- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Spam and Phishing Detection
- Speech Recognition and Synthesis
- Speech and Audio Processing
- Caching and Content Delivery
- Gene Regulatory Network Analysis
- Hate Speech and Cyberbullying Detection
- Complex Network Analysis Techniques
- Social Capital and Networks
- Blockchain Technology Applications and Security
- Graph theory and applications
- Cloud Computing and Resource Management
- Advanced Steganography and Watermarking Techniques
- Privacy-Preserving Technologies in Data
- Knowledge Management and Sharing
Simon Fraser University
2021-2024
University of Hong Kong
2018-2020
Hong Kong University of Science and Technology
2018-2020
Hudson Institute
2019
John Wiley & Sons (United States)
2019
City University of Hong Kong
2019
Traffic analysis attacks to identify which web page a client is browsing, using only her packet metadata - known as website fingerprinting (WF) has been proven effective in closed-world experiments against privacy technologies like Tor. We want investigate their usefulness the real open world. Several WF claim have high recall and low false positive rate, but they shown succeed base rate pages. explicitly incorporate into precision call it r-precision. Using this metric, we show that best...
Website Fingerprinting (WF) attacks utilize size and timing information of encrypted network traffic to infer the user's browsing activity, posing a great threat privacy-enhancing technologies like Tor; nevertheless, Tor has not adopted any defense because existing defenses are convincing enough show their effectiveness. Some have been overcome by newer attacks; other never implemented tested in real open-world scenario.In this paper, we propose Surakav, tunable practical that is effective...
In a Website Fingerprinting (WF) attack, local, passive eavesdropper utilizes network flow information to identify which web pages user is browsing. Previous researchers have extensively demonstrated the feasibility and effectiveness of WF, but only under strong Single Page Assumption: extracted by adversary always belongs single page. other words, WF classifier will never be asked classify corresponding more than one page, or part The Assumption unrealistic because people often browse with...
In Website Fingerprinting (WF) attack, a local passive eavesdropper utilizes network flow information to identify which web pages user is browsing. Previous researchers have demonstrated the feasibility and effectiveness of WF attacks under strong Single Page Assumption: extracted by adversary belongs single page. reality, assumption may not hold because users tend open multiple tabs simultaneously (or within short period time) so that their traffic mixed. this article, we propose an...
Tor~\citetor is the most widely used anonymous communication network with millions of daily users~\citetormetrics. Since Tor provides server and client anonymity, hundreds malware binaries found in wild rely on it to hide their presence hinder Command & Control (C&C) takedown operations. We believe a paramount tool enabling online freedom privacy, blocking defend against such infeasible for both users organizations. In this work, we present effective traffic analysis approaches that can...
Offchain networks emerge as a promising solution to address the scalability challenge of blockchain. Participants directly make payments through network payment channels without overhead committing onchain transactions. Routing is critical performance offchain networks. Existing solutions use either static routing with poor or dynamic high obtain channel balance information. In this paper, we propose Flash, new that leverages unique characteristics transactions in strike better tradeoff...
Tor, an onion-routing anonymity network, has been shown to be vulnerable Website Fingerprinting (WF), which de-anonymizes web browsing by analyzing the unique characteristics of encrypted network traffic. Although many defenses have proposed, few implemented and tested in real world; others were only simulated. Due its synthetic nature, simulation may fail capture performance these defenses. To figure out how perform world, we propose WFDefProxy, a general platform for WF defense...
The onion router (Tor) is a network system for anonymous communication. However, website fingerprinting (WF) attacks have threatened the anonymity of Tor. WF attackers can passively monitor and collect traffic, classify victims' traffic based on machine learning or deep learning, identify websites victims visit. In recent years, there has been some research defense, but most works high bandwidth latency overhead. Besides, defenses are criticized as being unrealistic to implement in real-time...
This paper, the factors to consider dynamic and static local routing strategy of scalefree networks.Don't have access global information for large network, put forward a kind combined with current topology network node traffic flow situation considering information.Based on scale-free networks in simulation model, analyses congestion shift.Through experiments research, found that there are optimal control parameters, makes throughput can reach maximum.
Traffic analysis attacks to identify which web page a client is browsing, using only her packet metadata --- known as website fingerprinting has been proven effective in closed-world experiments against privacy technologies like Tor. However, due the base rate fallacy, these have failed large open-world settings clients that visit sensitive pages with low rate. We find this because they poor precision were designed maximize recall. In work, we argue more important than recall for...
Do entrepreneurs in online communities gain more knowledge from their peers when they present inquiries with empathy cues such as emotional distress and personal profile? While can evoke one’s motivate prosocial helping behaviour, also signal the high expectation of seeker cognitive cost provider to fulfil expectation. Given self-disclosure intimate information communications process, we adopt social penetration theory examine utility sharing entrepreneurs. We hypothesize that embedded will...