Nicholas Hopper
Orcid: 0000-0003-2536-9587Affiliations:
- University of Minnesota, USA
According to our database1,
Nicholas Hopper
authored at least 90 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., January, 2024
Laserbeak: Evolving Website Fingerprinting Attacks With Attention and Multi-Channel Feature Representation.
IEEE Trans. Inf. Forensics Secur., 2024
2023
CoRR, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
2020
2019
p1-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning.
Proc. Priv. Enhancing Technol., 2019
2018
Proc. Priv. Enhancing Technol., 2018
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Financial Cryptography and Data Security, 2018
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
2016
Proc. Priv. Enhancing Technol., 2016
E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes With Economic Incentives.
CoRR, 2016
ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
IET Inf. Secur., 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Financial Cryptography and Data Security, 2014
2013
IEEE Trans. Mob. Comput., 2013
Attacking the kad network - real world evaluation and high fidelity simulation using DVN.
Secur. Commun. Networks, 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Keep your friends close: Incorporating trust into social network-based Sybil defenses.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of the Financial Cryptography and Data Security, 2011
2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Int. J. Inf. Sec., 2009
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design.
Proceedings of the 2009 ACM Workshop on Privacy in the Electronic Society, 2009
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the Privacy Enhancing Technologies, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2007
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
Proceedings of the Computer Security, 2007
2006
On the effectiveness of <i>k</i>;-anonymity against traffic analysis and surveillance.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006
2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
2004
IACR Cryptol. ePrint Arch., 2004
2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2001
Proceedings of the Advances in Cryptology, 2001
1999
Proceedings of the 1999 Congress on Evolutionary Computation, 1999