Skip to main content

Showing 1–50 of 63 results for author: Papadopoulos, P

  1. arXiv:2406.06352  [pdf, other

    cs.CV

    Latent Directions: A Simple Pathway to Bias Mitigation in Generative AI

    Authors: Carolina Lopez Olmos, Alexandros Neophytou, Sunando Sengupta, Dim P. Papadopoulos

    Abstract: Mitigating biases in generative AI and, particularly in text-to-image models, is of high importance given their growing implications in society. The biased datasets used for training pose challenges in ensuring the responsible development of these models, and mitigation through hard prompting or embedding alteration, are the most common present solutions. Our work introduces a novel approach to ac… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

    Comments: Accepted at CVPR workshop 2024, proceedings of ReGenAI: First Workshop on Responsible Generative AI

  2. arXiv:2404.08088  [pdf, other

    cs.CV

    Visual Context-Aware Person Fall Detection

    Authors: Aleksander Nagaj, Zenjie Li, Dim P. Papadopoulos, Kamal Nasrollahi

    Abstract: As the global population ages, the number of fall-related incidents is on the rise. Effective fall detection systems, specifically in healthcare sector, are crucial to mitigate the risks associated with such events. This study evaluates the role of visual context, including background objects, on the accuracy of fall detection classifiers. We present a segmentation pipeline to semi-automatically s… ▽ More

    Submitted 11 April, 2024; originally announced April 2024.

    Comments: 10 pages, 6 figures, KES IDT-24 conference

  3. arXiv:2403.05271  [pdf, other

    cs.CR

    DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity

    Authors: Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Craig Thomson, Baraq Ghaleb

    Abstract: Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper delves into enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification metho… ▽ More

    Submitted 11 March, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

  4. arXiv:2311.06536  [pdf, other

    cs.CV

    CrashCar101: Procedural Generation for Damage Assessment

    Authors: Jens Parslov, Erik Riise, Dim P. Papadopoulos

    Abstract: In this paper, we are interested in addressing the problem of damage assessment for vehicles, such as cars. This task requires not only detecting the location and the extent of the damage but also identifying the damaged part. To train a computer vision system for the semantic part and damage segmentation in images, we need to manually annotate images with costly pixel annotations for both part ca… ▽ More

    Submitted 11 November, 2023; originally announced November 2023.

    Comments: Accepted at WACV 2024

  5. arXiv:2311.04414  [pdf, other

    cs.CV

    Learning the What and How of Annotation in Video Object Segmentation

    Authors: Thanos Delatolas, Vicky Kalogeiton, Dim P. Papadopoulos

    Abstract: Video Object Segmentation (VOS) is crucial for several applications, from video editing to video data generation. Training a VOS model requires an abundance of manually labeled training videos. The de-facto traditional way of annotating objects requires humans to draw detailed segmentation masks on the target objects at each video frame. This annotation process, however, is tedious and time-consum… ▽ More

    Submitted 11 November, 2023; v1 submitted 7 November, 2023; originally announced November 2023.

    Comments: Accepted to WACV 2024

  6. arXiv:2306.08418  [pdf, other

    cs.CY

    The Devil is in the Details: Analyzing the Lucrative Ad Fraud Patterns of the Online Ad Ecosystem

    Authors: Emmanouil Papadogiannakis, Nicolas Kourtellis, Panagiotis Papadopoulos, Evangelos P. Markatos

    Abstract: The online advertising market has recently reached the 500 billion dollar mark, and to accommodate the need to match a user with the highest bidder at a fraction of a second, it has moved towards a complex automated model involving numerous agents and middle men. Stimulated by potential revenue and the lack of transparency, bad actors have found ways to abuse it, circumvent restrictions, and gener… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

    Comments: 17 pages

  7. arXiv:2302.13438  [pdf, other

    cs.LG cs.CR

    P4L: Privacy Preserving Peer-to-Peer Learning for Infrastructureless Setups

    Authors: Ioannis Arapakis, Panagiotis Papadopoulos, Kleomenis Katevas, Diego Perino

    Abstract: Distributed (or Federated) learning enables users to train machine learning models on their very own devices, while they share only the gradients of their models usually in a differentially private way (utility loss). Although such a strategy provides better privacy guarantees than the traditional centralized approach, it requires users to blindly trust a centralized infrastructure that may also b… ▽ More

    Submitted 26 February, 2023; originally announced February 2023.

