Scientific Publications

  1. S. Panda, E. Panaousis, G. Loukas, and K. Kentrotis, "Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous Vehicles," in ARES’23 Proceedings, ACM, 2023. doi: 10.1145/3600160.3605073.
     
  2. O. Papadakis, A. Andronikakis, N. Foutris, M. Papadimitriou, A. Stratikopoulos, F. Zakkak, P. Xekalakis, and C. Kotselidis, "A Multifaceted Memory Analysis of Java Benchmarks," in 20th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes, ACM, 2023. doi: 10.1145/3617651.3622978.
     
  3. O. Papadakis, A. Andronikakis, N. Foutris, M. Papadimitriou, A. Stratikopoulos, F. Zakkak, P. Xekalakis, and C. Kotselidis, "Scaling Up Performance of Managed Applications on NUMA Systems," in The 2023 ACM SIGPLAN International Symposium on Memory Management (ISMM 2023), ACM, 2023. doi: 10.1145/3591195.3595270.
     
  4. J. Fumero, F. Blanaru, A. Stratikopoulos, S. Dohrmann, S. Viswanathan, and C. Kotselidis, "Unified Shared Memory: Friend or Foe? Understanding the Implications of Unified Memory on Managed Heaps," in 20th ACM SIGPLAN International Conference on Managed Programming Languages and Runtimes (MPLR ’23), ACM, 2023. doi: 10.1145/3617651.3622984.
     
  5. A. Stroumpoulis, I. Katsanakis, and E. Kopanaki, "The Use of Digital Technologies in a Common Data Space and Sustainable development Context: A Conceptual Framework Focus on Smart Hospitality," in ICOT2023. Available: https://iatour.org/icot2023/wp-content/uploads/2023/06/Book-of-Abstracts-ICOT2023-ver.1.pdf.
     
  6. A. Stroumpoulis, I. Katsanakis, and E. Kopanaki, "Exploring Digital Technology and Sustainable Development Integration in a Shared Data Environment: A Conceptual Framework on the Retail Sector," in 19th HSSS National & International Conference 2023. Available: https://confe.hsss.eu/wp-content/uploads/2023/10/HSSS-2023-TIMETABLE.pdf.
     
  7. T. Chen, P. Xu, S. Picek, B. Luo, W. Susilo, H. Jin, and K. Liang, "The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption," in 2023 Network and Distributed System Security Symposium. doi: 10.14722/ndss.2023.24725.
     
  8. X. Zhang, W. Wang, P. Xu, L. T. Yang, and K. Liang, "High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption," in 32nd USENIX Security Symposium. Available: https://www.usenix.org/system/files/usenixsecurity23-zhang-xianglong.pdf.
     
  9. A. Stratikopoulos, F. Blanaru, J. Fumero, M. Xekalaki, O. Papadakis, and C. Kotselidis, "Cross-Language Interoperability of Heterogeneous Code," in Companion Proceedings of the 7th International Conference on the Art Science and Engineering of Programming (“Programming” ’23), ACM, 2023. doi: 10.1145/3594671.3594675.
     
  10. J. Fumero, G. Rethy, A. Stratikopoulos, N. Foutris, and C. Kotselidis, "Beehive SPIR-V Toolkit: A Composable and Functional API for Runtime SPIR-V Code Generation," in 2023 Workshop on Virtual Machines and Language Implementations, ACM, 2023. doi: 10.1145/3623507.3623555.