Arnaud Legout

Orcid: 0000-0003-4706-424X

According to our database1, Arnaud Legout authored at least 41 papers between 2000 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting.
Proc. Priv. Enhancing Technol., 2022

2021
Evaluating Smartphone Accuracy for RSSI Measurements.
IEEE Trans. Instrum. Meas., 2021

Did I delete my cookies? Cookies respawning with browser fingerprinting.
CoRR, 2021

In-Depth Technical and Legal Analysis of Tracking on Health Related Websites with ERNIE Extension.
Proceedings of the WPES '21: Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic Society, 2021

2020
Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels.
Proc. Priv. Enhancing Technol., 2020

2018
Tracking the Pixels: Detecting Web Trackers via Analyzing Invisible Pixels.
CoRR, 2018

2016
Social Clicks: What and Who Gets Read on Twitter?
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

Demo: ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

2015
ReCon: Revealing and Controlling Privacy Leaks in Mobile Network Traffic.
CoRR, 2015

2014
Studying social networks at scale: macroscopic anatomy of the twitter social graph.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Sampling online social networks: an experimental study of twitter.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

How to network in online social networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

2013
Data plane throughput vs control plane delay: Experimental study of BitTorrent performance.
Proceedings of the 13th IEEE International Conference on Peer-to-Peer Computing, 2013

2012
Linking a Social Identity to an IP Address.
ERCIM News, 2012

Experimental Assessment of BitTorrent Completion Time in Heterogeneous TCP/uTP Swarms.
Proceedings of the Traffic Monitoring and Analysis - 4th International Workshop, 2012

Classification of content and users in BitTorrent by semi-supervised learning methods.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

Hybrid Approach for Experimental Networking Research.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

Meddle: middleboxes for increased transparency and control of mobile traffic.
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 2012

The complete picture of the Twitter social graph.
Proceedings of the 2012 ACM conference on CoNEXT student workshop, 2012

Efficacité et vie privée : de BitTorrent à Skype.
, 2012

2011
I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy
CoRR, 2011

Pushing BitTorrent locality to the limit.
Comput. Networks, 2011

A survey on YouTube streaming service.
Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools Communications, 2011

Network Non-neutrality Debate: An Economic Analysis.
Proceedings of the NETWORKING 2011, 2011

One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

Network characteristics of video streaming traffic.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

2010
Compromising Tor Anonymity Exploiting P2P Information Leakage
CoRR, 2010

De-anonymizing BitTorrent Users on Tor
CoRR, 2010

BitTorrent Experiments on Testbeds: A Study of the Impact of Network Latencies
CoRR, 2010

Can Realistic BitTorrent Experiments Be Performed on Clusters?
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent.
Proceedings of the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010

2009
Swarming Overlay Construction Strategies.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
Small is not always beautiful.
Proceedings of the 7th international conference on Peer-to-peer systems, 2008

2007
Understanding the Properties of the BitTorrent Overlay
CoRR, 2007

Clustering and sharing incentives in BitTorrent systems.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

2006
Rarest first and choke algorithms are enough.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2002
Revisiting the fair queuing paradigm for end-to-end congestion control.
IEEE Netw., 2002

2001
Bandwidth-allocation policies for unicast and multicast flows.
IEEE/ACM Trans. Netw., 2001

2000
PLM: fast convergence for cumulative layered multicast transmisson schemes.
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2000


  Loading...