Tavish Vaidya

According to our database1, Tavish Vaidya authored at least 16 papers between 2015 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Ephemeral Exit Bridges for Tor.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor.
Proceedings of the 28th USENIX Security Symposium, 2019

You Talk Too Much: Limiting Privacy Exposure Via Voice Input.
Proceedings of the 2019 IEEE Security and Privacy Workshops, 2019

Does Being Verified Make You More Credible?: Account Verification's Effect on Tweet Credibility.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Whisper: a unilateral defense against VoIP traffic re-identification attacks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
An Extensive Evaluation of the Internet's Open Proxies.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

DeDoS: Defusing DoS with Dispersion Oriented Software.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Where art thou, Eve? Experiences laying traps for Internet eavesdroppers.
Proceedings of the 10th USENIX Workshop on Cyber Security Experimentation and Test, 2017

A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers.
Proceedings of the Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

2016
Hidden Voice Commands.
Proceedings of the 25th USENIX Security Symposium, 2016

Dispersing Asymmetric DDoS Attacks with SplitStack.
Proceedings of the 15th ACM Workshop on Hot Topics in Networks, 2016

2015
2001-2013: Survey and Analysis of Major Cyberattacks.
CoRR, 2015

Helping Users Understand Their Web Footprints.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Mind Your (R, \varPhi ) s: Location-Based Privacy Controls for Consumer Drones.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015


  Loading...