paying for Likes? Understanding Facebook Like Fraud Using Honeypots. |
De Cristofaro, E., Murdoch, S.J. (2014). Preface. . |
De Cristofaro, E., Murdoch, S.J. (2014). Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8555 LNCS doi:10.1007/978-3-319-08506-7 |
De Cristofaro, E., Murdoch, S.J. (2014). Privacy Enhancing Technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings. Springer. |
Cardenas, A., Chow, R., De Cristofaro, E. (2013). Data Handling in the Smart Grid: Do We Know Enough?. In Critical Infrastructure Protection VII. (pp. 21-32). Springer Berlin Heidelberg. |
De Cristofaro, E., Faber, S., Tsudik, G. (2013). Secure Genomic Testing with Size-and Position-Hiding Private Substring Matching. |
De Cristofaro, E., Manulis, M., Poettering, B. (2013). Private discovery of common social contacts. International journal of information security, 12 49-65. |
De Cristofaro, E., Soriente, C. (2013). Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI). IEEE Transactions on Information Forensics and Security (TIFS), 8 (8), |
De Cristofaro, E., Soriente, C. (2013). Participatory privacy: Enabling privacy in participatory sensing. IEEE Network, 27 32-36. |
Nagy, M., De Cristofaro, E., Dmitrienko, A., Asokan, N., Sadeghi, A.-.R. (2013). Do I know you?–Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications. |
Norcie, G., De Cristofaro, E., Bellotti, V. (2013). Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles. |
Blundo, C., De Cristofaro, E., Gasti, P. (2012). EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity.. |
Chaabane, A., De Cristofaro, E., Kaafar, M.-.A., Uzun, E. (2012). Privacy in Content-Oriented Networking: Threats and Countermeasures. Computer Communication Review, 43 25-33. |
De Cristofaro, E., Di Pietro, R. (2012). Adversaries and countermeasures in privacy-enhanced Urban sensing systems. IEEE Systems Journal, Special Issue on Security and Privacy of Complex Systems, |
De Cristofaro, E., Di Pietro, R. (2012). Preserving Query Privacy in Urban Sensing Systems. |
De Cristofaro, E., Faber, S., Gasti, P., Tsudik, G. (2012). GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?. |
De Cristofaro, E., Gasti, P., Tsudik, G. (2012). Fast and Private Computation of Cardinality of Set Intersection and Union. |
De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A. (2012). Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs.. IEEE Data Eng. Bull., 35 93-100. |
De Cristofaro, E., Soriente, C., Tsudik, G., Williams, A. (2012). Hummingbird: Privacy at the time of Twitter. |
De Cristofaro, E., Tsudik, G. (2012). Experimenting with Fast Private Set Intersection. |
Mishari, M.A., De Cristofaro, E., El Defrawy, K., Tsudik, G. (2012). Harvesting SSL Certificate Data to Identify Web-Fraud. International Journal of Network Security (IJSN), |
Ateniese, G., De Cristofaro, E., Tsudik, G. (2011). (If) size matters: size-hiding private set intersection. |
Baldi, P., Baronio, R., De Cristofaro, E., Gasti, P., Tsudik, G. (2011). Countering GATTACA: efficient and secure testing of fully-sequenced human genomes. |
Castelluccia, C., De Cristofaro, E., Francillon, A., Kaafar, M.-.A. (2011). EphPub: Toward Robust Ephemeral Publishing. |
De Cristofaro, E., Durussel, A., Aad, I. (2011). Reclaiming privacy for smartphone applications. |
De Cristofaro, E., Lu, Y., Tsudik, G. (2011). Efficient techniques for privacy-preserving sharing of sensitive information. |
De Cristofaro, E., Manulis, M., Poettering, B. (2011). Private Discovery of Common Social Contacts. |
De Cristofaro, E., Soriente, C. (2011). PEPSI—privacy-enhanced participatory sensing infrastructure. |
Fischer-Hübner, S., Hopper, N. (Eds.), (2011). Privacy Enhancing Technologies - 11th International Symposium, PETS 2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings. Springer. |
Auletta, V., Blundo, C., De Caro, A., De Cristofaro, E., Persiano, G., Visconti, I. (2010). Increasing privacy threats in the cyberspace: the case of Italian e-passports. |
Castelluccia, C., De Cristofaro, E., Perito, D. (2010). Private information disclosure from web searches. |
De Cristofaro, E., Kim, J. (2010). Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization. IEEE Security & Privacy, 8 18-24. |
De Cristofaro, E., Kim, J., Tsudik, G. (2010). Linear-complexity private set intersection protocols secure in malicious model. |
De Cristofaro, E., Tsudik, G. (2010). Practical private set intersection protocols with linear complexity. |