• No results found

Reza Shokri Curriculum Vitae [1 of 5] Reza Shokri

N/A
N/A
Protected

Academic year: 2021

Share "Reza Shokri Curriculum Vitae [1 of 5] Reza Shokri"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Reza Shokri

Department of Computer Science, The University of Texas at Austin Visiting Cornell NYC Tech

[email protected] http://www.shokri.org

RESEARCH INTERESTS

• Privacy-Enhancing Technologies; Computational Privacy –Privacy-Preserving Machine Learning

• Economics of Security and Privacy –Game Theory

• Quantitative Analysis of Security and Privacy –Bayesian Inference

–Probabilistic Graphical Models –Machine Learning

• Mobile Networks; Pervasive Computing

ACADEMIC POSITIONS • Post-Doctoral Researcher

Oct. 2014 – present, CS Department, UT Austin; Visiting Cornell NYC Tech Oct. 2013 – Sep. 2014, Institute of Information Security, ETH Zurich, Switzerland • Research Assistant

Oct. 2007 – Sep. 2013, Laboratory for Communications and Applications, EPFL, Switzerland Sep. 2005 – Jul. 2007, Router Laboratory, University of Tehran, Iran

EDUCATION

• Oct. 2007 – Mar. 2013, PhD. in Computer and Communication Sciences, EPFL, Switzerland

- PhD. Thesis: Quantifying and Protecting Location Privacy

- Advisor: Prof. Jean-Pierre Hubaux

- Committee: Prof. G. Danezis, Prof. V. Shmatikov, Prof. J.-Y. Le Boudec, Prof. M. Grossglauser • Sep. 2004 – Jul. 2007, MSc. in Software Computer Engineering, University of Tehran, Iran

- Master Thesis: Anonymous Routing in Mobile Ad Hoc Networks

• Sep. 1999 – Mar. 2003, BSc. in Software Computer Engineering, University of Isfahan, Iran

(2)

HONORS and AWARDS

• Swiss National Science Foundation post-doctoralfellowship, 87’000 USD, 2013

• Runner-up for the annual Award for Outstanding Research in Privacy Enhancing Technologies (PET Award) 2012

SELECTED PUBLICATIONS

• Reza Shokri, and Vitaly Shmatikov. “Privacy-Preserving Deep Learning”. In ACM Conference on Computer and Communications Security (CCS), Denver, Colorado, USA, 2015.

• Reza Shokri. “Privacy Games: Optimal User-Centric Data Obfuscation”. In Proceedings on Privacy Enhancing Technologies (PoPETs) 2015.

• Igor Bilogrevic, Kevin Huguenin, Stephan Mihaila,Reza Shokri, and Jean-Pierre Hubaux. “Pre-dicting Users’ Motivations behind Location Check-Ins and Utility Implications of Privacy Protec-tion Mechanisms”. In Network and Distributed System Security (NDSS) Symposium, San Diego, California, 2015.

• Arthur Gervais,Reza Shokri, Adish Singla, Srdjan Capkun, and Vincent Lenders. “Quantifying Web-Search Privacy”. In ACM Conference on Computer and Communications Security (CCS), Arizona, USA, 2014.

• George Theodorakopoulos,Reza Shokri, Carmela Troncoso, Jean-Pierre Hubaux, and Jean-Yves Le Boudec. “Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for Location-Based Services”. In ACM Workshop on Privacy in the Electronic Society (WPES), Arizona, USA, 2014. • Alexandra Mihaela Olteanu, Kevin Huguenin,Reza Shokri, and Jean-Pierre Hubaux. “Quantify-ing the Effect of Co-location Information on Location Privacy”. In Privacy Enhancing Technologies Symposium (PETS), Amsterdam, The Netherlands, 2014.

• Reza Shokri, George Theodorakopoulos, Panos Papadimitratos, Ehsan Kazemi, and Jean-Pierre Hubaux. “Hiding in the Mobile Crowd: Location Privacy through Collaboration”. In IEEE Trans-actions on Dependable and Secure Computing (TDSC), Special Issue on “Security and Privacy in Mobile Platforms”, 2014.

• Reza Shokri, George Theodorakopoulos, Carmela Troncoso, Jean-Pierre Hubaux, and Jean-Yves Le Boudec. “Protecting Location Privacy: Optimal Strategy against Localization Attacks”. In ACM Conference on Computer and Communications Security (CCS), Raleigh, NC, USA, 2012. • Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, and Jean-Pierre Hubaux.

