default search action
BibTeX records: Eric Chan-Tin
@inproceedings{DBLP:conf/acisp/MoranSHKC24, author = {Madeline Moran and Arrianna Szymczak and Anna Hart and Shelia Kennison and Eric Chan{-}Tin}, editor = {Tianqing Zhu and Yannan Li}, title = {Deep Dive on Relationship Between Personality and Password Creation}, booktitle = {Information Security and Privacy - 29th Australasian Conference, {ACISP} 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14896}, pages = {393--411}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5028-3\_20}, doi = {10.1007/978-981-97-5028-3\_20}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MoranSHKC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2405-01963, author = {Firuz Juraev and Mohammed Abuhamad and Eric Chan{-}Tin and George K. Thiruvathukal and Tamer Abuhmed}, title = {From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings}, journal = {CoRR}, volume = {abs/2405.01963}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2405.01963}, doi = {10.48550/ARXIV.2405.01963}, eprinttype = {arXiv}, eprint = {2405.01963}, timestamp = {Sun, 09 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2405-01963.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/KhanGKMASHFC23, author = {Muhammad T. Khan and Rachel Gordon and Nimra Khan and Madeline Moran and Mohammed Abuhamad and Loretta J. Stalans and Jeffrey Huntsinger and Jennifer Forestal and Eric Chan{-}Tin}, editor = {Minh Ho{\`{a}}ng H{\`{a}} and Xingquan Zhu and My T. Thai}, title = {Identification and Analysis of the Spread of \{Mis\}information on Social Media}, booktitle = {Computational Data and Social Networks - 12th International Conference, CSoNet 2023, Hanoi, Vietnam, December 11-13, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14479}, pages = {361--372}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0669-3\_33}, doi = {10.1007/978-981-97-0669-3\_33}, timestamp = {Sat, 17 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csonet/KhanGKMASHFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/svcc/ReyesDCMCAK23, author = {Daisy Reyes and Eno Dynowski and Taryn Chovan and John Mikos and Eric Chan{-}Tin and Mohammed Abuhamad and Shelia Kennison}, title = {WebTracker: Real Webbrowsing Behaviors}, booktitle = {Silicon Valley Cybersecurity Conference, {SVCC} 2023, San Jose, CA, USA, May 17-19, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SVCC56964.2023.10164930}, doi = {10.1109/SVCC56964.2023.10164930}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/svcc/ReyesDCMCAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/svcc/ShaoHYCA23, author = {Yong Shao and Kenneth Hernandez and Kia Yang and Eric Chan{-}Tin and Mohammed Abuhamad}, title = {Lightweight and Effective Website Fingerprinting Over Encrypted {DNS}}, booktitle = {Silicon Valley Cybersecurity Conference, {SVCC} 2023, San Jose, CA, USA, May 17-19, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SVCC56964.2023.10165086}, doi = {10.1109/SVCC56964.2023.10165086}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/svcc/ShaoHYCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmcsa/AhlgrenRSCTK23, author = {Isaac Ahlgren and Victor Rakotondranoro and Yasin N. Silva and Eric Chan{-}Tin and George K. Thiruvathukal and Neil Klingensmith}, title = {Userland Containers for Mobile Systems}, booktitle = {Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications, HotMobile 2023, Newport Beach, California, February 22-23, 2023}, pages = {141}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3572864.3581588}, doi = {10.1145/3572864.3581588}, timestamp = {Tue, 14 Feb 2023 11:37:11 +0100}, biburl = {https://dblp.org/rec/conf/wmcsa/AhlgrenRSCTK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hpdc/2023snta, editor = {Massimo Cafaro and Eric Chan{-}Tin and Jerry Chou and Jinoh Kim}, title = {Proceedings of the 2023 on Systems and Network Telemetry and Analytics, {SNTA} 2023, Orlando, FL, USA, 20 June 2023}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589012}, doi = {10.1145/3589012}, timestamp = {Thu, 03 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpdc/2023snta.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-06496, author = {Eldor Abdukhamidov and Mohammed Abuhamad and Simon S. Woo and Eric Chan{-}Tin and Tamer Abuhmed}, title = {Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems}, journal = {CoRR}, volume = {abs/2307.06496}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.06496}, doi = {10.48550/ARXIV.2307.06496}, eprinttype = {arXiv}, eprint = {2307.06496}, timestamp = {Mon, 24 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-06496.