Author of the publication

A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay.

, , , , , and . ISCC, page 1369-1375. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash., , , and . ICC, page 1-7. IEEE, (2019)CAS: Content Attribution System for Network Forensics., , , , and . ISCTCS, volume 520 of Communications in Computer and Information Science, page 129-136. Springer, (2014)A Multi-Level Analysis Framework in Network Security Situation Awareness., , and . ITQM, volume 17 of Procedia Computer Science, page 530-536. Elsevier, (2013)A Bigram based Real Time DNS Tunnel Detection Approach., , , , and . ITQM, volume 17 of Procedia Computer Science, page 852-860. Elsevier, (2013)Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario., , , , , and . ICEA, page 205-210. ACM, (2021)2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks., , , , , and . ISCC, page 1-7. IEEE, (2020)Towards misdirected email detection based on multi-attributes., , , , and . ISCC, page 796-802. IEEE Computer Society, (2015)PrUE: Distilling Knowledge from Sparse Teacher Networks., , , and . ECML/PKDD (3), volume 13715 of Lecture Notes in Computer Science, page 102-117. Springer, (2022)Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications., , , , , and . DSC, page 91-98. IEEE, (2021)Mining Open-Source Cyber Threat Intelligence with Distant Supervision from the Web., , , and . DSC, page 76-82. IEEE, (2021)