Xun Gong

Affiliations:
  • Google Security & Privacy, Safe Browsing team, Mountain View, CA, USA
  • University of Illinois at Urbana-Champaign, Department of Electrical Engineering, IL, USA


According to our database1, Xun Gong authored at least 18 papers between 2010 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Quantifying the Information Leakage in Timing Side Channels in Deterministic Work-Conserving Schedulers.
IEEE/ACM Trans. Netw., 2016

Sneak-Peek: High speed covert channels in data center networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Capacity limit of queueing timing channel in shared FCFS schedulers.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Timing channels in traffic analysis
PhD thesis, 2014

Timing Side Channels in Shared Queues.
CoRR, 2014

2013
Invisible Flow Watermarks for Channels With Dependent Substitution, Deletion, and Bursty Insertion Errors.
IEEE Trans. Inf. Forensics Secur., 2013

An Information Theoretic Study of Timing Side Channels in Two-user Schedulers.
CoRR, 2013

Timing side channels for traffic analysis.
Proceedings of the IEEE International Conference on Acoustics, 2013

PnP: improving web browsing performance over tor using web resource prefetch-and-push.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Designing Router Scheduling Policies: A Privacy Perspective.
IEEE Trans. Signal Process., 2012

CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-Resistant Web Browsing
CoRR, 2012

Website Detection Using Remote Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Invisible flow watermarks for channels with dependent substitution and deletion errors.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Information theoretic analysis of side channel information leakage in FCFS schedulers.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Designing privacy preserving router scheduling policies.
Proceedings of the 45st Annual Conference on Information Sciences and Systems, 2011

2010
Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks.
Proceedings of IEEE International Conference on Communications, 2010

Fingerprinting websites using remote traffic analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...