Követés
Nikita Borisov
Nikita Borisov
Professor of Electrical and Computer Engineering, University of Illinois at Urbana
E-mail megerősítve itt: illinois.edu - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Intercepting mobile communications: The insecurity of 802.11
N Borisov, I Goldberg, D Wagner
Proceedings of the 7th annual international conference on Mobile computing …, 2001
15762001
The tangled web of password reuse.
A Das, J Bonneau, M Caesar, N Borisov, XF Wang
NDSS 14 (2014), 23-26, 2014
6532014
EASiER: Encryption-based access control in social networks with efficient revocation
S Jahid, P Mittal, N Borisov
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
5942011
Property inference attacks on fully connected neural networks using permutation invariant representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
5672018
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
5282001
Off-the-record communication, or, why not to use PGP
N Borisov, I Goldberg, E Brewer
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 77-84, 2004
5202004
Flybynight: mitigating the privacy risks of social networking
MM Lucas, N Borisov
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 1-8, 2008
3582008
BotGrep: Finding P2P bots with structured graph analysis
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
Proceedings of the 19th USENIX conference on Security, 7-7, 2010
3552010
Detecting ai trojans using meta neural analysis
X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li
2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021
3462021
Denial of service or denial of security?
N Borisov, G Danezis, P Mittal, P Tabriz
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2552007
A tune-up for Tor: Improving security and performance in the Tor network
R Snader, N Borisov
Proceedings of the Network and Distributed Security Symposium-NDSS 8, 2008
2252008
Computational puzzles as sybil defenses
N Borisov
Peer-to-Peer Computing, 2006. P2P 2006. Sixth IEEE International Conference …, 2006
2242006
Do you hear what i hear? fingerprinting smart devices through embedded acoustic components
A Das, N Borisov, M Caesar
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2082014
Rainbow: A robust and invisible non-blind watermark for network flows
A Houmansadr, N Kiyavash, N Borisov
Proceedings of the Network and Distributed System Security Symposium (NDSS …, 2009
2032009
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
A Das, N Borisov, M Caesar
NDSS, 2016
1802016
DECENT: A decentralized architecture for enforcing privacy in online social networks
S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
1772012
Cirripede: circumvention infrastructure using router redirection with plausible deniability
A Houmansadr, GTK Nguyen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1752011
Cachet: a decentralized architecture for privacy preserving social networking with caching
S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia
Proceedings of the 8th international conference on Emerging networking …, 2012
1712012
A generic application-level protocol analyzer and its language
N Borisov, DJ Brumley, HJ Wang, J Dunagan, P Joshi, C Guo
14h Symposium on Network and Distributed System Security (NDSS), 2007
1652007
PIR-Tor: Scalable anonymous communication using private information retrieval
P Mittal, F Olumofin, C Troncoso, N Borisov, I Goldberg
USENIX Security, 2011
1572011
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20