Author of the publication

Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China.

, , and . WWW, page 472-483. ACM / IW3C2, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Measuring Real-World Accuracies and Biases in Modeling Password Guessability., , , , , , , , , and . USENIX Security Symposium, page 463-481. USENIX Association, (2015)JoBS: Joint Buffer Management and Scheduling for Differentiated Services., and . IWQoS, volume 2092 of Lecture Notes in Computer Science, page 404-418. Springer, (2001)Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment., , and . USENIX Security Symposium, page 5199-5216. USENIX Association, (2023)A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior., , , , , , , , , and . CHI, page 2903-2912. ACM, (2015)ICLab: A Global, Longitudinal Internet Censorship Measurement Platform., , , , , , and . SP, page 135-151. IEEE, (2020)Self-Supervised Euphemism Detection and Identification for Content Moderation., , , , , , and . SP, page 229-246. IEEE, (2021)Moving Forward, Building an Ethics Community (Panel Statements)., , , and . Financial Cryptography Workshops, volume 7126 of Lecture Notes in Computer Science, page 178-183. Springer, (2011)This is your data on drugs: lessons computer security can learn from the drug war., , and . NSPW, page 143-149. ACM, (2010)Email typosquatting., and . Internet Measurement Conference, page 419-431. ACM, (2017)Practical Recommendations for Stronger, More Usable Passwords Combining Minimum-strength, Minimum-length, and Blocklist Requirements., , , and . CCS, page 1407-1426. ACM, (2020)