What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Emiliano De Cristofaro
Google Scholar
43
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
The Inadequacy of Similarity-Based Privacy Metrics: Privacy Attacks Against "Truly Anonymous" Synthetic Datasets.
Georgi Ganev
Emiliano De Cristofaro
2025
conf/esorics
PROTEAN: Federated Intrusion Detection in Non-IID Environments Through Prototype-Based Knowledge Sharing.
Sara Chennoufi
Yufei Han
Gregory Blanc
Emiliano De Cristofaro
Christophe Kiennert
2024
conf/ccs
Graphical vs. Deep Generative Models: Measuring the Impact of Differentially Private Mechanisms and Budgets on Utility.
Georgi Ganev
Kai Xu
Emiliano De Cristofaro
2024
conf/uss
"What do you want from theory alone?" Experimenting with Tight Auditing of Differentially Private Synthetic Data Generation.
Meenatchi Sundaram Muthu Selva Annamalai
Georgi Ganev
Emiliano De Cristofaro
2024
conf/sp
BadVFL: Backdoor Attacks in Vertical Federated Learning.
Mohammad Naseri
Yufei Han
Emiliano De Cristofaro
2024
conf/ndss
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting.
Meenatchi Sundaram Muthu Selva Annamalai
Igor Bilogrevic
Emiliano De Cristofaro
2023
conf/sp
Lambretta: Learning to Rank for Twitter Soft Moderation.
Pujan Paudel
Jeremy Blackburn
Emiliano De Cristofaro
Savvas Zannettou
Gianluca Stringhini
2022
conf/ccs
Why So Toxic?: Measuring and Triggering Toxic Behavior in Open-Domain Chatbots.
Wai Man Si
Michael Backes
Jeremy Blackburn
Emiliano De Cristofaro
Gianluca Stringhini
Savvas Zannettou
Yang Zhang
2022
conf/ccs
CERBERUS: Exploring Federated Prediction of Security Events.
Mohammad Naseri
Yufei Han
Enrico Mariconti
Yun Shen
Gianluca Stringhini
Emiliano De Cristofaro
2022
conf/uss
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models.
Yugeng Liu
Rui Wen
Xinlei He
Ahmed Salem
Zhikun Zhang
Michael Backes
Emiliano De Cristofaro
Mario Fritz
Yang Zhang
2022
conf/sp
TrollMagnifier: Detecting State-Sponsored Troll Accounts on Reddit.
Mohammad Hammas Saeed
Shiza Ali
Jeremy Blackburn
Emiliano De Cristofaro
Savvas Zannettou
Gianluca Stringhini
2022
conf/ndss
On Utility and Privacy in Synthetic Genomic Data.
Bristena Oprisanu
Georgi Ganev
Emiliano De Cristofaro
2022
conf/ndss
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning.
Mohammad Naseri
Jamie Hayes
Emiliano De Cristofaro
2020
conf/sp
On the Feasibility of Acoustic Attacks Using Commodity Smart Devices.
Matt Wixey
Emiliano De Cristofaro
Shane D. Johnson
2019
journals/popets
LOGAN: Membership Inference Attacks Against Generative Models.
Jamie Hayes
Luca Melis
George Danezis
Emiliano De Cristofaro
2019
journals/popets
Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective.
Alexandros Mittos
Bradley A. Malin
Emiliano De Cristofaro
2019
conf/sp
Exploiting Unintended Feature Leakage in Collaborative Learning.
Luca Melis
Congzheng Song
Emiliano De Cristofaro
Vitaly Shmatikov
2018
conf/acns
Nothing Refreshes Like a RePSI: Reactive Private Set Intersection.
Andrea Cerulli
Emiliano De Cristofaro
Claudio Soriente
2018
conf/ndss
Knock Knock, Who's There? Membership Inference on Aggregate Location Data.
Apostolos Pyrgelis
Carmela Troncoso
Emiliano De Cristofaro
2018
conf/acsac
LOBO: Evaluation of Generalization Deficiencies in Twitter Bot Classifiers.
Juan Echeverría
Emiliano De Cristofaro
Nicolas Kourtellis
Ilias Leontiadis
Gianluca Stringhini
Shi Zhou
2017
journals/popets
What Does The Crowd Say About You? Evaluating Aggregation-based Location Privacy.
Apostolos Pyrgelis
Carmela Troncoso
Emiliano De Cristofaro
2017
conf/ndss
MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models.
Enrico Mariconti
Lucky Onwuzurike
Panagiotis Andriotis
Emiliano De Cristofaro
Gordon J. Ross
Gianluca Stringhini
2016
conf/uss
Adblocking and Counter Blocking: A Slice of the Arms Race.
Rishab Nithyanand
Sheharbano Khattak
Mobin Javed
Narseo Vallina-Rodriguez
Marjan Falahrastegar
Julia E. Powles
Emiliano De Cristofaro
Hamed Haddadi
Steven J. Murdoch
2016
conf/ndss
Efficient Private Statistics with Succinct Sketches.
Luca Melis
George Danezis
Emiliano De Cristofaro
2016
conf/wisec
POSTER: Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps.
Lucky Onwuzurike
Emiliano De Cristofaro
2015
conf/wisec
How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL.
Marcin Nagy
Thanh Bui
Emiliano De Cristofaro
N. Asokan
Jörg Ott
Ahmad-Reza Sadeghi
2015
conf/wisec
Danger is my middle name: experimenting with SSL vulnerabilities in Android apps.
Lucky Onwuzurike
Emiliano De Cristofaro
2014
conf/esorics
What's the Gist? Privacy-Preserving Aggregation of User Profiles.
