{CoVisor}: a compositional hypervisor for {software-defined} networks X Jin, J Gossels, J Rexford, D Walker 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2015 | 349* | 2015 |
Structural data de-anonymization: Quantification, practice, and implications S Ji, W Li, M Srivatsa, R Beyah Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 140 | 2014 |
On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge. S Ji, W Li, NZ Gong, P Mittal, RA Beyah NDSS, 2015 | 112 | 2015 |
Structure based data de-anonymization of social networks and mobility traces S Ji, W Li, M Srivatsa, JS He, R Beyah Information Security: 17th International Conference, ISC 2014, Hong Kong …, 2014 | 76 | 2014 |
General graph data de-anonymization: From mobility traces to social networks S Ji, W Li, M Srivatsa, JS He, R Beyah ACM Transactions on Information and System Security (TISSEC) 18 (4), 1-29, 2016 | 45 | 2016 |
Structural data de-anonymization: Theory and practice S Ji, W Li, M Srivatsa, R Beyah IEEE/ACM Transactions on Networking 24 (6), 3523-3536, 2016 | 36 | 2016 |
Seed-based de-anonymizability quantification of social networks S Ji, W Li, NZ Gong, P Mittal, R Beyah IEEE Transactions on Information Forensics and Security 11 (7), 1398-1411, 2016 | 36 | 2016 |
De-sag: On the de-anonymization of structure-attribute graph data S Ji, T Wang, J Chen, W Li, P Mittal, R Beyah IEEE Transactions on Dependable and Secure Computing 16 (4), 594-607, 2017 | 29 | 2017 |
On the relative de-anonymizability of graph data: Quantification and evaluation S Ji, W Li, S Yang, P Mittal, R Beyah IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 22 | 2016 |
Poster: Optimization based data de-anonymization, 2014 S Ji, W Li, J He, M Srivatsa, R Beyah Poster presented at the 35th IEEE Symposium on Security and Privacy, May 18, 21, 2014 | 6 | 2014 |
Poster: optimization based data de-anonymization S Ji, W Li, J He, M Srivatsa, R Beyah Poster Presented at the 35th IEEE Symposium on Security and Privacy, May, 18-21, 0 | 1 | |
DE-ANONYMIZING SOCIAL NETWORKS AND MOBILITY TRACES W Li Georgia Institute of Technology, 2016 | | 2016 |
Supplementary File of “Structural Data De-anonymization: Theory and Practice” S Ji, W Li, M Srivatsa, R Beyah | | |
Prateek Mittal Princeton University S Ji, W Li, R Beyah, NZ Gong | | |
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes....... Z Liu, H Seo, J Großschädl, H Kim, S Ji, W Li, NZ Gong, P Mittal, R Beyah, ... | | |
Data De-anonymization: From Mobility Traces to On-line Social Networks S Ji, W Li, M Srivatsa, JS He, R Beyah | | |
Poster: De-anonymizing Mobility Traces and Social Data using Social Auxiliary Information S Ji, W Li, M Srivatsa, JS He, R Beyah | | |