Timing attacks in low-latency mix systems BN Levine, MK Reiter, C Wang, M Wright Financial Cryptography (FC 2004), 251-265, 2004 | 473* | 2004 |
Deep fingerprinting: Undermining website fingerprinting defenses with deep learning P Sirinam, M Imani, M Juarez, M Wright ACM Conference on Computer and Communications Security (CCS 2018), 2018 | 462 | 2018 |
Location privacy in sensor networks against a global eavesdropper K Mehta, D Liu, M Wright IEEE International Conference on Network Protocols (ICNP 2007), 314-323, 2007 | 318 | 2007 |
The predecessor attack: An analysis of a threat to anonymous communications systems MK Wright, M Adler, BN Levine, C Shields ACM Transactions on Information and System Security (TISSEC) 7 (4), 489-522, 2004 | 314 | 2004 |
An analysis of the degradation of anonymous protocols M Wright, M Adler, BN Levine, C Shields ISOC Symposium on Network and Distributed Systems Security (NDSS 2002), 39-50, 2002 | 298 | 2002 |
WTF-PAD: Toward an Efficient Website Fingerprinting Defense M Juarez, M Imani, M Perry, C Diaz, M Wright ESORICS, 27-46, 2016 | 295* | 2016 |
Defending anonymous communications against passive logging attacks M Wright, M Adler, BN Levine, C Shields IEEE Symposium on Security and Privacy (S&P 2003), 28-41, 2003 | 235 | 2003 |
Protecting location privacy in sensor networks against a global eavesdropper K Mehta, D Liu, M Wright IEEE Transactions on Mobile Computing (TMC) 11 (2), 320-336, 2012 | 228 | 2012 |
Salsa: A structured approach to large-scale anonymity A Nambiar, M Wright ACM Conference on Computer and Communications Security (CCS 2006), 17-26, 2006 | 202 | 2006 |
Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning P Sirinam, N Mathews, MS Rahman, M Wright Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 178 | 2019 |
Recurrent convolutional structures for audio spoof and video deepfake detection A Chintha, B Thai, SJ Sohrawardi, K Bhatt, A Hickerson, M Wright, ... IEEE Journal of Selected Topics in Signal Processing 14 (5), 1024-1037, 2020 | 155 | 2020 |
Fast detection of replica node attacks in mobile sensor networks using sequential analysis JW Ho, M Wright, SK Das IEEE INFOCOM 2009, 1773-1781, 2009 | 147 | 2009 |
Tik-Tok: The utility of packet timing in website fingerprinting attacks MS Rahman, P Sirinam, N Mathews, KG Gangadhara, M Wright Proceedings on Privacy Enhancing Technologies (PoPETs) 2020 (3), 5-24, 2020 | 120 | 2020 |
Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing JW Ho, M Wright, SK Das IEEE Transactions on Mobile Computing (TMC) 10 (6), 767-782, 2011 | 115 | 2011 |
Fast detection of node replication attacks in mobile sensor networks JW Ho, M Wright, SK Das IEEE ICNP, 2008 | 115* | 2008 |
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks JW Ho, D Liu, M Wright, SK Das Ad Hoc Networks 7 (8), 1476-1488, 2009 | 107 | 2009 |
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces MS Rahman, M Imani, N Mathews, M Wright IEEE Transactions on Information Forensics and Security 16, 1594-1609, 2020 | 92 | 2020 |
ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing JW Ho, M Wright, SK Das IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (4), 494-511, 2012 | 81 | 2012 |
A study of user password strategy for multiple accounts SMT Haque, M Wright, S Scielzo ACM Conference on Data and Application Security and Privacy (CODASPY 2013 …, 2013 | 74 | 2013 |
Pisces: Anonymous Communication Using Social Networks P Mittal, M Wright, N Borisov ISOC Network and Distributed Systems Security Symposium (NDSS 2013), 2013 | 72 | 2013 |