Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A First Look at Generating Website Fingerprinting Attacks via Neural Architecture Search., , , , and . WPES@CCS, page 173-178. ACM, (2023)Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?, , , , , , , , and . CCS, page 3399-3401. ACM, (2022)Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China., , and . WWW, page 472-483. ACM / IW3C2, (2021)Stegozoa: Enhancing WebRTC Covert Channels with Video Steganography for Internet Censorship Circumvention., , and . AsiaCCS, page 1154-1167. ACM, (2022)Towards a Scalable Censorship-Resistant Overlay Network based on WebRTC Covert Channels., and . DICG@Middleware, page 37-42. ACM, (2020)Effective Detection of Multimedia Protocol Tunneling using Machine Learning., , and . USENIX Security Symposium, page 169-185. USENIX Association, (2018)Work in Progress: A Glance at Social Media Self-Censorship in North America., and . EuroS&P Workshops, page 609-618. IEEE, (2023)SpotProxy: Rediscovering the Cloud for Censorship Circumvention., , , , , , and . USENIX Security Symposium, USENIX Association, (2024)FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications., , , , , and . NDSS, The Internet Society, (2021)Stargaze: A LEO Constellation Emulator for Security Experimentation., , and . CPSIOTSEC@CCS, page 47-53. ACM, (2022)