Author of the publication

Forgive Us our SYNs: Technical and Ethical Considerations for Measuring Internet Filtering.

, , and . NS Ethics@SIGCOMM, page 3. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DrugCentral: online drug compendium., , , , , , , and . Nucleic Acids Res., 45 (Database-Issue): D932-D939 (2017)An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message., and . FOCI @ USENIX Security Symposium, USENIX Association, (2019)An analysis of automatic image filtering on WeChat Moments., , and . FOCI @ USENIX Security Symposium, USENIX Association, (2018)Self-Healing Algorithms for Byzantine Faults, , and . CoRR, (2012)Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC., , , , , , and . First Monday, (2013)Measuring Decentralization of Chinese Keyword Censorship via Mobile Games., , and . FOCI @ USENIX Security Symposium, USENIX Association, (2017)Measuring QQMail's automated email censorship in China., and . FOCI@SIGCOMM, page 8-15. ACM, (2021)Original SYN: Finding machines hidden behind firewalls., , and . INFOCOM, page 720-728. IEEE, (2015)Self-Healing of Byzantine Faults., , and . SSS, volume 8255 of Lecture Notes in Computer Science, page 98-112. Springer, (2013)Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels., , , and . PAM, volume 8362 of Lecture Notes in Computer Science, page 109-118. Springer, (2014)