Author of the publication

Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic.

, , , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing., , , , and . IEEE Access, (2019)A Privacy-Preserving Data Feed Scheme for Smart Contracts., , , , and . IEICE Trans. Inf. Syst., 105-D (2): 195-204 (2022)MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality., , , , , , , , , and 1 other author(s). PST, page 1-7. IEEE, (2023)Geometric Searchable Encryption Without False Positive And Its Applications., , , , and . Comput. J., 66 (9): 2155-2168 (September 2023)Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention., , , , , , and . CoRR, (2023)CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts., , , , , , , and . ACISP, volume 13494 of Lecture Notes in Computer Science, page 449-468. Springer, (2022)Privacy Protection for Medical Data Sharing in Smart Healthcare., , , , , , and . ACM Trans. Multim. Comput. Commun. Appl., 16 (3s): 100:1-100:18 (2020)Permission less Block chains and Secure Logging., , and . IEEE ICBC, page 56-60. IEEE, (2019)Fully Discover the Balance of Lightning Network Payment Channels., , , and . WASA (1), volume 12937 of Lecture Notes in Computer Science, page 159-173. Springer, (2021)Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds., , , , , and . ACM TUR-C, page 164-165. ACM, (2023)