Cited By
View all- Chao DXu DGao FZhang CZhang WZhu L(2024)A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and FormalizationIEEE Communications Surveys & Tutorials10.1109/COMST.2024.335000626:3(1775-1829)Online publication date: Nov-2025
- Garg NShahid IAvllazagaj EHill JHan JRoy N(2023)ThermWareProceedings of the 24th International Workshop on Mobile Computing Systems and Applications10.1145/3572864.3580339(81-88)Online publication date: 22-Feb-2023
- Bin HZhao SLi ZYu NXi RZhu HSun L(2023)UID-Auto-Gen: Extracting Device Fingerprinting from Network Traffic2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)10.1109/IPCCC59175.2023.10253856(82-90)Online publication date: 17-Nov-2023
- Show More Cited By