  8. Towards The Creation Of The Future Fish Farm

    Authors: Pavlos Papadopoulos, William J Buchanan, Sarwar Sayeed, Nikolaos Pitropakis

    Abstract: A fish farm is an area where fish raise and bred for food. Fish farm environments support the care and management of seafood within a controlled environment. Over the past few decades, there has been a remarkable increase in the calorie intake of protein attributed to seafood. Along with this, there are significant opportunities within the fish farming industry for economic development. Determinin… ▽ More

    Submitted 2 January, 2023; originally announced January 2023.

    Journal ref: Security and Safety, 3(4), 174-186 (2022)

  9. arXiv:2212.06492  [pdf, other

    cs.CY cs.CR cs.LG

    FNDaaS: Content-agnostic Detection of Fake News sites

    Authors: Panagiotis Papadopoulos, Dimitris Spithouris, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Automatic fake news detection is a challenging problem in misinformation spreading, and it has tremendous real-world political and social impacts. Past studies have proposed machine learning-based methods for detecting such fake news, focusing on different properties of the published news articles, such as linguistic characteristics of the actual content, which however have limitations due to the… ▽ More

    Submitted 13 December, 2022; originally announced December 2022.

  10. arXiv:2212.03218  [pdf, other

    cs.CR

    Transforming EU Governance: The Digital Integration through EBSI and GLASS

    Authors: Dimitrios Kasimatis, William J Buchanan, Mwarwan Abubakar, Owen Lo, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, Sarwar Sayeed, Marc Sel

    Abstract: Traditionally, government systems managed citizen identities through disconnected data systems, using simple identifiers and paper-based processes, limiting digital trust and requiring citizens to request identity verification documents. The digital era offers a shift towards unique digital identifiers for each citizen, enabling a 'citizen wallet' for easier access to personal documents like acade… ▽ More

    Submitted 19 April, 2024; v1 submitted 6 December, 2022; originally announced December 2022.

  11. The Hitchhiker's Guide to Facebook Web Tracking with Invisible Pixels and Click IDs

    Authors: Paschalis Bekos, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Over the past years, advertisement companies have used various tracking methods to persistently track users across the web. Such tracking methods usually include first and third-party cookies, cookie synchronization, as well as a variety of fingerprinting mechanisms. Facebook (FB) recently introduced a new tagging mechanism that attaches a one-time tag as a URL parameter (FBCLID) on outgoing links… ▽ More

    Submitted 28 March, 2023; v1 submitted 1 August, 2022; originally announced August 2022.

    Journal ref: In Proceedings of the ACM Web Conference 2023 (WWW '23)

  12. YouTubers Not madeForKids: Detecting Channels Sharing Inappropriate Videos Targeting Children

    Authors: Myrsini Gkolemi, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: In the last years, hundreds of new Youtube channels have been creating and sharing videos targeting children, with themes related to animation, superhero movies, comics, etc. Unfortunately, many of these videos are inappropriate for consumption by their target audience, due to disturbing, violent, or sexual scenes. In this paper, we study YouTube channels found to post suitable or disturbing video… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

    Comments: 12 pages, 10 Tables, 23 Figures. In Proceedings of 14th ACM Web Science Conference 2022, Barcelona, Spain

    MSC Class: 68U01

  13. arXiv:2203.16071  [pdf, other

    cs.CV

    Learning Program Representations for Food Images and Cooking Recipes

    Authors: Dim P. Papadopoulos, Enrique Mora, Nadiia Chepurko, Kuan Wei Huang, Ferda Ofli, Antonio Torralba

    Abstract: In this paper, we are interested in modeling a how-to instructional procedure, such as a cooking recipe, with a meaningful and rich high-level representation. Specifically, we propose to represent cooking recipes and food images as cooking programs. Programs provide a structured representation of the task, capturing cooking semantics and sequential relationships of actions in the form of a graph.… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

    Comments: CVPR 2022 oral

  14. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

    Authors: Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas

    Abstract: E-governance is a process that aims to enhance a government's ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the establishment of an e-Governance model. There is often a need for an inclusive e-governance model with integrated multiactor governance services and where… ▽ More

    Submitted 16 March, 2022; originally announced March 2022.

