Skip to main content
Go to the home page of the European Commission (opens in new window)
English en
CORDIS - EU research results
CORDIS

Reliable biomeTric tEchNologies to asSist Police authorities in cOmbating terrorism and oRganized crime

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Interim Version of Dissemination, Communication, Exploitation and Stakeholders Engagement Report (opens in new window)

Description of all the activities and actions carried out for scientific dissemination, communication and community building.

Initial Version of Dissemination, Communication, Exploitation and Stakeholders Engagement Report (opens in new window)

Description of all the activities and actions carried out for scientific dissemination, communication and community building.

Publications

Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages (opens in new window)

Author(s): Ho, Björn; Chen, Huanhuan; Shi, Zeshun; Liang, Kaitai
Publisher: Springer
DOI: 10.1007/978-3-031-70903-6_6

Large Language Models in Modern Forensic Investigations: Harnessing the Power of Generative Artificial Intelligence in Crime Resolution and Suspect Identification (opens in new window)

Author(s): Nikolakopoulos, Anastasios; Evangelatos, Spyridon; Veroni, Eleni; Chasapas, Konstantinos; Gousetis, Nikolaos; Apostolaras, Apostolos; Nikolopoulos, Christos D.; Korakis, Thanasis
Publisher: IEEE
DOI: 10.1109/EEITE61750.2024.10654427

A User-Centered Interface Enabling Secure Multimodal Biometric Search in Cross-Border Law Enforcement Operations (opens in new window)

Author(s): Kyriaki Miniadou, Eirini Kyriakou, Asterios Leonidis, Maria Korozi, Constantine Stephanidis
Published in: Communications in Computer and Information Science, HCI International 2025 – Late Breaking Papers, 2026
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-032-12773-0_15

PrivDNN: A Secure Multi-Party Computation Framework for Deep Learning using Partial DNN Encryption (opens in new window)

Author(s): Ren, Liangqin; Liu, Zeyan; Li, Fengjun; Liang, Kaitai; Li, Zhu; Luo, Bo
Publisher: PoPETs
DOI: 10.56553/POPETS-2024-0089

File-Injection Attacks on Searchable Encryption, Based on Binomial Structures (opens in new window)

Author(s): Langhout, Tjard; Chen, Huanhuan; Liang, Kaitai
Publisher: Springer
DOI: 10.1007/978-3-031-70896-1_21

MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering (opens in new window)

Author(s): Wang, Rui; Wang, Xingkai; Chen, Huanhuan; Decouchant, Jeremie; Picek, Stjepan; Laoutaris, Nikolaos; Liang, Kaitai
Publisher: ACM
DOI: 10.1145/3700422

EMOBAF: Multi-objective Stealthy and Robust Black-box Backdoor Attack in Dual Domains via Evolutionary Algorithm (opens in new window)

Author(s): Dazhuang Liu, Yanqi Qiao, Rui Wang, Kaitai Liang, Georgios Smaragdakis
Published in: Proceedings 2025 Network and Distributed System Security Symposium, 2025
Publisher: Internet Society
DOI: 10.14722/NDSS.2025.241061

Inject Less, Recover More: Unlocking the Potential of Document Recovery in Injection Attacks Against SSE (opens in new window)

Author(s): Zhang, Manning; Shi, Zeshun; Chen, Huanhuan; Liang, Kaitai
Publisher: IEEE
DOI: 10.1109/CSF61375.2024.00029

Enhancing International Security A Secure Biometric Data Sharing Framework for Effective Cross-Border Crime and Terrorism Prevention (opens in new window)

Author(s): Benos, Georgios; Koutsoukos, Konstantinos; Symvoulidis, Chrysostomos; Drakoulis, Dimitrios
Publisher: IEEE
DOI: 10.1109/BIGDATA62323.2024.10825067

Enhancing Secure Cross-Border Collaboration among Law Enforcement Agencies for Facial Biometric Search (opens in new window)

