Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

StegoTorus: a camouflage proxy for the Tor anonymity system., , , , , , and . CCS, page 109-120. ACM, (2012)Bootstrapping Communications into an Anti-Censorship System., , , , , , , , and . FOCI, USENIX Association, (2012)ICLab: A Global, Longitudinal Internet Censorship Measurement Platform., , , , , , and . CoRR, (2019)Darwin's Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models., , , and . WPES@CCS, page 103-108. ACM, (2022)I Still Know What You Visited Last Summer: Leaking Browsing History via User Interaction and Side Channel Attacks., , , and . IEEE Symposium on Security and Privacy, page 147-161. IEEE Computer Society, (2011)The C Preprocessor, and . (2005)ICLab: A Global, Longitudinal Internet Censorship Measurement Platform., , , , , , and . SP, page 135-151. IEEE, (2020)Self-Supervised Euphemism Detection and Identification for Content Moderation., , , , , , and . SP, page 229-246. IEEE, (2021)How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation., , , , and . Internet Measurement Conference, page 203-217. ACM, (2018)Topics of Controversy: An Empirical Analysis of Web Censorship Lists., , , and . Proc. Priv. Enhancing Technol., 2017 (1): 42-61 (2017)