How much anonymity does network latency leak? N Hopper, EY Vasserman, E Chan-Tin ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010 | 323 | 2010 |
DP-ADMM: ADMM-based distributed learning with differential privacy Z Huang, R Hu, Y Guo, E Chan-Tin, Y Gong IEEE Transactions on Information Forensics and Security 15, 1002-1012, 2019 | 202 | 2019 |
Towards complete node enumeration in a peer-to-peer botnet BBH Kang, E Chan-Tin, CP Lee, J Tyra, HJ Kang, C Nunnery, Z Wadler, ... Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 89 | 2009 |
Attacking the kad network P Wang, J Tyra, E Chan-Tin, T Malchow, DF Kune, N Hopper, Y Kim Proceedings of the 4th international conference on Security and privacy in …, 2008 | 84 | 2008 |
The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems E Chan-Tin, D Feldman, N Hopper, Y Kim Security and Privacy in Communication Networks: 5th International ICST …, 2009 | 61 | 2009 |
Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors SM Kennison, E Chan-Tin Frontiers in Psychology 11, 546546, 2020 | 58 | 2020 |
The SAGE Encyclopedia of the Internet B Warf SAGE Publications Ltd, 2018 | 47 | 2018 |
The frog-boiling attack: Limitations of secure network coordinate systems E Chan-Tin, V Heorhiadi, N Hopper, Y Kim ACM Transactions on information and system security (TISSEC) 14 (3), 1-23, 2011 | 44 | 2011 |
Revisiting assumptions for website fingerprinting attacks W Cui, T Chen, C Fields, J Chen, A Sierra, E Chan-Tin Proceedings of the 2019 ACM asia conference on computer and communications …, 2019 | 41 | 2019 |
Why Kad lookup fails HJ Kang, E Chan-Tin, NJ Hopper, Y Kim 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 121-130, 2009 | 39 | 2009 |
Introducing a distributed cloud architecture with efficient resource discovery and optimal resource allocation P Khethavath, J Thomas, E Chan-Tin, H Liu 2013 IEEE Ninth World Congress on Services, 386-392, 2013 | 37 | 2013 |
Accurate and Provably Secure Latency Estimation with Treeple. E Chan-Tin, N Hopper NDSS, 2011 | 29 | 2011 |
Why we hate IT: two surveys on pre‐generated and expiring passwords in an academic setting M Farcasin, E Chan‐tin Security and Communication Networks 8 (13), 2361-2373, 2015 | 21 | 2015 |
Revisiting circuit clogging attacks on Tor E Chan-Tin, J Shin, J Yu 2013 International Conference on Availability, Reliability and Security, 131-140, 2013 | 20 | 2013 |
Development of a virtual reality based simulation environment for orthopedic surgical training J Cecil, MB Bharathi Raj Kumar, A Gupta, M Pirela-Cruz, E Chan-Tin, J Yu On the Move to Meaningful Internet Systems: OTM 2016 Workshops: Confederated …, 2017 | 17 | 2017 |
Towards an efficient distributed cloud computing architecture P Khethavath, JP Thomas, E Chan-Tin Peer-to-Peer Networking and Applications 10, 1152-1168, 2017 | 16 | 2017 |
Who creates strong passwords when nudging fails SM Kennison, IT Jones, VH Spooner, DE Chan-Tin Computers in Human Behavior Reports 4, 100132, 2021 | 14 | 2021 |
Advedge: Optimizing adversarial perturbations against interpretable deep learning E Abdukhamidov, M Abuhamad, F Juraev, E Chan-Tin, T AbuHmed Computational Data and Social Networks: 10th International Conference …, 2021 | 14 | 2021 |
Smartphone passcode prediction T Chen, M Farcasin, E Chan‐Tin IET Information Security 12 (5), 431-437, 2018 | 14 | 2018 |
Realistic cover traffic to mitigate website fingerprinting attacks W Cui, J Yu, Y Gong, E Chan-Tin 2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018 | 14 | 2018 |