default search action
Gergely Biczók
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Adrián Pekár, Árpád László Makara, Gergely Biczók:
Incremental federated learning for traffic flow classification in heterogeneous data scenarios. Neural Comput. Appl. 36(32): 20401-20424 (2024) - [c36]Marcell Frank, Balázs Pejó, Gergely Biczók:
Effective Anonymous Messaging: The Role of Altruism. GameSec 2024: 240-259 - [i14]Ziyuan Huang, Gergely Biczók, Mingyan Liu:
Incentivizing Secure Software Development: The Role of Liability (Waiver) and Audit. CoRR abs/2401.08476 (2024) - [i13]Shuaishuai Liu, Gergely Biczók:
IDPFilter: Mitigating Interdependent Privacy Issues in Third-Party Apps. CoRR abs/2405.01411 (2024) - [i12]Marcell Frank, Balazs Pejo, Gergely Biczók:
Effective Anonymous Messaging: the Role of Altruism. CoRR abs/2408.14980 (2024) - [i11]Gergely Benko, Gergely Biczók:
The Cyber Alliance Game: How Alliances Influence Cyber-Warfare. CoRR abs/2410.05953 (2024) - 2023
- [j16]Balázs Pejó, Gergely Biczók:
Quality Inference in Federated Learning With Secure Aggregation. IEEE Trans. Big Data 9(5): 1430-1437 (2023) - [j15]András Gazdag, Szilvia Lestyán, Mina Remeli, Gergely Ács, Tamás Holczer, Gergely Biczók:
Privacy pitfalls of releasing in-vehicle network data. Veh. Commun. 39: 100565 (2023) - [c35]Mustafa Özger, István Gódor, Anders Nordlöw, Thomas Heyn, Sreekrishna Pandi, Ian Peterson, Alberto Viseras, Jaroslav Holis, Christian Raffelsberger, Andreas Kercek, Bengt Mölleryd, László Toka, Gergely Biczók, Robby de Candido, Felix Laimer, Udo Tarmann, Dominic Schupke, Cicek Cavdar:
6G for Connected Sky: A Vision for Integrating Terrestrial and Non-Terrestrial Networks. EuCNC/6G Summit 2023: 711-716 - [i10]Mustafa Özger, István Gódor, Anders Nordlöw, Thomas Heyn, Sreekrishna Pandi, Ian Peterson, Alberto Viseras, Jaroslav Holis, Christian Raffelsberger, Andreas Kercek, Bengt Mölleryd, László Toka, Gergely Biczók, Robby de Candido, Felix Laimer, Udo Tarmann, Dominic Schupke, Cicek Cavdar:
6G for Connected Sky: A Vision for Integrating Terrestrial and Non-Terrestrial Networks. CoRR abs/2305.04271 (2023) - 2022
- [j14]Szilvia Lestyán, Gergely Ács, Gergely Biczók:
In Search of Lost Utility: Private Location Data. Proc. Priv. Enhancing Technol. 2022(3): 354-372 (2022) - [j13]Balázs Pejó, Gergely Biczók:
Games in the Time of COVID-19: Promoting Mechanism Design for Pandemic Response. ACM Trans. Spatial Algorithms Syst. 8(3): 1-23 (2022) - 2021
- [c34]Shuaishuai Liu, Barbara Herendi, Gergely Biczók:
Interdependent Privacy Issues Are Pervasive Among Third-Party Applications. DPM/CBT@ESORICS 2021: 70-86 - [c33]András Földvári, Gergely Biczók, Imre Kocsis, László Gönczy, András Pataricza:
Impact Assessment of IT Security Breaches in Cyber-Physical Systems: Short paper. LADC 2021: 1-4 - [c32]Enio Marku, Gergely Biczók, Colin Boyd:
SafeLib: a practical library for outsourcing stateful network functions securely. NetSoft 2021: 244-252 - [c31]Irina Chiscop, András Gazdag, Joost Bosman, Gergely Biczók:
Detecting Message Modification Attacks on the CAN Bus with Temporal Convolutional Networks. VEHITS 2021: 488-496 - [i9]Irina Chiscop, András Gazdag, Joost W. Bosman, Gergely Biczók:
Detecting message modification attacks on the CAN bus with Temporal Convolutional Networks. CoRR abs/2106.08692 (2021) - [i8]Balázs Pejó, Gergely Biczók:
Games in the Time of COVID-19: Promoting Mechanism Design for Pandemic Response. CoRR abs/2106.12329 (2021) - [i7]Balázs Pejó, Gergely Biczók, Gergely Ács:
Measuring Contributions in Privacy-Preserving Federated Learning. ERCIM News 2021(126) (2021) - 2020
- [j12]Enio Marku, Gergely Biczók, Colin Boyd:
Securing Outsourced VNFs: Challenges, State of the Art, and Future Directions. IEEE Commun. Mag. 58(7): 72-77 (2020) - [c30]Gergely Biczók, Máté Horváth, Szilveszter Szebeni, István Lám, Levente Buttyán:
The Cost of Having Been Pwned: A Security Service Provider's Perspective. ETAA@ESORICS 2020: 154-167 - [c29]Balázs Pejó, Gergely Biczók:
Corona Games: Masks, Social Distancing and Mechanism Design. COVID@SIGSPATIAL 2020: 24-31 - [i6]Balazs Pejo, Gergely Biczók:
Corona Games: Masks, Social Distance and Mechanism Design. CoRR abs/2006.06674 (2020) - [i5]Szilvia Lestyán, Gergely Ács, Gergely Biczók:
Privacy-preserving release of mobility data: a clean-slate approach. CoRR abs/2008.01665 (2020)
2010 – 2019
- 2019
- [j11]Balazs Pejo, Qiang Tang, Gergely Biczók:
Together or Alone: The Price of Privacy in Collaborative Learning. Proc. Priv. Enhancing Technol. 2019(2): 47-65 (2019) - [c28]Iraklis Symeonidis, Jessica Schroers, Mustafa A. Mustafa, Gergely Biczók:
Towards Systematic Specification of Non-Functional Requirements for Sharing Economy Systems. DCOSS 2019: 423-429 - [c27]Szilvia Lestyan, Gergely Ács, Gergely Biczók, Zsolt Szalay:
Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification. ICISSP 2019: 136-145 - [c26]Mina Remeli, Szilvia Lestyán, Gergely Ács, Gergely Biczók:
Automatic Driver Identification from In-Vehicle Network Logs. ITSC 2019: 1150-1157 - [c25]Enio Marku, Gergely Biczók, Colin Boyd:
Towards protected VNFs for multi-operator service delivery. NetSoft 2019: 19-23 - [i4]Szilvia Lestyan, Gergely Ács, Gergely Biczók, Zsolt Szalay:
Extracting Vehicle Sensor Signals from CAN Logs for Driver Re-identification. CoRR abs/1902.08956 (2019) - [i3]Mina Remeli, Szilvia Lestyan, Gergely Ács, Gergely Biczók:
Automatic Driver Identification from In-Vehicle Network Logs. CoRR abs/1911.09508 (2019) - 2018
- [j10]Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel:
Collateral damage of Facebook third-party applications: a comprehensive study. Comput. Secur. 77: 179-208 (2018) - [c24]Balázs Pejó, Qiang Tang, Gergely Biczók:
The Price of Privacy in Collaborative Learning. CCS 2018: 2261-2263 - [r1]Gergely Ács, Gergely Biczók, Claude Castelluccia:
Privacy-Preserving Release of Spatio-Temporal Density. Handbook of Mobile Data Privacy 2018: 307-335 - [i2]Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel:
Collateral Damage of Facebook Applications: a Comprehensive Study. IACR Cryptol. ePrint Arch. 2018: 285 (2018) - 2017
- [j9]Gergely Biczók, Manos Dramitinos, László Toka, Poul E. Heegaard, Håkon Lønsethagen:
Manufactured by Software: SDN-Enabled Multi-Operator Composite Services with the 5G Exchange. IEEE Commun. Mag. 55(4): 80-86 (2017) - [j8]Riccardo Guerzoni, Ishan Vaishnavi, David Pérez-Caparrós, Alex Galis, Francesco Tusa, Paolo Monti, Andrea Sgambelluri, Gergely Biczók, Balázs Sonkoly, László Toka, Aurora Ramos, Javier Melian, Olivier Dugeon, Filippo Cugini, Barbara Martini, Paola Iovanna, Giovanni Giuliani, Ricardo Figueiredo, Luis Miguel Contreras Murillo, Carlos Jesus Bernardos, Cristina Santana, Róbert Szabó:
Analysis of end-to-end multi-domain management and orchestration frameworks for software defined infrastructures: an architectural survey. Trans. Emerg. Telecommun. Technol. 28(4) (2017) - [p1]Mateus Augusto Silva Santos, Alireza Ranjbar, Gergely Biczók, Barbara Martini, Francesco Paolucci:
Security Requirements for Multi-operator Virtualized Network and Service Orchestration for 5G. Guide to Security in SDN and NFV 2017: 253-272 - 2016
- [c23]Poul E. Heegaard, Gergely Biczók, László Toka:
Sharing is Power: Incentives for Information Exchange in Multi-Operator Service Delivery. GLOBECOM 2016: 1-7 - [c22]Gergely Biczók, Yanling Chen, Katina Kralevska, Harald Øverby:
Combining forward error correction and network coding in bufferless networks: A case study for optical packet switching. HPSR 2016: 61-68 - [c21]Gergely Biczók, Balázs Sonkoly, Nikolett Bereczky, Colin Boyd:
Private VNFs for collaborative multi-operator service delivery: An architectural case. NOMS 2016: 1249-1252 - [c20]Iraklis Symeonidis, Fatemeh Shirazi, Gergely Biczók, Cristina Pérez-Solà, Bart Preneel:
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence. SEC 2016: 194-208 - 2015
- [c19]László Toka, Gergely Biczók:
On pricing online data backup. INFOCOM Workshops 2015: 564-569 - 2014
- [j7]Atef Abdelkefi, Yuming Jiang, Bjarne Emil Helvik, Gergely Biczók, Alexandru Calu:
Assessing the service quality of an Internet path through end-to-end measurement. Comput. Networks 70: 30-44 (2014) - [c18]Gergely Biczók, Santiago Diez Martinez, Thomas Jelle, John Krogstie:
Navigating MazeMap: Indoor human mobility, spatio-logical ties and future potential. PerCom Workshops 2014: 266-271 - [i1]Gergely Biczók, Santiago Diez Martinez, Thomas Jelle, John Krogstie:
Navigating MazeMap: indoor human mobility, spatio-logical ties and future potential. CoRR abs/1401.5297 (2014) - 2013
- [j6]Márton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly, Gergely Biczók:
Incrementally upgradable data center architecture using hyperbolic tessellations. Comput. Networks 57(6): 1373-1393 (2013) - [j5]László Gyarmati, András Gulyás, Balázs Sonkoly, Tuan Anh Trinh, Gergely Biczók:
Free-scaling your data center. Comput. Networks 57(8): 1758-1773 (2013) - [j4]Péter Babarczi, Gergely Biczók, Harald Øverby, János Tapolcai, Péter Soproni:
Realization strategies of dedicated path protection: A bandwidth cost perspective. Comput. Networks 57(9): 1974-1990 (2013) - [c17]Gergely Biczók, Pern Hui Chia:
Interdependent Privacy: Let Me Share Your Data. Financial Cryptography 2013: 338-353 - 2012
- [j3]András Gulyás, Attila Korösi, Dávid Szabó, Gergely Biczók:
On greedy network formation. SIGMETRICS Perform. Evaluation Rev. 40(2): 49-52 (2012) - [c16]Anastasius Gavras, Andrzej Bak, Gergely Biczók, Piotr Gajowniczek, András Gulyás, Halid Hrasnica, Pedro Martinez-Julia, Felician Németh, Chrysa Papagianni, Symeon Papavassiliou, Marcin Pilarski, Antonio Fernandez Gómez-Skarmeta:
Heterogeneous Testbeds, Tools and Experiments -Measurement Requirements Perspective. FP7 FIRE/EULER 2012: 139-158 - [c15]Harald Øverby, Gergely Biczók, Péter Babarczi, János Tapolcai:
Cost comparison of 1+1 path protection schemes: A case for coding. ICC 2012: 3067-3072 - [c14]Márton Csernai, András Gulyás, Attila Korösi, Balázs Sonkoly, Gergely Biczók:
Poincaré: A Hyperbolic Data Center Architecture. ICDCS Workshops 2012: 8-16 - 2011
- [j2]Albrecht J. Fehske, Gerhard P. Fettweis, Jens Malmodin, Gergely Biczók:
The global footprint of mobile communications: The ecological and economic perspective. IEEE Commun. Mag. 49(8): 55-62 (2011) - [j1]Gergely Biczók, László Toka, András Gulyás, Tuan Anh Trinh, Attila Vidács:
Incentivizing the global wireless village. Comput. Networks 55(2): 439-456 (2011) - 2010
- [b1]Gergely Biczók:
Árazási, ösztönző és torlódáskezelési mechanizmusok heterogén hálózatokban. Budapest University of Technology and Economics, Hungary, 2010 - [c13]Dirk Trossen, Gergely Biczók:
Not paying the truck driver: differentiated pricing for the future internet. ReArch@CoNEXT 2010: 1:1-1:6 - [c12]Balázs Lajtha, Gergely Biczók, Róbert Szabó:
Enabling P2P Gaming with Network Coding. EUNICE 2010: 76-86 - [c11]Luis Sánchez, Oliver Blume, Manuel J. Gonzalez, Gergely Biczók, Dieter Ferling, István Gódor:
EARTH: Paving the Way for Future Energy Efficient Broadband Wireless Networks. MONAMI 2010: 326-339 - [c10]Gunther Auer, István Gódor, László Hévizi, Muhammad Ali Imran, Jens Malmodin, Péter Fazekas, Gergely Biczók, Hauke Holtkamp, Dietrich Zeller, Oliver Blume, Rahim Tafazolli:
Enablers for Energy Efficient Wireless Networks. VTC Fall 2010: 1-5
2000 – 2009
- 2009
- [c9]Gergely Biczók, László Toka, Attila Vidács, Tuan Anh Trinh:
On incentives in global wireless communities. U-NET@CoNEXT 2009: 1-6 - [c8]Gergely Biczók, Tuan Anh Trinh:
A User-Influenced Pricing Mechanism for Internet Access. ICQT 2009: 48-60 - [c7]Gergely Biczók, Gábor Németh, Peter Tarján, Ferenc Kubinszky, Andras Veres:
SpeedDetect: A Simple TCP Extension for Handling Sudden Capacity Increase. NGI 2009: 1-9 - 2008
- [c6]Gergely Biczók, Sándor Kardos, Tuan Anh Trinh:
Pricing internet access for disloyal users: a game-theoretic analysis. NetEcon 2008: 55-60 - 2007
- [c5]Gábor Németh, Peter Tarján, Gergely Biczók, Ferenc Kubinszky, Andras Veres:
Measuring high-speed TCP performance during mobile handovers. LCN 2007: 599-612 - 2005
- [c4]Gergely Biczók, Rolland Vida:
On Faster and fair lookup operation in content-addressable networks. CoNEXT 2005: 226-227 - [c3]Balázs Kovács, Rolland Vida, Gergely Biczók:
Hierarchical architecture for managed wireless networks. CoNEXT 2005: 260-261 - [c2]Kristóf Fodor, Dániel Krupp, Gergely Biczók, János L. Gerevich, Krisztián Sugár:
SAMSON: Smart Address Management in Self-Organizing Networks. EUNICE 2005: 285-298 - [c1]Miklós Aurél Rónai, Kristóf Fodor, Gergely Biczók, Zoltán Richard Turányi, András Gergely Valkó:
MAIPAN - Middleware for Application Interconnection in Personal Area Networks. MobiQuitous 2005: 494-498
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint