Archives: Events

Researchers at Schools: Privacy risks in Android applications

Nowadays, most of us use a mobile phone on a daily basis, for many different activities (such as social networks,...

Read more arrow_right_alt

Second-level Digital Divide: A Longitudinal Study of Mobile Traffic Consumption Imbalance in France

We study the interaction between the consumption of digital services via mobile devices and urbanization levels, using measurement data collected...

Read more arrow_right_alt

Distinguished Seminar: From Co-Existence to Resilience through Cross-Technology Communication

Co-existence of radio communication technologies has always been one of the key challenges in wireless communications. This particularly holds for...

Read more arrow_right_alt

Distinguished Seminar: Correctness Conditions for Cross-Chain Deals

Modern distributed data management systems face a new challenge: how can autonomous, mutually-distrusting parties cooperate safely and effectively? Addressing this...

Read more arrow_right_alt

LossLeaP: Learning to Predict for Intent-Based Networking

Intent-Based Networking mandates that high-level human-understandable intents are automatically interpreted and implemented by network management entities. As a key part...

Read more arrow_right_alt

FreqyWM: Frequency WaterMarking for the New Data Economy

We present a novel data engineering technique for modulating the appearance frequency of a few tokens within a dataset for...

Read more arrow_right_alt

Try IT! Congress

IMDEA Networks will participate in the Try IT! congress organized by DA-ETSIINF in collaboration with ACM-UPM and the ETSI Informáticos...

Read more arrow_right_alt

Taking Responsibility for Someone Else's Code: Studying the Privacy Behaviors of Mobile Apps at Scale

Modern software development has embraced the concept of “code reuse,” which is the practice of relying on third-party code to...

Read more arrow_right_alt

Machine Learning in Radio Propagation Modeling

Efficient and reliable indoor radio propagation modeling tools are inextricably intertwined with the design and operation of next-generation wireless networks....

Read more arrow_right_alt

Strengthening the IoT Ecosystem: Privacy Preserving IoT Security Management

We are seeing an increasingly abundance of potentially intrusive and privacy-invasive IoT devices in our lives, from smart city projects...

Read more arrow_right_alt

Recent Comments

    Archives

    Categories