Igor Bilogrevic
Julien Freudiger
Emiliano De Cristofaro
Ersin Uzun
2013
journals/tifs
Extended Capabilities for a Privacy-Enhanced Participatory Sensing Infrastructure (PEPSI).
Emiliano De Cristofaro
Claudio Soriente
2013
conf/fc
Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles.
Gregory Norcie
Emiliano De Cristofaro
Victoria Bellotti
2013
conf/acsac
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications.
Marcin Nagy
Emiliano De Cristofaro
Alexandra Dmitrienko
N. Asokan
Ahmad-Reza Sadeghi
2012
conf/sp
Hummingbird: Privacy at the Time of Twitter.
Emiliano De Cristofaro
Claudio Soriente
Gene Tsudik
Andrew Williams
2012
conf/esorics
EsPRESSo: Efficient Privacy-Preserving Evaluation of Sample Set Similarity.
Carlo Blundo
Emiliano De Cristofaro
Paolo Gasti
2012
conf/cans
Fast and Private Computation of Cardinality of Set Intersection and Union.
Emiliano De Cristofaro
Paolo Gasti
Gene Tsudik
2011
conf/ccs
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
Pierre Baldi
Roberta Baronio
Emiliano De Cristofaro
Paolo Gasti
Gene Tsudik
2011
conf/acns
Private Discovery of Common Social Contacts.
Emiliano De Cristofaro
Mark Manulis
Bertram Poettering
2011
conf/pkc
(If) Size Matters: Size-Hiding Private Set Intersection.
Giuseppe Ateniese
Emiliano De Cristofaro
Gene Tsudik
2011
conf/wisec
Short paper: PEPSI - privacy-enhanced participatory sensing infrastructure.
Emiliano De Cristofaro
Claudio Soriente
2010
conf/fc
Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.
Vincenzo Auletta
Carlo Blundo
Angelo De Caro
Emiliano De Cristofaro
Giuseppe Persiano
Ivan Visconti
2010
conf/fc
Practical Private Set Intersection Protocols with Linear Complexity.
Emiliano De Cristofaro
Gene Tsudik
2010
conf/asiacrypt
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
Emiliano De Cristofaro
Jihye Kim
Gene Tsudik
2009
conf/wisec
FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks.
Emiliano De Cristofaro
Jens-Matthias Bohli
Dirk Westhoff
2008
conf/esorics
A Distributed Implementation of the Certified Information Access Service.
Carlo Blundo
Emiliano De Cristofaro
Aniello Del Sorbo
Clemente Galdi
Giuseppe Persiano
Coauthors
Ahmad-Reza Sadeghi
(2)
Ahmed Salem
(1)
Alexandra Dmitrienko
(1)
Alexandros Mittos
(1)
Andrea Cerulli
(1)
Andrew Williams
(1)
Angelo De Caro
(1)
Aniello Del Sorbo
(1)
Apostolos Pyrgelis
(2)
Bertram Poettering
(1)
Bradley A. Malin
(1)
Bristena Oprisanu
(1)
Carlo Blundo
(3)
Carmela Troncoso
(2)
Christophe Kiennert
(1)
Claudio Soriente
(4)
Clemente Galdi
(1)
Congzheng Song
(1)
Dirk Westhoff
(1)
Emiliano De Cristofaro
(43)
Enrico Mariconti
(2)
Ersin Uzun
(1)
Gene Tsudik
(6)
George Danezis
(2)
Georgi Ganev
(4)
Gianluca Stringhini
(6)
Giuseppe Ateniese
(1)
Giuseppe Persiano
(2)
Gordon J. Ross
(1)
Gregory Blanc
(1)
Gregory Norcie
(1)
Hamed Haddadi
(1)
Igor Bilogrevic
(2)
Ilias Leontiadis
(1)
Ivan Visconti
(1)
Jamie Hayes
(2)
Jens-Matthias Bohli
(1)
Jeremy Blackburn
(3)
Jihye Kim
(1)
Jörg Ott
(1)
Juan Echeverría
(1)
Julia E. Powles
(1)
Julien Freudiger
(1)
Kai Xu
(1)
Luca Melis
(3)
Lucky Onwuzurike
(3)
Marcin Nagy
(2)
Mario Fritz
(1)
Marjan Falahrastegar
(1)
Mark Manulis
(1)
Matt Wixey
(1)
Meenatchi Sundaram Muthu Selva Annamalai
(2)
Michael Backes
(2)
Mobin Javed
(1)
Mohammad Hammas Saeed
(1)
Mohammad Naseri
(3)
N. Asokan
(2)
Narseo Vallina-Rodriguez
(1)
Nicolas Kourtellis
(1)
Panagiotis Andriotis
(1)
Paolo Gasti
(3)
Pierre Baldi
(1)
Pujan Paudel
(1)
Rishab Nithyanand
(1)
Roberta Baronio
(1)
Rui Wen
(1)
Sara Chennoufi
(1)
Savvas Zannettou
(3)
Shane D. Johnson
(1)
Sheharbano Khattak
(1)
Shi Zhou
(1)
Shiza Ali
(1)
Steven J. Murdoch
(1)
Thanh Bui
(1)
Victoria Bellotti
(1)
Vincenzo Auletta
(1)
Vitaly Shmatikov
(1)
Wai Man Si
(1)
Xinlei He
(1)
Yang Zhang
(2)
Yufei Han
(3)
Yugeng Liu
(1)
Yun Shen
(1)
Zhikun Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to