default search action
Igor Bilogrevic
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Meenatchi Sundaram Muthu Selva Annamalai, Igor Bilogrevic, Emiliano De Cristofaro:
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting. NDSS 2024 - [c23]Marian Harbach, Igor Bilogrevic, Enrico Bacis, Serena Chen, Ravjit Uppal, Andy Paicu, Elias Klim, Meggyn Watkins, Balazs Engedy:
Don't Interrupt Me - A Large-Scale Study of On-Device Permission Prompt Quieting in Chrome. NDSS 2024 - [c22]Caroline Violot, Tugrulcan Elmas, Igor Bilogrevic, Mathias Humbert:
Shorts vs. Regular Videos on YouTube: A Comparative Analysis of User Engagement and Content Creation Trends. WebSci 2024: 213-223 - [c21]Enrico Bacis, Igor Bilogrevic, Róbert Busa-Fekete, Asanka Herath, Antonio Sartori, Umar Syed:
Assessing Web Fingerprinting Risk. WWW (Companion Volume) 2024: 245-254 - [c20]Asuman Senol, Alisha Ukani, Dylan Cutler, Igor Bilogrevic:
The Double Edged Sword: Identifying Authentication Pages and their Fingerprinting Behavior. WWW 2024: 1690-1701 - [i6]Caroline Violot, Tugrulcan Elmas, Igor Bilogrevic, Mathias Humbert:
Shorts vs. Regular Videos on YouTube: A Comparative Analysis of User Engagement and Content Creation Trends. CoRR abs/2403.00454 (2024) - [i5]Enrico Bacis, Igor Bilogrevic, Róbert Busa-Fekete, Asanka Herath, Antonio Sartori, Umar Syed:
Assessing Web Fingerprinting Risk. CoRR abs/2403.15607 (2024) - 2023
- [i4]Meenatchi Sundaram Muthu Selva Annamalai, Igor Bilogrevic, Emiliano De Cristofaro:
FP-Fed: Privacy-Preserving Federated Detection of Browser Fingerprinting. CoRR abs/2311.16940 (2023) - 2021
- [c19]Igor Bilogrevic, Balazs Engedy, Judson L. Porter III, Nina Taft, Kamila Hasanbega, Andrew Paseltiner, Hwi Kyoung Lee, Edward Jung, Meggyn Watkins, P. J. McLachlan, Jason James:
"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome. USENIX Security Symposium 2021: 769-784 - 2020
- [j9]Alexandre Meylan, Mauro Cherubini, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin:
A Study on the Use of Checksums for Integrity Verification of Web Downloads. ACM Trans. Priv. Secur. 24(1): 4:1-4:36 (2020) - [c18]Jake Weidman, Igor Bilogrevic, Jens Grossklags:
Nothing Standard About It: An Analysis of Minimum Security Standards in Organizations. DETIPS/DeSECSys/MPS/SPOSE@ESORICS 2020: 263-282
2010 – 2019
- 2019
- [c17]Sai Teja Peddinti, Igor Bilogrevic, Nina Taft, Martin Pelikan, Úlfar Erlingsson, Pauline Anthonysamy, Giles Hogben:
Reducing Permission Requests in Mobile Apps. Internet Measurement Conference 2019: 259-266 - 2018
- [j8]Kévin Huguenin, Igor Bilogrevic, Joana Soares Machado, Stefan Mihaila, Reza Shokri, Italo Dacosta, Jean-Pierre Hubaux:
A Predictive Model for User Motivation and Utility Implications of Privacy-Protection Mechanisms in Location Check-Ins. IEEE Trans. Mob. Comput. 17(4): 760-774 (2018) - [j7]Anindya Maiti, Murtuza Jadliwala, Jibo He, Igor Bilogrevic:
Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches. IEEE Trans. Mob. Comput. 17(9): 2180-2194 (2018) - [c16]Mauro Cherubini, Alexandre Meylan, Bertil Chapuis, Mathias Humbert, Igor Bilogrevic, Kévin Huguenin:
Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses. CCS 2018: 1256-1271 - [r1]Igor Bilogrevic:
Privacy in Geospatial Applications and Location-Based Social Networks. Handbook of Mobile Data Privacy 2018: 195-228 - 2017
- [c15]Bram Bonné, Sai Teja Peddinti, Igor Bilogrevic, Nina Taft:
Exploring decision making with Android's runtime permission dialogs using in-context surveys. SOUPS 2017: 195-210 - [i3]Anindya Maiti, Murtuza Jadliwala, Jibo He, Igor Bilogrevic:
Side-Channel Inference Attacks on Mobile Keypads using Smartwatches. CoRR abs/1710.03656 (2017) - 2016
- [j6]Igor Bilogrevic, Kévin Huguenin, Berker Agir, Murtuza Jadliwala, Maria Gazaki, Jean-Pierre Hubaux:
A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive Mob. Comput. 25: 125-142 (2016) - [j5]Anh Pham, Kévin Huguenin, Igor Bilogrevic, Italo Dacosta, Jean-Pierre Hubaux:
