Publications
42 found
Show per page
Schroer, S. L., Apruzzese, G., Human, S., Laskov, P., Anderson, H. S., Bernroider, E. W. N., Fass, A., Nassi, B., Rimmer, V., Roli, F., Salam, S., Ashley Shen, C. E., Sunyaev, A., Wadhwa-Brown, T., Wagner, I., & Wang, G. (2025). SoK: On the Offensive Potential of AI. Proceedings - 2025 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025, 247–280. https://doi.org/10.1109/satml64287.2025.00021
Schroer, S. L., Apruzzese, G., Human, S., Laskov, P., Anderson, H. S., Bernroider, E. W. N., Fass, A., Nassi, B., Rimmer, V., Roli, F., Salam, S., Ashley Shen, C. E., Sunyaev, A., Wadhwa-Brown, T., Wagner, I., & Wang, G. (2025). SoK: On the Offensive Potential of AI. Proceedings - 2025 IEEE Conference on Secure and Trustworthy Machine Learning, SaTML 2025, 247–280. https://doi.org/10.1109/satml64287.2025.00021
Pavliv, Valentyna, Akbari, Nima, & . (2024). AI-powered Smart Toys: Interactive Friends or Surveillance Devices? 14th International Conference on the Internet of Things (IoT 2024), 172–175. https://doi.org/10.1145/3703790.3703841
Pavliv, Valentyna, Akbari, Nima, & . (2024). AI-powered Smart Toys: Interactive Friends or Surveillance Devices? 14th International Conference on the Internet of Things (IoT 2024), 172–175. https://doi.org/10.1145/3703790.3703841
Pallas, F., Koerner, K., Barbera, I., Hoepman, J.-H., Jensen, M., Narla, N. R., Samarin, N., Ulbricht, M.-R., Wagner, I., Wuyts, K., & Zimmermann, C. (2024). Privacy Engineering from Principles to Practice: A Roadmap. IEEE Security and Privacy, 22(2), 86–92. https://doi.org/10.1109/msec.2024.3363829
Pallas, F., Koerner, K., Barbera, I., Hoepman, J.-H., Jensen, M., Narla, N. R., Samarin, N., Ulbricht, M.-R., Wagner, I., Wuyts, K., & Zimmermann, C. (2024). Privacy Engineering from Principles to Practice: A Roadmap. IEEE Security and Privacy, 22(2), 86–92. https://doi.org/10.1109/msec.2024.3363829
Reisinger, Thomas, Boiten, Eerke Albert, & . (2024, February 19). SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings. 2024 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/icnc59896.2024.10556130
Reisinger, Thomas, Boiten, Eerke Albert, & . (2024, February 19). SEPPI: Secure and Privacy-Preserving Invitation for Unified Communication Meetings. 2024 International Conference on Computing, Networking and Communications (ICNC). https://doi.org/10.1109/icnc59896.2024.10556130
Feldbusch, Julika, Pavliv, Valentyna, Akbari, Nima, & . (2024). No transparency for smart toys. In Jensen, Meiko; Lauradoux, Cédric; Rannenberg, Kai (ed.), Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024 (pp. 203–227). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-68024-3_11
Feldbusch, Julika, Pavliv, Valentyna, Akbari, Nima, & . (2024). No transparency for smart toys. In Jensen, Meiko; Lauradoux, Cédric; Rannenberg, Kai (ed.), Privacy Technologies and Policy: 12th Annual Privacy Forum, APF 2024 (pp. 203–227). Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-68024-3_11
, & Boiten, Eerke. (2023). Risks and benefits of smart toilets [Proceedings-article]. BuildSys 2023 - Proceedings of The10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 340–346. https://doi.org/10.1145/3600100.3625377
, & Boiten, Eerke. (2023). Risks and benefits of smart toilets [Proceedings-article]. BuildSys 2023 - Proceedings of The10th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation, 340–346. https://doi.org/10.1145/3600100.3625377
Reisinger, Thomas, , & Boiten, Eerke Albert. (2023, July 1). Unified Communication: What do Digital Activists need? 2023 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw59978.2023.00021
Reisinger, Thomas, , & Boiten, Eerke Albert. (2023, July 1). Unified Communication: What do Digital Activists need? 2023 IEEE European Symposium on Security and Privacy Workshops. https://doi.org/10.1109/eurospw59978.2023.00021
. (2023). Privacy Policies Across the Ages: Content of Privacy Policies 1996-2021. ACM Transactions on Privacy and Security, 26(3), 32. https://doi.org/10.1145/3590152
. (2023). Privacy Policies Across the Ages: Content of Privacy Policies 1996-2021. ACM Transactions on Privacy and Security, 26(3), 32. https://doi.org/10.1145/3590152
Loft, Paul, He, Ying, Yevseyeva, Iryna, & . (2022). CAESAR8: An agile enterprise architecture approach to managing information security risks. Computers and Security, 122, 102877. https://doi.org/10.1016/j.cose.2022.102877
