Author of the publication

Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems.

, , and . S&P, page 116-130. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TruXy: Trusted Storage Cloud for Scientific Workflows., , , , , , , and . IEEE Trans. Cloud Computing, 5 (3): 428-442 (2017)Malytics: A Malware Detection Scheme., , , and . CoRR, (2018)Cost-Efficient Stream Processing on the Cloud., , , and . CLOUD, page 209-213. IEEE, (2019)FlexFlow: A Flexible Flow Control Policy Specification Framework., , and . DBSec, volume 142 of IFIP, page 358-371. Kluwer/Springer, (2003)P2P-Based Web Text Information Retrieval., and . APWeb, volume 3399 of Lecture Notes in Computer Science, page 247-252. Springer, (2005)Estimating the Number of Nodes in a Mobile Wireless Network.. GLOBECOM, page 1-5. IEEE, (2010)APDP: Attack-Proof Personalized Differential Privacy Model for a Smart Home., , , , , , and . IEEE Access, (2019)Flow-Sensitive Type-Based Heap Cloning (Artifact)., , and . Dagstuhl Artifacts Ser., 6 (2): 01:1-01:2 (2020)Contrasting the Performance of Eight Satellite-Based GPP Models in Water-Limited and Temperature-Limited Grassland Ecosystems., , , , , , and . Remote. Sens., 11 (11): 1333 (2019)A Framework of MLaaS for Facilitating Adaptive Micro Learning through Open Education Resources in Mobile Environment., , , , and . Int. J. Web Serv. Res., 14 (4): 50-74 (2017)