Author of the publication

No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.

, , , , and . CoRR, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks., , , and . CoRR, (2020)Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques., and . CoRR, (2018)Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers., , , , , and . CoRR, (2013)Data Security in Unattended Wireless Sensor Networks., , , , and . IEEE Trans. Computers, 58 (11): 1500-1511 (2009)OliVaR: Improving Olive Variety Recognition using Deep Neural Networks., , , , , , , , and . CoRR, (2023)Minerva: A File-Based Ransomware Detector., , , , and . CoRR, (2023)Fault-Tolerant Reference Counting for Garbage Collection in Distributed Systems., and . Comput. J., 34 (6): 503-513 (1991)Reliable detection of compressed and encrypted data., , , , and . Neural Comput. Appl., 34 (22): 20379-20393 (2022)Distributed data source verification in wireless sensor networks., , , and . Inf. Fusion, 10 (4): 342-353 (2009)DOLOS: A Novel Architecture for Moving Target Defense., , , , , and . IEEE Trans. Inf. Forensics Secur., (2023)