    Comments: Sensors 2022, 22(6), 2291; https://doi.org/10.3390/s22062291

  15. arXiv:2202.05079  [pdf, other

    cs.CY

    Who Funds Misinformation? A Systematic Analysis of the Ad-related Profit Routines of Fake News sites

    Authors: Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Fake news is an age-old phenomenon, widely assumed to be associated with political propaganda published to sway public opinion. Yet, with the growth of social media, it has become a lucrative business for Web publishers. Despite many studies performed and countermeasures proposed, unreliable news sites have increased in the last years their share of engagement among the top performing news sources… ▽ More

    Submitted 17 February, 2023; v1 submitted 10 February, 2022; originally announced February 2022.

    Comments: 12 pages, The Web Conference 2023

    ACM Class: K.4.2

  16. Leveraging Google's Publisher-specific IDs to Detect Website Administration

    Authors: Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Digital advertising is the most popular way for content monetization on the Internet. Publishers spawn new websites, and older ones change hands with the sole purpose of monetizing user traffic. In this ever-evolving ecosystem, it is challenging to effectively answer questions such as: Which entities monetize what websites? What categories of websites does an average entity typically monetize on a… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

    Comments: 10 pages, To be published at The Web Conference 2022 (WWW 2022). Please cite the WWW version

    ACM Class: K.4.2

  17. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

    Authors: Grant McDonald, Pavlos Papadopoulos, Nikolaos Pitropakis, Jawad Ahmad, William J. Buchanan

    Abstract: Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to succumb to ransom demands as part of operating expenses to counter the cost incurred from downtime. Despite the prevalence of ransomware as a threat t… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Journal ref: Sensors 22, no. 3: 953 (2022)

  18. arXiv:2201.04236  [pdf, other

    cs.CV

    Incidents1M: a large-scale dataset of images with natural disasters, damage, and incidents

    Authors: Ethan Weber, Dim P. Papadopoulos, Agata Lapedriza, Ferda Ofli, Muhammad Imran, Antonio Torralba

    Abstract: Natural disasters, such as floods, tornadoes, or wildfires, are increasingly pervasive as the Earth undergoes global warming. It is difficult to predict when and where an incident will occur, so timely emergency response is critical to saving the lives of those endangered by destructive events. Fortunately, technology can play a role in these situations. Social media posts can be used as a low-lat… ▽ More

    Submitted 11 January, 2022; originally announced January 2022.

  19. arXiv:2112.10092  [pdf, other

    cs.CR

    Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

    Authors: Hisham Ali, Pavlos Papadopoulos, Jawad Ahmad, Nikolaos Pitropakis, Zakwan Jaroucheh, William J. Buchanan

    Abstract: Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can provide access to past and current cybersecurity threats for reducing the risk of a potential cyberattack - the requirements for threat information sharing range from simplistic sharing of documents to threat intelligence sh… ▽ More

    Submitted 19 December, 2021; originally announced December 2021.

    Journal ref: IEEE SINCONF 2021: 14th International Conference on Security of Information and Networks

  20. Measuring the (Over)use of Service Workers for In-Page Push Advertising Purposes

    Authors: George Pantelakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos

    Abstract: Rich offline experience, periodic background sync, push notification functionality, network requests control, improved performance via requests caching are only a few of the functionalities provided by the Service Worker (SW) API. This new technology, supported by all major browsers, can significantly improve users' experience by providing the publisher with the technical foundations that would no… ▽ More

    Submitted 29 March, 2022; v1 submitted 21 October, 2021; originally announced October 2021.

