Author:
Mohajeri Moghaddam Hooman,Li Baiyu,Derakhshani Mohammad,Goldberg Ian
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. HiddenTor: Toward a User-Centric and Private Query System for Tor BridgeDB;2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS);2024-07-23
2. Metadata Privacy Beyond Tunneling for Instant Messaging;2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P);2024-07-08
3. Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSION;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
4. Whispering Packets: Hiding Messages in VoIP Traffic;2024 5th International Conference on Computer Engineering and Application (ICCEA);2024-04-12
5. Amoeba: Circumventing ML-supported Network Censorship via Adversarial Reinforcement Learning;Proceedings of the ACM on Networking;2023-11-27