From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?, , , , , , , , и . CCS, стр. 3399-3401. ACM, (2022)A First Look at Generating Website Fingerprinting Attacks via Neural Architecture Search., , , , и . WPES@CCS, стр. 173-178. ACM, (2023)Extending C2 Traffic Detection Methodologies: From TLS 1.2 to TLS 1.3-enabled Malware., , , , и . RAID, стр. 181-196. ACM, (2024)Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China., , и . WWW, стр. 472-483. ACM / IW3C2, (2021)Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention., , и . AsiaCCS, стр. 1154-1167. ACM, (2022)Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels., и . DICG@Middleware, стр. 37-42. ACM, (2020)Effective Detection of Multimedia Protocol Tunneling using Machine Learning., , и . USENIX Security Symposium, стр. 169-185. USENIX Association, (2018)Work in Progress: A Glance at Social Media Self-Censorship in North America., и . EuroS&P Workshops, стр. 609-618. IEEE, (2023)SpotProxy: Rediscovering the Cloud for Censorship Circumvention., , , , , , и . USENIX Security Symposium, USENIX Association, (2024)FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications., , , , , и . NDSS, The Internet Society, (2021)