Author(s): Miniadou, Kyriaki; Leonidis, Asterios; Papadopoulos, Georgios Th.; Stephanidis, Constantine
Publisher: IEEE
DOI: 10.1109/EEITE61750.2024.10654447

CCA-1 Secure Updatable Encryption with Adaptive Security (opens in new window)

Author(s): Huanhuan Chen, Yao Jiang Galteland & Kaitai Liang
Published in: 2023
Publisher: Springer
DOI: 10.1007/978-981-99-8733-7_12

Query Recovery from Easy to Hard: Jigsaw Attack against SSE (opens in new window)

Author(s): Nie, Hao; Wang, Wei; Xu, Peng; Zhang, Xianglong; Yang, Laurence T.; Liang, Kaitai
Publisher: USENIX
DOI: 10.48550/ARXIV.2403.01155

Encrypted Biometric Search: A Deep Learning Approach to Scalable and Secure Cross-Border Data Exchange. (opens in new window)

Author(s): Miniadou, Kyriaki; Leonidis, Asterios; Papadopoulos, Georgios Th.; Stephanidis, Constantine
Publisher: IEEE
DOI: 10.1109/BIGDATA62323.2024.10825332

A Secure and Trustworthy Biometric Data Ecosystem for Cross-border Suspect Identification (opens in new window)

Author(s): Kyriakou, Katerina; Apostolaras, Apostolos; Velentzas, Polychronis; Benos, Georgios; Koutsoukos, Konstantinos; Symvoulidis, Chrysostomos; Liang, Kaitai; Shi, Zeshun; Leonidis, Asterios; Miniadou, Kyriaki; Veroni, Eleni; Evangelatos, Spyridon; Papadopoulos, Georgios Th.; Korakis, Thanasis
Publisher: IEEE
DOI: 10.1109/BIGDATA62323.2024.10826113

d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases (opens in new window)

Author(s): Liu, Dongli; Wang, Wei; Xu, Peng; Yang, Laurence T.; Luo, Bo; Liang, Kaitai
Publisher: USENIX
DOI: 10.48550/ARXIV.2403.01182

Biometrics Data Space: Ensuring Trustworthy and Secure Data Exchange for Suspect Identification (opens in new window)

Author(s): Kyriakou, Katerina; Apostolaras, Apostolos; Velentzas, Polychronis; Syrigos, Ilias; Maglavera, Stavroula; Evangelatos, Spyridon; Veroni, Eleni; Korakis, Thanasis
Publisher: IEEE
DOI: 10.1109/EEITE61750.2024.10654448

Power of union: Federated honey password vaults against differential attack (opens in new window)

Author(s): Peng Xu, Tingting Rao, Wei Wang, Zhaojun Lu, Kaitai Liang
Published in: Computers & Security, Issue 157, 2025, ISSN 0167-4048
Publisher: Elsevier BV
DOI: 10.1016/J.COSE.2025.104592

Stealthy Backdoor Attack Against Federated Learning Through Frequency Domain by Backdoor Neuron Constraint and Model Camouflage (opens in new window)

Author(s): Qiao, Yanqi; Liu, Dazhuang; Wang, Rui; Liang, Kaitai
Published in: IEEE Journal on Emerging and Selected Topics in Circuits and Systems, ISSN 2156-3365
Publisher: IEEE
DOI: 10.1109/JETCAS.2024.3450527

Keyword Search Shareable Encryption for Fast and Secure Data Replication (opens in new window)

Author(s): Wang, Wei; Liu, Dongli; Xu, Peng; Yang, Laurence Tianruo; Liang, Kaitai
Published in: IEEE Transactions on Information Forensics and Security, ISSN 1556-6021
Publisher: IEEE
DOI: 10.1109/TIFS.2023.3306941

Exploring the Potential of Offline LLMs in Data Science: A Study on Code Generation for Data Analysis (opens in new window)

Author(s): Anastasios Nikolakopoulos, Antonios Litke, Alexandros Psychas, Eleni Veroni, Theodora Varvarigou
Published in: IEEE Access, Issue 13, 2025, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/ACCESS.2025.3556973

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0