Xiang

Results: 4684



#Item
1Computer security / Cybercrime / Cyberwarfare / Computer network security / Security engineering / Computing / National security / Deception technology / Cyberattack / Intrusion detection system / Botnet / Denial-of-service attack

Poster: A Website Protection Framework Against Targeted Attacks based on Cyber Deception Jianbao Lin*, Chaoge Liu†, Xiang Cui*†‡, Zhaopeng Jia* * Beijing University of Posts and Telecommunications, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-15 12:53:26
2Computing / Information and communications technology / Internet / Internet privacy / Secure communication / Internet Standards / Cyberwarfare / Computer network security / Tor / Transmission Control Protocol / Traffic analysis / Proxy server

Touching from a Distance: Website Fingerprinting Attacks and Defenses Xiang Cai Xin Cheng Zhang

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2012-09-12 17:33:53
3Computing / Fingerprinting algorithms / Cryptography / Identification / Internet privacy / Biometrics / Computer network security / Device fingerprint / Internet fraud / Public key fingerprint / Fingerprint / Tor

Poster: Identify and Track Web Attacker Based on Deceptive Technology and Browser Fingerprint Heyang Lv1 Binxing Fang2 Xiang Cui3,4 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 06:46:30
4Concurrent computing / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Distributed computing / Malware / Botnet / Peer-to-peer / Social peer-to-peer processes

Poster: A Reputation-Based Resilient P2P Botnet Jie Yin1,2, Xiang Cui1,2, Ke Li3 1 2 Institute of Information Engineering, Chinese Academy of Sciences

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-12 09:17:38
5Computing / Concurrency control / Networking hardware / Information and communications technology / Concurrent computing / Computer networking / Computer network security / Middlebox / Monitor / Packet processing / Data Plane Development Kit / Transmission Control Protocol

Rollback-Recovery for Middleboxes Justine Sherry∗ Peter Xiang Gao∗ Soumya Basu∗ Aurojit Panda∗ Arvind Krishnamurthy• Christian Maciocco† Maziar Manesh† João Martins/ Sylvia Ratnasamy∗ Luigi Rizzo‡ Scot

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2015-07-16 16:30:14
6Computing / Internet / Network performance / Network architecture / Internet protocols / Internet Standards / Internet privacy / Secure communication / Transmission Control Protocol / SOCKS / Tor / TCP congestion control

CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense Xiang Cai Rishab Nithyanand

Add to Reading List

Source URL: www.freehaven.net

Language: English - Date: 2015-07-10 12:47:16
7Wireless networking / Computing / Wireless / Technology / Wireless sensor network / Big data / Internet of things / Sensor node / Zigbee / Collection Tree Protocol / Smart city / Crowdsensing

Recent Advances in Green Industrial Networking Embracing Big Data with Compressive Sensing: A Green Approach in Industrial Wireless Networks Linghe Kong, Daqiang Zhang, Zongjian He, Qiao Xiang, Jiafu Wan, and Meixia Tao

Add to Reading List

Source URL: wirelesslab.sjtu.edu.cn

Language: English - Date: 2017-04-17 03:11:53
8Computing / Internet / Internet security / Secure communication / Free software / Transmission Control Protocol / Tor / Support vector machine

Effective Attacks and Provable Defenses for Website Fingerprinting Tao Wang, University of Waterloo; Xiang Cai, Rishab Nithyanand, and Rob Johnson, Stony Brook University; Ian Goldberg, University of Waterloo https://www

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-20 08:19:38
9

CARE: Finding Local Linear Correlations in High Dimensional Data Xiang Zhang, Feng Pan, and Wei Wang Department of Computer Science University of North Carolina at Chapel Hill Chapel Hill, NC 27599, USA

Add to Reading List

Source URL: cs.unc.edu

Language: English - Date: 2008-02-10 23:19:52
    10

    Synthesis of Logic Interpretations Jian Xiang, John Knight, Kevin Sullivan Department of Computer Science University of Virginia Charlottesville, VA USA {Jian,Knight,Sullivan}@cs.virginia.edu

    Add to Reading List

    Source URL: jianxiang.info

    Language: English - Date: 2017-09-23 07:40:56
      UPDATE