Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning P Sirinam, N Mathews, MS Rahman, M Wright Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 192 | 2019 |
Tik-tok: The utility of packet timing in website fingerprinting attacks MS Rahman, P Sirinam, N Mathews, KG Gangadhara, M Wright arXiv preprint arXiv:1902.06421, 2019 | 128 | 2019 |
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces MS Rahman, M Imani, N Mathews, M Wright IEEE Transactions on Information Forensics and Security 16, 1594-1609, 2020 | 97 | 2020 |
GANDaLF: GAN for data-limited fingerprinting SE Oh, N Mathews, MS Rahman, M Wright, N Hopper Proceedings on Privacy Enhancing Technologies 2021 (2), 2021 | 36 | 2021 |
Sok: A critical evaluation of efficient website fingerprinting defenses N Mathews, JK Holland, SE Oh, MS Rahman, N Hopper, M Wright 2023 IEEE Symposium on Security and Privacy (SP), 969-986, 2023 | 35 | 2023 |
DeepCoFFEA: Improved flow correlation attacks on Tor via metric learning and amplification SE Oh, T Yang, N Mathews, JK Holland, MS Rahman, N Hopper, M Wright 2022 IEEE Symposium on Security and Privacy (SP), 1915-1932, 2022 | 29 | 2022 |
Poster: video fingerprinting in tor MS Rahman, N Matthews, M Wright Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 11 | 2019 |
What a shame: Smart assistant voice command fingerprinting utilizing deep learning J Hyland, C Schneggenburger, N Lim, J Ruud, N Mathews, M Wright Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021 | 9 | 2021 |
Understanding feature discovery in website fingerprinting attacks N Mathews, P Sirinam, M Wright 2018 IEEE Western New York Image and Signal Processing Workshop (WNYISPW), 1-5, 2018 | 8 | 2018 |
Poster: Evaluating security metrics for website fingerprinting N Mathews, MS Rahman, M Wright Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 2 | 2019 |
ESPRESSO: Advanced End-to-End Flow Correlation Attacks on Tor T Chawla, S Mittal, N Mathews, M Wright Proceedings of the 8th Asia-Pacific Workshop on Networking, 219-220, 2024 | | 2024 |
WhisperVoiceTrace: A Comprehensive Analysis of Voice Command Fingerprinting H Kim, M Jo, J Hong, H Kang, N Mathews, SE Oh Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | | 2024 |