    Comments: 13 pages, PAM'22

    Journal ref: International Conference on Passive and Active Network Measurement 2022

  21. arXiv:2110.02277  [pdf, other

    cs.CV

    Scaling up instance annotation via label propagation

    Authors: Dim P. Papadopoulos, Ethan Weber, Antonio Torralba

    Abstract: Manually annotating object segmentation masks is very time-consuming. While interactive segmentation methods offer a more efficient alternative, they become unaffordable at a large scale because the cost grows linearly with the number of annotated masks. In this paper, we propose a highly efficient annotation scheme for building large datasets with object segmentation masks. At a large scale, imag… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: ICCV 2021

  22. arXiv:2110.01970  [pdf

    cs.CR

    Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

    Authors: Edward Henry Young, Christos Chrysoulas, Nikolaos Pitropakis, Pavlos Papadopoulos, William J Buchanan

    Abstract: Little or no research has been directed to analysis and researching forensic analysis of the Bitcoin mixing or 'tumbling' service themselves. This work is intended to examine effective tooling and methodology for recovering forensic artifacts from two privacy focused mixing services namely Obscuro which uses the secure enclave on intel chips to provide enhanced confidentiality and Wasabi wallet wh… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: Accepted for publication in the International Conference on Data Analytics for Business and Industry (ICDABI) 2021 - (DATA'21)

  23. arXiv:2109.08566  [pdf, other

    cs.CR cs.CY cs.DC

    GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

    Authors: Christos Chrysoulas, Amanda Thomson, Nikolaos Pitropakis, Pavlos Papadopoulos, Owen Lo, William J. Buchanan, George Domalis, Nikos Karacapilidis, Dimitris Tsakalidis, Dimitris Tsolis

    Abstract: The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation it has broadened the attack surface and made them a popular target for cyber attacks. eGovernance services utilize internet, which is currently a location addressed system where whoever controls the location controls not only the… ▽ More

    Submitted 17 September, 2021; originally announced September 2021.

    Comments: To be published in the proceedings of the 7th Workshop On The Security Of Industrial Control Systems & Of Cyber-Physical Systems (CyberICPS 2021). In Conjunction With ESORICS 2021

  24. arXiv:2109.02979  [pdf, other

    cs.CR

    POW-HOW: An enduring timing side-channel to evade online malware sandboxes

    Authors: Antonio Nappa, Panagiotis Papadopoulos, Matteo Varvello, Daniel Aceituno Gomez, Juan Tapiador, Andrea Lanzi

    Abstract: Online malware scanners are one of the best weapons in the arsenal of cybersecurity companies and researchers. A fundamental part of such systems is the sandbox that provides an instrumented and isolated environment (virtualized or emulated) for any user to upload and run unknown artifacts and identify potentially malicious behaviors. The provided API and the wealth of information inthe reports pr… ▽ More

    Submitted 5 October, 2021; v1 submitted 7 September, 2021; originally announced September 2021.

    Journal ref: In proceedings of 26th European Symposium on Research in Computer Security (ESORICS'21), 2021

  25. arXiv:2106.01940  [pdf, other

    cs.CR

    THEMIS: A Decentralized Privacy-Preserving Ad Platform with Reporting Integrity

    Authors: Gonçalo Pestana, Iñigo Querejeta-Azurmendi, Panagiotis Papadopoulos, Benjamin Livshits

    Abstract: Online advertising fuels the (seemingly) free internet. However, although users can access most of the web services free of charge, they pay a heavy coston their privacy. They are forced to trust third parties and intermediaries, who not only collect behavioral data but also absorb great amounts of ad revenues. Consequently, more and more users opt out from advertising by resorting to ad blockers,… ▽ More

    Submitted 3 June, 2021; originally announced June 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:2007.05556

  26. arXiv:2104.12426  [pdf, other

    cs.LG cs.CR cs.NI

    Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

    Authors: Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan

    Abstract: As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought. Traditional defending approaches are no longer sufficient to detect both known and unknown attacks to high accuracy. Machine learning intrusion detection systems have… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

    Comments: MDPI Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356; https://www.mdpi.com/2624-800X/1/2/14

    Journal ref: J. Cybersecur. Priv. 2021, 1(2), 252-273

  27. arXiv:2104.05743  [pdf, other

    cs.LG cs.CR cs.DC

    Practical Defences Against Model Inversion Attacks for Split Neural Networks

    Authors: Tom Titcombe, Adam J. Hall, Pavlos Papadopoulos, Daniele Romanini

    Abstract: We describe a threat model under which a split network-based federated learning system is susceptible to a model inversion attack by a malicious computational server. We demonstrate that the attack can be successfully performed with limited knowledge of the data distribution by the attacker. We propose a simple additive noise method to defend against model inversion, finding that the method can si… ▽ More

    Submitted 21 April, 2021; v1 submitted 12 April, 2021; originally announced April 2021.