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-11906, author = {Eldor Abdukhamidov and Mohammed Abuhamad and Simon S. Woo and Eric Chan{-}Tin and Tamer Abuhmed}, title = {Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks}, journal = {CoRR}, volume = {abs/2307.11906}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.11906}, doi = {10.48550/ARXIV.2307.11906}, eprinttype = {arXiv}, eprint = {2307.11906}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-11906.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/WagnerBKC22, author = {Anne Wagner and Anna Bakas and Shelia Kennison and Eric Chan{-}Tin}, title = {Comparing Online Surveys for Cybersecurity: {SONA} and MTurk}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {30}, pages = {2}, year = {2022}, url = {https://doi.org/10.4108/eai.8-2-2022.173334}, doi = {10.4108/EAI.8-2-2022.173334}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/WagnerBKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/WagnerBRKC22, author = {Anne Wagner and Anna Bakas and Daisy Reyes and Shelia Kennison and Eric Chan{-}Tin}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {The Personalities of Social Media Posts and Photos}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1231--1233}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3527291}, doi = {10.1145/3488932.3527291}, timestamp = {Tue, 24 May 2022 13:40:31 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/WagnerBRKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/Chan-TinK22, author = {Eric Chan{-}Tin and Shelia Kennison}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {CySSS '22: 1st International Workshop on Cybersecurity and Social Sciences}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1267--1268}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517203}, doi = {10.1145/3488932.3517203}, timestamp = {Tue, 24 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/Chan-TinK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cysss/SunAACA22, author = {Qirui Sun and Mohammed Abuhamad and Eldor Abdukhamidov and Eric Chan{-}Tin and Tamer Abuhmed}, editor = {Eric Chan{-}Tin and Shelia Kennison}, title = {MLxPack: Investigating the Effects of Packers on ML-based Malware Detection Systems Using Static and Dynamic Traits}, booktitle = {CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, Nagasaki, Japan, 30 May 2022}, pages = {11--18}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494108.3522768}, doi = {10.1145/3494108.3522768}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cysss/SunAACA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpdc/Chan-TinSJRK22, author = {Eric Chan{-}Tin and Loretta J. Stalans and Spencer Johnston and Daisy Reyes and Shelia Kennison}, editor = {Massimo Cafaro and Jerry Chou and Jinoh Kim and Alex Sim}, title = {Predicting Phishing Victimization: Roles of Protective and Vulnerable Strategies and Decision-Making Styles}, booktitle = {SNTA@HPDC 2022, Fifth International Workshop on Systems and Network Telemetry and Analytics, Minneapolis, MN, USA, 30 June 2022}, pages = {35--42}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3526064.3534107}, doi = {10.1145/3526064.3534107}, timestamp = {Sat, 17 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpdc/Chan-TinSJRK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cysss/2022, editor = {Eric Chan{-}Tin and Shelia Kennison}, title = {CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, Nagasaki, Japan, 30 May 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494108}, doi = {10.1145/3494108}, isbn = {978-1-4503-9177-1}, timestamp = {Wed, 25 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cysss/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-15926, author = {Eldor Abdukhamidov and Mohammed Abuhamad and Simon S. Woo and Eric Chan{-}Tin and Tamer Abuhmed}, title = {Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning}, journal = {CoRR}, volume = {abs/2211.15926}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.15926}, doi = {10.48550/ARXIV.2211.15926}, eprinttype = {arXiv}, eprint = {2211.15926}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-15926.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/BakasWJKC21, author = {Anna Bakas and Anne Wagner and Spencer Johnston and Shelia Kennison and Eric Chan{-}Tin}, title = {Impact of Personality Types and Matching Messaging on Password Strength}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {8}, number = {28}, pages = {e1}, year = {2021}, url = {https://doi.org/10.4108/eai.1-6-2021.170012}, doi = {10.4108/EAI.1-6-2021.170012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sesa/BakasWJKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/AbdukhamidovAJC21, author = {Eldor Abdukhamidov and Mohammed Abuhamad and Firuz Juraev and Eric Chan{-}Tin and Tamer AbuHmed}, editor = {David Mohaisen and Ruoming Jin}, title = {AdvEdge: Optimizing Adversarial Perturbations Against Interpretable Deep Learning}, booktitle = {Computational Data and Social Networks - 10th International Conference, CSoNet 2021, Virtual Event, November 15-17, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13116}, pages = {93--105}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91434-9\_9}, doi = {10.1007/978-3-030-91434-9\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csonet/AbdukhamidovAJC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eicc/WagnerBKC21, author = {Anne Wagner and Anna Bakas and Shelia Kennison and Eric Chan{-}Tin}, editor = {Martin Gilje Jaatun and Geir M. K{\o}ien and Oksana Kulyk}, title = {A Comparison of {SONA} and MTurk for Cybersecurity Surveys}, booktitle = {{EICC} '21: European Interdisciplinary Cybersecurity Conference, Virtual Event, Romania, November 10-11, 2021}, pages = {87--88}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3487405.3487657}, doi = {10.1145/3487405.3487657}, timestamp = {Thu, 25 Nov 2021 12:07:01 +0100}, biburl = {https://dblp.org/rec/conf/eicc/WagnerBKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuangHGCG20, author = {Zonghao Huang and Rui Hu and Yuanxiong Guo and Eric Chan{-}Tin and Yanmin Gong}, title = {{DP-ADMM:} ADMM-Based Distributed Learning With Differential Privacy}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1002--1012}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2931068}, doi = {10.1109/TIFS.2019.2931068}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuangHGCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/automotiveUI/AbegazCKT20, author = {Brook W. Abegaz and Eric Chan{-}Tin and Neil Klingensmith and George K. Thiruvathukal}, title = {Addressing Rogue Vehicles by Integrating Computer Vision, Activity Monitoring, and Contextual Information}, booktitle = {Adjunct Proceedings of the 12th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2020, Virtual Event, Washington, DC, USA, September 21-22, 2020}, pages = {62--64}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3409251.3411724}, doi = {10.1145/3409251.3411724}, timestamp = {Thu, 27 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/automotiveUI/AbegazCKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpdc/Chan-Tin20, author = {Eric Chan{-}Tin}, editor = {Massimo Cafaro and Jinoh Kim and Alex Sim}, title = {2020 Vision for Web Privacy}, booktitle = {Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics, SNTA@HPDC 2020, Stockholm, Sweden, June 23, 2020}, pages = {31}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3391812.3396267}, doi = {10.1145/3391812.3396267}, timestamp = {Fri, 19 Jun 2020 12:28:20 +0200}, biburl = {https://dblp.org/rec/conf/hpdc/Chan-Tin20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/CuiCC20, author = {Weiqi Cui and Tao Chen and Eric Chan{-}Tin}, title = {More Realistic Website Fingerprinting Using Deep Learning}, booktitle = {40th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2020, Singapore, November 29 - December 1, 2020}, pages = {333--343}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICDCS47774.2020.00058}, doi = {10.1109/ICDCS47774.2020.00058}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcs/CuiCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sesa/CuiYGC19, author = {Weiqi Cui and Jiangmin Yu and Yanmin Gong and Eric Chan{-}Tin}, title = {Efficient, Effective, and Realistic Website Fingerprinting Mitigation}, journal = {{EAI} Endorsed Trans. Security Safety}, volume = {6}, number = {20}, pages = {e2}, year = {2019}, url = {https://doi.org/10.4108/eai.29-1-2019.161977}, doi = {10.4108/EAI.29-1-2019.161977}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sesa/CuiYGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CuiCFCSC19, author = {Weiqi Cui and Tao Chen and Christian Fields and Julianna Chen and Anthony Sierra and Eric Chan{-}Tin}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Revisiting Assumptions for Website Fingerprinting Attacks}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {328--339}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329802}, doi = {10.1145/3321705.3329802}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CuiCFCSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChenCC19, author = {Tao Chen and Weiqi Cui and Eric Chan{-}Tin}, editor = {Songqing Chen and Kim{-}Kwang Raymond Choo and Xinwen Fu and Wenjing Lou and Aziz Mohaisen}, title = {Measuring Tor Relay Popularity}, booktitle = {Security and Privacy in Communication Networks - 15th {EAI} International Conference, SecureComm 2019, Orlando, FL, USA, October 23-25, 2019, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {304}, pages = {386--405}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37228-6\_19}, doi = {10.1007/978-3-030-37228-6\_19}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChenCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ChenFC18, author = {Tao Chen and Michael Farcasin and Eric Chan{-}Tin}, title = {Smartphone passcode prediction}, journal = {{IET} Inf. Secur.