| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2026 | J | jnl |
CoRR
|
| 2026 | — | conf |
NINeS
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
CoRR
|
| 2025 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2025 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A* | conf |
EMNLP
|
| 2024 | J | jnl |
CoRR
|
| 2024 | A | conf |
ICWSM
|
| 2024 | A* | conf |
SP
|
| 2024 | J | jnl |
CoRR
|
| 2024 | J | jnl |
CoRR
|
| 2023 | A* | conf |
USENIX Security Symposium
|
| 2023 | J | jnl |
CoRR
|
| 2023 | — | conf |
CoNEXT (Short Papers)
|
| 2023 | J | jnl |
CoRR
|
| 2023 | A | conf |
ICWSM
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Proc. Priv. Enhancing Technol.
|
| 2022 | A | conf |
ICWSM
|
| 2022 | A | conf |
ICWSM
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
Proc. ACM Hum. Comput. Interact.
|
| 2022 | J | jnl |
CoRR
|
| 2022 | J | jnl |
CoRR
|
| 2022 | A | conf |
ESA
|
| 2021 | J | jnl |
CoRR
|
| 2021 | J | jnl |
CoRR
|
| 2020 | A* | conf |
WWW
|
| 2020 | B | conf |
PAM
|
| 2020 | J | jnl |
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding.
Proc. Priv. Enhancing Technol.
|
| 2019 | J | jnl |
Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding.
CoRR
|
| 2019 | J | jnl |
CoRR
|
| 2018 | A* | conf |
NDSS
|
| 2018 | — | conf |
ANRW
|
| 2017 | A | conf |
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography.
CoNEXT
|
| 2017 | J | jnl |
A Churn for the Better: Localizing Censorship using Network-level Path Churn and Network Tomography.
CoRR
|
| 2017 | A* | conf |
USENIX Security Symposium
|
| 2017 | — | conf |
FOCI @ USENIX Security Symposium
|
| 2017 | J | jnl |
CoRR
|
| 2017 | J | jnl |
CoRR
|
| 2016 | J | jnl |
CoRR
|
| 2016 | — | conf |
FOCI
|
| 2016 | J | jnl |
CoRR
|
| 2016 | A | conf |
EuroS&P
|
| 2016 | J | jnl |
CoRR
|
| 2016 | A* | conf |
NDSS
|
| 2016 | J | jnl |
login Usenix Mag.
|
| 2016 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2015 | J | jnl |
CoRR
|
| 2014 | A* | conf |
CCS
|
| 2014 | — | conf |
WPES
|
| 2014 | A* | conf |
USENIX Security Symposium
|
| 2014 | — | conf |
WPES
|
| 2014 | J | jnl |
CoRR
|
| 2014 | J | jnl |
CoRR
|
| 2013 | J | jnl |
J. Comput. Secur.
|
| 2013 | — | conf |
WPES
|
| 2012 | — | conf |
IEEE Symposium on Security and Privacy Workshops
|
| 2011 | A* | conf |
CCS
|
| 2011 | A | conf |
ESORICS
|
| 2011 | J | jnl |
J. Comput. Secur.
|
| 2010 | Misc | conf |
UbiComp
|
| 2010 | A | conf |
ESORICS
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|
| 2009 | J | jnl |
IACR Cryptol. ePrint Arch.
|