Claudiu Perta
TitleCited byYear
Signals from the crowd: uncovering social relationships through smartphone probes
MV Barbera, A Epasto, A Mei, VC Perta, J Stefa
Proceedings of the 2013 conference on Internet measurement conference, 265-276, 2013
1132013
Clone2clone (c2c): Peer-to-peer networking of smartphones on the cloud
S Kosta, VC Perta, J Stefa, P Hui, A Mei
Presented as part of the 5th {USENIX} Workshop on Hot Topics in Cloud Computing, 2013
512013
Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system
MV Barbera, S Kosta, A Mei, VC Perta, J Stefa
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2355-2363, 2014
402014
A first look at user activity on tinder
G Tyson, VC Perta, H Haddadi, MC Seto
Proceedings of the 2016 IEEE/ACM International Conference on Advances in …, 2016
362016
A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients
VC Perta, MV Barbera, G Tyson, H Haddadi, A Mei
Proceedings on Privacy Enhancing Technologies 2015 (1), 77-91, 2015
212015
Clonedoc: exploiting the cloud to leverage secure group collaboration mechanisms for smartphones
S Kosta, VC Perta, J Stefa, P Hui, A Mei
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013
202013
Exploring http header manipulation in-the-wild
G Tyson, S Huang, F Cuadrado, I Castro, VC Perta, A Sathiaseelan, ...
Proceedings of the 26th International Conference on World Wide Web, 451-458, 2017
152017
Cdroid: Towards a cloud-integrated mobile operating system
MV Barbera, S Kosta, A Mei, VC Perta, J Stefa
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2013
152013
CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10)
MV Barbera, A Epasto, A Mei, S Kosta, VC Perta, J Stefa
Sep, 2013
82013
Exploiting delay patterns for user ips identification in cellular networks
VC Perta, MV Barbera, A Mei
International Symposium on Privacy Enhancing Technologies Symposium, 224-243, 2014
72014
CRAWDAD dataset sapienza/probe-requests (v. 2013-09-10). Retrieved 10 November, 2015
MV Barbera, A Epasto, A Mei, S Kosta, VC Perta, J Stefa
52013
A Needle in the Haystack-Delay Based User Identification in Cellular Networks
MV Barbera, S Bronzini, A Mei, VC Perta
International Conference on Passive and Active Network Measurement, 265-267, 2014
2014
A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients
H Haddadi, V Perta
De Gruyter, 0
The system can't perform the operation now. Try again later.
Articles 1–13