    Comments: ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021)

  28. arXiv:2104.00489  [pdf, other

    cs.LG cs.CR cs.DC

    PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN

    Authors: Daniele Romanini, Adam James Hall, Pavlos Papadopoulos, Tom Titcombe, Abbas Ismail, Tudor Cebere, Robert Sandmann, Robin Roehm, Michael A. Hoeh

    Abstract: We introduce PyVertical, a framework supporting vertical federated learning using split neural networks. The proposed framework allows a data scientist to train neural networks on data features vertically partitioned across multiple owners while keeping raw data on an owner's device. To link entities shared across different datasets' partitions, we use Private Set Intersection on IDs associated wi… ▽ More

    Submitted 14 April, 2021; v1 submitted 1 April, 2021; originally announced April 2021.

    Comments: ICLR 2021 Workshop on Distributed and Private Machine Learning (DPML 2021)

  29. arXiv:2103.15753  [pdf, other

    cs.CR cs.CY cs.DC cs.LG

    Privacy and Trust Redefined in Federated Machine Learning

    Authors: Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan

    Abstract: A common privacy issue in traditional machine learning is that data needs to be disclosed for the training procedures. In situations with highly sensitive data such as healthcare records, accessing this information is challenging and often prohibited. Luckily, privacy-preserving technologies have been developed to overcome this hurdle by distributing the computation of the training and ensuring th… ▽ More

    Submitted 30 March, 2021; v1 submitted 29 March, 2021; originally announced March 2021.

    Comments: MDPI Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356; https://doi.org/10.3390/make3020017

    Journal ref: Mach. Learn. Knowl. Extr. 2021, 3(2), 333-356

  30. arXiv:2103.09258  [pdf, other

    cs.SI cs.CR cs.LG

    The Rise and Fall of Fake News sites: A Traffic Analysis

    Authors: Manolis Chalkiadakis, Alexandros Kornilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: Over the past decade, we have witnessed the rise of misinformation on the Internet, with online users constantly falling victims of fake news. A multitude of past studies have analyzed fake news diffusion mechanics and detection and mitigation techniques. However, there are still open questions about their operational behavior such as: How old are fake news websites? Do they typically stay online… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

  31. User Tracking in the Post-cookie Era: How Websites Bypass GDPR Consent to Track Users

    Authors: Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos

    Abstract: During the past few years, mostly as a result of the GDPR and the CCPA, websites have started to present users with cookie consent banners. These banners are web forms where the users can state their preference and declare which cookies they would like to accept, if such option exists. Although requesting consent before storing any identifiable information is a good start towards respecting the us… ▽ More

    Submitted 10 February, 2022; v1 submitted 17 February, 2021; originally announced February 2021.

    Comments: 12 pages, Published at The Web Conference 2021 (WWW 2021). Please cite the WWW version; Made source code publicly available

    ACM Class: K.4.2

  32. arXiv:2011.09350  [pdf, other

    cs.CR cs.LG

    Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning

    Authors: Nick Angelou, Ayoub Benaissa, Bogdan Cebere, William Clark, Adam James Hall, Michael A. Hoeh, Daniel Liu, Pavlos Papadopoulos, Robin Roehm, Robert Sandmann, Phillipp Schoppmann, Tom Titcombe

    Abstract: We present a multi-language, cross-platform, open-source library for asymmetric private set intersection (PSI) and PSI-Cardinality (PSI-C). Our protocol combines traditional DDH-based PSI and PSI-C protocols with compression based on Bloom filters that helps reduce communication in the asymmetric setting. Currently, our library supports C++, C, Go, WebAssembly, JavaScript, Python, and Rust, and ru… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: NeurIPS 2020 Workshop on Privacy Preserving Machine Learning (PPML 2020)

