University College, London (UCL)

General Info

Rank: #57 Worldwide
#11 in Europe
Papers: 51
Number of Researchers: 43
APA
(average papers per authors):
1.2
Country: UNITED KINGDOM

Activity Map

Contributors

  • George Danezis (10 papers)
  • Emiliano De Cristofaro (10 papers)
  • Sarah Meiklejohn (9 papers)
  • Gianluca Stringhini (5 papers)
  • Enrico Mariconti (3 papers)
  • Sebastian Meiser (3 papers)
  • George Kappos (3 papers)
  • Haaroon Yousaf (3 papers)
  • Luca Melis (2 papers)
  • Steven J. Murdoch (2 papers)
  • Mustafa Al-Bassam (2 papers)
  • Alberto Sonnino (2 papers)
  • Shehar Bano (2 papers)
  • Vasilios Mavroudis (2 papers)
  • Bristena Oprisanu (2 papers)
  • Mohammad Naseri (2 papers)
  • Mark Handley (2 papers)
  • M. Angela Sasse (2 papers)
  • Lorenzo Cavallaro (2 papers)
  • Mary Maller (2 papers)
  • Jamie Hayes (2 papers)
  • Ania M. Piotrowska (2 papers)
  • Lucky Onwuzurike (1 papers)
  • Panagiotis Andriotis (1 papers)
  • Gordon Ross (1 papers)
  • Apostolos Pyrgelis (1 papers)
  • Georgi Ganev (1 papers)
  • Andrea Bittau (1 papers)
  • Tim Weyrich (1 papers)
  • Ruba Abu-Salma (1 papers)
  • Jonathan Bootle (1 papers)
  • Benoit Libert (1 papers)
  • Pyrros Chaidos (1 papers)
  • Andrea Cerulli (1 papers)
  • Matt Kusner (1 papers)
  • Petr Marchenko (1 papers)
  • Brad Karp (1 papers)
  • Jens Krinke (1 papers)
  • Steve Dodier-Lazaro (1 papers)
  • Santanu K. Dash (1 papers)
  • Ingolf Becker (1 papers)
  • Simon Parkin (1 papers)
  • Lars Speckemeier (1 papers)

Papers

"The Final Nail in WEP's Coffin"

Andrea Bittau, Mark Handley, ... -- Oakland 2006

"Multi-Use Unidirectional Proxy Re-Signatures"

Benoit Libert, ... -- CCS 2008

"Fingerprinting Blank Paper Using Commodity Scanners"

Tim Weyrich, ... -- Oakland 2009

"Structuring Protocol Implementations to Protect Sensitive Data"

Petr Marchenko, Brad Karp, ... -- Usenix 2010

"The Case for Ubiquitous Transport-Level Encryption"

Mark Handley, ... -- Usenix 2010

"PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks"

George Danezis, ... -- CCS 2014

"Algebraic MACs and Keyed-Verification Anonymous Credentials"

Sarah Meiklejohn, ... -- CCS 2014

"CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization"

Steven J. Murdoch, ... -- Oakland 2015

"Drops for Stuff: An Analysis of Reshipping Mule Scams"

Gianluca Stringhini, ... -- CCS 2015

"HORNET: High-speed Onion Routing at the Network Layer"

George Danezis, ... -- CCS 2015

"EvilCohort: Detecting Communities of Malicious Accounts on Online Services"

Gianluca Stringhini, ... -- Usenix 2015

"Centrally Banked Cryptocurrencies"

George Danezis, Sarah Meiklejohn, ... -- NDSS 2016

"Efficient Private Statistics with Succinct Sketches"

Luca Melis, George Danezis, Emiliano De Cristofaro, ... -- NDSS 2016

"Do You See What I See? Differential Treatment of Anonymous Users"

Steven J. Murdoch, ... -- NDSS 2016

"BeleniosRF: A Non-Interactive Receipt-Free Electronic Voting Scheme"

Pyrros Chaidos, ... -- CCS 2016

"Transparency Overlays and Applications"

Sarah Meiklejohn, ... -- CCS 2016

"k-fingerprinting: a Robust Scalable Website Fingerprinting Technique"

Jamie Hayes, George Danezis, ... -- Usenix 2016

"MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models"

