Follow
Evgenios M. Kornaropoulos
Title
Cited by
Cited by
Year
Fast approximation of betweenness centrality through sampling
M Riondato, EM Kornaropoulos
Data Mining and Knowledge Discovery 30 (2), 438-475, 2016
2882016
Data recovery on encrypted databases with k-nearest neighbor query leakage
EM Kornaropoulos, C Papamanthou, R Tamassia
2019 IEEE Symposium on Security and Privacy (S&P), 2019
822019
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution.
EM Kornaropoulos, C Papamanthou, R Tamassia
2020 IEEE Symposium on Security and Privacy (S&P), 2020
802020
Response-hiding encrypted ranges: revisiting security via parametrized leakage-abuse attacks
EM Kornaropoulos, C Papamanthou, R Tamassia
2021 IEEE Symposium on Security and Privacy (SP), 1502-1519, 2021
372021
Systems and methods for securely detecting data similarities
E Kornaropoulos, P Efstathopoulos
US Patent 9,942,032, 2018
302018
Overloaded orthogonal drawings
EM Kornaropoulos, IG Tollis
International Symposium on Graph Drawing, 242-253, 2011
242011
DAGView: an approach for visualizing large graphs
EM Kornaropoulos, IG Tollis
International Symposium on Graph Drawing, 499-510, 2012
222012
A novel KNN classifier for acoustic vehicle classification based on alpha-stable statistical modeling
EM Kornaropoulos, P Tsakalides
2009 IEEE 15th Workshop on Statistical Signal Processing, 1-4, 2009
222009
Weak dominance drawings and linear extension diameter
EM Kornaropoulos, IG Tollis
arXiv preprint arXiv:1108.1439, 2011
182011
Weak dominance drawings for directed acyclic graphs
EM Kornaropoulos, IG Tollis
International Symposium on Graph Drawing, 559-560, 2012
172012
Leakage Inversion: Towards Quantifying Privacy in Searchable Encryption
EM Kornaropoulos, N Moyer, C Papamanthou, A Psomas
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
152022
The Price of Tailoring the Index to your Data: Poisoning Attacks on Learned Index Structures
EM Kornaropoulos, S Ren, R Tamassia
Proceedings of the 2022 International Conference on Management of Data …, 2022
122022
Auditable data structures
MT Goodrich, EM Kornaropoulos, M Mitzenmacher, R Tamassia
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 285-300, 2017
102017
BeeTrace: a unified platform for secure contact tracing that breaks data silos
X Liu, N Trieu, EM Kornaropoulos, D Song
arXiv preprint arXiv:2007.02285, 2020
92020
A Visualization Framework and User Studies for Overloaded Orthogonal Drawings
W Didimo, EM Kornaropoulos, F Montecchiani, IG Tollis
Computer Graphics Forum, 2017
92017
Algorithms and Bounds for Overloaded Orthogonal Drawings
EM Kornaropoulos, IG Tollis
J. Graph Algorithms Appl 20 (2), 217-246, 2016
82016
More practical and secure history-independent hash tables
MT Goodrich, EM Kornaropoulos, M Mitzenmacher, R Tamassia
European Symposium on Research in Computer Security (ESORICS), 20-38, 2016
62016
Adversarial examples for k-nearest neighbor classifiers based on higher-order voronoi diagrams
C Sitawarin, EM Kornaropoulos, D Song, D Wagner
Thirty-Fifth Conference on Neural Information Processing Systems, 2021
52021
Dominance drawing of non-planar graphs
EM Kornaropoulos
Masters Thesis, Department of Computer Science, University of Crete, 2012
42012
The Case of Adversarial Inputs for Secure Similarity Approximation Protocols
EM Kornaropoulos, P Efstathopoulos
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 247-262, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20