Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Matthew Wright 0001
@inproceedings{DBLP:conf/sp/MathewsHORHW23, author = {Nate Mathews and James K. Holland and Se Eun Oh and Mohammad Saidur Rahman and Nicholas Hopper and Matthew Wright}, title = {SoK: {A} Critical Evaluation of Efficient Website Fingerprinting Defenses}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {969--986}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179289}, doi = {10.1109/SP46215.2023.10179289}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/MathewsHORHW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/behaviourIT/Al-AmeenMFWS22, author = {Mahdi Nasrullah Al{-}Ameen and Sonali Tukaram Marne and Kanis Fatema and Matthew Wright and Shannon Scielzo}, title = {On improving the memorability of system-assigned recognition-based passwords}, journal = {Behav. Inf. Technol.}, volume = {41}, number = {5}, pages = {1115--1131}, year = {2022}, url = {https://doi.org/10.1080/0144929x.2020.1858161}, doi = {10.1080/0144929X.2020.1858161}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/behaviourIT/Al-AmeenMFWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/collas/RahmanCW22, author = {Mohammad Saidur Rahman and Scott E. Coull and Matthew Wright}, editor = {Sarath Chandar and Razvan Pascanu and Doina Precup}, title = {On the Limitations of Continual Learning for Malware Classification}, booktitle = {Conference on Lifelong Learning Agents, CoLLAs 2022, 22-24 August 2022, McGill University, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, series = {Proceedings of Machine Learning Research}, volume = {199}, pages = {564--582}, publisher = {{PMLR}}, year = {2022}, url = {https://proceedings.mlr.press/v199/rahman22a.html}, timestamp = {Sat, 18 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/collas/RahmanCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/OhYMH0H022, author = {Se Eun Oh and Taiji Yang and Nate Mathews and James K. Holland and Mohammad Saidur Rahman and Nicholas Hopper and Matthew Wright}, title = {DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {1915--1932}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833801}, doi = {10.1109/SP46214.2022.9833801}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/OhYMH0H022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdc/ShahriyarW22, author = {Shaikh Akib Shahriyar and Matthew K. Wright}, editor = {Simon S. Woo and Shahroz Tariq and Hyoungshick Kim}, title = {Evaluating Robustness of Sequence-based Deepfake Detector Models by Adversarial Perturbation}, booktitle = {WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, Nagasaki, Japan, 30 May 2022}, pages = {13--18}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3494109.3527194}, doi = {10.1145/3494109.3527194}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wdc/ShahriyarW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-06568, author = {Mohammad Saidur Rahman and Scott E. Coull and Matthew Wright}, title = {On the Limitations of Continual Learning for Malware Classification}, journal = {CoRR}, volume = {abs/2208.06568}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.06568}, doi = {10.48550/ARXIV.2208.06568}, eprinttype = {arXiv}, eprint = {2208.06568}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-06568.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SengAW21, author = {Sovantharith Seng and Mahdi Nasrullah Al{-}Ameen and Matthew Wright}, title = {A first look into users' perceptions of facial recognition in the physical world}, journal = {Comput. Secur.}, volume = {105}, pages = {102227}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102227}, doi = {10.1016/J.COSE.2021.102227}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SengAW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/SengAW21, author = {Sovantharith Seng and Mahdi Nasrullah Al{-}Ameen and Matthew Wright}, title = {A look into user privacy andthird-party applications in Facebook}, journal = {Inf. Comput. Secur.}, volume = {29}, number = {2}, pages = {283--313}, year = {2021}, url = {https://doi.org/10.1108/ICS-08-2019-0108}, doi = {10.1108/ICS-08-2019-0108}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imcs/SengAW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/OhMRWH21, author = {Se Eun Oh and Nate Mathews and Mohammad Saidur Rahman and Matthew Wright and Nicholas Hopper}, title = {GANDaLF: {GAN} for Data-Limited Fingerprinting}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {2}, pages = {305--322}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0029}, doi = {10.2478/POPETS-2021-0029}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/OhMRWH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RahmanIMW21, author = {Mohammad Saidur Rahman and Mohsen Imani and Nate Mathews and Matthew Wright}, title = {Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {1594--1609}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2020.3039691}, doi = {10.1109/TIFS.2020.3039691}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RahmanIMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmvc/LinBWK21, author = {Xinmiao Lin and Wentao Bao and Matthew K. Wright and Yu Kong}, title = {Gradient Frequency Modulation for Visually Explaining Video Understanding Models}, booktitle = {32nd British Machine Vision Conference 2021, {BMVC} 2021, Online, November 22-25, 2021}, pages = {14}, publisher = {{BMVA} Press}, year = {2021}, url = {https://www.bmvc2021-virtualconference.com/assets/papers/0059.pdf}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bmvc/LinBWK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Doolani0SH21, author = {Jayesh Doolani and Matthew Wright and Rajesh Setty and S. M. Taiabul Haque}, editor = {Yoshifumi Kitamura and Aaron Quigley and Katherine Isbister and Takeo Igarashi and Pernille Bj{\o}rn and Steven Mark Drucker}, title = {LociMotion: Towards Learning a Strong Authentication Secret in a Single Session}, booktitle = {{CHI} '21: {CHI} Conference on Human Factors in Computing Systems, Virtual Event / Yokohama, Japan, May 8-13, 2021}, pages = {689:1--689:13}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3411764.3445105}, doi = {10.1145/3411764.3445105}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/Doolani0SH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/HylandSLRM021, author = {Jack Hyland and Conrad Schneggenburger and Nick Lim and Jake Ruud and Nate Mathews and Matthew Wright}, title = {What a {SHAME:} Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning}, booktitle = {{WPES} '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, Virtual Event, Korea, 15 November 2021}, pages = {237--243}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3463676.3485615}, doi = {10.1145/3463676.3485615}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/HylandSLRM021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-01215, author = {Xinmiao Lin and Wentao Bao and Matthew K. Wright and Yu Kong}, title = {Gradient Frequency Modulation for Visually Explaining Video Understanding Models}, journal = {CoRR}, volume = {abs/2111.01215}, year = {2021}, url = {https://arxiv.org/abs/2111.01215}, eprinttype = {arXiv}, eprint = {2111.01215}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-01215.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jstsp/ChinthaTSBHWP20, author = {Akash Chintha and Bao Thai and Saniat Javid Sohrawardi and Kartavya Bhatt and Andrea Hickerson and Matthew Wright and Raymond W. Ptucha}, title = {Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection}, journal = {{IEEE} J. Sel. Top. Signal Process.}, volume = {14}, number = {5}, pages = {1024--1037}, year = {2020}, url = {https://doi.org/10.1109/JSTSP.2020.2999185}, doi = {10.1109/JSTSP.2020.2999185}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jstsp/ChinthaTSBHWP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/RahmanSMG020, author = {Mohammad Saidur Rahman and Payap Sirinam and Nate Mathews and Kantha Girish Gangadhara and Matthew Wright}, title = {Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {3}, pages = {5--24}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0043}, doi = {10.2478/POPETS-2020-0043}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/RahmanSMG020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LevineLL020, author = {Brian Neil Levine and Marc Liberatore and Brian Lynn and Matthew Wright}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1497--1512}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417876}, doi = {10.1145/3372297.3417876}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LevineLL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MosliWYP20, author = {Rayan Mosli and Matthew Wright and Bo Yuan and Yin Pan}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {They Might {NOT} Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {439--459}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_22}, doi = {10.1007/978-3-030-59013-0\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MosliWYP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/ChinthaRSBWP20, author = {Akash Chintha and Aishwarya Rao and Saniat Javid Sohrawardi and Kartavya Bhatt and Matthew Wright and Raymond W. Ptucha}, title = {Leveraging edges and optical flow on faces for deepfake detection}, booktitle = {2020 {IEEE} International Joint Conference on Biometrics, {IJCB} 2020, Houston, TX, USA, September 28 - October 1, 2020}, pages = {1--10}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/IJCB48548.2020.9304936}, doi = {10.1109/IJCB48548.2020.9304936}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icb/ChinthaRSBWP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/DengL020, author = {Perry Deng and Cooper Linsky and Matthew Wright}, title = {Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data}, booktitle = {{IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2020, Arlington, VA, USA, November 9-10, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISI49825.2020.9280538}, doi = {10.1109/ISI49825.2020.9280538}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isi/DengL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-04382, author = {Perry Deng and Cooper Linsky and Matthew Wright}, title = {Weaponizing Unicodes with Deep Learning - Identifying Homoglyphs with Weakly Labeled Data}, journal = {CoRR}, volume = {abs/2010.04382}, year = {2020}, url = {https://arxiv.org/abs/2010.04382}, eprinttype = {arXiv}, eprint = {2010.04382}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-04382.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-05850, author = {Perry Deng and Mohammad Saidur Rahman and Matthew Wright}, title = {Detecting Adversarial Patches with Class Conditional Reconstruction Networks}, journal = {CoRR}, volume = {abs/2011.05850}, year = {2020}, url = {https://arxiv.org/abs/2011.05850}, eprinttype = {arXiv}, eprint = {2011.05850}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-05850.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/ImaniAW19, author = {Mohsen Imani and Mehrdad Amirabadi and Matthew Wright}, title = {Modified relay selection and circuit selection for faster Tor}, journal = {{IET} Commun.}, volume = {13}, number = {17}, pages = {2723--2734}, year = {2019}, url = {https://doi.org/10.1049/iet-com.2018.5591}, doi = {10.1049/IET-COM.2018.5591}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-com/ImaniAW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SirinamMR019, author = {Payap Sirinam and Nate Mathews and Mohammad Saidur Rahman and Matthew Wright}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1131--1148}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354217}, doi = {10.1145/3319535.3354217}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SirinamMR019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SohrawardiCTSHP19, author = {Saniat Javid Sohrawardi and Akash Chintha and Bao Thai and Sovantharith Seng and Andrea Hickerson and Raymond W. Ptucha and Matthew Wright}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Poster: Towards Robust Open-World Detection of Deepfakes}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2613--2615}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363269}, doi = {10.1145/3319535.3363269}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SohrawardiCTSHP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SengKA019, author = {Sovantharith Seng and Huzeyfe Kocabas and Mahdi Nasrullah Al{-}Ameen and Matthew Wright}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2617--2619}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363270}, doi = {10.1145/3319535.3363270}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SengKA019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MathewsRW19, author = {Nate Mathews and Mohammad Saidur Rahman and Matthew Wright}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Poster: Evaluating Security Metrics for Website Fingerprinting}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2625--2627}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363272}, doi = {10.1145/3319535.3363272}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MathewsRW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RahmanMW19, author = {Mohammad Saidur Rahman and Nate Mathews and Matthew Wright}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Poster: Video Fingerprinting in Tor}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2629--2631}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363273}, doi = {10.1145/3319535.3363273}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RahmanMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-06421, author = {Mohammad Saidur Rahman and Payap Sirinam and Nate Mathews and Kantha Girish Gangadhara and Matthew Wright}, title = {Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks}, journal = {CoRR}, volume = {abs/1902.06421}, year = {2019}, url = {http://arxiv.org/abs/1902.06421}, eprinttype = {arXiv}, eprint = {1902.06421}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-06421.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-06626, author = {Mohsen Imani and Mohammad Saidur Rahman and Nate Mathews and Aneesh Yogesh Joshi and Matthew Wright}, title = {Adv-DWF: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces}, journal = {CoRR}, volume = {abs/1902.06626}, year = {2019}, url = {http://arxiv.org/abs/1902.06626}, eprinttype = {arXiv}, eprint = {1902.06626}, timestamp = {Mon, 29 Mar 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-06626.