Loft, Paul, He, Ying, Yevseyeva, Iryna, & . (2022). CAESAR8: An agile enterprise architecture approach to managing information security risks. Computers and Security, 122, 102877. https://doi.org/10.1016/j.cose.2022.102877
Reisinger, Thomas, , & Boiten, Eerke Albert. (2022). Security and Privacy in Unified Communication. ACM Computing Surveys, 55(3), 55. https://doi.org/10.1145/3498335
Reisinger, Thomas, , & Boiten, Eerke Albert. (2022). Security and Privacy in Unified Communication. ACM Computing Surveys, 55(3), 55. https://doi.org/10.1145/3498335
. (2022). A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. In Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) : Vol. 13555 LNCS (pp. 3–23). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-17146-8_1
. (2022). A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. In Atluri, Vijayalakshmi and Di Pietro, Roberto and Jensen, Christian D. and Meng, Weizhi (Ed.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) : Vol. 13555 LNCS (pp. 3–23). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-17146-8_1
. (2022). Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency. Cambridge University Press. https://doi.org/10.1017/9781108946940
. (2022). Auditing Corporate Surveillance Systems: Research Methods for Greater Transparency. Cambridge University Press. https://doi.org/10.1017/9781108946940
. (2022, January 1). Longitudinal Corpus of Privacy Policies [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.5841139
. (2022, January 1). Longitudinal Corpus of Privacy Policies [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.5841139
. (2022, January 1). Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996-2021. http://arxiv.org/abs/2201.08739
. (2022, January 1). Privacy Policies Across the Ages: Content and Readability of Privacy Policies 1996-2021. http://arxiv.org/abs/2201.08739
Zhao, Yuchen, & . (2022). Using Metrics Suites to Improve the Measurement of Privacy in Graphs. IEEE Transactions on Dependable and Secure Computing, 19(1), 259–274. https://doi.org/10.1109/tdsc.2020.2980271
Zhao, Yuchen, & . (2022). Using Metrics Suites to Improve the Measurement of Privacy in Graphs. IEEE Transactions on Dependable and Secure Computing, 19(1), 259–274. https://doi.org/10.1109/tdsc.2020.2980271
. (2021). Location Semantics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.), Encyclopedia of Cryptography, Security and Privacy (pp. 1–3). Springer. https://doi.org/10.1007/978-3-642-27739-9_1736-1
. (2021). Location Semantics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.), Encyclopedia of Cryptography, Security and Privacy (pp. 1–3). Springer. https://doi.org/10.1007/978-3-642-27739-9_1736-1
. (2021). Measuring Location Privacy. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.), Encyclopedia of Cryptography, Security and Privacy (pp. 1–4). Springer. https://doi.org/10.1007/978-3-642-27739-9_1530-1
. (2021). Measuring Location Privacy. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.), Encyclopedia of Cryptography, Security and Privacy (pp. 1–4). Springer. https://doi.org/10.1007/978-3-642-27739-9_1530-1
, & Eckhoff, David. (2021). Privacy Metrics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.), Encyclopedia of Cryptography, Security and Privacy (pp. 1–5). Springer. https://doi.org/10.1007/978-3-642-27739-9_1543-1
, & Eckhoff, David. (2021). Privacy Metrics. In Jajodia, Sushil and Samarati, Pierangela and Yung, Moti (Ed.), Encyclopedia of Cryptography, Security and Privacy (pp. 1–5). Springer. https://doi.org/10.1007/978-3-642-27739-9_1543-1
Loft, Paul, He, Ying, Janicke, Helge, & . (2021). Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis. Enterprise Information Systems, 15(4), 448–473. https://doi.org/10.1080/17517575.2019.1605000
Loft, Paul, He, Ying, Janicke, Helge, & . (2021). Dying of a hundred good symptoms: why good security can still fail - a literature review and analysis. Enterprise Information Systems, 15(4), 448–473. https://doi.org/10.1080/17517575.2019.1605000
, & Yevseyeva, Iryna. (2021). Designing Strong Privacy Metrics Suites Using Evolutionary Optimization. ACM Transactions on Privacy and Security, 24(2), Article 12 (February 2021), 35 pages. https://doi.org/10.1145/3439405
, & Yevseyeva, Iryna. (2021). Designing Strong Privacy Metrics Suites Using Evolutionary Optimization. ACM Transactions on Privacy and Security, 24(2), Article 12 (February 2021), 35 pages. https://doi.org/10.1145/3439405