}, volume = {12}, number = {5}, pages = {431--437}, year = {2018}, url = {https://doi.org/10.1049/iet-ifs.2017.0606}, doi = {10.1049/IET-IFS.2017.0606}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ChenFC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/Chan-TinR18, author = {Eric Chan{-}Tin and Rakesh Ravishankar}, title = {The case for {HTTPS:} measuring overhead and impact of certificate authorities}, journal = {Int. J. Secur. Networks}, volume = {13}, number = {4}, pages = {261--269}, year = {2018}, url = {https://doi.org/10.1504/IJSN.2018.10015823}, doi = {10.1504/IJSN.2018.10015823}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/Chan-TinR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/Chan-TinKK18, author = {Eric Chan{-}Tin and Taejoon Kim and Jinoh Kim}, title = {Website Fingerprinting Attack Mitigation Using Traffic Morphing}, booktitle = {38th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2018, Vienna, Austria, July 2-6, 2018}, pages = {1575--1578}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICDCS.2018.00174}, doi = {10.1109/ICDCS.2018.00174}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/Chan-TinKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/CuiYGC18, author = {Weiqi Cui and Jiangmin Yu and Yanmin Gong and Eric Chan{-}Tin}, title = {Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks}, booktitle = {38th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2018, Vienna, Austria, July 2-6, 2018}, pages = {1579--1584}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICDCS.2018.00175}, doi = {10.1109/ICDCS.2018.00175}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/CuiYGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-10101, author = {Zonghao Huang and Rui Hu and Eric Chan{-}Tin and Yanmin Gong}, title = {{DP-ADMM:} ADMM-based Distributed Learning with Differential Privacy}, journal = {CoRR}, volume = {abs/1808.10101}, year = {2018}, url = {http://arxiv.org/abs/1808.10101}, eprinttype = {arXiv}, eprint = {1808.10101}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-10101.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/KhethavathTC17, author = {Praveenkumar Khethavath and Johnson P. Thomas and Eric Chan{-}Tin}, title = {Towards an efficient distributed cloud computing architecture}, journal = {Peer-to-Peer Netw. Appl.}, volume = {10}, number = {5}, pages = {1152--1168}, year = {2017}, url = {https://doi.org/10.1007/s12083-016-0468-x}, doi = {10.1007/S12083-016-0468-X}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/KhethavathTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/YuFC17, author = {Jiangmin Yu and Michael Farcasin and Eric Chan{-}Tin}, title = {Wireless Interference Prediction for Embedded Health Devices}, booktitle = {26th International Conference on Computer Communication and Networks, {ICCCN} 2017, Vancouver, BC, Canada, July 31 - Aug. 3, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICCCN.2017.8038501}, doi = {10.1109/ICCCN.2017.8038501}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/YuFC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-09333, author = {Michael Farcasin and Akhileshwar Guli and Eric Chan{-}Tin}, title = {Fluid Passwords - Mitigating the effects of password leaks at the user level}, journal = {CoRR}, volume = {abs/1708.09333}, year = {2017}, url = {http://arxiv.org/abs/1708.09333}, eprinttype = {arXiv}, eprint = {1708.09333}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-09333.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/CecilKGPCY16, author = {Joe Cecil and M. Bharathi Raj Kumar and Avinash Gupta and Miguel Pirela{-}Cruz and Eric Chan{-}Tin and Jiangmin Yu}, editor = {Ioana Ciuciu and Christophe Debruyne and Herv{\'{e}} Panetto and Georg Weichhart and Peter Bollen and Anna Fensel and Maria{-}Esther Vidal}, title = {Development of a Virtual Reality Based Simulation Environment for Orthopedic Surgical Training}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2016 Workshops - Confederated International Workshops: EI2N, FBM, ICSP, Meta4eS, and {OTMA} 2016, Rhodes, Greece, October 24-28, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10034}, pages = {206--214}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-55961-2\_21}, doi = {10.1007/978-3-319-55961-2\_21}, timestamp = {Tue, 09 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/otm/CecilKGPCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/Chan-TinHHK15, author = {Eric Chan{-}Tin and Victor Heorhiadi and Nicholas Hopper and Yongdae Kim}, title = {Hijacking the Vuze BitTorrent network: all your hop are belong to us}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {4}, pages = {203--208}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2014.0337}, doi = {10.1049/IET-IFS.2014.0337}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/Chan-TinHHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ShinCK15, author = {Jiyoung Shin and Eric Chan{-}Tin and Praveenkumar Khethavath}, title = {Accurate geolocation using network coordinates}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {3}, pages = {170--182}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.071830}, doi = {10.1504/IJSN.2015.071830}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ShinCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FarcasinC15, author = {Michael Farcasin and Eric Chan{-}Tin}, title = {Why we hate {IT:} two surveys on pre-generated and expiring passwords in an academic setting}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2361--2373}, year = {2015}, url = {https://doi.org/10.1002/sec.1184}, doi = {10.1002/SEC.1184}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FarcasinC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShinKFC15, author = {Jiyoung Shin and S. Kancharlapalli and Michael Farcasin and Eric Chan{-}Tin}, title = {SmartPass: a smarter geolocation-based authentication scheme}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3927--3938}, year = {2015}, url = {https://doi.org/10.1002/sec.1311}, doi = {10.1002/SEC.1311}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShinKFC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Chan-Tin15, author = {Eric Chan{-}Tin}, title = {AnonCall: Making Anonymous Cellular Phone Calls}, booktitle = {10th International Conference on Availability, Reliability and Security, {ARES} 2015, Toulouse, France, August 24-27, 2015}, pages = {626--631}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ARES.2015.13}, doi = {10.1109/ARES.2015.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Chan-Tin15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhcr/Chan-TinC14, author = {Eric Chan{-}Tin and Qi Cheng}, title = {Secure Routing and Scheduling in Ad-Hoc Cognitive Radio Networks for Public Safety}, journal = {Int. J. Handheld Comput. Res.}, volume = {5}, number = {2}, pages = {44--60}, year = {2014}, url = {https://doi.org/10.4018/ijhcr.2014040103}, doi = {10.4018/IJHCR.2014040103}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhcr/Chan-TinC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acssc/ChengC14, author = {Qi Cheng and Eric Chan{-}Tin}, editor = {Michael B. Matthews}, title = {A unified framework for robust cooperative spectrum sensing}, booktitle = {48th Asilomar Conference on Signals, Systems and Computers, {ACSSC} 2014, Pacific Grove, CA, USA, November 2-5, 2014}, pages = {1589--1593}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ACSSC.2014.7094733}, doi = {10.1109/ACSSC.2014.7094733}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acssc/ChengC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/YuC14, author = {Jiangmin Yu and Eric Chan{-}Tin}, editor = {Gail{-}Joon Ahn and Anupam Datta}, title = {Identifying Webbrowsers in Encrypted Communications}, booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, pages = {135--138}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665943.2665968}, doi = {10.1145/2665943.2665968}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/YuC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangTCMKHK13, author = {Peng Wang and James Tyra and Eric Chan{-}Tin and Tyson Malchow and Denis Foo Kune and Nicholas Hopper and Yongdae Kim}, title = {Attacking the kad network - real world evaluation and high fidelity simulation using {DVN}}, journal = {Secur. Commun. Networks}, volume = {6}, number = {12}, pages = {1556--1575}, year = {2013}, url = {https://doi.org/10.1002/sec.172}, doi = {10.1002/SEC.172}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WangTCMKHK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Chan-TinSY13, author = {Eric Chan{-}Tin and Jiyoung Shin and Jiangmin Yu}, title = {Revisiting Circuit Clogging Attacks on Tor}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {131--140}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.17}, doi = {10.1109/ARES.2013.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Chan-TinSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/KhethavathTCL13, author = {Praveen Khethavath and Johnson P. Thomas and Eric Chan{-}Tin and Hong Liu}, title = {Introducing a Distributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation}, booktitle = {{IEEE} Ninth World Congress on Services, {SERVICES} 2013, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {386--392}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SERVICES.2013.68}, doi = {10.1109/SERVICES.2013.