default search action
Thanassis Giannetsos
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Joze M. Rozanec, Inna Novalija, Patrik Zajec, Klemen Kenda, Hooman Tavakoli Ghinani, Sungho Suh, Entso Veliou, Dimitrios Papamartzivanos, Thanassis Giannetsos, Sofia-Anna Menesidou, Rubén Alonso, Nino Cauli, Antonello Meloni, Diego Reforgiato Recupero, Dimosthenis Kyriazis, Georgios Sofianidis, Spyros Theodoropoulos, Blaz Fortuna, Dunja Mladenic, John Soldatos:
Human-centric artificial intelligence architecture for industry 5.0 applications. Int. J. Prod. Res. 61(20): 6847-6872 (2023) - [c37]Heini Bergsson Debes, Thanassis Giannetsos:
RETRACT: Expressive Designated Verifier Anonymous Credentials. ARES 2023: 26:1-26:12 - [c36]Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi:
ZEKRA: Zero-Knowledge Control-Flow Attestation. AsiaCCS 2023: 357-371 - [c35]Sam Afzal-Houshmand, Dimitrios Papamartzivanos, Sajad Homayoun, Entso Veliou, Christian Damsgaard Jensen, Athanasios Voulodimos, Thanassis Giannetsos:
Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems. DCOSS-IoT 2023: 568-576 - [c34]Dimosthenis Masouros, Dimitrios Soudris, Georgios Gardikis, Victoria Katsarou, Maria Christopoulou, George Xilouris, Hugo Ramón, Antonio Pastor, Fabrizio Scaglione, Cristian Petrollini, António Pinto, João P. Vilela, Antonia Karamatskou, Nikolaos Papadakis, Anna Angelogianni, Thanassis Giannetsos, Luis Javier García-Villalba, Jesús A. Alonso-López, Martin Strand, Gudmund Grov, Anastasios N. Bikos, Kostas Ramantas, Ricardo Santos, Fábio Silva, Nikolaos Tsampieris:
Towards Privacy-First Security Enablers for 6G Networks: The PRIVATEER Approach. SAMOS 2023: 379-391 - [c33]Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen:
Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets. TrustCom 2023: 1049-1059 - [c32]Anna Angelogianni, Ioannis Krontiris, Thanassis Giannetsos:
Comparative Evaluation of PKI and DAA-based Architectures for V2X Communication Security. VNC 2023: 199-206 - [i7]Joze M. Rozanec, Elias Montini, Vincenzo Cutrona, Dimitrios Papamartzivanos, Timotej Klemencic, Blaz Fortuna, Dunja Mladenic, Entso Veliou, Thanassis Giannetsos, Christos Emmanouilidis:
Human in the AI loop via xAI and Active Learning for Visual Inspection. CoRR abs/2307.05508 (2023) - 2022
- [j12]Weizhi Meng, Thanassis Giannetsos, Christian Damsgaard Jensen:
Information and Future Internet Security, Trust and Privacy. Future Internet 14(12): 372 (2022) - [j11]Theodora Anastasiou, Sophia Karagiorgou, Petros Petrou, Dimitrios Papamartzivanos, Thanassis Giannetsos, Georgia Tsirigotaki, Jelle Keizer:
Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems. Sensors 22(18): 6905 (2022) - [c31]Heini Bergsson Debes, Thanassis Giannetsos:
ZEKRO: Zero-Knowledge Proof of Integrity Conformance. ARES 2022: 35:1-35:10 - [c30]Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang:
ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract. BlockTEA 2022: 3-18 - [c29]Daan Gordijn, Roland Kromes, Thanassis Giannetsos, Kaitai Liang:
Combining ID's, Attributes, and Policies in Hyperledger Fabric. BlockTEA 2022: 32-48 - [i6]Joze M. Rozanec, Inna Novalija, Patrik Zajec, Klemen Kenda, Hooman Tavakoli, Sungho Suh, Entso Veliou, Dimitrios Papamartzivanos, Thanassis Giannetsos, Sofia-Anna Menesidou, Rubén Alonso, Nino Cauli, Antonello Meloni, Diego Reforgiato Recupero, Dimosthenis Kyriazis, Georgios Sofianidis, Spyros Theodoropoulos, Blaz Fortuna, Dunja Mladenic, John Soldatos:
Human-Centric Artificial Intelligence Architecture for Industry 5.0 Applications. CoRR abs/2203.10794 (2022) - [i5]Daan Gordijn, Roland Kromes, Thanassis Giannetsos, Kaitai Liang:
Combining ID's, Attributes, and Policies in Hyperledger Fabric. CoRR abs/2207.01599 (2022) - [i4]Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang:
ID-based self-encryption via Hyperledger Fabric based smart contract. CoRR abs/2207.01605 (2022) - 2021
- [j10]Dimitrios Papamartzivanos, Sofia-Anna Menesidou, Panagiotis Gouvas, Thanassis Giannetsos:
A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly. Future Internet 13(2): 30 (2021) - [c28]Heini Bergsson Debes, Thanassis Giannetsos:
Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems. DCOSS 2021: 92-101 - [c27]Joze M. Rozanec, Patrik Zajec, Klemen Kenda, Inna Novalija, Blaz Fortuna, Dunja Mladenic, Entso Veliou, Dimitrios Papamartzivanos, Thanassis Giannetsos, Sofia-Anna Menesidou, Rubén Alonso, Nino Cauli, Diego Reforgiato Recupero, Dimosthenis Kyriazis, Georgios Sofianidis, Spyros Theodoropoulos, John Soldatos:
STARdom: An Architecture for Trusted and Secure Human-Centered Manufacturing Systems. APMS (4) 2021: 199-207 - [c26]Sam Afzal-Houshmand, Sajad Homayoun, Thanassis Giannetsos:
A Perfect Match: Deep Learning Towards Enhanced Data Trustworthiness in Crowd-Sensing Systems. MeditCom 2021: 258-264 - [c25]Dimitrios Papamartzivanos, Sofia-Anna Menesidou, Panagiotis Gouvas, Thanassis Giannetsos:
Towards Efficient Control-Flow Attestation with Software-Assisted Multi-level Execution Tracing. MeditCom 2021: 512-518 - [c24]Georgios Fotiadis, José Moreira, Thanassis Giannetsos, Liqun Chen, Peter B. Rønne, Mark Ryan, Peter Y. A. Ryan:
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. STM 2021: 163-184 - [c23]Benjamin Larsen, Thanassis Giannetsos, Ioannis Krontiris, Kenneth A. Goldman:
Direct anonymous attestation on the road: efficient and privacy-preserving revocation in C-ITS. WISEC 2021: 48-59 - [e5]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8661-6 [contents] - [i3]Joze M. Rozanec, Patrik Zajec, Klemen Kenda, Inna Novalija, Blaz Fortuna, Dunja Mladenic, Entso Veliou, Dimitrios Papamartzivanos, Thanassis Giannetsos, Sofia-Anna Menesidou, Rubén Alonso, Nino Cauli, Diego Reforgiato Recupero, Dimosthenis Kyriazis, Georgios Sofianidis, Spyros Theodoropoulos, John Soldatos:
STARdom: an architecture for trusted and secure human-centered manufacturing systems. CoRR abs/2104.00983 (2021) - [i2]Heini Bergsson Debes, Thanassis Giannetsos, Ioannis Krontiris:
BLINDTRUST: Oblivious Remote Attestation for Secure Service Function Chains. CoRR abs/2107.05054 (2021) - 2020
- [j9]Shahzana Liaqat, Adnan Akhunzada, Fatema Sabeen Shaikh, Thanassis Giannetsos, Mian Ahmad Jan:
SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT). Comput. Commun. 160: 697-705 (2020) - [c22]Thanassis Giannetsos, Daniele Sgandurra:
2nd Workshop on Cyber-Security Arms Race (CYSARM 2020). CCS 2020: 2147-2148 - [c21]Benjamin Larsen, Heini Bergsson Debes, Thanassis Giannetsos:
CloudVaults: Integrating Trust Extensions into System Integrity Verification for Cloud-Based Environments. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 197-220 - [c20]Hasan Tooba, Adnan Akhunzada, Thanassis Giannetsos, Jahanzaib Malik:
Orchestrating SDN Control Plane towards Enhanced IoT Security. NetSoft 2020: 457-464 - [c19]Tiberiu-Ioan Szatmari, Michael Kai Petersen, Maciej Jan Korzepa, Thanassis Giannetsos:
Modelling Audiological Preferences using Federated Learning. UMAP (Adjunct Publication) 2020: 187-190 - [e4]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020. ACM 2020, ISBN 978-1-4503-8091-1 [contents] - [e3]Ioana Boureanu, Constantin Catalin Dragan, Mark Manulis, Thanassis Giannetsos, Christoforos Dadoyan, Panagiotis Gouvas, Roger A. Hallman, Shujun Li, Victor Chang, Frank Pallas, Jörg Pohle, M. Angela Sasse:
Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12580, Springer 2020, ISBN 978-3-030-66503-6 [contents] - [e2]Maryline Laurent, Thanassis Giannetsos:
Information Security Theory and Practice - 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11-12, 2019, Proceedings. Lecture Notes in Computer Science 12024, Springer 2020, ISBN 978-3-030-41701-7 [contents]
2010 – 2019
- 2019
- [j8]Tassos Dimitriou, Thanassis Giannetsos, Liqun Chen:
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems. Comput. Commun. 137: 1-14 (2019) - [j7]Nikolaos Pitropakis, Emmanouil Panaousis, Thanassis Giannetsos, Eleftherios Anastasiadis, George Loukas:
A taxonomy and survey of attacks against machine learning. Comput. Sci. Rev. 34 (2019) - [j6]Linzhi Jiang, Liqun Chen, Thanassis Giannetsos, Bo Luo, Kaitai Liang, Jinguang Han:
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case. IEEE Internet Things J. 6(6): 10177-10190 (2019) - [c18]Thanassis Giannetsos, Ioannis Krontiris:
Securing V2X Communications for the Future: Can PKI Systems offer the answer? ARES 2019: 95:1-95:8 - [c17]Thanassis Giannetsos, Daniele Sgandurra:
1st Workshop on Cyber-Security Arms Race (CYSARM 2019). CCS 2019: 2711-2712 - [c16]Constantinos Pouyioukka, Thanassis Giannetsos, Weizhi Meng:
CrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart Contracts. IFIPTM 2019: 147-161 - [c15]Nikos Koutroumpouchos, Christoforos Ntantogian, Sofia-Anna Menesidou, Kaitai Liang, Panagiotis Gouvas, Christos Xenakis, Thanassis Giannetsos:
Secure Edge Computing with Lightweight Control-Flow Property-based Attestation. NetSoft 2019: 84-92 - [e1]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6840-7 [contents] - 2018
- [c14]Alessandro Carrega, Matteo Repetto, Fulvio Risso, Stefan Covaci, Anastasios Zafeiropoulos, Thanassis Giannetsos, Orazio Toscano:
Situational Awareness in Virtual Networks: The ASTRID Approach. CloudNet 2018: 1-6 - [c13]Nikhil Banerjee, Thanassis Giannetsos, Emmanouil Panaousis, Clive Cheong Took:
Unsupervised Learning for Trustworthy IoT. FUZZ-IEEE 2018: 1-8 - [i1]Nikhil Banerjee, Thanassis Giannetsos, Emmanouil Panaousis, Clive Cheong Took:
Unsupervised Learning for Trustworthy IoT. CoRR abs/1805.10401 (2018) - 2017
- [c12]Jorden Whitefield, Liqun Chen, Thanassis Giannetsos, Steve A. Schneider, Helen Treharne:
Privacy-enhanced capabilities for VANETs using direct anonymous attestation. VNC 2017: 123-130 - 2016
- [j5]Stylianos Gisdakis, Thanassis Giannetsos, Panagiotis Papadimitratos:
Security, Privacy, and Incentive Provision for Mobile Crowd Sensing Systems. IEEE Internet Things J. 3(5): 839-853 (2016) - [c11]Stylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos:
Android privacy C(R)ache: reading your external storage and sensors for fun and profit. PAMCO@MobiHoc 2016: 1-10 - 2015
- [c10]Stylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos:
SHIELD: a data verification framework for participatory sensing systems. WISEC 2015: 16:1-16:12 - 2014
- [j4]Thanassis Giannetsos, Tassos Dimitriou:
LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks. J. Comput. Syst. Sci. 80(3): 618-643 (2014) - [c9]Thanassis Giannetsos, Stylianos Gisdakis, Panos Papadimitratos:
Trustworthy People-Centric Sensing: Privacy, security and user incentives road-map. Med-Hoc-Net 2014: 39-46 - [c8]Stylianos Gisdakis, Thanassis Giannetsos, Panos Papadimitratos:
SPPEAR: security & privacy-preserving architecture for participatory-sensing applications. WISEC 2014: 39-50 - 2013
- [c7]Stylianos Gisdakis, Marcello Lagana, Thanassis Giannetsos, Panos Papadimitratos:
SEROSA: SERvice oriented security architecture for Vehicular Communications. VNC 2013: 111-118 - 2012
- [j3]Antonis Michalas, Tassos Dimitriou, Thanassis Giannetsos, Nikos Komninos, Neeli R. Prasad:
Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes. Wirel. Pers. Commun. 66(3): 559-575 (2012) - 2011
- [j2]Thanassis Giannetsos, Tassos Dimitriou, Neeli R. Prasad:
People-centric sensing in assistive healthcare: Privacy challenges and directions. Secur. Commun. Networks 4(11): 1295-1307 (2011) - 2010
- [j1]Thanassis Giannetsos, Tassos Dimitriou, Ioannis Krontiris, Neeli R. Prasad:
Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices. Comput. J. 53(10): 1576-1593 (2010) - [c6]Tassos Dimitriou, Thanassis Giannetsos:
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks. DCOSS 2010: 334-347
2000 – 2009
- 2009
- [c5]Thanassis Giannetsos, Tassos Dimitriou, Neeli R. Prasad:
Self-propagating worms in wireless sensor networks. StudentWorkshop@CoNEXT 2009: 31-32 - [c4]Ioannis Krontiris, Zinaida Benenson, Thanassis Giannetsos, Felix C. Freiling, Tassos Dimitriou:
Cooperative Intrusion Detection in Wireless Sensor Networks. EWSN 2009: 263-278 - 2008
- [c3]Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou:
LIDeA: a distributed lightweight intrusion detection architecture for sensor networks. SecureComm 2008: 20 - [c2]Ioannis Krontiris, Thanassis Giannetsos, Tassos Dimitriou:
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side. WiMob 2008: 526-531 - 2007
- [c1]Ioannis Krontiris, Tassos Dimitriou, Thanassis Giannetsos, Marios Mpasoukos:
Intrusion Detection of Sinkhole Attacks in Wireless Sensor Networks. ALGOSENSORS 2007: 150-161
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint