Research

Privacy, security, and machine learning.

Selected Publications

  1. J. Freudiger. How Talkative is your Mobile Device? An Experimental Study of Wi-Fi Probe Requests. WiSec, 2015 [slides]
  2. J. Freudiger, S. Rane, A. E. Brito, and E. Uzun. Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing. Workshop on Information Sharing and Collaborative Security (WISCS) 2014 [slides]
  3. I. Bilogrevic, J. Freudiger, E. De Cristofaro, and E. Uzun. What’s the Gist? Privacy-Preserving Aggregation of User Profiles. European Symposium on Research in Computer Security (Esorics), 2014 [slides]
  4. N. Vratonjic, J. Freudiger, V. Bindschaedler and J.-P. Hubaux. The Inconvenient Truth About Web Certificates. Workshop on Economics of Information Security (WEIS), 2011

Publications

  1. J. Freudiger. How Talkative is your Mobile Device? An Experimental Study of Wi-Fi Probe Requests. WiSec, 2015 [slides]
  2. J. Freudiger, E. De Cristofaro, and A. E. Brito. Controlled Data Sharing for Collaborative Threat Mitigation (ArXiv). DIMVA, 2015 [slides]
  3. J. Freudiger, S. Rane, A. E. Brito, and E. Uzun. Privacy Preserving Data Quality Assessment for High-Fidelity Data Sharing. Workshop on Information Sharing and Collaborative Security (WISCS), 2014 [slides]
  4. I. Bilogrevic, J. Freudiger, E. De Cristofaro, and E. Uzun. What’s the Gist? Privacy-Preserving Aggregation of User Profiles. European Symposium on Research in Computer Security (Esorics), 2014 [slides]
  5. E. De Cristofaro, H. Du, J. Freudiger, and G. Norcie. A Comparative Usability Study of Two-Factor Authentication. Usable Security Workshop (USEC), 2014 [slides]
  6. J. Freudiger, M. Jadliwala, J.-P. Hubaux, V. Niemi, and P. Ginzboorg. Privacy of community pseudonyms in wireless peer-to-peer networks. Mobile Networks and Applications, 2013
  7. J. Freudiger, H. Manshaei, J.-P. Hubaux, and D. C. Parkes. Non-Cooperative Location Privacy. IEEE Transactions on Dependable and Secure Computing (TDSC), 2012
  8. J. Freudiger. When Whereabouts is no Longer Thereabouts: Location Privacy in Wireless Networks. EPFL Ph.D. Thesis, 2011
  9. M. Jadliwala, J. Freudiger, I. Aad, J.-P. Hubaux, and V. Niemi. Privacy-Triggered Communications in Pervasive Social Networks. IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC), 2011
  10. N. Vratonjic, J. Freudiger, V. Bindschaedler, and J.-P. Hubaux. The Inconvenient Truth About Web Certificates. Workshop on Economics of Information Security (WEIS), 2011
  11. J. Freudiger, R. Shokri, and J.-P. Hubaux. Evaluating the Privacy Risk of Location-Based Services. Financial Cryptography and Data Security (FC), 2011
  12. M. Humbert, M. Manshaei, J. Freudiger, and J.-P. Hubaux. Tracking Games in Mobile Networks. Conference on Decision and Game Theory for Security (GameSec), 2011
  13. R. Shokri, C. Troncoso, C. Diaz, J. Freudiger, and J.-P. Hubaux. Unraveling an Old Cloak: k-anonymity for Location Privacy. Workshop on Privacy in the Electronic Society (WPES), 2010
  14. E. Costanza, J. Panchard, G. Zufferey, J. Nembrini, J. Freudiger, J. Huang, and J.-P. Hubaux. SensorTune: A Mobile Auditory Interface for DIY Wireless Sensor Networks. Conference on Human Factors in Computing Systems (CHI), 2010 [youtube]
  15. N. Vratonjic, J. Freudiger, and J.-P. Hubaux. Integrity of the Web Content: The Case of Online Advertising. Usenix Workshop on Collaborative Methods for Security and Privacy (CollSec), 2010
  16. J. Freudiger, R. Neu, and J.-P. Hubaux. Private Sharing of User Location over Online Social Networks. Hot Topics in Privacy Enhancing Technologies (HotPETs), 2010 [slides]
  17. R. Shokri, J. Freudiger, and J.-P. Hubaux. A Unified Framework for Location Privacy. Hot Topics in Privacy Enhancing Technologies (HotPETs), 2010
  18. J. Freudiger, M.H. Manshaei, J.-Y. Le Boudec, and J.-P. Hubaux. On the Age of Pseudonyms in Mobile Ad Hoc Networks. IEEE International Conference on Computer Communications (INFOCOM), 2010 [slides]
  19. J. Freudiger, M.H. Manshaei, J.-P. Hubaux, and D.C. Parkes. On Non-Cooperative Location Privacy: A Game-Theoretic Approach. ACM Conference on Computer and Communications Security (CCS), 2009 [slides]
  20. R. Shokri, J. Freudiger, M. Jadliwala, and J.-P. Hubaux. A Distortion-based Metric for Location Privacy. Workshop on Privacy in the Electronic Society (WPES), 2009
  21. J. Freudiger, M. Raya, and J.-P. Hubaux. Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks. Conference on Security and Privacy in Communication Networks (SECURECOMM), 2009 [slides]
  22. J. Freudiger, R. Shokri, and J.P. Hubaux. On the Optimal Placement of Mix Zones. Privacy Enhancing Technologies Symposium (PETS), 2009 [slides]
  23. J. Freudiger, N. Vratonjic, and J.-P. Hubaux. Towards Privacy-Friendly Online Advertising. IEEE Web 2.0 Security and Privacy (W2SP), 2009
  24. P. Papadimitratos, L. Buttyan, and T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, and J.-P Hubaux. Towards Secure Vehicular Communication Systems: Design and Architecture. IEEE Communications Magazine, 2008.
  25. M.H. Manshaei, M. Felegyhazi, J. Freudiger, P. Marbach, and J.-P. Hubaux. On Wireless Social Community Networks. IEEE International Conference on Computer Communications (INFOCOM), 2008
  26. M.H. Manshaei, J. Freudiger, M. Felegyhazi, P. Marcbach, and J.-P. Hubaux. Wireless Social Community Networks: A Game-theoretic Analysis. Int. Zurich Seminar on Communications (IZS), 2008
  27. M.H. Manshaei, M. Felegyhazi, J. Freudiger, J.-P. Hubaux, and P. Marback. On Spectrum Sharing Games of Network Operators and Cognitive Radios. Cognitive Wireless Networks: Concepts, Methodologies and Visions, F. Fitzek & M. Katz Eds. Springer, 2007
  28. J. Freudiger, M. Raya, M. Felegyhazi, P. Papadimitratos, and J.-P. Hubaux. Mix-Zones for Location Privacy in Vehicular Networks. Workshop on Wireless Networking for Intelligent Transportation Systems (WiN-ITS), 2007