SecureRun: Cheat-Proof and Private Summaries for Location-Based Activities. IEEE Trans. Mob. Comput. 15(8): 2109-2123 (2016) - [c14]Igor Bilogrevic, Martin Ortlieb:
"If You Put All The Pieces Together...": Attitudes Towards Data Combination and Sharing Across Services and Companies. CHI 2016: 5215-5227 - 2015
- [c13]Anindya Maiti, Murtuza Jadliwala, Jibo He, Igor Bilogrevic:
(Smart)watch your taps: side-channel keystroke inference attacks using smartwatches. ISWC 2015: 27-30 - [c12]Igor Bilogrevic, Kévin Huguenin, Stefan Mihaila, Reza Shokri, Jean-Pierre Hubaux:
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms. NDSS 2015 - 2014
- [b1]Igor Bilogrevic:
On Multi-Dimensional Privacy in Context-Aware Mobile Networks. EPFL, Switzerland, 2014 - [j4]Igor Bilogrevic, Murtuza Jadliwala, Vishal Joneja, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:
Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices. IEEE Trans. Inf. Forensics Secur. 9(7): 1141-1156 (2014) - [c11]Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. ESORICS (2) 2014: 128-145 - [c10]Anh Pham, Kévin Huguenin, Igor Bilogrevic, Jean-Pierre Hubaux:
Secure and private proofs for location-based activity summaries in urban areas. UbiComp 2014: 751-762 - [i2]Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. CoRR abs/1405.1328 (2014) - [i1]Igor Bilogrevic, Julien Freudiger, Emiliano De Cristofaro, Ersin Uzun:
What's the Gist? Privacy-Preserving Aggregation of User Profiles. IACR Cryptol. ePrint Arch. 2014: 502 (2014) - 2013
- [j3]Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux:
Optimizing mix-zone coverage in pervasive wireless networks. J. Comput. Secur. 21(3): 317-346 (2013) - [c9]Igor Bilogrevic, Kévin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi:
Inferring social ties in pervasive networks: an on-campus comparative study. UbiComp (Adjunct Publication) 2013: 123-126 - [c8]Igor Bilogrevic, Kévin Huguenin, Berker Agir, Murtuza Jadliwala, Jean-Pierre Hubaux:
Adaptive information-sharing for privacy-aware mobile social networks. UbiComp 2013: 657-666 - [c7]Igor Bilogrevic, Kévin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi:
Inferring social ties in academic networks using short-range wireless communications. WPES 2013: 179-188 - 2012
- [c6]Laurent Bindschaedler, Murtuza Jadliwala, Igor Bilogrevic, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Jean-Pierre Hubaux:
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. NDSS 2012 - [c5]Igor Bilogrevic, Murtuza Jadliwala, István Lám, Imad Aad, Philip Ginzboorg, Valtteri Niemi, Laurent Bindschaedler, Jean-Pierre Hubaux:
Big Brother Knows Your Friends: On Privacy of Social Communities in Pervasive Networks. Pervasive 2012: 370-387 - 2011
- [j2]Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux:
OREN: Optimal revocations in ephemeral networks. Comput. Networks 55(5): 1168-1180 (2011) - [j1]Igor Bilogrevic, Murtuza Jadliwala, Praveen Kumar, Sudeep Singh Walia, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:
Meetings through the cloud: Privacy-preserving scheduling on mobile devices. J. Syst. Softw. 84(11): 1910-1927 (2011) - [c4]Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hubaux, Imad Aad, Valtteri Niemi:
Privacy-preserving activity scheduling on mobile devices. CODASPY 2011: 261-272 - [c3]Murtuza Jadliwala, Igor Bilogrevic, Jean-Pierre Hubaux:
Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective. ESORICS 2011: 548-567 - [c2]Igor Bilogrevic, Murtuza Jadliwala, Kübra Kalkan, Jean-Pierre Hubaux, Imad Aad:
Privacy in Mobile Computing for Location-Sharing-Based Services. PETS 2011: 77-96 - 2010
- [c1]Igor Bilogrevic, Mohammad Hossein Manshaei, Maxim Raya, Jean-Pierre Hubaux:
Optimal revocations in ephemeral networks: A game-theoretic framework. WiOpt 2010: 21-30
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint