Effective attacks and provable defenses for website fingerprinting T Wang, X Cai, R Nithyanand, R Johnson, I Goldberg 23rd USENIX Security Symposium (USENIX Security 14), 143-157, 2014 | 569 | 2014 |
Improved website fingerprinting on tor T Wang, I Goldberg Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013 | 403 | 2013 |
A systematic approach to developing and evaluating website fingerprinting defenses X Cai, R Nithyanand, T Wang, R Johnson, I Goldberg Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 331 | 2014 |
Walkie-talkie: An efficient defense against passive website fingerprinting attacks T Wang, I Goldberg 26th USENIX Security Symposium (USENIX Security 17), 1375-1390, 2017 | 310 | 2017 |
On realistically attacking tor with website fingerprinting. T Wang, I Goldberg Proc. Priv. Enhancing Technol. 2016 (4), 21-36, 2016 | 225 | 2016 |
Zero-delay Lightweight Defenses against Website Fingerprinting J Gong, T Wang 29th {USENIX} Security Symposium ({USENIX} Security 20), 717-734, 2020 | 144 | 2020 |
Congestion-aware path selection for Tor T Wang, K Bauer, C Forero, I Goldberg Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 125 | 2012 |
High Precision Open-World Website Fingerprinting T Wang 2020 IEEE Symposium on Security and Privacy (SP), 152-167, 2020 | 78 | 2020 |
A multi-tab website fingerprinting attack Y Xu, T Wang, Q Li, Q Gong, Y Chen, Y Jiang Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 64 | 2018 |
Surakav: generating realistic traces for a strong website fingerprinting defense J Gong, W Zhang, C Zhang, T Wang 2022 IEEE Symposium on Security and Privacy (SP), 1558-1573, 2022 | 41 | 2022 |
An automated multi-tab website fingerprinting attack Q Yin, Z Liu, Q Li, T Wang, Q Wang, C Shen, Y Xu IEEE Transactions on Dependable and Secure Computing 19 (6), 3656-3670, 2021 | 39 | 2021 |
WFDefProxy: Real World Implementation and Evaluation of Website Fingerprinting Defenses J Gong, W Zhang, C Zhang, T Wang IEEE Transactions on Information Forensics and Security, 2023 | 22* | 2023 |
Exposing the Rat in the Tunnel: Using Traffic Analysis for Tor-based Malware Detection P Dodia, M AlSabah, O Alrawi, T Wang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 21 | 2022 |
The One-Page Setting: A Higher Standard for Evaluating Website Fingerprinting Defenses T Wang Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 21 | 2021 |
Designing a Better Browser for Tor with BLAST T Wang NDSS, 2020 | 3 | 2020 |
MixFlow: Assessing Mixnets Anonymity with Contrastive Architectures and Semantic Network Information R Attarian, E Mohammadi, T Wang, EH Beni Cryptology ePrint Archive, 2023 | 2 | 2023 |