Xun Gong
Affiliations:- Google Security & Privacy, Safe Browsing team, Mountain View, CA, USA
- University of Illinois at Urbana-Champaign, Department of Electrical Engineering, IL, USA
According to our database1,
Xun Gong
authored at least 18 papers
between 2010 and 2016.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2016
Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers.
IEEE/ACM Trans. Netw., 2016
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
2013
Invisible Flow Watermarks for Channels With Dependent Substitution, Deletion, and Bursty Insertion Errors.
IEEE Trans. Inf. Forensics Secur., 2013
CoRR, 2013
Proceedings of the IEEE International Conference on Acoustics, 2013
PnP: improving web browsing performance over tor using web resource prefetch-and-push.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IEEE Trans. Signal Process., 2012
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
CoRR, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Invisible flow watermarks for channels with dependent substitution and deletion errors.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Information theoretic analysis of side channel information leakage in FCFS schedulers.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011
2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010