2025
Pivot: Panoramic-Image-Based VR User Authentication against Side-Channel Attacks.
ACM Trans. Multim. Comput. Commun. Appl., February, 2025
TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network.
CoRR, January, 2025
Practical Cybersecurity Education: A Course Model Using Experiential Learning Theory.
Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1, 2025
Enhancing Cybersecurity Education using Scoring Engines: A Practical Approach to Hands-On Learning and Feedback.
Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1, 2025
2024
BBS: A secure and autonomous blockchain-based big-data sharing system.
J. Syst. Archit., 2024
I'm Spartacus, No, I'm Spartacus: Measuring and Understanding LLM Identity Confusion.
CoRR, 2024
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers.
Proceedings of the 33rd USENIX Security Symposium, 2024
Relation Mining Under Local Differential Privacy.
Proceedings of the 33rd USENIX Security Symposium, 2024
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
mmEar: Push the Limit of COTS mmWave Eavesdropping on Headphones.
Proceedings of the IEEE INFOCOM 2024, 2024
Deanonymizing Ethereum Users behind Third-Party RPC Services.
Proceedings of the IEEE INFOCOM 2024, 2024
Samba: Detecting SSL/TLS API Misuses in IoT Binary Applications.
Proceedings of the IEEE INFOCOM 2024, 2024
CORE: Transaction Commit-Controlled Release of Private Data Over Blockchains.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
On Building Automation Systems and Attacks.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Unified View of IoT and CPS Security and Privacy.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Evaluating the Efficacy of Productivity Tools in Engineering Education.
Proceedings of the IEEE Global Engineering Education Conference, 2024
RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
A Comprehensive and Long-term Evaluation of Tor V3 Onion Services.
Proceedings of the IEEE INFOCOM 2023, 2023
A Deep Learning Framework with Pruning RoI Proposal for Dental Caries Detection in Panoramic X-ray Images.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
On False Data Injection Attack against Building Automation Systems.
Proceedings of the International Conference on Computing, Networking and Communications, 2023
A Greedy Algorithm-Based Self-Training Pipeline for Expansion of Dental Caries Dataset.
Proceedings of the IEEE International Conference on E-health Networking, 2023
FITS: Matching Camera Fingerprints Subject to Software Noise Pollution.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Towards Incentive for Electrical Vehicles Demand Response With Location Privacy Guaranteeing in Microgrids.
IEEE Trans. Dependable Secur. Comput., 2022
On Security of TrustZone-M-Based IoT Systems.
IEEE Internet Things J., 2022
fASLR: Function-Based ASLR via TrustZone-M and MPU for Resource-Constrained IoT Systems.
IEEE Internet Things J., 2022
A Unified View of IoT And CPS Security and Privacy.
CoRR, 2022
On False Data Injection Attack against Building Automation Systems.
CoRR, 2022
Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery.
Proceedings of the IEEE INFOCOM 2022, 2022
FUME: Fuzzing Message Queuing Telemetry Transport Brokers.
Proceedings of the IEEE INFOCOM 2022, 2022
Towards an Efficient Defense against Deep Learning based Website Fingerprinting.
Proceedings of the IEEE INFOCOM 2022, 2022
Implication of Animation on Android Security.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
BBS: A Blockchain Big-Data Sharing System.
Proceedings of the IEEE International Conference on Communications, 2022
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems.
Proceedings of the Computer Security - ESORICS 2022, 2022
On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
2021
Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes.
J. Syst. Archit., 2021
On Manually Reverse Engineering Communication Protocols of Linux-Based IoT Systems.
IEEE Internet Things J., 2021
BOSS: A Blockchain Off-State Sharing System.
CoRR, 2021
Prison Break of Android Reflection Restriction and Defense.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
On Private Data Collection of Hyperledger Fabric.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
On Automating BACnet Device Discovery and Property Identification.
Proceedings of the ICC 2021, 2021
2020
Co-Detection of crowdturfing microblogs and spammers in online social networks.
World Wide Web, 2020
STIR: A Smart and Trustworthy IoT System Interconnecting Legacy IR Devices.