“Quan-tifying Location Privacy”. In IEEE Symposium on Security and Privacy (S&P, Oakland), CA, USA, 2011.

• Reza Shokri, George Theodorakopoulos, George Danezis, Jean-Pierre Hubaux, and Jean-Yves Le Boudec. “Quantifying Location Privacy: The Case of Sporadic Location Exposure”. In Privacy Enhancing Technologies Symposium (PETS), Waterloo, Canada, 2011.

• Julien Freudiger, Reza Shokri, and Jean-Pierre Hubaux. “On the Optimal Placement of Mix Zones”. In Privacy Enhancement Technologies Symposium (PETS), Seattle, WA, USA, 2009.

(3)

• Reza Shokri, Pedram Pedarsani, George Theodorakopoulos, and Jean-Pierre Hubaux. “Preserv-ing Privacy in Collaborative Filter“Preserv-ing through Distributed Aggregation of Offline Profiles”. In ACM Conference on Recommender Systems (RecSys), NY, USA, 2009.

• Reza Shokri, Marcin Poturalski, Gael Ravot, Panos Papadimitratos, and Jean-Pierre Hubaux. “A Practical Secure Neighbor Verification Protocol for Wireless Sensor Networks”. In ACM Con-ference on Wireless Network Security (WiSec), Zurich, Switzerland, 2009.

• Reza Shokri, Panos Papadimitratos, George Theodorakopoulos, and Jean-Pierre Hubaux. “Col-laborative Location Privacy”. In IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), Valencia, Spain, 2011.

• Reza Shokri, Carmela Troncoso, Claudia Diaz, Julien Freudiger, and Jean-Pierre Hubaux. “Un-raveling an Old Cloak: k-anonymity for Location Privacy”. In ACM Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA, 2010.

• Reza Shokri, Julien Freudiger, and Jean-Pierre Hubaux. “A Unified Framework for Location Privacy”. In Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), Berlin, Germany, 2010.

• Reza Shokri, Julien Freudiger, Murtuza Jadliwala, and Jean-Pierre Hubaux. “A Distortion-based Metric for Location Privacy”. In ACM Workshop on Privacy in the Electronic Society (WPES), Chicago, IL, USA, 2009.

• Julien Freudiger, Reza Shokri, and Jean-Pierre Hubaux. “Evaluating the Privacy Risk of Location-Based Services”. In Financial Cryptography and Data Security (FC), St. Lucia, 2011. • Francisco Santos, Mathias Humbert, Reza Shokri and Jean-Pierre Hubaux. “Collaborative

Lo-cation Privacy with Rational Users”. In ACM Conference on Decision and Game Theory for Security (GameSec), Maryland, USA, 2011.

• Maxim Raya, Reza Shokri, and Jean-Pierre Hubaux. “On the Tradeoff between Trust and Pri-vacy in Wireless Ad Hoc Networks”. In ACM Conference on Wireless Network Security (WiSec), Hoboken, NJ, USA, 2010.

BIBLIOMETRICS1

• h-index: 14 • citations: 942

• peak rate: 266 citations/year in 2014

PROFESSIONAL ACTIVITIES

• Program co-chairof Hot Topics in Privacy Enhancing Technologies (HotPETs 2013 & 2014) • Program committeemember of

- Network and Distributed System Security Symposium (NDSS 2016)

1

(4)

- International World Wide Web Conference (WWW 2016)

- USENIX Security Symposium 2015

- Privacy Enhancing Technologies Symposium (PETS 2013 & 2014 & 2015)

- ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2014 & 2015)

- Conference on Decision and Game Theory for Security (GameSec 2015)

- ACM Workshop on Privacy in the Electronic Society (WPES 2012 & 2015)

- ASIACCS Workshop on IoT Privacy, Trust, and Security (IoTPTS 2015)

- International Conference on Privacy, Security and Trust (PST 2014)

• External reviewer for ACM CCS, IEEE S&P, NDSS, Usenix Security, IEEE CSF, PETS, ESORICS, FC, ACM WiSec, ACM SenSys, and ACM UbiComp conferences, and ACM TISSEC, IEEE TMC, IEEE TWC, IEEE TDSC, IEEE TIFS, IEEE TPDS, and IEEE Vehicular Technology journals

TEACHING and STUDENT SUPERVISION

• Guest lecturer forPrivacy in the Digital Age at Cornell NYC Tech (2015) • Guest lecturer forComputer Security course at ETH Zurich (2014)

• Teaching assistant for master level course Mobile Networks (2009-2013), and PhD. level course Security and Cooperation in Wireless Networks (2009-2012), EPFL.

