Author of the publication

Multipath TCP traffic diversion attacks and countermeasures.

, , , , and . ICNP, page 1-10. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding., , and . Proc. Priv. Enhancing Technol., 2020 (1): 65-82 (2020)Measurement and Early Detection of Third-Party Application Abuse on Twitter., and . WWW, page 448-458. ACM, (2019)Aragorn: A Privacy-Enhancing System for Mobile Cameras., , , , , and . Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 7 (4): 181:1-181:31 (December 2023)A Traffic Flow Approach to Early Detection of Gathering Events: Comprehensive Results., , , , , and . ACM Trans. Intell. Syst. Technol., 8 (6): 74:1-74:24 (2017)FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting., , and . CoRR, (2021)A Girl Has A Name, And It's ... Adversarial Authorship Attribution for Deobfuscation., , , and . CoRR, (2022)WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking., , , , and . CoRR, (2021)Benchmarking Adversarial Robustness of Compressed Deep Learning Models., , , , and . CoRR, (2023)Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors., , and . CoRR, (2020)WebGraph: Capturing Advertising and Tracking Information Flows for Robust Blocking., , , , and . USENIX Security Symposium, page 2875-2892. USENIX Association, (2022)