IEEE Internet Things J., 2020
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020
BLESS: A BLE Application Security Scanning Framework.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
SIC<sup>2</sup>: Securing Microcontroller Based IoT Devices with Low-cost Crypto Coprocessors.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
On Runtime Software Security of TrustZone-M Based IoT Devices.
Proceedings of the IEEE Global Communications Conference, 2020
2019
Analysis of and defense against crowd-retweeting based spam in social networks.
World Wide Web, 2019
CIM: Camera in Motion for Smartphone Authentication.
IEEE Trans. Inf. Forensics Secur., 2019
Your clicks reveal your secrets: a novel user-device linking method through network and visual data.
Multim. Tools Appl., 2019
On Location Privacy-Preserving Online Double Auction for Electric Vehicles in Microgrids.
IEEE Internet Things J., 2019
On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode.
CoRR, 2019
Novel and Practical SDN-based Traceback Technique for Malicious Traffic over Anonymous Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Building a Low-Cost and State-of-the-Art IoT Security Hands-On Laboratory.
Proceedings of the Internet of Things. A Confluence of Many Disciplines, 2019
Microcontroller Based IoT System Firmware Security: Case Studies.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Toward Drone Privacy via Regulating Altitude and Payload.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Towards Deep Learning-Based Detection Scheme with Raw ECG Signal for Wearable Telehealth Systems.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
On Misconception of Hardware and Cost in IoT Security and Privacy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
I Know What You Enter on Gear VR.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
2018
SODA: Strategy-Proof Online Double Auction Scheme for Multimicrogrids Bidding.
IEEE Trans. Syst. Man Cybern. Syst., 2018
User Differentiated Verifiable File Search on the Cloud.
IEEE Trans. Serv. Comput., 2018
On the Security and Data Integrity of Low-Cost Sensor Networks for Air Quality Monitoring.
Sensors, 2018
IoT Security: An End-to-End View and Case Study.
CoRR, 2018
A Survey on Big Data Market: Pricing, Trading and Protection.
IEEE Access, 2018
Turning Legacy IR Devices into Smart IoT Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
ABC: Enabling Smartphone Authentication with Built-in Camera.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
SecT: A Lightweight Secure Thing-Centered IoT Communication System.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Towards Incentive Mechanism for Taxi Services Allocation with Privacy Guarantee.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
SecTap: Secure Back of Device Input System for Mobile Devices.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
A Case Study of Security and Privacy Threats from Augmented Reality (AR).
Proceedings of the 2018 International Conference on Computing, 2018
Towards 3D Deployment of UAV Base Stations in Uneven Terrain.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
A Framework for Detecting and Countering Android UI Attacks via Inspection of IPC Traffic.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
The Peeping Eye in the Sky.
Proceedings of the IEEE Global Communications Conference, 2018
2017
Privacy Enhancing Keyboard: Design, Implementation, and Usability Testing.
Wirel. Commun. Mob. Comput., 2017
A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems.
IEEE Trans. Veh. Technol., 2017
Proc. Priv. Enhancing Technol., 2017
Guest Editorial Special Issue on Security and Privacy in Cyber-Physical Systems.
IEEE Internet Things J., 2017
Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System.
IEEE Internet Things J., 2017
Sto2Auc: A Stochastic Optimal Bidding Strategy for Microgrids.
IEEE Internet Things J., 2017
A User Incentive-Based Scheme Against Dishonest Reporting in Privacy-Preserving Mobile Crowdsensing Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
3D vision attack against authentication.
Proceedings of the IEEE International Conference on Communications, 2017
An End-to-End View of IoT Security and Privacy.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones.
IEEE Trans. Mob. Comput., 2016
Password Extraction via Reconstructed Wireless Mouse Trajectory.
IEEE Trans. Dependable Secur. Comput., 2016
On the security of binary arithmetic coding based on interval shrinking.
Multim. Tools Appl., 2016
Disjoint multi mobile agent itinerary planning for big data analytics.
EURASIP J. Wirel. Commun. Netw., 2016
Data integrity attacks against the distributed real-time pricing in the smart grid.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016
Secure fingertip mouse for mobile devices.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
On crowd-retweeting spamming campaign in social networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
On Malware Leveraging the Android Accessibility Framework.
