2025 (4)
- Dominika Woszczyk, Soteris Demetriou, DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech, Proceedings on the 25th Privacy Enhancing Technologies Symposium (PETS/PoPETS), 2025
- Anastasios Lepipas, Marios Charalambides, Jiani Liu, Yiying Guan, Dominika Woszczyk, Mansi, Hai Le, Soteris Demetriou, Leaky Diffusion: Attribute Leakage in Text-Guided Image Generation, Proceedings on the 25th Privacy Enhancing Technologies Symposium (PETS/PoPETS), 2025
- Dominika Woszczyk, Ranya Aloufi, Soteris Demetriou, ClaritySpeech: Dementia Obfuscation in Speech, Proceedings of the 26th Interspeech Conference, volume 2025, 2025
- Mansi, Anastasios Lepipas, Dominika Woszczyk, Yiying Guan, Soteris Demetriou, Understanding Dementia Speech Alignment with Diffusion-Based Image Generation, Proceedings of the 26th Interspeech Conference, volume 2025, 2025
2024 (5)
- Matt Guo, Soteris Demetriou, Joey Yang, Michael Leighton, Diedi Hu, Tong Bao, Amit Adhikari, Thawan Kooburat, Annie Kim, Chunqiang Tang, MobileConfig: Remote Configuration Management for Mobile Apps at Hyperscale, 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), pp.1867–1882, 2024
- Anastasios Lepipas, Anastasia Borovykh, Soteris Demetriou, Username Squatting on Online Social Networks: A Study on X, Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, pp.621–637, 2024
- Chengzeng You, Zhongyuan Hau, Binbin Xu, Soteris Demetriou, Adversarial 3D Virtual Patches using Integrated Gradients, 2024 IEEE Security and Privacy Workshops (SPW), volume , pp.289-295, 2024, *Best Paper Award*
- Dominika Woszczyk, Ranya Aloufi, Soteris Demetriou, Prosody-Driven Privacy-Preserving Dementia Detection, Interspeech, volume 2024, 2024
- Richard Capraru, Emil C. Lupu, Soteris Demetriou, Jian-Gang Wang, Boon Hee Soong, Rain-Reaper: Unmasking LiDAR-based Detector Vulnerabilities in Rain, 2024 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2024
2023 (4)
- Alireza Sahraei, Soteris Demetriou, Amirali Sobhgol, Haoran Zhang, Abhigna Nagaraja, Neeraj Pathak, Girish Joshi, Carla Souza, Bo Huang, Wyatt Cook, Andrii Golovei, Pradeep Venkat, Andrew McFague, Dimitrios Skarlatos, Vipul Patel, Ravinder Thind, Ernesto Gonzalez, Yun Jin, Chunqiang Tang, XFaaS: Hyperscale and Low Cost Serverless Functions at Meta, 29th ACM Symposium on Operating Systems Principles (SOSP 23), 2023
- Hsiao-Ying Huang, Soteris Demetriou, Muhammad Hassan, G"uliz Seray Tuncay, Carl A. Gunter, Masooda Bashir, Evaluating User Behavior in Smartphone Security: A Psychometric Perspective, Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023), pp.509–524, 2023
- Harshit Saokar, Soteris Demetriou, Nick Magerko, Max Kontorovich, Josh Kirstein, Margot Leibold, Dimitrios Skarlatos, Hitesh Khandelwal, Chunqiang Tang, ServiceRouter: Hyperscale and Minimal Cost Service Mesh at Meta, 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23), pp.969–985, 2023
- Boris Grubic, Yang Wang, Tyler Petrochko, Ran Yaniv, Brad Jones, David Callies, Matt Clarke-Lauer, Dan Kelley, Soteris Demetriou, Kenny Yu, Chunqiang Tang, Conveyor: One-Tool-Fits-All Continuous Software Deployment at Meta, 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23), pp.325–342, 2023
2022 (3)
- Dominika Woszczyk, Anna Hledikova, Alican Akman, Soteris Demetriou, Björn Schuller, Data Augmentation for Dementia Detection in Spoken Language, Proc. Interspeech 2022, pp.2858–2862, 2022
- Cecilia Loureiro-Koechlin, Jos'e-Rodrigo C'ordoba-Pach'on, Lynne Coventry, Soteris Demetriou, Charles Weir, Vision: Design Fiction for Cybersecurity: Using Science Fiction to Help Software Developers Anticipate Problems, Proceedings of the 2022 European Symposium on Usable Security, pp.79–84, 2022
- Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu, Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception, 43rd IEEE Security and Privacy, SP Workshops 2022, San Francisco, CA, USA, May 22-26, 2022, pp.229–235, 2022
2021 (7)
- Zhongyuan Hau, Kenneth T Co, Soteris Demetriou, Emil C Lupu, Object Removal Attacks on LiDAR-based 3D Object Detectors, Third International Workshop on Automotive and Autonomous Vehicle Security (AutoSec) - co-located with NDSS, 2021, *Runner-Up for Best Short Paper Award*
- Zhongyuan Hau, Soteris Demetriou, Luis Mu~noz-Gonz'alez, Emil C. Lupu, Shadow-Catcher: Looking into Shadows to Detect Ghost Objects in Autonomous Vehicle 3D Sensing, Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I, volume 12972, pp.691–711, 2021
- Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, Soteris Demetriou, Layer-wise Characterization of Latent Information Leakage in Federated Learning, 2021, Distributed and Private Machine Learning workshop - co-located with ICLR.
- Dominika Woszczyk, Alvin Lee, Soteris Demetriou, Open, Sesame! Introducing Access Control to Voice Services, 2021
- Sojhal Ismail Khan, Dominika C Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed, Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services, Annual Computer Security Applications Conference, pp.944–956, 2021
- Chengzeng You, Zhongyuan Hau, Soteris Demetriou, Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception, Proceedings of the 1st Workshop on Security and Privacy for Mobile AI, pp.13–18, 2021
- Sojhal Ismail Khan, Dominika C Woszczyk, Chengzeng You, Soteris Demetriou, Muhammad Naveed, Characterizing Improper Input Validation Vulnerabilities of Mobile Crowdsourcing Services, Annual Computer Security Applications Conference, pp.944–956, 2021
2020 (5)
- Fan Mo, Ali Shahin, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi, DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments, Proceedings of the 18th ACM international conference on Mobile systems, applications, and services (MobiSys), 2020
- Hsiao-Ying Huang, Soteris Demetriou, Rini Banerjee, Güliz Seray Tuncay, Carl A. Gunter, Masooda Bashir, Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security, arXiv, 2020
- Xiaofeng Wang, Kan Yuan, Xiaoyong Zhou, Muhammad Naveed, Soteris Demetriou, Carl Gunter, External resource control of mobile devices, 2020, US Patent 10,685,142
- Soteris Demetriou, Puneet Jain, Determination of a next state of multiple iot devices within an environment, 2020, US Patent 10,778,516
- Dominika Woszczyk, Stavros Petridis, David Millard, Domain Adversarial Neural Networks for Dysarthric Speech Recognition, Proceedings of 21th Annual Conference of the International Speech Communication Association (Interspeech), pp.3875–3879, 2020
2019 (3)
- Avesta Hojjati, Yunhui Long, Soteris Demetriou, Carl A Gunter, BEEER: distributed record and replay for medical devices in hospital operating rooms, Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security (HotSoS), pp.1, 2019
- Puneet Jain, Soteris Demetriou, Kyu-Han Kim, Determining Car Positions, 2019, US Patent 10,380,889
- Shuhan Lou, Ling Peng, Yunting Song, Xuantong Chen, Chengzeng You, Optimization of Bus Service with a Spatio-Temporal Transport Pulsation Model, Future of Information and Communication Conference, pp.304–318, 2019
2018 (4)
- Soteris Demetriou, Puneet Jain, Kyu-Han Kim, Codrive: Improving automobile positioning via collaborative driving, IEEE INFOCOM 2018-IEEE Conference on Computer Communications (INFOCOM), pp.72–80, 2018, *Best-in-Session Presentation Award In Technical Session: Vehicular Networks*
- Güliz Seray Tuncay, Soteris Demetriou, Karan Ganju, C Gunter, Resolving the predicament of android custom permissions, In Proceedings of the 25th Network and Distributed Systems Security Symposium (NDSS) , 2018, *Distinguished Paper Award*
- Soteris Demetriou, Nathaniel D Kaufman, Jonah Baim, Adam J Goldsher, Carl A Gunter, Toward an Extensible Framework for Redaction, 1st International Workshop on Security and Privacy for the Internet-of-Things, 2018
- Soteris Demetriou, Analyzing & designing the security of shared resources on smartphone operating systems, 2018
2017 (4)
- Animesh Srivastava, Puneet Jain, Soteris Demetriou, Landon P Cox, Kyu-Han Kim, Camforensics: Understanding visual privacy leaks in the wild, Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems (SenSys), pp.30, 2017
- Yeonjoon Lee, Tongxin Li, Nan Zhang, Soteris Demetriou, Mingming Zha, XiaoFeng Wang, Kai Chen, Xiaoyong Zhou, Xinhui Han, Michael Grace, Ghost installer in the shadow: Security analysis of app installation on android, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.403–414, 2017
- Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A Gunter, Xiaoyong Zhou, Michael Grace, HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), pp.122–133, 2017
- Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, others, Understanding iot security through the data crystal ball: Where we are now and where we are going to be, arXiv preprint arXiv:1703.09809, 2017
2016 (2)
- Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, Carl A Gunter, Free for All! Assessing User Data Exposure to Advertising Libraries on Android., In Proceedings of the 23rd Network and Distributed Systems Security Symposium (NDSS), 2016
- Güliz Seray Tuncay, Soteris Demetriou, Carl A Gunter, Draco: A system for uniform and fine-grained access control for web code on android, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp.104–115, 2016
2015 (1)
- Soteris Demetriou, Xiaoyong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl Gunter, What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources., In Proceedings of the 22nd Network and Distributed Systems Security Symposium (NDSS), 2015
2014 (1)
- Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A Gunter, Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android., In Proceedings of the 21st Network and Distributed Systems Security Symposium (NDSS), 2014
2013 (3)
- Xiaoyong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A Gunter, Klara Nahrstedt, Identity, location, disease and more: Inferring your secrets from android public resources, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS), pp.1017–1028, 2013
- Christos Sintoris, Nikoleta Yiannoutsou, Soteris Demetriou, Nikolaos M Avouris, Discovering the invisible city: Location-based games for learning in smart cities., IxD&A, volume 16, pp.47–64, 2013
- Christos Sintoris, Nikoleta Yiannoutsou, Soteris Demetriou, Nikolaos Avouris, Discovering the invisible city: Game design for learning in technology enhanced places, ARV Workshop on Smart Cities Learning, Villalard-de-Lans, Vercors, 2013
2011 (1)
- Christos Sintoris, Dimitrios Raptis, Nikoleta Yiannoutsou, Sotirios Dimitriou, Nikolaos Avouris, Content creation by end users for location-sensitive mobile educational games, Proceedings, IS-EUD 2011 Workshop Involving End Users and Domain Experts in Design of Educational Games, 2011
Recent Comments