  33. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

    Authors: Charalampos Stamatellis, Pavlos Papadopoulos, Nikolaos Pitropakis, Sokratis Katsikas, William J Buchanan

    Abstract: Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common security attack vectors. However, healthcare-oriented blockchain solutions can provide a decentralized, anonymous and secure EHR handling approach. This… ▽ More

    Submitted 27 January, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: MDPI Sensors (This article belongs to the Special Issue Security, Trust and Privacy in New Computing Environments) URL: https://www.mdpi.com/1424-8220/20/22/6587

    Journal ref: Sensors 2020, 20(22), 6587

  34. Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing

    Authors: William J Buchanan, Muhammad Ali Imran, Masood Ur-Rehman, Lei Zhang, Qammer H. Abbasi, Christos Chrysoulas, David Haynes, Nikolaos Pitropakis, Pavlos Papadopoulos

    Abstract: The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways where carriers of disease could be tracked and their contacts traced. These are generalized methods developed either in a distributed manner giving ci… ▽ More

    Submitted 10 September, 2020; originally announced September 2020.

  35. arXiv:2008.09188  [pdf, other

    cs.CV

    Detecting natural disasters, damage, and incidents in the wild

    Authors: Ethan Weber, Nuria Marzo, Dim P. Papadopoulos, Aritro Biswas, Agata Lapedriza, Ferda Ofli, Muhammad Imran, Antonio Torralba

    Abstract: Responding to natural disasters, such as earthquakes, floods, and wildfires, is a laborious task performed by on-the-ground emergency responders and analysts. Social media has emerged as a low-latency data source to quickly understand disaster situations. While most studies on social media are limited to text, images offer more information for understanding disaster and incident scenes. However, n… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

    Comments: ECCV 2020

  36. Privacy Preserving Passive DNS

    Authors: Pavlos Papadopoulos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, Sokratis Katsikas

    Abstract: The Domain Name System (DNS) was created to resolve the IP addresses of the web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global DNS infrastructure to malicious actors. The passive DNS data collection process creates a database containing various DNS data elements, some of… ▽ More

    Submitted 14 August, 2020; originally announced August 2020.

    Journal ref: Computers 2020, 9, 64

  37. arXiv:2007.05556  [pdf, other

    cs.CR

    THEMIS: Decentralized and Trustless Ad Platform with Reporting Integrity

    Authors: Gonçalo Pestana, Iñigo Querejeta-Azurmendi, Panagiotis Papadopoulos, Benjamin Livshits

    Abstract: Online advertising fuels the (seemingly) free internet. However, although users can access most websites free of charge, they need to pay a heavy cost on their privacy and blindly trust third parties and intermediaries that absorb great amounts of adrevenues and user data. This is one of the reasons users opt out from advertising by resorting ad blockers thatin turn cost publishers millions of dol… ▽ More

    Submitted 4 August, 2020; v1 submitted 10 July, 2020; originally announced July 2020.

  38. arXiv:2006.02456  [pdf, other

    cs.CR cs.CY cs.DC cs.GT cs.LG

    A Distributed Trust Framework for Privacy-Preserving Machine Learning

    Authors: Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J Buchanan

    Abstract: When training a machine learning model, it is standard procedure for the researcher to have full knowledge of both the data and model. However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluctant to relinquish control of private information to third parties. Privacy-preserving techniques distribute computation in order to ensure that data r… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

    Comments: To be published in the proceedings of the 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020

    Report number: TrustBus 2020, LNCS 12395, pp. 205--220, 2020 MSC Class: 68M25 ACM Class: C.2.0

    Journal ref: 17th International Conference TrustBus 2020

  39. arXiv:2005.06599  [pdf, other

    cs.CR cs.CY cs.LG

    Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

    Authors: Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan

    Abstract: Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high situational awareness, it can still be hard for users to continually be aware of the URL of the website they are visiting. Traditional detection methods rely on blocklists and content analysis, both of which require time-cons… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

    Comments: In Proceedings of the 6th ICISSP

    MSC Class: 68-06

    Journal ref: ICISSP, Volume 1, pages 289-298 (2020)

  40. arXiv:2004.11797  [pdf, other

    math.NA cs.CE

    Computing multiple solutions of topology optimization problems

    Authors: Ioannis P. A. Papadopoulos, Patrick E. Farrell, Thomas M. Surowiec

    Abstract: Topology optimization problems often support multiple local minima due to a lack of convexity. Typically, gradient-based techniques combined with continuation in model parameters are used to promote convergence to more optimal solutions; however, these methods can fail even in the simplest cases. In this paper, we present an algorithm to perform a systematic exploratory search for the solutions of… ▽ More

    Submitted 12 January, 2021; v1 submitted 24 April, 2020; originally announced April 2020.