EAI Endorsed Trans. Ubiquitous Environ., 2015
Tor Bridge Discovery: Extensive Analysis and Large-scale Empirical Evaluation.
IEEE Trans. Parallel Distributed Syst., 2015
TorWard: Discovery, Blocking, and Traceback of Malicious Traffic Over Tor.
IEEE Trans. Inf. Forensics Secur., 2015
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems.
IEEE Trans. Computers, 2015
A cloud computing based system for cyber security management.
Int. J. Parallel Emergent Distributed Syst., 2015
De-anonymizing and countermeasures in anonymous communication networks.
IEEE Commun. Mag., 2015
On Computing Multi-Agent Itinerary Planning in Distributed Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Rise of the Indoor Crowd: Reconstruction of Building Interior View via Mobile Crowdsourcing.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015
Secondary Market Mobile Users for Internet Access.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015
Blind Recognition of Text Input on Mobile Devices via Natural Language Processing.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015
Rise of Mini-Drones: Applications and Issues.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015
On stochastic optimal bidding strategy for microgrids.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Pricing and revenue sharing in secondary market of mobile internet access.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
INCOR: Inter-flow Network Coding based Opportunistic Routing in wireless mesh networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
A Systematic Key Management mechanism for practical Body Sensor Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
Towards Neural Network Based Malware Detection on Android Mobile Devices.
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014
HAWK: An Unmanned Mini-Helicopter-Based Aerial Wireless Kit for Localization.
IEEE Trans. Mob. Comput., 2014
Blind Recognition of Touched Keys: Attack and Countermeasures.
CoRR, 2014
Providing service assurance in mobile opportunistic networks.
Comput. Networks, 2014
Security threats to mobile multimedia applications: Camera-based attacks on mobile phones.
IEEE Commun. Mag., 2014
Network coding versus traditional routing in adversarial wireless networks.
Ad Hoc Networks, 2014
Customizable, scalable and reliable community-based mobile health interventions.
Proceedings of the 4th ACM MobiHoc workshop on Pervasive wireless healthcare, 2014
TorWard: Discovery of malicious traffic over Tor.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
On simulation studies of cyber attacks against LTE networks.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Analyzing mobile phone vulnerabilities caused by camera.
Proceedings of the IEEE Global Communications Conference, 2014
Privacy-preserving outsourcing of image global feature detection.
Proceedings of the IEEE Global Communications Conference, 2014
Optimizing Aggregate Query Processing in Cloud Data Warehouses.
Proceedings of the Data Management in Cloud, Grid and P2P Systems, 2014
Towards verifiable file search on the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Blind Recognition of Touched Keys on Mobile Devices.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
CollabAssure: A Collaborative Market Based Data Service Assurance Framework for Mobile Devices.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
A Loose-Virtual-Clustering-Based Routing for Power Heterogeneous MANETs.
IEEE Trans. Veh. Technol., 2013
How to block Tor's hidden bridges: detecting methods and countermeasures.
J. Supercomput., 2013
Novel Packet Size-Based Covert Channel Attacks against Anonymizer.
IEEE Trans. Computers, 2013
Blind detection of spread spectrum flow watermarks.
Secur. Commun. Networks, 2013
On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic Traceback.
Int. J. Networked Distributed Comput., 2013
Optimizing Communication for Multi-Join Query Processing in Cloud Data Warehouses.
Int. J. Grid High Perform. Comput., 2013
Protocol-level attacks against Tor.
Comput. Networks, 2013
Effective RSS Sampling for Forensic Wireless Localization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
How Privacy Leaks From Bluetooth Mouse?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Protocol-level hidden server discovery.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Theory underlying measurement of AOA with a rotating directional antenna.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
SmartParcel: A Collaborative Data Sharing Framework for Mobile Operating Systems.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
On effective localization attacks against Internet Threat monitors.
Proceedings of IEEE International Conference on Communications, 2013
2012
A New Cell-Counting-Based Attack Against Tor.
IEEE/ACM Trans. Netw., 2012
The Digital Marauder's Map: A WiFi Forensic Positioning Tool.
