default search action
Arnaud Legout
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j6]Imane Fouad, Cristiana Santos, Arnaud Legout, Nataliia Bielova:
My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting. Proc. Priv. Enhancing Technol. 2022(3): 79-98 (2022) - 2021
- [j5]Yanis Boussad, Mohamed Naoufal Mahfoudi, Arnaud Legout, Leonardo Lizzi, Fabien Ferrero, Walid Dabbous:
Evaluating Smartphone Accuracy for RSSI Measurements. IEEE Trans. Instrum. Meas. 70: 1-12 (2021) - [c26]Vera Wesselkamp, Imane Fouad, Cristiana Santos, Yanis Boussad, Nataliia Bielova, Arnaud Legout:
In-Depth Technical and Legal Analysis of Tracking on Health Related Websites with ERNIE Extension. WPES@CCS 2021: 151-166 - [i24]Imane Fouad, Cristiana Santos, Arnaud Legout, Nataliia Bielova:
Did I delete my cookies? Cookies respawning with browser fingerprinting. CoRR abs/2105.04381 (2021) - 2020
- [j4]Imane Fouad, Nataliia Bielova, Arnaud Legout, Natasa Sarafijanovic-Djukic:
Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels. Proc. Priv. Enhancing Technol. 2020(2): 499-518 (2020)
2010 – 2019
- 2018
- [i23]Imane Fouad, Nataliia Bielova, Arnaud Legout, Natasa Sarafijanovic-Djukic:
Tracking the Pixels: Detecting Web Trackers via Analyzing Invisible Pixels. CoRR abs/1812.01514 (2018) - 2016
- [c25]Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David R. Choffnes:
Demo: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. MobiSys (Companion Volume) 2016: 117 - [c24]Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David R. Choffnes:
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic. MobiSys 2016: 361-374 - [c23]Maksym Gabielkov, Arthi Ramachandran, Augustin Chaintreau, Arnaud Legout:
Social Clicks: What and Who Gets Read on Twitter? SIGMETRICS 2016: 179-192 - 2015
- [i22]Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David R. Choffnes:
ReCon: Revealing and Controlling Privacy Leaks in Mobile Network Traffic. CoRR abs/1507.00255 (2015) - 2014
- [c22]Giovanni Neglia, Xiuhui Ye, Maksym Gabielkov, Arnaud Legout:
How to network in online social networks. INFOCOM Workshops 2014: 819-824 - [c21]Maksym Gabielkov, Ashwin Rao, Arnaud Legout:
Sampling online social networks: an experimental study of twitter. SIGCOMM 2014: 127-128 - [c20]Maksym Gabielkov, Ashwin Rao, Arnaud Legout:
Studying social networks at scale: macroscopic anatomy of the twitter social graph. SIGMETRICS 2014: 277-288 - [i21]Giovanni Neglia, Xiuhui Ye, Maksym Gabielkov, Arnaud Legout:
How to Network in Online Social Networks. CoRR abs/1403.0850 (2014) - [i20]Maksym Gabielkov, Ashwin Rao, Arnaud Legout:
Studying Social Networks at Scale: Macroscopic Anatomy of the Twitter Social Graph. CoRR abs/1404.1355 (2014) - 2013
- [c19]Claudio Testa, Dario Rossi, Ashwin Rao, Arnaud Legout:
Data plane throughput vs control plane delay: Experimental study of BitTorrent performance. P2P 2013: 1-5 - 2012
- [b1]Arnaud Legout:
Efficacité et vie privée : de BitTorrent à Skype. University of Nice Sophia Antipolis, France, 2012 - [c18]Maksym Gabielkov, Arnaud Legout:
The complete picture of the Twitter social graph. StudentWorkshop@CoNEXT 2012: 19-20 - [c17]Ashwin Rao, Justine Sherry, Arnaud Legout, Arvind Krishnamurthy, Walid Dabbous, David R. Choffnes:
Meddle: middleboxes for increased transparency and control of mobile traffic. StudentWorkshop@CoNEXT 2012: 65-66 - [c16]Amine Abidi, Sonia Mettali Gammar, Farouk Kamoun, Walid Dabbous, Thierry Turletti, Arnaud Legout:
Hybrid Approach for Experimental Networking Research. ICDCN 2012: 168-178 - [c15]Konstantin Avrachenkov, Paulo Gonçalves, Arnaud Legout, Marina Sokol:
Classification of content and users in BitTorrent by semi-supervised learning methods. IWCMC 2012: 625-630 - [c14]Claudio Testa, Dario Rossi, Ashwin Rao, Arnaud Legout:
Experimental Assessment of BitTorrent Completion Time in Heterogeneous TCP/uTP Swarms. TMA 2012: 52-65 - [i19]Arnaud Legout, Walid Dabbous:
Linking a Social Identity to an IP Address. ERCIM News 2012(90) (2012) - 2011
- [j3]Stevens Le Blond, Arnaud Legout, Walid Dabbous:
Pushing BitTorrent locality to the limit. Comput. Networks 55(3): 541-557 (2011) - [c13]Ashwin Rao, Arnaud Legout, Yeon-Sup Lim, Don Towsley, Chadi Barakat, Walid Dabbous:
Network characteristics of video streaming traffic. CoNEXT 2011: 25 - [c12]Stevens Le Blond, Chao Zhang, Arnaud Legout, Keith W. Ross, Walid Dabbous:
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy. Internet Measurement Conference 2011: 45-60 - [c11]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. LEET 2011 - [c10]Eitan Altman, Arnaud Legout, Yuedong Xu:
Network Non-neutrality Debate: An Economic Analysis. Networking (2) 2011: 68-81 - [c9]Majed Haddad, Eitan Altman, Rachid El Azouzi, Tania Jiménez, Salah-Eddine Elayoubi, Sana Ben Jamaa, Arnaud Legout, Ashwin Rao:
A survey on YouTube streaming service. VALUETOOLS 2011: 300-305 - [i18]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. CoRR abs/1103.1518 (2011) - [i17]Stevens Le Blond, Zhang Chao, Arnaud Legout, Keith W. Ross, Walid Dabbous:
I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy. CoRR abs/1109.4039 (2011) - [i16]Claudio Testa, Dario Rossi, Ashwin Rao, Arnaud Legout:
Experimental Assessment of BitTorrent Completion Time in Heterogeneous TCP/uTP swarms. CoRR abs/1110.5068 (2011) - [i15]Ashwin Rao, Yeon-Sup Lim, Chadi Barakat, Arnaud Legout, Don Towsley, Walid Dabbous:
Network Characteristics of Video Streaming Traffic. CoRR abs/1111.0948 (2011) - 2010
- [c8]Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar:
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. LEET 2010 - [c7]Ashwin Rao, Arnaud Legout, Walid Dabbous:
Can Realistic BitTorrent Experiments Be Performed on Clusters? Peer-to-Peer Computing 2010: 1-10 - [i14]Ashwin Rao, Arnaud Legout, Walid Dabbous:
BitTorrent Experiments on Testbeds: A Study of the Impact of Network Latencies. CoRR abs/1003.5746 (2010) - [i13]Stevens Le Blond, Arnaud Legout, Fabrice Le Fessant, Walid Dabbous, Mohamed Ali Kâafar:
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. CoRR abs/1004.0930 (2010) - [i12]Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Arnaud Legout, Claude Castelluccia, Walid Dabbous:
De-anonymizing BitTorrent Users on Tor. CoRR abs/1004.1267 (2010) - [i11]Pere Manils, Chaabane Abdelberi, Stevens Le Blond, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous:
Compromising Tor Anonymity Exploiting P2P Information Leakage. CoRR abs/1004.1461 (2010) - [i10]Ashwin Rao, Arnaud Legout, Walid Dabbous:
Can Realistic BitTorrent Experiments Be Performed on Clusters? CoRR abs/1006.4490 (2010) - [i9]Stevens Le Blond, Arnaud Legout, Walid Dabbous:
Pushing BitTorrent Locality to the Limit. CoRR abs/1011.1892 (2010) - [i8]Eitan Altman, Arnaud Legout, Yuedong Xu:
Network Non-neutrality Debate: An Economic Analysis. CoRR abs/1012.5862 (2010)
2000 – 2009
- 2009
- [c6]Anwar Al Hamra, Nikitas Liogkas, Arnaud Legout, Chadi Barakat:
Swarming Overlay Construction Strategies. ICCCN 2009: 1-6 - [i7]Anwar Al Hamra, Nikitas Liogkas, Arnaud Legout, Chadi Barakat:
Swarming Overlay Construction Strategies. CoRR abs/0905.3049 (2009) - 2008
- [c5]Pawel Marciniak, Nikitas Liogkas, Arnaud Legout, Eddie Kohler:
Small is not always beautiful. IPTPS 2008: 9 - [i6]Pawel Marciniak, Nikitas Liogkas, Arnaud Legout, Eddie Kohler:
Small Is Not Always Beautiful. CoRR abs/0802.1015 (2008) - [i5]Stevens Le Blond, Arnaud Legout, Walid Dabbous:
Pushing BitTorrent Locality to the Limit. CoRR abs/0812.0581 (2008) - 2007
- [c4]Arnaud Legout, Nikitas Liogkas, Eddie Kohler, Lixia Zhang:
Clustering and sharing incentives in BitTorrent systems. SIGMETRICS 2007: 301-312 - [i4]Anwar Al Hamra, Arnaud Legout, Chadi Barakat:
Understanding the Properties of the BitTorrent Overlay. CoRR abs/0707.1820 (2007) - [i3]Arnaud Legout, Nikitas Liogkas, Eddie Kohler, Lixia Zhang:
Clustering and Sharing Incentives in BitTorrent Systems. CoRR abs/cs/0703107 (2007) - 2006
- [c3]Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi:
Rarest first and choke algorithms are enough. Internet Measurement Conference 2006: 203-216 - [i2]Arnaud Legout, Guillaume Urvoy-Keller, Pietro Michiardi:
Rarest First and Choke Algorithms Are Enough. CoRR abs/cs/0609026 (2006) - [i1]Arnaud Legout, Nikitas Liogkas, Eddie Kohler, Lixia Zhang:
Clustering and Sharing Incentives in BitTorrent Systems. CoRR abs/cs/0611105 (2006) - 2002
- [j2]Arnaud Legout, Ernst W. Biersack:
Revisiting the fair queuing paradigm for end-to-end congestion control. IEEE Netw. 16(5): 38-46 (2002) - 2001
- [j1]Arnaud Legout, Jörg Nonnenmacher, Ernst W. Biersack:
Bandwidth-allocation policies for unicast and multicast flows. IEEE/ACM Trans. Netw. 9(4): 464-478 (2001) - 2000
- [c2]Arnaud Legout, Ernst W. Biersack:
PLM: fast convergence for cumulative layered multicast transmisson schemes. SIGMETRICS 2000: 13-22
1990 – 1999
- 1999
- [c1]Arnaud Legout, Jörg Nonnenmacher, Ernst W. Biersack:
Bandwidth Allocation Policies for Unicast and Multicast Flows. INFOCOM 1999: 254-261
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 00:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint