Nikita Borisov
Affiliations:- University of Illinois at Urbana-Champaign, IL, USA
According to our database1,
Nikita Borisov
authored at least 107 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
DiProber: Estimating Relays Capacities in Underloaded Anonymous Communication Networks.
Proceedings of the American Control Conference, 2024
2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
2022
Proc. Priv. Enhancing Technol., 2022
DiProber: Using Dual Probing to Estimate Tor Relay Capacities in Underloaded Networks.
CoRR, 2022
2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Applied Networking Research Workshop, 2019
2018
Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures.
Proc. Priv. Enhancing Technol., 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 7th USENIX Workshop on Free and Open Communications on the Internet, 2017
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Smartphone Fingerprinting Via Motion Sensors: Analyzing Feasiblity at Large-Scale and Studing Real Usage Patterns.
CoRR, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
2015
Proc. Priv. Enhancing Technol., 2015
2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
J. Syst. Softw., 2013
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.
Comput. Secur., 2013
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
PnP: improving web browsing performance over tor using web resource prefetch-and-push.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
ACM Trans. Inf. Syst. Secur., 2012
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
CoRR, 2012
CoRR, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
DECENT: A decentralized architecture for enforcing privacy in online social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Cachet: a decentralized architecture for privacy preserving social networking with caching.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Improving Security and Performance in the Tor Network through Tunable Path Selection.
IEEE Trans. Dependable Secur. Comput., 2011
CoRR, 2011
Stegobot: construction of an unobservable communication network leveraging social behavior
CoRR, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the IEEE International Conference on Acoustics, 2011
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
EASiER: encryption-based access control in social networks with efficient revocation.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Cirripede: circumvention infrastructure using router redirection with plausible deniability.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
KSII Trans. Internet Inf. Syst., 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of IEEE International Conference on Communications, 2010
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 8th international conference on Peer-to-peer systems, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the IEEE International Conference on Acoustics, 2009
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing (P2P 2006), 2006
2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Proceedings of the Network and Distributed System Security Symposium, 2005
2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
2002
Proceedings of the General Track: 2002 USENIX Annual Technical Conference, 2002
Proceedings of the Network and Distributed System Security Symposium, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
2001
Comput. Networks, 2001
Proceedings of the MOBICOM 2001, 2001