Author of the publication

Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems.

, , and . S&P, page 116-130. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knockoff-Guided Feature Selection via A Single Pre-trained Reinforced Agent., , , , , and . CoRR, (2024)On the billing vulnerabilities of SIP-based VoIP systems., , , and . Comput. Networks, 54 (11): 1837-1847 (2010)Identifying Linear Traces of the Han Dynasty Great Wall in Dunhuang Using Gaofen-1 Satellite Remote Sensing Imagery and the Hough Transform., , , , , , , and . Remote. Sens., 11 (22): 2711 (2019)Determining oil slick thickness using hyperspectral remote sensing in the Bohai Sea of China., , , , and . Int. J. Digit. Earth, 6 (1): 76-93 (2013)JUN and PDGFRA as Crucial Candidate Genes for Childhood Autism Spectrum Disorder., , , , , , , and . Frontiers Neuroinformatics, (2022)An Energy Efficient STDP-Based SNN Architecture With On-Chip Learning., , , , , , , , and . IEEE Trans. Circuits Syst. I Regul. Pap., 69 (12): 5147-5158 (2022)On the Feasibility of Detecting Software Supply Chain Attacks.. MILCOM, page 458-463. IEEE, (2021)CloudImmu: Transparent Protection of Binary Applications in the Cloud.. MILCOM, page 309-315. IEEE, (2021)Research on the lakes change in Ejin alluvial fan from long time-series landsat images., , , , and . IGARSS, page 374-377. IEEE, (2010)CIMNet: A Contextual Information Mining Network for Real-time Instance Segmentation., , , , , , , and . CCRIS, page 100-108. ACM, (2023)