Enrico Mariconti, Lucky Onwuzurike, Panagiotis Andriotis, Emiliano De Cristofaro, Gordon Ross, Gianluca Stringhini, ... -- NDSS 2017

"Obstacles to the Adoption of Secure Communication Tools"

Ruba Abu-Salma, M. Angela Sasse, ... -- Oakland 2017

"A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components"

Vasilios Mavroudis, Andrea Cerulli, George Danezis, ... -- CCS 2017

"POISED: Spotting Twitter Spam Off the Beaten Paths"

Gianluca Stringhini, ... -- CCS 2017

"How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel"

Jens Krinke, Steve Dodier-Lazaro, ... -- Usenix 2017

"Transcend: Detecting Concept Drift in Malware Classification Models"

Santanu K. Dash, ... -- Usenix 2017

"The Loopix Anonymity System"

Ania M. Piotrowska, Jamie Hayes, Sebastian Meiser, George Danezis, ... -- Usenix 2017

"Knock Knock, Who's There? Membership Inference on Aggregate Location Data."

Apostolos Pyrgelis, Emiliano De Cristofaro, ... -- NDSS 2018

"Chainspace: A Sharded Smart Contracts Platform."

Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, George Danezis, ... -- NDSS 2018

"Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two"

Sebastian Meiser, ... -- Oakland 2018

"Bulletproofs: Short Proofs for Confidential Transactions and More"

Jonathan Bootle, ... -- Oakland 2018

"Tight on Budget? Tight Bounds for r-Fold Approximate Differential Privacy"

Sebastian Meiser, ... -- CCS 2018

"Tiresias: Predicting Security Events Through Deep Learning"

Enrico Mariconti, Gianluca Stringhini, ... -- CCS 2018

"The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength"

Ingolf Becker, Simon Parkin, M. Angela Sasse, ... -- Usenix 2018

"An Empirical Analysis of Anonymity in Zcash"

George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn, ... -- Usenix 2018

"Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers"

Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis, ... -- NDSS 2019

"Exploiting Unintended Feature Leakage in Collaborative Learning"

Luca Melis, Emiliano De Cristofaro, ... -- Oakland 2019

"Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings"

Mary Maller, Sarah Meiklejohn, ... -- CCS 2019

"Tracing Transactions Across Cryptocurrency Ledgers"

Haaroon Yousaf, George Kappos, Sarah Meiklejohn, ... -- Usenix 2019

"No Right to Remain Silent: Isolating Malicious Mixes"

Ania M. Piotrowska, George Danezis, ... -- Usenix 2019

"Snappy: Fast On-chain Payments with Practical Collaterals"

Vasilios Mavroudis, ... -- NDSS 2020

"SoK: Hate, Harassment, and the Changing Landscape of Online Abuse"

Sarah Meiklejohn, ... -- Oakland 2021

"MPC-Friendly Commitments for Publicly Verifiable Covert Security"

Matt Kusner, ... -- CCS 2021

"Dompteur: Taming Audio Adversarial Examples"

Lars Speckemeier, ... -- Usenix 2021

"On Utility and Privacy in Synthetic Genomic Data"

Bristena Oprisanu, Georgi Ganev, Emiliano De Cristofaro, ... -- NDSS 2022

"Local and Central Differential Privacy for Robustness and Privacy in Federated Learning"

Mohammad Naseri, Emiliano De Cristofaro, ... -- NDSS 2022

"TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit?"

Emiliano De Cristofaro, ... -- Oakland 2022

"Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift"

Lorenzo Cavallaro, ... -- Oakland 2022

"CERBERUS: Exploring Federated Prediction of Security Events"

Mohammad Naseri, Enrico Mariconti, Emiliano De Cristofaro, ... -- CCS 2022

"Why So Toxic? Measuring and Triggering Toxic Behavior in Open-Domain Chatbots"

Emiliano De Cristofaro, ... -- CCS 2022

"ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models"

Emiliano De Cristofaro, ... -- Usenix 2022

"Synthetic Data – Anonymisation Groundhog Day"

Bristena Oprisanu, ... -- Usenix 2022

"Dos and Don'ts of Machine Learning in Computer Security"

Lorenzo Cavallaro, ... -- Usenix 2022

"How to Peel a Million: Validating and Expanding Bitcoin Clusters"

George Kappos, Haaroon Yousaf, Sarah Meiklejohn, ... -- Usenix 2022