Eric Chan-Tin

According to our database1, Eric Chan-Tin authored at least 50 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks.
CoRR, 2023

Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems.
CoRR, 2023

Userland Containers for Mobile Systems.
Proceedings of the 24th International Workshop on Mobile Computing Systems and Applications, 2023

Lightweight and Effective Website Fingerprinting Over Encrypted DNS.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

WebTracker: Real Webbrowsing Behaviors.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

2022
Comparing Online Surveys for Cybersecurity: SONA and MTurk.
EAI Endorsed Trans. Security Safety, 2022

Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning.
CoRR, 2022

Predicting Phishing Victimization: Roles of Protective and Vulnerable Strategies and Decision-Making Styles.
Proceedings of the SNTA@HPDC 2022, 2022

MLxPack: Investigating the Effects of Packers on ML-based Malware Detection Systems Using Static and Dynamic Traits.
Proceedings of the CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, 2022

The Personalities of Social Media Posts and Photos.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

CySSS '22: 1st International Workshop on Cybersecurity and Social Sciences.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Impact of Personality Types and Matching Messaging on Password Strength.
EAI Endorsed Trans. Security Safety, 2021

A Comparison of SONA and MTurk for Cybersecurity Surveys.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

AdvEdge: Optimizing Adversarial Perturbations Against Interpretable Deep Learning.
Proceedings of the Computational Data and Social Networks - 10th International Conference, 2021

2020
DP-ADMM: ADMM-Based Distributed Learning With Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2020

More Realistic Website Fingerprinting Using Deep Learning.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2020 Vision for Web Privacy.
Proceedings of the 3rd International Workshop on Systems and Network Telemetry and Analytics, 2020

Addressing Rogue Vehicles by Integrating Computer Vision, Activity Monitoring, and Contextual Information.
Proceedings of the Adjunct Proceedings of the 12th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, 2020

2019
Efficient, Effective, and Realistic Website Fingerprinting Mitigation.
EAI Endorsed Trans. Security Safety, 2019

Measuring Tor Relay Popularity.
Proceedings of the Security and Privacy in Communication Networks, 2019

Revisiting Assumptions for Website Fingerprinting Attacks.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
The case for HTTPS: measuring overhead and impact of certificate authorities.
Int. J. Secur. Networks, 2018

Smartphone passcode prediction.
IET Inf. Secur., 2018

DP-ADMM: ADMM-based Distributed Learning with Differential Privacy.
CoRR, 2018

Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Website Fingerprinting Attack Mitigation Using Traffic Morphing.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

2017
Towards an efficient distributed cloud computing architecture.
Peer-to-Peer Netw. Appl., 2017

Fluid Passwords - Mitigating the effects of password leaks at the user level.
CoRR, 2017

Wireless Interference Prediction for Embedded Health Devices.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

2016
Development of a Virtual Reality Based Simulation Environment for Orthopedic Surgical Training.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Workshops, 2016

2015
SmartPass: a smarter geolocation-based authentication scheme.
Secur. Commun. Networks, 2015

Why we hate IT: two surveys on pre-generated and expiring passwords in an academic setting.
Secur. Commun. Networks, 2015

Accurate geolocation using network coordinates.
Int. J. Secur. Networks, 2015

Hijacking the Vuze BitTorrent network: all your hop are belong to us.
IET Inf. Secur., 2015

AnonCall: Making Anonymous Cellular Phone Calls.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
Secure Routing and Scheduling in Ad-Hoc Cognitive Radio Networks for Public Safety.
Int. J. Handheld Comput. Res., 2014

Identifying Webbrowsers in Encrypted Communications.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

A unified framework for robust cooperative spectrum sensing.
Proceedings of the 48th Asilomar Conference on Signals, Systems and Computers, 2014

2013
Attacking the kad network - real world evaluation and high fidelity simulation using DVN.
Secur. Commun. Networks, 2013

Introducing a Distributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Revisiting Circuit Clogging Attacks on Tor.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
KoNKS: konsensus-style network koordinate system.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems.
ACM Trans. Inf. Syst. Secur., 2011

Accurate and Provably Secure Latency Estimation with Treeple.
Proceedings of the Network and Distributed System Security Symposium, 2011

2010
How much anonymity does network latency leak?
ACM Trans. Inf. Syst. Secur., 2010

Secure latency estimation with treeple.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems.
Proceedings of the Security and Privacy in Communication Networks, 2009

Why Kad Lookup Fails.
Proceedings of the Proceedings P2P 2009, 2009

Towards complete node enumeration in a peer-to-peer botnet.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Attacking the Kad network.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008


  Loading...