Del Alamo, J. M., Such, J., Wagner, I., & Ramokapane, M. (2020). Preface on the International Workshop on Privacy Engineering 2020 (IWPE′20). Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. https://doi.org/10.1109/eurospw51379.2020.00046
Del Alamo, J. M., Such, J., Wagner, I., & Ramokapane, M. (2020). Preface on the International Workshop on Privacy Engineering 2020 (IWPE′20). Proceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020. https://doi.org/10.1109/eurospw51379.2020.00046
Fairclough, Simon M., Giannetti, Cinzia, , & Shakeel, Hamza. (2020, August 16). Colorimetric sensor for pH monitoring of liquid samples using bubble wrap and mobile phone camera. FLEPS 2020 - IEEE International Conference on Flexible and Printable Sensors and Systems. https://doi.org/10.1109/fleps49123.2020.9239445
Fairclough, Simon M., Giannetti, Cinzia, , & Shakeel, Hamza. (2020, August 16). Colorimetric sensor for pH monitoring of liquid samples using bubble wrap and mobile phone camera. FLEPS 2020 - IEEE International Conference on Flexible and Printable Sensors and Systems. https://doi.org/10.1109/fleps49123.2020.9239445
Mothi, Dinesh, Janicke, Helge, & . (2020). A novel principle to validate digital forensic models. Forensic Science International: Digital Investigation, 33, 200904. https://doi.org/10.1016/j.fsidi.2020.200904
Mothi, Dinesh, Janicke, Helge, & . (2020). A novel principle to validate digital forensic models. Forensic Science International: Digital Investigation, 33, 200904. https://doi.org/10.1016/j.fsidi.2020.200904
. (2020). Methods of Corporate Surveillance: A Primer on Experimental Transparency Research. The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 2020, 315–316. https://doi.org/10.1145/3366424.3383116
. (2020). Methods of Corporate Surveillance: A Primer on Experimental Transparency Research. The Web Conference 2020 - Companion of the World Wide Web Conference, WWW 2020, 315–316. https://doi.org/10.1145/3366424.3383116
Ferra, Fenia, , Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, & Snape, Richard. (2020). Challenges in Assessing Privacy Impact: Tales from the Front Lines. Security and Privacy, 3(2), e101. https://doi.org/10.1002/spy2.101
Ferra, Fenia, , Boiten, Eerke, Hadlington, Lee, Psychoula, Ismini, & Snape, Richard. (2020). Challenges in Assessing Privacy Impact: Tales from the Front Lines. Security and Privacy, 3(2), e101. https://doi.org/10.1002/spy2.101
, & Yevseyeva, Iryna. (2020, January 1). Privacy Metrics Suites for Genomic Privacy, Vehicular Communications Privacy, and Graph Privacy (Version 1.0.0) [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.3350563
, & Yevseyeva, Iryna. (2020, January 1). Privacy Metrics Suites for Genomic Privacy, Vehicular Communications Privacy, and Graph Privacy (Version 1.0.0) [Data Set] [Zenodo]. https://doi.org/10.5281/zenodo.3350563
Zeng, Wen, Bashir, Reem, Wood, Trevor, Siewe, Francois, Janicke, Helge, & . (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems. EAI Endorsed Transactions on Cloud Systems, 6(18), 1–11. https://doi.org/10.4108/eai.13-7-2018.165236
Zeng, Wen, Bashir, Reem, Wood, Trevor, Siewe, Francois, Janicke, Helge, & . (2020). How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems. EAI Endorsed Transactions on Cloud Systems, 6(18), 1–11. https://doi.org/10.4108/eai.13-7-2018.165236
, & Eckhoff, David. (2019). Technical privacy metrics: A systematic survey. ACM Computing Surveys, 51(3), 57:1–57:38. https://doi.org/10.1145/3168389
, & Eckhoff, David. (2019). Technical privacy metrics: A systematic survey. ACM Computing Surveys, 51(3), 57:1–57:38. https://doi.org/10.1145/3168389
Muhammad, Musa Abubakar, Ayesh, Aladdin, & . (2019, July 1). Behavior-based outlier detection for network access control systems. ACM International Conference Proceeding Series. https://doi.org/10.1145/3341325.3342004
Muhammad, Musa Abubakar, Ayesh, Aladdin, & . (2019, July 1). Behavior-based outlier detection for network access control systems. ACM International Conference Proceeding Series. https://doi.org/10.1145/3341325.3342004
Zhao, Yuchen, & . (2019). On the Strength of Privacy Metrics for Vehicular Communication. IEEE Transactions on Mobile Computing, 18(2), 390–403. https://doi.org/10.1109/TMC.2018.2830359
Zhao, Yuchen, & . (2019). On the Strength of Privacy Metrics for Vehicular Communication. IEEE Transactions on Mobile Computing, 18(2), 390–403. https://doi.org/10.1109/TMC.2018.2830359
