关注
Zachary Weinberg
Zachary Weinberg
Carnegie Mellon University
在 owlfolio.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
StegoTorus: A Camouflage Proxy for the Tor Anonymity System
Z Weinberg, J Wang, V Yegneswaran, L Briesemeister, S Cheung, ...
Proceedings of the 19th ACM conference on Computer and Communications Security, 2012
2442012
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
Z Weinberg, EY Chen, PR Jayaraman, C Jackson
2011 IEEE Symposium on Security and Privacy, 147-161, 2011
1622011
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
A Akhavan Niaki, S Cho, Z Weinberg, NP Hoang, A Razaghpanah, ...
IEEE Symposium on Security and Privacy (SP), 214-230, 2020
107*2020
How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation
Z Weinberg, S Cho, N Christin, V Sekar, P Gill
Proceedings of the Internet Measurement Conference 2018, 203-217, 2018
702018
Protecting browsers from Cross-Origin CSS attacks
LS Huang, Z Weinberg, C Evans, C Jackson
Proceedings of the 17th ACM conference on Computer and communications …, 2010
652010
Self-supervised euphemism detection and identification for content moderation
W Zhu, H Gong, R Bansal, Z Weinberg, N Christin, G Fanti, S Bhat
2021 IEEE Symposium on Security and Privacy (SP), 229-246, 2021
452021
Bootstrapping Communications into an Anti-Censorship System
P Lincoln, I Mason, P Porras, V Yegneswaran, Z Weinberg, J Massar, ...
Free and Open Communications on the Internet, 2012
312012
Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China
R Rambert, Z Weinberg, D Barradas, N Christin
Web Conference 2021, 472-483, 2021
272021
Topics of Controversy: An Empirical Analysis of Web Censorship Lists
Z Weinberg, M Sharif, J Szurdi, N Christin
Proceedings on Privacy Enhancing Technologies 2017 (1), 42-61, 2017
272017
Embodied Verbal Semantics: Evidence from a lexical matching task
S Narayan, BK Bergen, Z Weinberg
Annual Meeting of the Berkeley Linguistics Society 30 (1), 493-504, 2004
122004
A maintenance programmer’s view of GCC
Z Weinberg
GCC Developer’s Summit, 2003
92003
Toward Automated Worldwide Monitoring of Network-Level Censorship
Z Weinberg
Carnegie Mellon University, 2018
32018
STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming
B DeBruhl, YS Kim, Z Weinberg, P Tague
9th IEEE International Conference on Mobile Ad hoc and Sensor Systems, 2012
22012
Cooperative Meaning Construction in an Interactional Task
Z Weinberg, S Narayan, R Núñez
Conference presentation at CSDL, 2006
12006
Statically Typed Trees in GCC
N Sidwell, Z Weinberg
GCC Developers’ Summit, 149, 2004
12004
Selection of Landmarks for Efficient Active Geolocation
S Cho, Z Weinberg, A Bhattacharya, S Dai, R Rauf
Network Traffic Measurement and Analysis Conference (TMA), 2024
2024
Darwin's Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models
A Waheed, S Qunaibi, D Barradas, Z Weinberg
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 103-108, 2022
2022
系统目前无法执行此操作,请稍后再试。
文章 1–17