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/KhethavathTCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chan-TinH12, author = {Eric Chan{-}Tin and Nicholas Hopper}, editor = {Heung Youl Youm and Yoojae Won}, title = {KoNKS: konsensus-style network koordinate system}, booktitle = {7th {ACM} Symposium on Information, Compuer and Communications Security, {ASIACCS} '12, Seoul, Korea, May 2-4, 2012}, pages = {61--62}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2414456.2414491}, doi = {10.1145/2414456.2414491}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chan-TinH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Chan-TinHHK11, author = {Eric Chan{-}Tin and Victor Heorhiadi and Nicholas Hopper and Yongdae Kim}, title = {The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {27:1--27:23}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043627}, doi = {10.1145/2043621.2043627}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/Chan-TinHHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Chan-TinH11, author = {Eric Chan{-}Tin and Nicholas Hopper}, title = {Accurate and Provably Secure Latency Estimation with Treeple}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/accurate-and-provably-secure-latency-estimation-treeple}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/Chan-TinH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/HopperVC10, author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan{-}Tin}, title = {How much anonymity does network latency leak?}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {2}, pages = {13:1--13:28}, year = {2010}, url = {https://doi.org/10.1145/1698750.1698753}, doi = {10.1145/1698750.1698753}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/HopperVC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chan-TinH10, author = {Eric Chan{-}Tin and Nicholas Hopper}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Secure latency estimation with treeple}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {660--662}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866389}, doi = {10.1145/1866307.1866389}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Chan-TinH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KangCLTKNWSHDK09, author = {Brent ByungHoon Kang and Eric Chan{-}Tin and Christopher P. Lee and James Tyra and Hun Jeong Kang and Chris Nunnery and Zachariah Wadler and Greg Sinclair and Nicholas Hopper and David Dagon and Yongdae Kim}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Towards complete node enumeration in a peer-to-peer botnet}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {23--34}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533064}, doi = {10.1145/1533057.1533064}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KangCLTKNWSHDK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/KangCHK09, author = {Hun Jeong Kang and Eric Chan{-}Tin and Nicholas Hopper and Yongdae Kim}, editor = {Henning Schulzrinne and Karl Aberer and Anwitaman Datta}, title = {Why Kad Lookup Fails}, booktitle = {Proceedings {P2P} 2009, Ninth International Conference on Peer-to-Peer Computing, 9-11 September 2009, Seattle, Washington, {USA}}, pages = {121--130}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/P2P.2009.5284547}, doi = {10.1109/P2P.2009.5284547}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/p2p/KangCHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/Chan-TinFHK09, author = {Eric Chan{-}Tin and Daniel Feldman and Nicholas Hopper and Yongdae Kim}, editor = {Yan Chen and Tassos Dimitriou and Jianying Zhou}, title = {The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems}, booktitle = {Security and Privacy in Communication Networks - 5th International {ICST} Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {19}, pages = {448--458}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05284-2\_26}, doi = {10.1007/978-3-642-05284-2\_26}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/Chan-TinFHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/WangTCMKHK08, author = {Peng Wang and James Tyra and Eric Chan{-}Tin and Tyson Malchow and Denis Foo Kune and Nicholas Hopper and Yongdae Kim}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Attacking the Kad network}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {23}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460907}, doi = {10.1145/1460877.1460907}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/WangTCMKHK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HopperVC07, author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan{-}Tin}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {How much anonymity does network latency leak?}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {82--91}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315257}, doi = {10.1145/1315245.1315257}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HopperVC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.