Volgen
Eric Chan-Tin
Eric Chan-Tin
Associate Professor of Cybersecurity, Loyola University Chicago
Geverifieerd e-mailadres voor cs.luc.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
3272010
DP-ADMM: ADMM-based distributed learning with differential privacy
Z Huang, R Hu, Y Guo, E Chan-Tin, Y Gong
IEEE Transactions on Information Forensics and Security 15, 1002-1012, 2019
2212019
Towards complete node enumeration in a peer-to-peer botnet
BBH Kang, E Chan-Tin, CP Lee, J Tyra, HJ Kang, C Nunnery, Z Wadler, ...
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
902009
Attacking the kad network
P Wang, J Tyra, E Chan-Tin, T Malchow, DF Kune, N Hopper, Y Kim
Proceedings of the 4th international conference on Security and privacy in …, 2008
852008
Taking risks with cybersecurity: Using knowledge and personal characteristics to predict self-reported cybersecurity behaviors
SM Kennison, E Chan-Tin
Frontiers in Psychology 11, 546546, 2020
702020
The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems
E Chan-Tin, D Feldman, N Hopper, Y Kim
Security and Privacy in Communication Networks: 5th International ICST …, 2009
612009
The SAGE Encyclopedia of the Internet
B Warf
SAGE Publications Ltd, 2018
492018
Revisiting assumptions for website fingerprinting attacks
W Cui, T Chen, C Fields, J Chen, A Sierra, E Chan-Tin
Proceedings of the 2019 ACM asia conference on computer and communications …, 2019
472019
The frog-boiling attack: Limitations of secure network coordinate systems
E Chan-Tin, V Heorhiadi, N Hopper, Y Kim
ACM Transactions on information and system security (TISSEC) 14 (3), 1-23, 2011
442011
Why Kad lookup fails
HJ Kang, E Chan-Tin, NJ Hopper, Y Kim
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 121-130, 2009
402009
Introducing a distributed cloud architecture with efficient resource discovery and optimal resource allocation
P Khethavath, J Thomas, E Chan-Tin, H Liu
2013 IEEE Ninth World Congress on Services, 386-392, 2013
372013
Accurate and Provably Secure Latency Estimation with Treeple.
E Chan-Tin, N Hopper
NDSS, 2011
292011
Why we hate IT: two surveys on pre‐generated and expiring passwords in an academic setting
M Farcasin, E Chan‐tin
Security and Communication Networks 8 (13), 2361-2373, 2015
232015
Revisiting circuit clogging attacks on Tor
E Chan-Tin, J Shin, J Yu
2013 International Conference on Availability, Reliability and Security, 131-140, 2013
202013
Development of a virtual reality based simulation environment for orthopedic surgical training
J Cecil, MB Bharathi Raj Kumar, A Gupta, M Pirela-Cruz, E Chan-Tin, J Yu
On the Move to Meaningful Internet Systems: OTM 2016 Workshops: Confederated …, 2017
182017
Who creates strong passwords when nudging fails
SM Kennison, IT Jones, VH Spooner, DE Chan-Tin
Computers in Human Behavior Reports 4, 100132, 2021
172021
Towards an efficient distributed cloud computing architecture
P Khethavath, JP Thomas, E Chan-Tin
Peer-to-Peer Networking and Applications 10, 1152-1168, 2017
172017
Advedge: Optimizing adversarial perturbations against interpretable deep learning
E Abdukhamidov, M Abuhamad, F Juraev, E Chan-Tin, T AbuHmed
Computational Data and Social Networks: 10th International Conference …, 2021
162021
Realistic cover traffic to mitigate website fingerprinting attacks
W Cui, J Yu, Y Gong, E Chan-Tin
2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018
152018
More realistic website fingerprinting using deep learning
W Cui, T Chen, E Chan-Tin
2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020
142020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20