Author of the publication

Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems.

, , and . S&P, page 116-130. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying Linear Traces of the Han Dynasty Great Wall in Dunhuang Using Gaofen-1 Satellite Remote Sensing Imagery and the Hough Transform., , , , , , , and . Remote. Sens., 11 (22): 2711 (2019)On the billing vulnerabilities of SIP-based VoIP systems., , , and . Comput. Networks, 54 (11): 1837-1847 (2010)An Energy Efficient STDP-Based SNN Architecture With On-Chip Learning., , , , , , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 69 (12): 5147-5158 (2022)Knockoff-Guided Feature Selection via A Single Pre-trained Reinforced Agent., , , , , and . CoRR, (2024)JUN and PDGFRA as Crucial Candidate Genes for Childhood Autism Spectrum Disorder., , , , , , , and . Frontiers Neuroinformatics, (2022)Determining oil slick thickness using hyperspectral remote sensing in the Bohai Sea of China., , , , and . Int. J. Digit. Earth, 6 (1): 76-93 (2013)Roving Bugnet: Distributed Surveillance Threat and Mitigation., and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 39-50. Springer, (2009)Artificial Malware Immunization Based on Dynamically Assigned Sense of Self., and . ISC, volume 6531 of Lecture Notes in Computer Science, page 166-180. Springer, (2010)Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and Mitigation., and . SecureComm, volume 127 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 104-121. Springer, (2013)On the effectiveness of low latency anonymous network in the presence of timing attack., and . DSN, page 429-438. IEEE Computer Society, (2009)