🔬 Scientific Publications
(Updated November 2025 – based on Deliverables D8.2 and D8.3)
D8.2 – First Set of Scientific Publications (11 in total)
- Sakshyam Panda, Emmanouil Panaousis, George Loukas, Konstantinos Kentrotis
“Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles.” ARES’23 Proceedings / ACM (2023). https://doi.org/10.1145/3600160.3605073 - Orion Papadakis et al. “A Multifaceted Memory Analysis of Java Benchmarks.” 20th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes (MPLR 2023) / ACM (2023). https://doi.org/10.1145/3617651.3622978
- Orion Papadakis et al. “Scaling Up Performance of Managed Applications on NUMA Systems.” ISMM 2023 / ACM (2023). https://doi.org/10.1145/3591195.3595270
- Juan Fumero et al. “Unified Shared Memory: Friend or Foe? Understanding the Implications of Unified Memory on Managed Heaps.” MPLR ’23 / ACM (2023). https://doi.org/10.1145/3617651.3622984
- Asterios Stroumpoulis, Ioannis Katsanakis, Evangelia Kopanaki
“The Use of Digital Technologies in a Common Data Space and Sustainable Development Context: A Conceptual Framework Focus on Smart Hospitality.” ICOT 2023. PDF - Asterios Stroumpoulis, Ioannis Katsanakis, Evangelia Kopanaki
“Exploring Digital Technology and Sustainable Development Integration in a Shared Data Environment: A Conceptual Framework on the Retail Sector.” HSSS 2023. PDF - Nicolas Belleville, Loïc Masure “Hiding behind the one that I hide: Combining Loop Shuffling and Code Polymorphism for Enhanced AES Side-Channel Security.” COSADE 2024 / Springer. (Accepted)
- Tianyang Chen et al. “The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.” NDSS 2023. https://dx.doi.org/10.14722/ndss.2023.24725
- Xianglong Zhang et al. “High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption.” USENIX Security 2023. PDF
- Athanasios Stratikopoulos et al. “Cross-Language Interoperability of Heterogeneous Code.” Programming ’23 Companion / ACM. https://doi.org/10.1145/3594671.3594675
- Juan Fumero et al. “Beehive SPIR-V Toolkit: A Composable and Functional API for Runtime SPIR-V Code Generation.” VMIL 2023 / ACM. https://doi.org/10.1145/3623507.3623555
D8.3 – Second Set of Scientific Publications (23 in total)
- Mehdi Akbari Gurabi et al. “Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges.” Privacy and Identity 2023 / IFIP AICT. https://doi.org/10.1007/978-3-031-57978-3_11
- Felix Hermsen et al. “On Data Spaces for Retrieval Augmented Generation.” Europe Meets Japan Workshop on Data Sovereignty and Generative AI. https://doi.org/10.18420/inf2024_57
- Mehdi Akbari Gurabi et al. “A Conceptual Framework to Leverage Heuristics for Effective Human-Machine Collaboration in Incident Handling.” SecITC 2024. https://doi.org/10.1007/978-3-031-87760-5_3
- Mehdi Akbari Gurabi et al. “Enhancing Cyber Threat Intelligence Sharing through Data Spaces in Critical Infrastructures.” IEEE CSR 2025. https://doi.org/10.1109/CSR64739.2025.11130001
- Nicolas Belleville, Loïc Masure. “Combining Loop Shuffling and Code Polymorphism for Enhanced AES Side-Channel Security.” COSADE 2024 / Springer. https://doi.org/10.1007/978-3-031-57543-3_14
- Dolores Ordóñez-MartĂnez, Maurici Ruiz-PĂ©rez. “Conceptual Framework and Prospective Analysis of EU Tourism Data Spaces.” MDPI Sustainability. https://doi.org/10.3390/su16010371
