Articles with public access mandates - Nikita BorisovLearn more
Available somewhere: 14
Property inference attacks on fully connected neural networks using permutation invariant representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Mandates: US National Science Foundation, US Department of Energy
Detecting ai trojans using meta neural analysis
X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li
2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021
Mandates: US Department of Energy
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
A Das, N Borisov, M Caesar
NDSS, 2016
Mandates: US National Science Foundation
Enabling privacy-preserving incentives for mobile crowd sensing systems
H Jin, L Su, B Ding, K Nahrstedt, N Borisov
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Mandates: US National Science Foundation
PIR-Tor: Scalable anonymous communication using private information retrieval
P Mittal, F Olumofin, C Troncoso, N Borisov, I Goldberg
USENIX Security, 2011
Mandates: Research Foundation (Flanders)
Outguard: Detecting in-browser covert cryptocurrency mining in the wild
A Kharraz, Z Ma, P Murley, C Lever, J Mason, A Miller, N Borisov, ...
The World Wide Web Conference, 840-852, 2019
Mandates: US National Science Foundation
The web's sixth sense: A study of scripts accessing smartphone sensors
A Das, G Acar, N Borisov, A Pradeep
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Mandates: US National Science Foundation
DP5: A private presence service
N Borisov, G Danezis, I Goldberg
Proceedings on Privacy Enhancing Technologies, 2015
Mandates: UK Engineering and Physical Sciences Research Council
Assessing the privacy benefits of domain name encryption
NP Hoang, A Akhavan Niaki, N Borisov, P Gill, M Polychronakis
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
Mandates: US National Science Foundation
Conjure: Summoning proxies from unused address space
S Frolov, J Wampler, SC Tan, JA Halderman, N Borisov, E Wustrow
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Mandates: US National Science Foundation
Running refraction networking for real
B VanderSloot, S Frolov, J Wampler, SC Tan, I Simpson, M Kallitsis, ...
Proceedings on Privacy Enhancing Technologies, 2020
Mandates: US National Science Foundation
Scalable anonymous communication with provable security
P Mittal, N Borisov, C Troncoso, A Rial, IKU Leuven
5th USENIX conference on Hot topics in security (HotSec’10), 1-16, 2010
Mandates: Research Foundation (Flanders)
Tightrope: Towards optimal load-balancing of paths in anonymous networks
H Darir, H Sibai, N Borisov, G Dullerud, S Mitra
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 76-85, 2018
Mandates: US National Science Foundation
Mleflow: Learning from history to improve load balancing in tor
H Darir, H Sibai, CY Cheng, N Borisov, G Dullerud, S Mitra
Proceedings on Privacy Enhancing Technologies, 2022
Mandates: US National Science Foundation
Publication and funding information is determined automatically by a computer program