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-07490, author = {Rayan Mosli and Matthew Wright and Bo Yuan and Yin Pan}, title = {They Might {NOT} Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization}, journal = {CoRR}, volume = {abs/1909.07490}, year = {2019}, url = {http://arxiv.org/abs/1909.07490}, eprinttype = {arXiv}, eprint = {1909.07490}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-07490.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/ImaniBW18, author = {Mohsen Imani and Armon Barton and Matthew Wright}, title = {Guard Sets in Tor using {AS} Relationships}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {1}, pages = {145--165}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0008}, doi = {10.1515/POPETS-2018-0008}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ImaniBW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SirinamIJW18, author = {Payap Sirinam and Mohsen Imani and Marc Juarez and Matthew Wright}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1928--1943}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243768}, doi = {10.1145/3243734.3243768}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SirinamIJW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ImaniR018, author = {Mohsen Imani and Mohammad Saidur Rahman and Matthew Wright}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {Adversarial Traces for Website Fingerprinting Defense}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2225--2227}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3278493}, doi = {10.1145/3243734.3278493}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ImaniR018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BartonWMI18, author = {Armon Barton and Matthew Wright and Jiang Ming and Mohsen Imani}, editor = {William Enck and Adrienne Porter Felt}, title = {Towards Predicting Efficient and Anonymous Tor Circuits}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {429--444}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/barton}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/BartonWMI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-02265, author = {Payap Sirinam and Mohsen Imani and Marc Juarez and Matthew Wright}, title = {Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning}, journal = {CoRR}, volume = {abs/1801.02265}, year = {2018}, url = {http://arxiv.org/abs/1801.02265}, eprinttype = {arXiv}, eprint = {1801.02265}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-02265.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-01977, author = {Armon Barton and Mohsen Imani and Jiang Ming and Matthew Wright}, title = {Towards Predicting Efficient and Anonymous Tor Circuits}, journal = {CoRR}, volume = {abs/1805.01977}, year = {2018}, url = {http://arxiv.org/abs/1805.01977}, eprinttype = {arXiv}, eprint = {1805.01977}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-01977.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HoW17, author = {Jun{-}Won Ho and Matthew K. Wright}, title = {Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations}, journal = {{IEEE} Access}, volume = {5}, pages = {680--695}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2648853}, doi = {10.1109/ACCESS.2017.2648853}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HoW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iwc/Al-AmeenW17, author = {Mahdi Nasrullah Al{-}Ameen and Matthew K. Wright}, title = {Exploring the Potential of GeoPass: {A} Geographic Location-Password Scheme}, journal = {Interact. Comput.}, volume = {29}, number = {4}, pages = {605--627}, year = {2017}, url = {https://doi.org/10.1093/iwc/iww033}, doi = {10.1093/IWC/IWW033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iwc/Al-AmeenW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/PodolankoPMDW17, author = {John P. Podolanko and Revanth Pobala and Hussain Mucklai and George Danezis and Matthew Wright}, title = {LiLAC: Lightweight Low-Latency Anonymous Chat}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {141--151}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.14}, doi = {10.1109/PAC.2017.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/PodolankoPMDW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/MarneAW17, author = {Sonali Tukaram Marne and Mahdi Nasrullah Al{-}Ameen and Matthew K. Wright}, title = {Learning System-assigned Passwords: {A} Preliminary Study on the People with Learning Disabilities}, booktitle = {Thirteenth Symposium on Usable Privacy and Security, {SOUPS} 2017, Santa Clara, CA, USA, July 12-14, 2017}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/soups2017/workshop-program/wips2017/marne}, timestamp = {Wed, 19 Jul 2017 17:13:43 +0200}, biburl = {https://dblp.org/rec/conf/soups/MarneAW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LevineLLW17, author = {Brian Neil Levine and Marc Liberatore and Brian Lynn and Matthew Wright}, editor = {Jos{\'{e}} M. del {\'{A}}lamo and Seda F. G{\"{u}}rses and Anupam Datta}, title = {Statistical Detection of Downloaders in Freenet}, booktitle = {Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th {IEEE} Symposium on Security and Privacy, IWPE@SP 2017, San Jose, CA, USA, May 25, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1873}, pages = {25--32}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1873/IWPE17\_paper\_12.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:55 +0100}, biburl = {https://dblp.org/rec/conf/sp/LevineLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ImaniBW17, author = {Mohsen Imani and Armon Barton and Matthew Wright}, title = {Forming Guard Sets using {AS} Relationships}, journal = {CoRR}, volume = {abs/1706.05592}, year = {2017}, url = {http://arxiv.org/abs/1706.05592}, eprinttype = {arXiv}, eprint = {1706.05592}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ImaniBW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ImaniAW17, author = {Mohsen Imani and Mehrdad Amirabadi and Matthew Wright}, title = {The Evaluation of Circuit Selection Methods on Tor}, journal = {CoRR}, volume = {abs/1706.06457}, year = {2017}, url = {http://arxiv.org/abs/1706.06457}, eprinttype = {arXiv}, eprint = {1706.06457}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ImaniAW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/Al-AmeenHW16, author = {Mahdi Nasrullah Al{-}Ameen and S. M. Taiabul Haque and Matthew K. Wright}, title = {Leveraging autobiographical memory for two-factor online authentication}, journal = {Inf. Comput. Secur.}, volume = {24}, number = {4}, pages = {386--399}, year = {2016}, url = {https://doi.org/10.1108/ICS-01-2016-0005}, doi = {10.1108/ICS-01-2016-0005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/Al-AmeenHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/Al-AmeenW16, author = {Mahdi Nasrullah Al{-}Ameen and Matthew K. Wright}, title = {iPersea: Towards improving the Sybil-resilience of social {DHT}}, journal = {J. Netw. Comput. Appl.}, volume = {71}, pages = {1--10}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2016.05.014}, doi = {10.1016/J.JNCA.2016.05.014}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/Al-AmeenW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/BartonW16, author = {Armon Barton and Matthew Wright}, title = {DeNASA: Destination-Naive AS-Awareness in Anonymous Communications}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2016}, number = {4}, pages = {356--372}, year = {2016}, url = {https://doi.org/10.1515/popets-2016-0044}, doi = {10.1515/POPETS-2016-0044}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/BartonW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AsudehW16, author = {Omid Asudeh and Matthew Wright}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{POSTER:} Phishing Website Detection with a Multiphase Framework to Find Visual Similarity}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1790--1792}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2989050}, doi = {10.1145/2976749.2989050}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AsudehW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JuarezIPDW16, author = {Marc Juarez and Mohsen Imani and Mike Perry and Claudia D{\'{\i}}az and Matthew Wright}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Toward an Efficient Website Fingerprinting Defense}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, pages = {27--46}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4\_2}, doi = {10.1007/978-3-319-45744-4\_2}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JuarezIPDW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iot/ChoiJKLHW16, author = {Miri Choi and Jaewon Jang and Yeeji Kwon and Subeen Lim and Jun{-}Won Ho and Matthew K. Wright}, editor = {Stefan Schneegass and Albrecht Schmidt and Florian Michahelles and Mareike Kritzler and Alexander Ilic and Kai Kunze}, title = {Split-Pipeline Model for Worm Propagation over IoT}, booktitle = {Proceedings of the 6th International Conference on the Internet of Things, {IOT} 2016, Stuttgart, Germany, November 7-9, 2016}, pages = {155--156}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2998467}, timestamp = {Tue, 06 Nov 2018 16:59:08 +0100}, biburl = {https://dblp.org/rec/conf/iot/ChoiJKLHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ImaniAW16, author = {Mohsen Imani and Mehrdad Amirabadi and Matthew Wright}, title = {Modified Relay Selection and Circuit Selection for Faster Tor}, journal = {CoRR}, volume = {abs/1608.07343}, year = {2016}, url = {http://arxiv.org/abs/1608.07343}, eprinttype = {arXiv}, eprint = {1608.07343}, timestamp = {Tue, 20 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ImaniAW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuGWM15, author = {Changchang Liu and Peng Gao and Matthew K. Wright and Prateek Mittal}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Exploiting Temporal Dynamics in Sybil Defenses}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {805--816}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813693}, doi = {10.1145/2810103.2813693}, timestamp = {Wed, 08 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiuGWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Al-AmeenWS15, author = {Mahdi Nasrullah Al{-}Ameen and Matthew K. Wright and Shannon Scielzo}, editor = {Bo Begole and Jinwoo Kim and Kori Inkpen and Woontack Woo}, title = {Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues}, booktitle = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23, 2015}, pages = {2315--2324}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2702123.2702241}, doi = {10.1145/2702123.2702241}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/Al-AmeenWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Al-AmeenFWS15, author = {Mahdi Nasrullah Al{-}Ameen and Kanis Fatema and Matthew K. Wright and Shannon Scielzo}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Leveraging Real-Life Facts to Make Random Passwords More Memorable}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {438--455}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_22}, doi = {10.1007/978-3-319-24177-7\_22}, timestamp = {Sat, 19 Oct 2019 20:00:24 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Al-AmeenFWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/Al-AmeenFWS15, author = {Mahdi Nasrullah Al{-}Ameen and Kanis Fatema and Matthew K. Wright and Shannon Scielzo}, editor = {Lorrie Faith Cranor and Robert Biddle and Sunny Consolvo}, title = {The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords}, booktitle = {Eleventh Symposium On Usable Privacy and Security, {SOUPS} 2015, Ottawa, Canada, July 22-24, 2015}, pages = {185--196}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/soups2015/proceedings/presentation/al-ameen}, timestamp = {Wed, 05 Apr 2017 12:53:50 +0200}, biburl = {https://dblp.org/rec/conf/soups/Al-AmeenFWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Al-AmeenWS15, author = {Mahdi Nasrullah Al{-}Ameen and Matthew K. Wright and Shannon Scielzo}, title = {Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues}, journal = {CoRR}, volume = {abs/1503.02314}, year = {2015}, url = {http://arxiv.org/abs/1503.02314}, eprinttype = {arXiv}, eprint = {1503.02314}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Al-AmeenWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JuarezIPDW15, author = {Marc Juarez and Mohsen Imani and Mike Perry and Claudia D{\'{\i}}az and Matthew Wright}, title = {{WTF-PAD:} Toward an Efficient Website Fingerprinting Defense for Tor}, journal = {CoRR}, volume = {abs/1512.00524}, year = {2015}, url = {http://arxiv.org/abs/1512.00524}, eprinttype = {arXiv}, eprint = {1512.00524}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JuarezIPDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/LinHWK14, author = {Ying{-}Dar Lin and Chun{-}Ying Huang and Matthew K. Wright and Georgios Kambourakis}, title = {Mobile Application Security}, journal = {Computer}, volume = {47}, number = {6}, pages = {21--23}, year = {2014}, url = {https://doi.org/10.1109/MC.2014.156}, doi = {10.1109/MC.2014.156}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/LinHWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmms/HaqueWS14, author = {S. M. Taiabul Haque and Matthew K. Wright and Shannon Scielzo}, title = {Hierarchy of users' web passwords: Perceptions, practices and susceptibilities}, journal = {Int. J. Hum. Comput. Stud.}, volume = {72}, number = {12}, pages = {860--874}, year = {2014}, url = {https://doi.org/10.1016/j.ijhcs.2014.07.007}, doi = {10.1016/J.IJHCS.2014.07.007}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmms/HaqueWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/RajLLWD14, author = {Mayank Raj and Na Li and Donggang Liu and Matthew K. Wright and Sajal K. Das}, title = {Using data mules to preserve source location privacy in Wireless Sensor Networks}, journal = {Pervasive Mob. Comput.}, volume = {11}, pages = {244--260}, year = {2014}, url = {https://doi.org/10.1016/j.pmcj.2012.10.002}, doi = {10.1016/J.PMCJ.2012.10.002}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/RajLLWD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/AkavipatAKRSW14, author = {Ruj Akavipat and Mahdi N. Al{-}Ameen and Apu Kapadia and Zahid Rahman and Roman Schlegel and Matthew K. Wright}, title = {ReDS: {A} Framework for Reputation-Enhanced DHTs}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {2}, pages = {321--331}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.231}, doi = {10.1109/TPDS.2013.231}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/AkavipatAKRSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Al-AmeenW14, author = {Mahdi Nasrullah Al{-}Ameen and Matthew K. Wright}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Design and evaluation of persea, a sybil-resistant {DHT}}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {75--86}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590326}, doi = {10.1145/2590296.2590326}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Al-AmeenW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/SankeyW14, author = {Jody Sankey and Matthew K. Wright}, editor = {Emiliano De Cristofaro and Steven J. Murdoch}, title = {Dovetail: Stronger Anonymity in Next-Generation Internet Routing}, booktitle = {Privacy Enhancing Technologies - 14th International Symposium, {PETS} 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8555}, pages = {283--303}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08506-7\_15}, doi = {10.1007/978-3-319-08506-7\_15}, timestamp = {Sat, 09 Apr 2022 12:39:29 +0200}, biburl = {https://dblp.org/rec/conf/pet/SankeyW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/HaqueSW14, author = {S. M. Taiabul Haque and Shannon Scielzo and Matthew K. Wright}, editor = {Lorrie Faith Cranor and Lujo Bauer and Robert Biddle}, title = {Applying Psychometrics to Measure User Comfort when Constructing a Strong Password}, booktitle = {Tenth Symposium on Usable Privacy and Security, {SOUPS} 2014, Menlo Park, CA, USA, July 9-11, 2014}, pages = {231--242}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/soups2014/proceedings/presentation/haque}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/soups/HaqueSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RahmanWL14, author = {Nabila Rahman and Matthew K. Wright and Donggang Liu}, title = {Fast and energy-efficient technique for jammed region mapping in wireless sensor networks}, journal = {CoRR}, volume = {abs/1401.7002}, year = {2014}, url = {http://arxiv.org/abs/1401.7002}, eprinttype = {arXiv}, eprint = {1401.7002}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RahmanWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SankeyW14, author = {Jody Sankey and Matthew K. Wright}, title = {Dovetail: Stronger Anonymity in Next-Generation Internet Routing}, journal = {CoRR}, volume = {abs/1405.0351}, year = {2014}, url = {http://arxiv.org/abs/1405.0351}, eprinttype = {arXiv}, eprint = {1405.0351}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SankeyW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Al-AmeenHW14, author = {Mahdi Nasrullah Al{-}Ameen and S. M. Taiabul Haque and Matthew K. Wright}, title = {{Q-A:} Towards the Solution of Usability-Security Tension in User Authentication}, journal = {CoRR}, volume = {abs/1407.7277}, year = {2014}, url = {http://arxiv.org/abs/1407.7277}, eprinttype = {arXiv}, eprint = {1407.7277}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Al-AmeenHW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Al-AmeenW14, author = {Mahdi Nasrullah Al{-}Ameen and Matthew K. Wright}, title = {A Comprehensive Study of the GeoPass User Authentication Scheme}, journal = {CoRR}, volume = {abs/1408.2852}, year = {2014}, url = {http://arxiv.org/abs/1408.2852}, eprinttype = {arXiv}, eprint = {1408.2852}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Al-AmeenW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Al-AmeenW14a, author = {Mahdi Nasrullah Al{-}Ameen and Matthew K. Wright}, title = {iPersea : The Improved Persea with Sybil Detection Mechanism}, journal = {CoRR}, volume = {abs/1412.6883}, year = {2014}, url = {http://arxiv.org/abs/1412.6883}, eprinttype = {arXiv}, eprint = {1412.6883}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Al-AmeenW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/KothariW13, author = {Kush Kothari and Matthew K. Wright}, title = {Mimic: An active covert channel that evades regularity-based detection}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {647--657}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.008}, doi = {10.1016/J.COMNET.2012.10.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/KothariW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/DongLW13, author = {Qi Dong and Donggang Liu and Matthew K. Wright}, title = {Mitigating jamming attacks in wireless broadcast systems}, journal = {Wirel. Networks}, volume = {19}, number = {8}, pages = {1867--1880}, year = {2013}, url = {https://doi.org/10.1007/s11276-013-0574-0}, doi = {10.1007/S11276-013-0574-0}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/DongLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaqueWS13, author = {S. M. Taiabul Haque and Matthew K. Wright and Shannon Scielzo}, editor = {William Enck and Adrienne Porter Felt and N. Asokan}, title = {Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets}, booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November 8, 2013, Berlin, Germany}, pages = {105--110}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2516760.2516767}, doi = {10.1145/2516760.2516767}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaqueWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Al-AmeenW13, author = {Mahdi N. Al{-}Ameen and Matthew K. Wright}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {Persea: a sybil-resistant social {DHT}}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {169--172}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435372}, doi = {10.1145/2435349.2435372}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/Al-AmeenW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/HaqueWS13, author = {S. M. Taiabul Haque and Matthew K. Wright and Shannon Scielzo}, editor = {Elisa Bertino and Ravi S. Sandhu and Lujo Bauer and Jaehong Park}, title = {A study of user password strategy for multiple accounts}, booktitle = {Third {ACM} Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013}, pages = {173--176}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2435349.2435373}, doi = {10.1145/2435349.2435373}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/HaqueWS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MittalWB13, author = {Prateek Mittal and Matthew K. Wright and Nikita Borisov}, title = {Pisces: Anonymous Communication Using Social Networks}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, pages = {1--18}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/pisces-anonymous-communication-using-social-networks}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MittalWB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pet/2013, editor = {Emiliano De Cristofaro and Matthew K. Wright}, title = {Privacy Enhancing Technologies - 13th International Symposium, {PETS} 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7981}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39077-7}, doi = {10.1007/978-3-642-39077-7}, isbn = {978-3-642-39076-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/HoWD12, author = {Jun{-}Won Ho and Matthew K. Wright and Sajal K. Das}, title = {Distributed detection of mobile malicious node attacks in wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {10}, number = {3}, pages = {512--523}, year = {2012}, url = {https://doi.org/10.1016/j.adhoc.2011.09.006}, doi = {10.1016/J.ADHOC.2011.09.006}, timestamp = {Tue, 10 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/HoWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/Al-AmeenGW12, author = {Mahdi N. Al{-}Ameen and Charles Gatz and Matthew K. Wright}, title = {{SDA-2H:} Understanding the Value of Background Cover Against Statistical Disclosure}, journal = {J. Networks}, volume = {7}, number = {12}, pages = {1943--1951}, year = {2012}, url = {https://doi.org/10.4304/jnw.7.12.1943-1951}, doi = {10.4304/JNW.7.12.1943-1951}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/Al-AmeenGW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HoWD12, author = {Jun{-}Won Ho and Matthew K. Wright and Sajal K. Das}, title = {ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {4}, pages = {494--511}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2011.65}, doi = {10.1109/TDSC.2011.65}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HoWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/MehtaLW12, author = {Kiran Mehta and Donggang Liu and Matthew K. Wright}, title = {Protecting Location Privacy in Sensor Networks against a Global Eavesdropper}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {11}, number = {2}, pages = {320--336}, year = {2012}, url = {https://doi.org/10.1109/TMC.2011.32}, doi = {10.1109/TMC.2011.32}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmc/MehtaLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/SiddhabathulaDLW12, author = {Kartik Siddhabathula and Qi Dong and Donggang Liu and Matthew K. Wright}, title = {Fast jamming detection in sensor networks}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2012, Ottawa, ON, Canada, June 10-15, 2012}, pages = {934--938}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ICC.2012.6363672}, doi = {10.1109/ICC.2012.6363672}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/SiddhabathulaDLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/LiRLWD12, author = {Na Li and Mayank Raj and Donggang Liu and Matthew K. Wright and Sajal K. Das}, editor = {Luciano Bononi and Ajoy Kumar Datta and St{\'{e}}phane Devismes and Archan Misra}, title = {Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks}, booktitle = {Distributed Computing and Networking - 13th International Conference, {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7129}, pages = {309--324}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-25959-3\_23}, doi = {10.1007/978-3-642-25959-3\_23}, timestamp = {Mon, 26 Jun 2023 20:44:19 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/LiRLWD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/SadiqKW12, author = {Umair Sadiq and Mohan Kumar and Matthew K. Wright}, editor = {Albert Y. Zomaya and Bj{\"{o}}rn Landfeldt and Ravi Prakash}, title = {{CRISP:} collusion-resistant incentive-compatible routing and forwarding in opportunistic networks}, booktitle = {The 15th {ACM} International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, MSWiM '12, Paphos, Cyprus, October 21-25, 2012}, pages = {69--78}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2387238.2387253}, doi = {10.1145/2387238.2387253}, timestamp = {Wed, 22 Mar 2023 16:53:34 +0100}, biburl = {https://dblp.org/rec/conf/mswim/SadiqKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pet/2012, editor = {Simone Fischer{-}H{\"{u}}bner and Matthew K. Wright}, title = {Privacy Enhancing Technologies - 12th International Symposium, {PETS} 2012, Vigo, Spain, July 11-13, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7384}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31680-7}, doi = {10.1007/978-3-642-31680-7}, isbn = {978-3-642-31679-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pet/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-6326, author = {Prateek Mittal and Matthew K. Wright and Nikita Borisov}, title = {Pisces: Anonymous Communication Using Social Networks}, journal = {CoRR}, volume = {abs/1208.6326}, year = {2012}, url = {http://arxiv.org/abs/1208.6326}, eprinttype = {arXiv}, eprint = {1208.6326}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-6326.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1209-4867, author = {Ruj Akavipat and Mahdi N. Al{-}Ameen and Apu Kapadia and Zahid Rahman and Roman Schlegel and Matthew K. Wright}, title = {ReDS: {A} Framework for Reputation-Enhanced DHTs}, journal = {CoRR}, volume = {abs/1209.4867}, year = {2012}, url = {http://arxiv.org/abs/1209.4867}, eprinttype = {arXiv}, eprint = {1209.4867}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1209-4867.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WallsKW11, author = {Robert J. Walls and Kush Kothari and Matthew K. Wright}, title = {Liquid: {A} detection-resistant covert timing channel based on {IPD} shaping}, journal = {Comput. Networks}, volume = {55}, number = {6}, pages = {1217--1228}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2010.11.007}, doi = {10.1016/J.COMNET.2010.11.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WallsKW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MalleshW11, author = {Nayantara Mallesh and Matthew K. Wright}, title = {An analysis of the statistical disclosure attack and receiver-bound cover}, journal = {Comput. Secur.}, volume = {30}, number = {8}, pages = {597--612}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2011.08.011}, doi = {10.1016/J.COSE.2011.08.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MalleshW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ecra/MargolinLMW11, author = {N. Boris Margolin and Brian Neil Levine and James D. Miller and Matthew K. Wright}, title = {Economic incentives for protecting digital rights online}, journal = {Electron. Commer. Res. Appl.}, volume = {10}, number = {5}, pages = {553--564}, year = {2011}, url = {https://doi.org/10.1016/j.elerap.2010.12.006}, doi = {10.1016/J.ELERAP.2010.12.006}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ecra/MargolinLMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiberatoreGLW11, author = {Marc Liberatore and Bikas Gurung and Brian Neil Levine and Matthew K. Wright}, title = {Empirical tests of anonymous voice over {IP}}, journal = {J. Netw. Comput. Appl.}, volume = {34}, number = {1}, pages = {341--350}, year = {2011}, url = {https://doi.org/10.1016/j.jnca.2010.06.009}, doi = {10.1016/J.JNCA.2010.06.009}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiberatoreGLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/VakdeBLW11, author = {Gauri Vakde and Radhika Bibikar and Zhengyi Le and Matthew K. Wright}, title = {EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments}, journal = {Secur. Commun. Networks}, volume = {4}, number = {11}, pages = {1243--1256}, year = {2011}, url = {https://doi.org/10.1002/sec.246}, doi = {10.1002/SEC.246}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/VakdeBLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/HoWD11, author = {Jun{-}Won Ho and Matthew K. Wright and Sajal K. Das}, title = {Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {10}, number = {6}, pages = {767--782}, year = {2011}, url = {https://doi.org/10.1109/TMC.2010.213}, doi = {10.1109/TMC.2010.213}, timestamp = {Tue, 10 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/HoWD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MalleshW11, author = {Nayantara Mallesh and Matthew K. Wright}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Poster: shaping network topology for privacy and performance}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {813--816}, publisher = {{ACM}}, year = {2011}, url = {https://dl.acm.org/citation.cfm?id=2093500}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MalleshW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1109-6874, author = {Dustin Bachrach and Christopher Nunu and Dan S. Wallach and Matthew K. Wright}, title = {{\#}h00t: Censorship Resistant Microblogging}, journal = {CoRR}, volume = {abs/1109.6874}, year = {2011}, url = {http://arxiv.org/abs/1109.6874}, eprinttype = {arXiv}, eprint = {1109.6874}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1109-6874.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PadhyeKVW10, author = {Jaideep D. Padhye and Kush Kothari and Madhu Venkateshaiah and Matthew K. Wright}, title = {Evading stepping-stone detection under the cloak of streaming media with {SNEAK}}, journal = {Comput. Networks}, volume = {54}, number = {13}, pages = {2310--2325}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2010.03.011}, doi = {10.1016/J.COMNET.2010.03.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/PadhyeKVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npa/KhanMNW10, author = {Safwan Mahmud Khan and Nayantara Mallesh and Arjun Nambiar and Matthew K. Wright}, title = {The Dynamics of Salsa: {A} Robust Structured {P2P} System}, journal = {Netw. Protoc. Algorithms}, volume = {2}, number = {4}, pages = {40--60}, year = {2010}, url = {https://doi.org/10.5296/npa.v2i4.474}, doi = {10.5296/NPA.V2I4.474}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npa/KhanMNW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrishnamoorthyW10, author = {Pranav Krishnamoorthy and Matthew K. Wright}, editor = {Rachel Greenstadt}, title = {Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network}, booktitle = {Proceedings of the 3rd {ACM} Workshop on Security and Artificial Intelligence, AISec 2010, Chicago, Illinois, USA, October 8, 2010}, pages = {1--7}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866423.1866425}, doi = {10.1145/1866423.1866425}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrishnamoorthyW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AkavipatDK010, author = {Ruj Akavipat and Apurv Dhadphale and Apu Kapadia and Matthew Wright}, editor = {Ehab Al{-}Shaer and Brent Lagesse and Craig A. Shue}, title = {ReDS: reputation for directory services in {P2P} systems}, booktitle = {Proceedings of the 2010 {ACM} workshop on Insider threats, Insider Threats '10, Chicago, Illinois, USA, October 8, 2010}, pages = {47--54}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866886.1866896}, doi = {10.1145/1866886.1866896}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AkavipatDK010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/WrightKKD10, author = {Matthew K. Wright and Apu Kapadia and Mohan Kumar and Apurv Dhadphale}, editor = {Frederick T. Sheldon and Stacy J. Prowell and Robert K. Abercrombie and Axel W. Krings}, title = {ReDS: reputation for directory services in {P2P} systems}, booktitle = {Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, {CSIIRW} 2010, Oak Ridge, TN, USA, April 21-23, 2010}, pages = {71}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1852666.1852747}, doi = {10.1145/1852666.1852747}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csiirw/WrightKKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/AbrahamW10, author = {Titus Abraham and Matthew K. Wright}, title = {Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--5}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5684247}, doi = {10.1109/GLOCOM.2010.5684247}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/AbrahamW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MalleshW10, author = {Nayantara Mallesh and Matthew K. Wright}, editor = {Rainer B{\"{o}}hme and Philip W. L. Fong and Reihaneh Safavi{-}Naini}, title = {The Reverse Statistical Disclosure Attack}, booktitle = {Information Hiding - 12th International Conference, {IH} 2010, Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6387}, pages = {221--234}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16435-4\_17}, doi = {10.1007/978-3-642-16435-4\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/MalleshW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/LagesseKW10, author = {Brent Lagesse and Mohan Kumar and Matthew K. Wright}, title = {ReSCo: {A} middleware component for Reliable Service Composition in pervasive systems}, booktitle = {Eigth Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2010, March 29 - April 2, 2010, Mannheim, Germany, Workshop Proceedings}, pages = {486--491}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/PERCOMW.2010.5470620}, doi = {10.1109/PERCOMW.2010.5470620}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/LagesseKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/HoLWD09, author = {Jun{-}Won Ho and Donggang Liu and Matthew K. Wright and Sajal K. Das}, title = {Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {8}, pages = {1476--1488}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2009.04.008}, doi = {10.1016/J.ADHOC.2009.04.008}, timestamp = {Tue, 10 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/HoLWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HoWD09, author = {Jun{-}Won Ho and Matthew K. Wright and Sajal K. Das}, title = {Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {1773--1781}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062097}, doi = {10.1109/INFCOM.2009.5062097}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HoWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/HoLWD09, author = {Jun{-}Won Ho and Donggang Liu and Matthew K. Wright and Sajal K. Das}, title = {Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks}, booktitle = {Seventh Annual {IEEE} International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2009), 9-13 March 2009, Galveston, TX, {USA}}, pages = {1--6}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/PERCOM.2009.4912865}, doi = {10.1109/PERCOM.2009.4912865}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/HoLWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/LagesseKPW09, author = {Brent Lagesse and Mohan Kumar and Justin Mazzola Paluska and Matthew K. Wright}, title = {{DTT:} {A} Distributed Trust Toolkit for Pervasive Systems}, booktitle = {Seventh Annual {IEEE} International Conference on Pervasive Computing and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, {USA}}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/PERCOM.2009.4912754}, doi = {10.1109/PERCOM.2009.4912754}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/LagesseKPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/petra/LeVW09, author = {Zhengyi Le and Gauri Vakde and Matthew K. Wright}, title = {{PEON:} privacy-enhanced opportunistic networks with applications in assistive environments}, booktitle = {Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, {PETRA} 2009, Corfu, Greece, June 9-13, 2009}, series = {{ACM} International Conference Proceeding Series}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1579114.1579190}, doi = {10.1145/1579114.1579190}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/petra/LeVW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/HoWD09, author = {Jun{-}Won Ho and Matthew K. Wright and Sajal K. Das}, title = {ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis}, booktitle = {28th {IEEE} Symposium on Reliable Distributed Systems {(SRDS} 2009), Niagara Falls, New York, USA, September 27-30, 2009}, pages = {217--223}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SRDS.2009.23}, doi = {10.1109/SRDS.2009.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/HoWD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightALS08, author = {Matthew K. Wright and Micah Adler and Brian Neil Levine and Clay Shields}, title = {Passive-Logging Attacks Against Anonymous Communications Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {11}, number = {2}, pages = {3:1--3:34}, year = {2008}, url = {https://doi.org/10.1145/1330332.1330335}, doi = {10.1145/1330332.1330335}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightALS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/p2p/LagesseKW08, author = {Brent Lagesse and Mohan Kumar and Matthew K. Wright}, editor = {Klaus Wehrle and Wolfgang Kellerer and Sandeep K. Singhal and Ralf Steinmetz}, title = {{AREX:} An Adaptive System for Secure Resource Access in Mobile {P2P} Systems}, booktitle = {Proceedings P2P'08, Eighth International Conference on Peer-to-Peer Computing, 8-11 September 2008, Aachen, Germany}, pages = {43--52}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/P2P.2008.46}, doi = {10.1109/P2P.2008.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/p2p/LagesseKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/DaginawalaW08, author = {Hatim Daginawala and Matthew K. Wright}, editor = {Nikita Borisov and Ian Goldberg}, title = {Studying Timing Analysis on the Internet with SubRosa}, booktitle = {Privacy Enhancing Technologies, 8th International Symposium, {PETS} 2008, Leuven, Belgium, July 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5134}, pages = {133--150}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70630-4\_9}, doi = {10.1007/978-3-540-70630-4\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/DaginawalaW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MalleshW07, author = {Nayantara Mallesh and Matthew K. Wright}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Countering Statistical Disclosure with Receiver-Bound Cover Traffic}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {547--562}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_36}, doi = {10.1007/978-3-540-74835-9\_36}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MalleshW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/MehtaLW07, author = {Kiran Mehta and Donggang Liu and Matthew K. Wright}, title = {Location Privacy in Sensor Networks Against a Global Eavesdropper}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {314--323}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNP.2007.4375862}, doi = {10.1109/ICNP.2007.4375862}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/MehtaLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NambiarW06, author = {Arjun Nambiar and Matthew K. Wright}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Salsa: a structured approach to large-scale anonymity}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {17--26}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180409}, doi = {10.1145/1180405.1180409}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NambiarW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ReiterWW05, author = {Michael K. Reiter and XiaoFeng Wang and Matthew K. Wright}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Building Reliable Mix Networks with Fair Exchange}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {378--392}, year = {2005}, url = {https://doi.org/10.1007/11496137\_26}, doi = {10.1007/11496137\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ReiterWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WrightALS04, author = {Matthew K. Wright and Micah Adler and Brian Neil Levine and Clay Shields}, title = {The predecessor attack: An analysis of a threat to anonymous communications systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {4}, pages = {489--522}, year = {2004}, url = {https://doi.org/10.1145/1042031.1042032}, doi = {10.1145/1042031.1042032}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WrightALS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/MargolinWL04, author = {N. Boris Margolin and Matthew K. Wright and Brian Neil Levine}, editor = {Aggelos Kiayias and Moti Yung}, title = {Analysis of an incentives-based secrets protection system}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {22--30}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029153}, doi = {10.1145/1029146.1029153}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/MargolinWL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/LevineRWW04, author = {Brian Neil Levine and Michael K. Reiter and Chenxi Wang and Matthew K. Wright}, editor = {Ari Juels}, title = {Timing Attacks in Low-Latency Mix Systems (Extended Abstract)}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {251--265}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_25}, doi = {10.1007/978-3-540-27809-2\_25}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/LevineRWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WrightALS03, author = {Matthew K. Wright and Micah Adler and Brian Neil Levine and Clay Shields}, title = {Defending Anonymous Communications Against Passive Logging Attack}, booktitle = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14 May 2003, Berkeley, CA, {USA}}, pages = {28--41}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SECPRI.2003.1199325}, doi = {10.1109/SECPRI.2003.1199325}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/WrightALS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WrightALS02, author = {Matthew K. Wright and Micah Adler and Brian Neil Levine and Clay Shields}, title = {An Analysis of the Degradation of Anonymous Protocols}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2002, San Diego, California, {USA}}, pages = {1--12}, publisher = {The Internet Society}, year = {2002}, url = {https://www.ndss-symposium.org/ndss2002/analysis-degradation-anonymous-protocols/}, timestamp = {Mon, 01 Feb 2021 08:42:25 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WrightALS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.