- Huanhuan Chen, Yao Jiang Galteland & Kaitai Liang. “CCA-1 Secure Updatable Encryption with Adaptive Security.” ASIACRYPT 2023. https://eprint.iacr.org/2022/1339
- Wenting Li et al. “Improved Wordpcfg for Passwords with Maximum Probability Segmentation.” IEEE ICASSP 2023. https://doi.org/10.1109/ICASSP49357.2023.10096535
- Dolores Ordóñez-MartĂnez, Maurici Ruiz-PĂ©rez. “Toward Establishing a Tourism Data Space: Innovative Geo-Dashboard Development for Tourism Research and Management.” MDPI Smart Cities. https://doi.org/10.3390/smartcities7010026
- Jakob Jenko, Joao Pita Costa. “Using Temporal Fusion Transformer Predictions to Maximise Use of Renewable Energy Sources.” IEEE. https://doi.org/10.1109/AIE61866.2024.10561261
- Ioannis Katsanakis, Asterios Stroumpoulis, Evangelia Kopanaki. “A Theoretical Framework for Validating and Evaluating the TANGO Platform in Smart Hospitality.” ICOT 2024 – IATOUR. PDF
- Ioannis Katsanakis, Asterios Stroumpoulis, Evangelia Kopanaki. “Evaluation of the TANGO Platform: Insights from the Smart Hospitality Pilot.” ICOT 2025 – IATOUR. PDF
- A. Giannopoulos et al. “Enabling Retail Business Intelligence through Secure Cross-Border Data Analysis and Visualisation: The TANGO Platform Approach.” ICBAP 2025 – Springer. (Pending publication)
- F. Currao et al. “Enhancing Fraud Detection through Privacy-Preserving Federated Analytics: The Banking Pilot within TANGO.” ICBAP 2025 – Springer. (Pending publication)
- Jakob Jenko et al. “Learning from the COVID-19 Pandemic to Improve Critical Infrastructure Resilience using Temporal Fusion Transformers.” FedCSIS 2023. PDF
- Nicolas Belleville. “Genelle et al. Revisited: Masking an AES Round with Only 4 Secure ANDs.” IEEE Embedded Systems Letters. https://doi.org/10.1109/LES.2024.3516853
- Yanqi Qiao et al. “Stealthy Backdoor Attack Against Federated Learning Through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage.” IEEE JESTCAS. https://ieeexplore.ieee.org/abstract/document/10649604
- Dazhuang Liu et al. “LADDER: Multi-Objective Backdoor Attack via Evolutionary Algorithm.” NDSS Symposium. https://www.ndss-symposium.org/ndss-paper/ladder-multi-objective-backdoor-attack-via-evolutionary-algorithm/
- Alexandra Papageorgiou. “Essential Digital Skills for Digital Product Passports’ Stakeholders under the Ecodesign for Sustainable Products Regulation.” IFAC-PapersOnLine – Elsevier. (Pending publication)
- Maria Xekalaki et al. “Enabling Transparent Acceleration of Big Data Frameworks Using Heterogeneous Hardware.” Proceedings of the VLDB Endowment 15(13). https://doi.org/10.14778/3565838.3565842
- Athanasios Stratikopoulos et al. “Dynamic and Static Code Analysis for Java Programs on Heterogeneous Hardware.” MPLR ’25 / ACM. https://doi.org/10.1145/3759426.3760984
- Michail Papadimitriou et al. “TornadoViz: Visualizing Heterogeneous Execution Patterns in Modern Managed Runtime Systems.” MPLR ’25 / ACM. https://doi.org/10.1145/3759426.3760978
- Ruben Stenhuis et al. “MeetSafe: Enhancing Robustness Against White-Box Adversarial Examples.” Frontiers in Computer Science. https://www.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2025.1631561/full
- Erik Hieta-aho, Anni Karinsalo, Valtteri Lipiäinen. “Obstacles in Implementing and Integrating Self-Sovereign Identity and Proposed Solutions.” CENTRIC 2025. (Pending publication)