  41. arXiv:2002.00934  [pdf, other

    cs.CY cs.CR

    Stop Tracking Me Bro! Differential Tracking Of User Demographics On Hyper-partisan Websites

    Authors: Pushkal Agarwal, Sagar Joglekar, Panagiotis Papadopoulos, Nishanth Sastry, Nicolas Kourtellis

    Abstract: Websites with hyper-partisan, left or right-leaning focus offer content that is typically biased towards the expectations of their target audience. Such content often polarizes users, who are repeatedly primed to specific (extreme) content, usually reflecting hard party lines on political and socio-economic topics. Though this polarization has been extensively studied with respect to content, it i… ▽ More

    Submitted 30 March, 2020; v1 submitted 3 February, 2020; originally announced February 2020.

    Comments: Published at The Web Conference 2020 (WWW 2020). Please cite the WWW version

    ACM Class: K.4.2

  42. ZKSENSE: A Friction-less Privacy-Preserving Human Attestation Mechanism for Mobile Devices

    Authors: Iñigo Querejeta-Azurmendi, Panagiotis Papadopoulos, Matteo Varvello, Antonio Nappa, Jiexin Zhang, Benjamin Livshits

    Abstract: Recent studies show that 20.4% of the internet traffic originates from automated agents. To identify and block such ill-intentioned traffic, mechanisms that verify the humanness of the user are widely deployed, with CAPTCHAs being the most popular. Traditional CAPTCHAs require extra user effort (e.g., solving mathematical puzzles), which can severely downgrade the end-user's experience, especially… ▽ More

    Submitted 7 September, 2021; v1 submitted 18 November, 2019; originally announced November 2019.

    Journal ref: Proceedings on Privacy Enhancing Technologies 2021

  43. arXiv:1911.03226  [pdf, other

    cs.CR

    The coin that never sleeps. The privacy preserving usage of Bitcoin in a longitudinal analysis as a speculative asset

    Authors: Emmanouil Karampinakis, Michalis Pachilakis, Panagiotis Papadopoulos, Antonis Krithinakis, Evangelos P. Markatos

    Abstract: Bitcoin is the first and undoubtedly most successful cryptocurrecny to date with a market capitalization of more than 100 billion dollars. Today, Bitcoin has more than 100,000 supporting merchants and more than 3 million active users. Besides the trust it enjoys among people, Bitcoin lacks of a basic feature a substitute currency must have: stability of value. Hence, although the use of Bitcoin as… ▽ More

    Submitted 18 November, 2019; v1 submitted 6 November, 2019; originally announced November 2019.

    Comments: 7 pages, 5 figures, 24 references

  44. Filter List Generation for Underserved Regions

    Authors: Alexander Sjosten, Peter Snyder, Antonio Pastor, Panagiotis Papadopoulos, Benjamin Livshits

    Abstract: Filter lists play a large and growing role in protecting and assisting web users. The vast majority of popular filter lists are crowd-sourced, where a large number of people manually label resources related to undesirable web resources (e.g., ads, trackers, paywall libraries), so that they can be blocked by browsers and extensions. Because only a small percentage of web users participate in the ge… ▽ More

    Submitted 24 January, 2020; v1 submitted 16 October, 2019; originally announced October 2019.

    Journal ref: WWW'20, April 20-24, 2020, Taipei, Taiwan

  45. arXiv:1910.00159  [pdf, other

    cs.NI cs.CR

    VPN0: A Privacy-Preserving Decentralized Virtual Private Network

    Authors: Matteo Varvello, Iñigo Querejeta Azurmendi, Antonio Nappa, Panagiotis Papadopoulos, Goncalo Pestana, Ben Livshits

    Abstract: Distributed Virtual Private Networks (dVPNs) are new VPN solutions aiming to solve the trust-privacy concern of a VPN's central authority by leveraging a distributed architecture. In this paper, we first review the existing dVPN ecosystem and debate on its privacy requirements. Then, we present VPN0, a dVPN with strong privacy guarantees and minimal performance impact on its users. VPN0 guarantees… ▽ More

    Submitted 30 September, 2019; originally announced October 2019.

  46. arXiv:1907.12649  [pdf, other

    cs.CY cs.NI

    No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem

    Authors: Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: In recent years, Header Bidding (HB) has gained popularity among web publishers, challenging the status quo in the ad ecosystem. Contrary to the traditional waterfall standard, HB aims to give back to publishers control of their ad inventory, increase transparency, fairness and competition among advertisers, resulting in higher ad-slot prices. Although promising, little is known about how this ad… ▽ More

    Submitted 26 September, 2019; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: 14 pages, 24 Figures, 56 References, 1 Table. Accepted in ACM IMC 2019

  47. arXiv:1907.10331  [pdf, other

    cs.CR cs.GT cs.NI

    YourAdvalue: Measuring Advertising Price Dynamics without Bankrupting User Privacy

    Authors: Michalis Pachilakis, Panagiotis Papadopoulos, Nikolaos Laoutaris, Evangelos P. Markatos, Nicolas Kourtellis

    Abstract: The Real Time Bidding (RTB) protocol is by now more than a decade old. During this time, a handful of measurement papers have looked at bidding strategies, personal information flow, and cost of display advertising through RTB. In this paper, we present YourAdvalue, a privacy-preserving tool for displaying to end-users in a simple and intuitive manner their advertising value as seen through RTB. U… ▽ More

    Submitted 4 November, 2021; v1 submitted 24 July, 2019; originally announced July 2019.

    Comments: 16 pages, 17 Figures, 5 tables, 50 References

    Journal ref: Sigmetrics '21: ACM Meas. Anal. Comput. Syst., December 2021

  48. arXiv:1906.02839  [pdf, other

    cs.CV

    How to make a pizza: Learning a compositional layer-based GAN model

    Authors: Dim P. Papadopoulos, Youssef Tamaazousti, Ferda Ofli, Ingmar Weber, Antonio Torralba

    Abstract: A food recipe is an ordered set of instructions for preparing a particular dish. From a visual perspective, every instruction step can be seen as a way to change the visual appearance of the dish by adding extra objects (e.g., adding an ingredient) or changing the appearance of the existing ones (e.g., cooking the dish). In this paper, we aim to teach a machine how to make a pizza by building a ge… ▽ More

    Submitted 6 June, 2019; originally announced June 2019.

    Comments: CVPR 2019

  49. arXiv:1905.08767  [pdf, other

    cs.NI

    The Blind Men and the Internet: Multi-Vantage Point Web Measurements

    Authors: Jordan Jueckstock, Shaown Sarker, Peter Snyder, Panagiotis Papadopoulos, Matteo Varvello, Benjamin Livshits, Alexandros Kapravelos

    Abstract: In this paper, we design and deploy a synchronized multi-vantage point web measurement study to explore the comparability of web measurements across vantage points (VPs). We describe in reproducible detail the system with which we performed synchronized crawls on the Alexa top 5K domains from four distinct network VPs: research university, cloud datacenter, residential network, and Tor gateway pro… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

  50. arXiv:1903.01406  [pdf, other

    cs.CY cs.CR cs.DL

    Keeping out the Masses: Understanding the Popularity and Implications of Internet Paywalls

    Authors: Panagiotis Papadopoulos, Peter Snyder, Dimitrios Athanasakis, Benjamin Livshits

    Abstract: Funding the production of quality online content is a pressing problem for content producers. The most common funding method, online advertising, is rife with well-known performance and privacy harms, and an intractable subject-agent conflict: many users do not want to see advertisements, depriving the site of needed funding. Because of these negative aspects of advertisement-based funding, payw… ▽ More

    Submitted 7 May, 2020; v1 submitted 18 February, 2019; originally announced March 2019.