• Co-supervised 4 PhD. research projects on user behavior analysis in data sharing applications (2013),social aspects of location privacy (2013),tradeoff between privacy and trust (2010), privacy-preserving people-centric sensing (2008), and one Master thesis on impact of human mobility on location privacy (2012), EPFL.

• Co-supervised 13 Master semester projects, 6 undergraduate semester projects, and 2 internship projects, on different security and privacy problems in mobile networks, web, and recommender systems (2008-2013), EPFL.2

• Lecturer of undergraduate level course Operating System Laboratory: Linux kernel programming (2005 & 2006), University of Tehran.

• Teaching assistant for undergraduate level courses Computer Networks, Operating Systems, and Compilers (2001), University of Isfahan.

INVITED TALKS

• Privacy through Fake yet Semantically Real Traces at CS George Washington University, 2015 • Quantifying Web Search Privacy at Inria Saclay, Paris, 2014

• Quantifying and Protecting Location Privacy at GI-Dissertationspreis 2013 Kolloquium, 2014 • Computational Privacy: Two Fundamental Problems at Luxembourg University, 2014

• Computational Location Privacy at TDW Conf.: Enabling the Economics of Trust, Vienna, 2014

2

(5)

• Computational Privacy: Two Fundamental Problems at McGill University, 2014 • Computational Privacy: Two Fundamental Problems at University of Waterloo, 2014 • Computational Privacy: Two Fundamental Problems at the University of Toronto, 2014 • Computational Privacy: Two Fundamental Problems at NEC Germany, 2014

• Towards Intelligent Location-Privacy Preserving Mechanisms at LIX, Ecole Polytechnique, 2013 • Towards Intelligent Location-Privacy Preserving Mechanisms at MSR Cambridge, UK, 2013 • Quantifying Location Privacy at Palo Alto Research Center (PARC), USA, 2011

• Quantifying Location Privacy at Computer Science Department, UIUC, USA, 2011 • Location Privacy: Threats and Countermeasures at COSIC, K.U.Leuven, Belgium, 2010 • Location-Privacy Metrics at WINLAB, ECE Department, Rutgers University, NJ, USA, 2009 • Anonymous Routing in Mobile Networks at INRIA, LIX, Ecole Polytechnique, France, 2006

TOOLS

Location Privacy and Mobility Meter (LPM) is an open-source tool for learning and analyzing pre-dictability and similarity of human mobilities as well as quantifying privacy of mobile users against identification, localization, proximity disclosure, and tracking attacks. The tool is used as a benchmark for comparing different location-privacy preserving mechanisms. The software plus documentations are available online through: http://icapeople.epfl.ch/rshokri/lpm.

Quantify Web Search Privacy Web Search Privacy Meter is an open-source tool developed in Python to model web search behavior of users and quantify their privacy using differ-ent query obfuscation mechanisms. The software is available online for download through:

https://edit.ethz.ch/syssec/people/agervais/Web-Search-Privacy-Quantification-Framework

References

Related documents

Our conclusion that place effects are minimal for white men of all education levels is derived from combining our fundamental assumption regarding labor markets for highly

Removal of iron and manganese ions in the treatment of ground water samples using RH-57 carbon derived from chemical activation of rice husk is significant and meaningful and can

Trainee clinical psychologists reported a higher incidence of negative childhood experiences than PhD students and this was found to be associated with

These include the Gauteng Department of Agricultural and Rural Development (GDARD), Mariette Liefferink (Federation for a Sustainable Environment), Ingrid Watson (Centre for

To demonstrate the impact of higher initial loan rates on expected holding period return given different sets of assumptions, the spreadsheet shown in Table 1 was recalculated

Outcomes of interest were differences in CT median income, age, BMI, and gender be- tween HRA and THA patients, as well as differences in CT median income, age, and BMI between

Selected couple-parent is crossed each other to generate a new chromosome (off- spring) containing a gene-combination from both parents. The new chromosome is then used

We employ a general equilibrium framework to demonstrate that: (i) the asset location puzzle is purely a risk neutral phenomenon that disappears with the introduction