IEEE Trans. Mob. Comput., 2012
HLLS: A History information based Light Location Service for MANETs.
Comput. Networks, 2012
A context-aware scheme for privacy-preserving location-based services.
Comput. Networks, 2012
Aerial Localization with Smartphone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012
A novel network delay based side-channel attack: Modeling and defense.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Extensive analysis and large-scale empirical evaluation of tor bridge discovery.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
When Digital Forensic Research Meets Laws.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Fingerprint attack against touch-enabled devices.
Proceedings of the SPSM'12, 2012
How privacy leaks from bluetooth mouse?
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
A Cross-Layer Approach Handling Link Asymmetry for Wireless Mesh Access Networks.
IEEE Trans. Veh. Technol., 2011
On sampling signal strength for localization using a directional antenna.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Classification of commercial and personal profiles on MySpace.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Protection of query privacy for continuous location based services.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
A novel packet size based covert channel attack against anonymizer.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Long PN code based DSSS watermarking.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Identifying mobiles hiding behind wireless routers.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Proceedings of IEEE International Conference on Communications, 2011
Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011
2010
Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks.
IEEE Trans. Syst. Man Cybern. Part B, 2010
Correlation-Based Traffic Analysis Attacks on Anonymity Networks.
IEEE Trans. Parallel Distributed Syst., 2010
Self-Disciplinary Worms and Countermeasures: Modeling and Analysis.
IEEE Trans. Parallel Distributed Syst., 2010
Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures.
IEEE Trans. Computers, 2010
Generic network forensic data acquisition from household and small business wireless routers.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Barrier coverage with sensors of limited mobility.
Proceedings of the 11th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2010
Cyber Crime Scene Investigations (C²SI) through Cloud Computing.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
3DLoc: Three Dimensional Wireless Localization Toolkit.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
HLLS: A History Information Based Light Location Service for MANETs.
Proceedings of IEEE International Conference on Communications, 2010
gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity.
Proceedings of the Decision and Game Theory for Security, 2010
2009
An Invisible Localization Attack to Internet Threat Monitors.
IEEE Trans. Parallel Distributed Syst., 2009
TCP Performance in Flow-Based Mix Networks: Modeling and Analysis.
IEEE Trans. Parallel Distributed Syst., 2009
Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services.
Proceedings of the Wireless Algorithms, 2009
Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment.
Proceedings of the Wireless Algorithms, 2009
CAP: A Context-Aware Privacy Protection System for Location-Based Services.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
The Digital Marauder's Map: A New Threat to Location Privacy.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
A new cell counter based attack against tor.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Network Security Fundamentals.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks.
Int. J. Netw. Secur., 2008
Energy-efficient target detection in sensor networks using line proxies.
Int. J. Commun. Syst., 2008
On performance bottleneck of anonymous communication networks.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008
iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
A New Replay Attack Against Anonymous Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008
On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Analysis of flow-correlation attacks in anonymity network.
Int. J. Secur. Networks, 2007
DSSS-Based Flow Marking Technique for Invisible Traceback.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Detecting worms via mining dynamic program execution.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
On TCP Performance in Flow-Based Mix Networks.
Proceedings of the Third IEEE International Symposium on Dependable, 2007
2006
On Recognizing Virtual Honeypots and Countermeasures.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
2005
Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality Measures.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
On Flow Marking Attacks in Wireless Anonymous Communication Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005
SAS: A Scalar Anonymous Communication System.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Anonymity analysis of mix networks against flow-correlation attacks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
A quantitative analysis of anonymous communications.
IEEE Trans. Reliab., 2004
On Flow Correlation Attacks and Countermeasures in Mix Networks.
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures.
Proceedings of the Information Hiding, 6th International Workshop, 2004
2003
Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks.
Proceedings of the 32nd International Conference on Parallel Processing (ICPP 2003), 2003
On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003
On Countermeasures to Traffic Analysis Attacks.
Proceedings of the IEEE Systems, 2003
2002
An Optimal Strategy for Anonymous Communication Protocols.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
2001
NetCamo: camouflaging network traffic for QoS-guaranteed mission critical applications.
IEEE Trans. Syst. Man Cybern. Part A, 2001