Zhao, Yuchen, & . (2018). POSTER: Evaluating privacy metrics for graph anonymization and de-anonymization. ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, 817–819. https://doi.org/10.1145/3196494.3201586
Zhao, Yuchen, & . (2018). POSTER: Evaluating privacy metrics for graph anonymization and de-anonymization. ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, 817–819. https://doi.org/10.1145/3196494.3201586
Eckhoff, David, & . (2018). Privacy in the Smart City - Applications, Technologies, Challenges, and Solutions. IEEE Communications Surveys and Tutorials, 20(1), 489–516. https://doi.org/10.1109/COMST.2017.2748998
Eckhoff, David, & . (2018). Privacy in the Smart City - Applications, Technologies, Challenges, and Solutions. IEEE Communications Surveys and Tutorials, 20(1), 489–516. https://doi.org/10.1109/COMST.2017.2748998
, & Boiten, Eerke. (2018). Privacy Risk Assessment: From Art to Science, by Metrics. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11025 LNCS, 225–241. https://doi.org/10.1007/978-3-030-00305-0_17
, & Boiten, Eerke. (2018). Privacy Risk Assessment: From Art to Science, by Metrics. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 11025 LNCS, 225–241. https://doi.org/10.1007/978-3-030-00305-0_17
. (2017). Measuring Privacy in Vehicular Networks. Proceedings - Conference on Local Computer Networks, LCN, 2017-October, 183–186. https://doi.org/10.1109/LCN.2017.33
. (2017). Measuring Privacy in Vehicular Networks. Proceedings - Conference on Local Computer Networks, LCN, 2017-October, 183–186. https://doi.org/10.1109/LCN.2017.33
. (2017). Evaluating the Strength of Genomic Privacy Metrics. ACM Transactions on Privacy and Security, 20(1), 2:1–2:34. https://doi.org/10.1145/3020003
. (2017). Evaluating the Strength of Genomic Privacy Metrics. ACM Transactions on Privacy and Security, 20(1), 2:1–2:34. https://doi.org/10.1145/3020003
Tailor, Neel, He, Ying, & . (2016). Poster: Design ideas for privacy-aware user interfaces for mobile devices. WiSec 2016 - Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 219–220. https://doi.org/10.1145/2939918.2942420
Tailor, Neel, He, Ying, & . (2016). Poster: Design ideas for privacy-aware user interfaces for mobile devices. WiSec 2016 - Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 219–220. https://doi.org/10.1145/2939918.2942420
. (2016). Gender and performance in computer science. ACM Transactions on Computing Education, 16(3), Article No. 11. https://doi.org/10.1145/2920173
. (2016). Gender and performance in computer science. ACM Transactions on Computing Education, 16(3), Article No. 11. https://doi.org/10.1145/2920173
, He, Ying, Rosenberg, Duska, & Janicke, Helge. (2016). User interface design for privacy awareness in eHealth technologies. 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016, 38–43. https://doi.org/10.1109/CCNC.2016.7444728
, He, Ying, Rosenberg, Duska, & Janicke, Helge. (2016). User interface design for privacy awareness in eHealth technologies. 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016, 38–43. https://doi.org/10.1109/CCNC.2016.7444728
Maglaras, Leandros A., Al-Bayatti, Ali H., He, Ying, , & Janicke, Helge. (2016). Social internet of vehicles for smart cities. Journal of Sensor and Actuator Networks, 5(1), 3. https://doi.org/10.3390/jsan5010003
Maglaras, Leandros A., Al-Bayatti, Ali H., He, Ying, , & Janicke, Helge. (2016). Social internet of vehicles for smart cities. Journal of Sensor and Actuator Networks, 5(1), 3. https://doi.org/10.3390/jsan5010003
. (2015). Genomic privacy metrics: A systematic comparison. Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015, 50–59. https://doi.org/10.1109/SPW.2015.15
. (2015). Genomic privacy metrics: A systematic comparison. Proceedings - 2015 IEEE Security and Privacy Workshops, SPW 2015, 50–59. https://doi.org/10.1109/SPW.2015.15
, & Eckhoff, David. (2015). Privacy assessment in vehicular networks using simulation. Proceedings - Winter Simulation Conference, 2015-January, 3155–3166. https://doi.org/10.1109/WSC.2014.7020152
, & Eckhoff, David. (2015). Privacy assessment in vehicular networks using simulation. Proceedings - Winter Simulation Conference, 2015-January, 3155–3166. https://doi.org/10.1109/WSC.2014.7020152
, Hielscher, Kai-Steffen Jens, & German, Reinhard. (2005, January 1). A Measurement-Based Simulation Model of a Web Cluster.
, Hielscher, Kai-Steffen Jens, & German, Reinhard. (2005, January 1). A Measurement-Based Simulation Model of a Web Cluster.