default search action
Matthew Wright 0001
Person information
- affiliation: Rochester Institute of Technology, NY, USA
- affiliation (former): University of Texas at Arlington, Department of Computer Science and Engineering
- affiliation (former): University of Massachusetts Amherst, Department of Computer Science
Other persons with the same name
- Matthew Wright (aka: Matt Wright) — disambiguation page
- Matthew Wright 0002 (aka: Matthew James Wright) — Stanford University, Center for Computer Research in Music and Acoustics, CA, USA (and 1 more)
- Matthew Wright 0003 — King's College London, Biomedical Engineering, UK
- Matthew Wright 0004 — University of Minnesota, USA
- Matthew Wright 0005 (aka: Matthew L. Wright) — St. Olaf College, Northfield, MN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Nate Mathews, James K. Holland, Nicholas Hopper, Matthew Wright:
Laserbeak: Evolving Website Fingerprinting Attacks With Attention and Multi-Channel Feature Representation. IEEE Trans. Inf. Forensics Secur. 19: 9285-9300 (2024) - [c64]Tisha Chawla, Shubh Mittal, Nate Mathews, Matthew Wright:
ESPRESSO: Advanced End-to-End Flow Correlation Attacks on Tor. APNet 2024: 219-220 - [c63]Saniat Javid Sohrawardi, Y. Kelly Wu, Andrea Hickerson, Matthew Wright:
Dungeons & Deepfakes: Using scenario-based role-play to study journalists' behavior towards using AI-based verification tools for video content. CHI 2024: 776:1-776:17 - [c62]Ankit Shrestha, Audrey Flood, Saniat Javid Sohrawardi, Matthew Wright, Mahdi Nasrullah Al-Ameen:
A First Look into Targeted Clickbait and its Countermeasures: The Power of Storytelling. CHI 2024: 971:1-971:23 - 2023
- [c61]Nate Mathews, James K. Holland, Se Eun Oh, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright:
SoK: A Critical Evaluation of Efficient Website Fingerprinting Defenses. SP 2023: 969-986 - 2022
- [j35]Mahdi Nasrullah Al-Ameen, Sonali Tukaram Marne, Kanis Fatema, Matthew Wright, Shannon Scielzo:
On improving the memorability of system-assigned recognition-based passwords. Behav. Inf. Technol. 41(5): 1115-1131 (2022) - [c60]Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright:
On the Limitations of Continual Learning for Malware Classification. CoLLAs 2022: 564-582 - [c59]Se Eun Oh, Taiji Yang, Nate Mathews, James K. Holland, Mohammad Saidur Rahman, Nicholas Hopper, Matthew Wright:
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification. SP 2022: 1915-1932 - [c58]Shaikh Akib Shahriyar, Matthew K. Wright:
Evaluating Robustness of Sequence-based Deepfake Detector Models by Adversarial Perturbation. WDC@AsiaCCS 2022: 13-18 - [i22]Mohammad Saidur Rahman, Scott E. Coull, Matthew Wright:
On the Limitations of Continual Learning for Malware Classification. CoRR abs/2208.06568 (2022) - 2021
- [j34]Sovantharith Seng, Mahdi Nasrullah Al-Ameen, Matthew Wright:
A first look into users' perceptions of facial recognition in the physical world. Comput. Secur. 105: 102227 (2021) - [j33]Sovantharith Seng, Mahdi Nasrullah Al-Ameen, Matthew Wright:
A look into user privacy andthird-party applications in Facebook. Inf. Comput. Secur. 29(2): 283-313 (2021) - [j32]Se Eun Oh, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright, Nicholas Hopper:
GANDaLF: GAN for Data-Limited Fingerprinting. Proc. Priv. Enhancing Technol. 2021(2): 305-322 (2021) - [j31]Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright:
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces. IEEE Trans. Inf. Forensics Secur. 16: 1594-1609 (2021) - [c57]Xinmiao Lin, Wentao Bao, Matthew K. Wright, Yu Kong:
Gradient Frequency Modulation for Visually Explaining Video Understanding Models. BMVC 2021: 14 - [c56]Jayesh Doolani, Matthew Wright, Rajesh Setty, S. M. Taiabul Haque:
LociMotion: Towards Learning a Strong Authentication Secret in a Single Session. CHI 2021: 689:1-689:13 - [c55]Jack Hyland, Conrad Schneggenburger, Nick Lim, Jake Ruud, Nate Mathews, Matthew Wright:
What a SHAME: Smart Assistant Voice Command Fingerprinting Utilizing Deep Learning. WPES@CCS 2021: 237-243 - [i21]Xinmiao Lin, Wentao Bao, Matthew K. Wright, Yu Kong:
Gradient Frequency Modulation for Visually Explaining Video Understanding Models. CoRR abs/2111.01215 (2021) - 2020
- [j30]Akash Chintha, Bao Thai, Saniat Javid Sohrawardi, Kartavya Bhatt, Andrea Hickerson, Matthew Wright, Raymond W. Ptucha:
Recurrent Convolutional Structures for Audio Spoof and Video Deepfake Detection. IEEE J. Sel. Top. Signal Process. 14(5): 1024-1037 (2020) - [j29]Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright:
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. Proc. Priv. Enhancing Technol. 2020(3): 5-24 (2020) - [c54]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright:
A Forensically Sound Method of Identifying Downloaders and Uploaders in Freenet. CCS 2020: 1497-1512 - [c53]Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan:
They Might NOT Be Giants Crafting Black-Box Adversarial Examples Using Particle Swarm Optimization. ESORICS (2) 2020: 439-459 - [c52]Akash Chintha, Aishwarya Rao, Saniat Javid Sohrawardi, Kartavya Bhatt, Matthew Wright, Raymond W. Ptucha:
Leveraging edges and optical flow on faces for deepfake detection. IJCB 2020: 1-10 - [c51]Perry Deng, Cooper Linsky, Matthew Wright:
Weaponizing Unicodes with Deep Learning -Identifying Homoglyphs with Weakly Labeled Data. ISI 2020: 1-6 - [i20]Perry Deng, Cooper Linsky, Matthew Wright:
Weaponizing Unicodes with Deep Learning - Identifying Homoglyphs with Weakly Labeled Data. CoRR abs/2010.04382 (2020) - [i19]Perry Deng, Mohammad Saidur Rahman, Matthew Wright:
Detecting Adversarial Patches with Class Conditional Reconstruction Networks. CoRR abs/2011.05850 (2020)
2010 – 2019
- 2019
- [j28]Mohsen Imani, Mehrdad Amirabadi, Matthew Wright:
Modified relay selection and circuit selection for faster Tor. IET Commun. 13(17): 2723-2734 (2019) - [c50]Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, Matthew Wright:
Triplet Fingerprinting: More Practical and Portable Website Fingerprinting with N-shot Learning. CCS 2019: 1131-1148 - [c49]Saniat Javid Sohrawardi, Akash Chintha, Bao Thai, Sovantharith Seng, Andrea Hickerson, Raymond W. Ptucha, Matthew Wright:
Poster: Towards Robust Open-World Detection of Deepfakes. CCS 2019: 2613-2615 - [c48]Sovantharith Seng, Huzeyfe Kocabas, Mahdi Nasrullah Al-Ameen, Matthew Wright:
Poster: Understanding User's Decision to Interact with Potential Phishing Posts on Facebook using a Vignette Study. CCS 2019: 2617-2619 - [c47]Nate Mathews, Mohammad Saidur Rahman, Matthew Wright:
Poster: Evaluating Security Metrics for Website Fingerprinting. CCS 2019: 2625-2627 - [c46]Mohammad Saidur Rahman, Nate Mathews, Matthew Wright:
Poster: Video Fingerprinting in Tor. CCS 2019: 2629-2631 - [i18]Mohammad Saidur Rahman, Payap Sirinam, Nate Mathews, Kantha Girish Gangadhara, Matthew Wright:
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks. CoRR abs/1902.06421 (2019) - [i17]Mohsen Imani, Mohammad Saidur Rahman, Nate Mathews, Aneesh Yogesh Joshi, Matthew Wright:
Adv-DWF: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. CoRR abs/1902.06626 (2019) - [i16]Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan:
They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization. CoRR abs/1909.07490 (2019) - 2018
- [j27]Mohsen Imani, Armon Barton, Matthew Wright:
Guard Sets in Tor using AS Relationships. Proc. Priv. Enhancing Technol. 2018(1): 145-165 (2018) - [c45]Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright:
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. CCS 2018: 1928-1943 - [c44]Mohsen Imani, Mohammad Saidur Rahman, Matthew Wright:
Adversarial Traces for Website Fingerprinting Defense. CCS 2018: 2225-2227 - [c43]Armon Barton, Matthew Wright, Jiang Ming, Mohsen Imani:
Towards Predicting Efficient and Anonymous Tor Circuits. USENIX Security Symposium 2018: 429-444 - [i15]Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright:
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. CoRR abs/1801.02265 (2018) - [i14]Armon Barton, Mohsen Imani, Jiang Ming, Matthew Wright:
Towards Predicting Efficient and Anonymous Tor Circuits. CoRR abs/1805.01977 (2018) - 2017
- [j26]Jun-Won Ho, Matthew K. Wright:
Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations. IEEE Access 5: 680-695 (2017) - [j25]Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
Exploring the Potential of GeoPass: A Geographic Location-Password Scheme. Interact. Comput. 29(4): 605-627 (2017) - [c42]John P. Podolanko, Revanth Pobala, Hussain Mucklai, George Danezis, Matthew Wright:
LiLAC: Lightweight Low-Latency Anonymous Chat. PAC 2017: 141-151 - [c41]Sonali Tukaram Marne, Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
Learning System-assigned Passwords: A Preliminary Study on the People with Learning Disabilities. SOUPS 2017 - [c40]Brian Neil Levine, Marc Liberatore, Brian Lynn, Matthew Wright:
Statistical Detection of Downloaders in Freenet. IWPE@SP 2017: 25-32 - [i13]Mohsen Imani, Armon Barton, Matthew Wright:
Forming Guard Sets using AS Relationships. CoRR abs/1706.05592 (2017) - [i12]Mohsen Imani, Mehrdad Amirabadi, Matthew Wright:
The Evaluation of Circuit Selection Methods on Tor. CoRR abs/1706.06457 (2017) - 2016
- [j24]Mahdi Nasrullah Al-Ameen, S. M. Taiabul Haque, Matthew K. Wright:
Leveraging autobiographical memory for two-factor online authentication. Inf. Comput. Secur. 24(4): 386-399 (2016) - [j23]Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
iPersea: Towards improving the Sybil-resilience of social DHT. J. Netw. Comput. Appl. 71: 1-10 (2016) - [j22]Armon Barton, Matthew Wright:
DeNASA: Destination-Naive AS-Awareness in Anonymous Communications. Proc. Priv. Enhancing Technol. 2016(4): 356-372 (2016) - [c39]Omid Asudeh, Matthew Wright:
POSTER: Phishing Website Detection with a Multiphase Framework to Find Visual Similarity. CCS 2016: 1790-1792 - [c38]Marc Juarez, Mohsen Imani, Mike Perry, Claudia Díaz, Matthew Wright:
Toward an Efficient Website Fingerprinting Defense. ESORICS (1) 2016: 27-46 - [c37]Miri Choi, Jaewon Jang, Yeeji Kwon, Subeen Lim, Jun-Won Ho, Matthew K. Wright:
Split-Pipeline Model for Worm Propagation over IoT. IOT 2016: 155-156 - [i11]Mohsen Imani, Mehrdad Amirabadi, Matthew Wright:
Modified Relay Selection and Circuit Selection for Faster Tor. CoRR abs/1608.07343 (2016) - 2015
- [c36]Changchang Liu, Peng Gao, Matthew K. Wright, Prateek Mittal:
Exploiting Temporal Dynamics in Sybil Defenses. CCS 2015: 805-816 - [c35]Mahdi Nasrullah Al-Ameen, Matthew K. Wright, Shannon Scielzo:
Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues. CHI 2015: 2315-2324 - [c34]Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright, Shannon Scielzo:
Leveraging Real-Life Facts to Make Random Passwords More Memorable. ESORICS (2) 2015: 438-455 - [c33]Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew K. Wright, Shannon Scielzo:
The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords. SOUPS 2015: 185-196 - [i10]Mahdi Nasrullah Al-Ameen, Matthew K. Wright, Shannon Scielzo:
Towards Making Random Passwords Memorable: Leveraging Users' Cognitive Ability Through Multiple Cues. CoRR abs/1503.02314 (2015) - [i9]Marc Juarez, Mohsen Imani, Mike Perry, Claudia Díaz, Matthew Wright:
WTF-PAD: Toward an Efficient Website Fingerprinting Defense for Tor. CoRR abs/1512.00524 (2015) - 2014
- [j21]Ying-Dar Lin, Chun-Ying Huang, Matthew K. Wright, Georgios Kambourakis:
Mobile Application Security. Computer 47(6): 21-23 (2014) - [j20]S. M. Taiabul Haque, Matthew K. Wright, Shannon Scielzo:
Hierarchy of users' web passwords: Perceptions, practices and susceptibilities. Int. J. Hum. Comput. Stud. 72(12): 860-874 (2014) - [j19]Mayank Raj, Na Li, Donggang Liu, Matthew K. Wright, Sajal K. Das:
Using data mules to preserve source location privacy in Wireless Sensor Networks. Pervasive Mob. Comput. 11: 244-260 (2014) - [j18]Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew K. Wright:
ReDS: A Framework for Reputation-Enhanced DHTs. IEEE Trans. Parallel Distributed Syst. 25(2): 321-331 (2014) - [c32]Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
Design and evaluation of persea, a sybil-resistant DHT. AsiaCCS 2014: 75-86 - [c31]Jody Sankey, Matthew K. Wright:
Dovetail: Stronger Anonymity in Next-Generation Internet Routing. Privacy Enhancing Technologies 2014: 283-303 - [c30]S. M. Taiabul Haque, Shannon Scielzo, Matthew K. Wright:
Applying Psychometrics to Measure User Comfort when Constructing a Strong Password. SOUPS 2014: 231-242 - [i8]Nabila Rahman, Matthew K. Wright, Donggang Liu:
Fast and energy-efficient technique for jammed region mapping in wireless sensor networks. CoRR abs/1401.7002 (2014) - [i7]Jody Sankey, Matthew K. Wright:
Dovetail: Stronger Anonymity in Next-Generation Internet Routing. CoRR abs/1405.0351 (2014) - [i6]Mahdi Nasrullah Al-Ameen, S. M. Taiabul Haque, Matthew K. Wright:
Q-A: Towards the Solution of Usability-Security Tension in User Authentication. CoRR abs/1407.7277 (2014) - [i5]Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
A Comprehensive Study of the GeoPass User Authentication Scheme. CoRR abs/1408.2852 (2014) - [i4]Mahdi Nasrullah Al-Ameen, Matthew K. Wright:
iPersea : The Improved Persea with Sybil Detection Mechanism. CoRR abs/1412.6883 (2014) - 2013
- [j17]Kush Kothari, Matthew K. Wright:
Mimic: An active covert channel that evades regularity-based detection. Comput. Networks 57(3): 647-657 (2013) - [j16]Qi Dong, Donggang Liu, Matthew K. Wright:
Mitigating jamming attacks in wireless broadcast systems. Wirel. Networks 19(8): 1867-1880 (2013) - [c29]S. M. Taiabul Haque, Matthew K. Wright, Shannon Scielzo:
Passwords and interfaces: towards creating stronger passwords by using mobile phone handsets. SPSM@CCS 2013: 105-110 - [c28]Mahdi N. Al-Ameen, Matthew K. Wright:
Persea: a sybil-resistant social DHT. CODASPY 2013: 169-172 - [c27]S. M. Taiabul Haque, Matthew K. Wright, Shannon Scielzo:
A study of user password strategy for multiple accounts. CODASPY 2013: 173-176 - [c26]Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. NDSS 2013: 1-18 - [e2]Emiliano De Cristofaro, Matthew K. Wright:
Privacy Enhancing Technologies - 13th International Symposium, PETS 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings. Lecture Notes in Computer Science 7981, Springer 2013, ISBN 978-3-642-39076-0 [contents] - 2012
- [j15]Jun-Won Ho, Matthew K. Wright, Sajal K. Das:
Distributed detection of mobile malicious node attacks in wireless sensor networks. Ad Hoc Networks 10(3): 512-523 (2012) - [j14]Mahdi N. Al-Ameen, Charles Gatz, Matthew K. Wright:
SDA-2H: Understanding the Value of Background Cover Against Statistical Disclosure. J. Networks 7(12): 1943-1951 (2012) - [j13]Jun-Won Ho, Matthew K. Wright, Sajal K. Das:
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing. IEEE Trans. Dependable Secur. Comput. 9(4): 494-511 (2012) - [j12]Kiran Mehta, Donggang Liu, Matthew K. Wright:
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper. IEEE Trans. Mob. Comput. 11(2): 320-336 (2012) - [c25]Kartik Siddhabathula, Qi Dong, Donggang Liu, Matthew K. Wright:
Fast jamming detection in sensor networks. ICC 2012: 934-938 - [c24]Na Li, Mayank Raj, Donggang Liu, Matthew K. Wright, Sajal K. Das:
Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks. ICDCN 2012: 309-324 - [c23]Umair Sadiq, Mohan Kumar, Matthew K. Wright:
CRISP: collusion-resistant incentive-compatible routing and forwarding in opportunistic networks. MSWiM 2012: 69-78 - [e1]Simone Fischer-Hübner, Matthew K. Wright:
Privacy Enhancing Technologies - 12th International Symposium, PETS 2012, Vigo, Spain, July 11-13, 2012. Proceedings. Lecture Notes in Computer Science 7384, Springer 2012, ISBN 978-3-642-31679-1 [contents] - [i3]Prateek Mittal, Matthew K. Wright, Nikita Borisov:
Pisces: Anonymous Communication Using Social Networks. CoRR abs/1208.6326 (2012) - [i2]Ruj Akavipat, Mahdi N. Al-Ameen, Apu Kapadia, Zahid Rahman, Roman Schlegel, Matthew K. Wright:
ReDS: A Framework for Reputation-Enhanced DHTs. CoRR abs/1209.4867 (2012) - 2011
- [j11]Robert J. Walls, Kush Kothari, Matthew K. Wright:
Liquid: A detection-resistant covert timing channel based on IPD shaping. Comput. Networks 55(6): 1217-1228 (2011) - [j10]Nayantara Mallesh, Matthew K. Wright:
An analysis of the statistical disclosure attack and receiver-bound cover. Comput. Secur. 30(8): 597-612 (2011) - [j9]N. Boris Margolin, Brian Neil Levine, James D. Miller, Matthew K. Wright:
Economic incentives for protecting digital rights online. Electron. Commer. Res. Appl. 10(5): 553-564 (2011) - [j8]Marc Liberatore, Bikas Gurung, Brian Neil Levine, Matthew K. Wright:
Empirical tests of anonymous voice over IP. J. Netw. Comput. Appl. 34(1): 341-350 (2011) - [j7]Gauri Vakde, Radhika Bibikar, Zhengyi Le, Matthew K. Wright:
EnPassant: anonymous routing for disruption-tolerant networks with applications in assistive environments. Secur. Commun. Networks 4(11): 1243-1256 (2011) - [j6]Jun-Won Ho, Matthew K. Wright, Sajal K. Das:
Fast Detection of Mobile Replica Node Attacks in Wireless Sensor Networks Using Sequential Hypothesis Testing. IEEE Trans. Mob. Comput. 10(6): 767-782 (2011) - [c22]Nayantara Mallesh, Matthew K. Wright:
Poster: shaping network topology for privacy and performance. CCS 2011: 813-816 - [i1]Dustin Bachrach, Christopher Nunu, Dan S. Wallach, Matthew K. Wright:
#h00t: Censorship Resistant Microblogging. CoRR abs/1109.6874 (2011) - 2010
- [j5]Jaideep D. Padhye, Kush Kothari, Madhu Venkateshaiah, Matthew K. Wright:
Evading stepping-stone detection under the cloak of streaming media with SNEAK. Comput. Networks 54(13): 2310-2325 (2010) - [j4]Safwan Mahmud Khan, Nayantara Mallesh, Arjun Nambiar, Matthew K. Wright:
The Dynamics of Salsa: A Robust Structured P2P System. Netw. Protoc. Algorithms 2(4): 40-60 (2010) - [c21]Pranav Krishnamoorthy, Matthew K. Wright:
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network. AISec 2010: 1-7 - [c20]Ruj Akavipat, Apurv Dhadphale, Apu Kapadia, Matthew Wright:
ReDS: reputation for directory services in P2P systems. Insider Threats@CCS 2010: 47-54 - [c19]Matthew K. Wright, Apu Kapadia, Mohan Kumar, Apurv Dhadphale:
ReDS: reputation for directory services in P2P systems. CSIIRW 2010: 71 - [c18]Titus Abraham, Matthew K. Wright:
Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes. GLOBECOM 2010: 1-5 - [c17]Nayantara Mallesh, Matthew K. Wright:
The Reverse Statistical Disclosure Attack. Information Hiding 2010: 221-234 - [c16]Brent Lagesse, Mohan Kumar, Matthew K. Wright:
ReSCo: A middleware component for Reliable Service Composition in pervasive systems. PerCom Workshops 2010: 486-491
2000 – 2009
- 2009
- [j3]Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das:
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks. Ad Hoc Networks 7(8): 1476-1488 (2009) - [c15]Jun-Won Ho, Matthew K. Wright, Sajal K. Das:
Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis. INFOCOM 2009: 1773-1781 - [c14]Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das:
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. PerCom Workshops 2009: 1-6 - [c13]Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska, Matthew K. Wright:
DTT: A Distributed Trust Toolkit for Pervasive Systems. PerCom 2009: 1-8 - [c12]Zhengyi Le, Gauri Vakde, Matthew K. Wright:
PEON: privacy-enhanced opportunistic networks with applications in assistive environments. PETRA 2009 - [c11]Jun-Won Ho, Matthew K. Wright, Sajal K. Das:
ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Sensor Networks Using Sequential Analysis. SRDS 2009: 217-223 - 2008
- [j2]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
Passive-Logging Attacks Against Anonymous Communications Systems. ACM Trans. Inf. Syst. Secur. 11(2): 3:1-3:34 (2008) - [c10]Brent Lagesse, Mohan Kumar, Matthew K. Wright:
AREX: An Adaptive System for Secure Resource Access in Mobile P2P Systems. Peer-to-Peer Computing 2008: 43-52 - [c9]Hatim Daginawala, Matthew K. Wright:
Studying Timing Analysis on the Internet with SubRosa. Privacy Enhancing Technologies 2008: 133-150 - 2007
- [c8]Nayantara Mallesh, Matthew K. Wright:
Countering Statistical Disclosure with Receiver-Bound Cover Traffic. ESORICS 2007: 547-562 - [c7]Kiran Mehta, Donggang Liu, Matthew K. Wright:
Location Privacy in Sensor Networks Against a Global Eavesdropper. ICNP 2007: 314-323 - 2006
- [c6]Arjun Nambiar, Matthew K. Wright:
Salsa: a structured approach to large-scale anonymity. CCS 2006: 17-26 - 2005
- [c5]Michael K. Reiter, XiaoFeng Wang, Matthew K. Wright:
Building Reliable Mix Networks with Fair Exchange. ACNS 2005: 378-392 - 2004
- [j1]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4): 489-522 (2004) - [c4]N. Boris Margolin, Matthew K. Wright, Brian Neil Levine:
Analysis of an incentives-based secrets protection system. Digital Rights Management Workshop 2004: 22-30 - [c3]Brian Neil Levine, Michael K. Reiter, Chenxi Wang, Matthew K. Wright:
Timing Attacks in Low-Latency Mix Systems (Extended Abstract). Financial Cryptography 2004: 251-265 - 2003
- [c2]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
Defending Anonymous Communications Against Passive Logging Attack. S&P 2003: 28-41 - 2002
- [c1]Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields:
An Analysis of the Degradation of Anonymous Protocols. NDSS 2002: 1-12
Coauthor Index
aka: Mahdi Nasrullah Al-Ameen
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint