default search action
Eric Chan-Tin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed:
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses. IEEE Trans. Dependable Secur. Comput. 21(4): 3963-3976 (2024) - [c34]Madeline Moran, Arrianna Szymczak, Anna Hart, Shelia Kennison, Eric Chan-Tin:
Deep Dive on Relationship Between Personality and Password Creation. ACISP (2) 2024: 393-411 - [c33]Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, Tamer Abuhmed:
Unmasking the Vulnerabilities of Deep Learning Models: A Multi-Dimensional Analysis of Adversarial Attacks and Defenses. SVCC 2024: 1-8 - [i6]Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, Tamer Abuhmed:
From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings. CoRR abs/2405.01963 (2024) - 2023
- [c32]Muhammad T. Khan, Rachel Gordon, Nimra Khan, Madeline Moran, Mohammed Abuhamad, Loretta J. Stalans, Jeffrey Huntsinger, Jennifer Forestal, Eric Chan-Tin:
Identification and Analysis of the Spread of {Mis}information on Social Media. CSoNet 2023: 361-372 - [c31]Daisy Reyes, Eno Dynowski, Taryn Chovan, John Mikos, Eric Chan-Tin, Mohammed Abuhamad, Shelia Kennison:
WebTracker: Real Webbrowsing Behaviors. SVCC 2023: 1-8 - [c30]Yong Shao, Kenneth Hernandez, Kia Yang, Eric Chan-Tin, Mohammed Abuhamad:
Lightweight and Effective Website Fingerprinting Over Encrypted DNS. SVCC 2023: 1-8 - [c29]Isaac Ahlgren, Victor Rakotondranoro, Yasin N. Silva, Eric Chan-Tin, George K. Thiruvathukal, Neil Klingensmith:
Userland Containers for Mobile Systems. HotMobile 2023: 141 - [e2]Massimo Cafaro, Eric Chan-Tin, Jerry Chou, Jinoh Kim:
Proceedings of the 2023 on Systems and Network Telemetry and Analytics, SNTA 2023, Orlando, FL, USA, 20 June 2023. ACM 2023 [contents] - [i5]Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed:
Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems. CoRR abs/2307.06496 (2023) - [i4]Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed:
Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks. CoRR abs/2307.11906 (2023) - 2022
- [j15]Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin:
Comparing Online Surveys for Cybersecurity: SONA and MTurk. EAI Endorsed Trans. Security Safety 8(30): 2 (2022) - [c28]Anne Wagner, Anna Bakas, Daisy Reyes, Shelia Kennison, Eric Chan-Tin:
The Personalities of Social Media Posts and Photos. AsiaCCS 2022: 1231-1233 - [c27]Eric Chan-Tin, Shelia Kennison:
CySSS '22: 1st International Workshop on Cybersecurity and Social Sciences. AsiaCCS 2022: 1267-1268 - [c26]Qirui Sun, Mohammed Abuhamad, Eldor Abdukhamidov, Eric Chan-Tin, Tamer Abuhmed:
MLxPack: Investigating the Effects of Packers on ML-based Malware Detection Systems Using Static and Dynamic Traits. CySSS@AsiaCCS 2022: 11-18 - [c25]Eric Chan-Tin, Loretta J. Stalans, Spencer Johnston, Daisy Reyes, Shelia Kennison:
Predicting Phishing Victimization: Roles of Protective and Vulnerable Strategies and Decision-Making Styles. SNTA@HPDC 2022: 35-42 - [e1]Eric Chan-Tin, Shelia Kennison:
CySSS@AsiaCCS'22: Proceedings of the 1st Workshop on Cybersecurity and Social Sciences, Nagasaki, Japan, 30 May 2022. ACM 2022, ISBN 978-1-4503-9177-1 [contents] - [i3]Eldor Abdukhamidov, Mohammed Abuhamad, Simon S. Woo, Eric Chan-Tin, Tamer Abuhmed:
Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning. CoRR abs/2211.15926 (2022) - 2021
- [j14]Anna Bakas, Anne Wagner, Spencer Johnston, Shelia Kennison, Eric Chan-Tin:
Impact of Personality Types and Matching Messaging on Password Strength. EAI Endorsed Trans. Security Safety 8(28): e1 (2021) - [c24]Eldor Abdukhamidov, Mohammed Abuhamad, Firuz Juraev, Eric Chan-Tin, Tamer AbuHmed:
AdvEdge: Optimizing Adversarial Perturbations Against Interpretable Deep Learning. CSoNet 2021: 93-105 - [c23]Anne Wagner, Anna Bakas, Shelia Kennison, Eric Chan-Tin:
A Comparison of SONA and MTurk for Cybersecurity Surveys. EICC 2021: 87-88 - 2020
- [j13]Zonghao Huang, Rui Hu, Yuanxiong Guo, Eric Chan-Tin, Yanmin Gong:
DP-ADMM: ADMM-Based Distributed Learning With Differential Privacy. IEEE Trans. Inf. Forensics Secur. 15: 1002-1012 (2020) - [c22]Brook W. Abegaz, Eric Chan-Tin, Neil Klingensmith, George K. Thiruvathukal:
Addressing Rogue Vehicles by Integrating Computer Vision, Activity Monitoring, and Contextual Information. AutomotiveUI (adjunct) 2020: 62-64 - [c21]Eric Chan-Tin:
2020 Vision for Web Privacy. SNTA@HPDC 2020: 31 - [c20]Weiqi Cui, Tao Chen, Eric Chan-Tin:
More Realistic Website Fingerprinting Using Deep Learning. ICDCS 2020: 333-343
2010 – 2019
- 2019
- [j12]Weiqi Cui, Jiangmin Yu, Yanmin Gong, Eric Chan-Tin:
Efficient, Effective, and Realistic Website Fingerprinting Mitigation. EAI Endorsed Trans. Security Safety 6(20): e2 (2019) - [c19]Weiqi Cui, Tao Chen, Christian Fields, Julianna Chen, Anthony Sierra, Eric Chan-Tin:
Revisiting Assumptions for Website Fingerprinting Attacks. AsiaCCS 2019: 328-339 - [c18]Tao Chen, Weiqi Cui, Eric Chan-Tin:
Measuring Tor Relay Popularity. SecureComm (1) 2019: 386-405 - 2018
- [j11]Tao Chen, Michael Farcasin, Eric Chan-Tin:
Smartphone passcode prediction. IET Inf. Secur. 12(5): 431-437 (2018) - [j10]Eric Chan-Tin, Rakesh Ravishankar:
The case for HTTPS: measuring overhead and impact of certificate authorities. Int. J. Secur. Networks 13(4): 261-269 (2018) - [c17]Eric Chan-Tin, Taejoon Kim, Jinoh Kim:
Website Fingerprinting Attack Mitigation Using Traffic Morphing. ICDCS 2018: 1575-1578 - [c16]Weiqi Cui, Jiangmin Yu, Yanmin Gong, Eric Chan-Tin:
Realistic Cover Traffic to Mitigate Website Fingerprinting Attacks. ICDCS 2018: 1579-1584 - [i2]Zonghao Huang, Rui Hu, Eric Chan-Tin, Yanmin Gong:
DP-ADMM: ADMM-based Distributed Learning with Differential Privacy. CoRR abs/1808.10101 (2018) - 2017
- [j9]Praveenkumar Khethavath, Johnson P. Thomas, Eric Chan-Tin:
Towards an efficient distributed cloud computing architecture. Peer-to-Peer Netw. Appl. 10(5): 1152-1168 (2017) - [c15]Jiangmin Yu, Michael Farcasin, Eric Chan-Tin:
Wireless Interference Prediction for Embedded Health Devices. ICCCN 2017: 1-6 - [i1]Michael Farcasin, Akhileshwar Guli, Eric Chan-Tin:
Fluid Passwords - Mitigating the effects of password leaks at the user level. CoRR abs/1708.09333 (2017) - 2016
- [c14]Joe Cecil, M. Bharathi Raj Kumar, Avinash Gupta, Miguel Pirela-Cruz, Eric Chan-Tin, Jiangmin Yu:
Development of a Virtual Reality Based Simulation Environment for Orthopedic Surgical Training. OTM Workshops 2016: 206-214 - 2015
- [j8]Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
Hijacking the Vuze BitTorrent network: all your hop are belong to us. IET Inf. Secur. 9(4): 203-208 (2015) - [j7]Jiyoung Shin, Eric Chan-Tin, Praveenkumar Khethavath:
Accurate geolocation using network coordinates. Int. J. Secur. Networks 10(3): 170-182 (2015) - [j6]Michael Farcasin, Eric Chan-Tin:
Why we hate IT: two surveys on pre-generated and expiring passwords in an academic setting. Secur. Commun. Networks 8(13): 2361-2373 (2015) - [j5]Jiyoung Shin, S. Kancharlapalli, Michael Farcasin, Eric Chan-Tin:
SmartPass: a smarter geolocation-based authentication scheme. Secur. Commun. Networks 8(18): 3927-3938 (2015) - [c13]Eric Chan-Tin:
AnonCall: Making Anonymous Cellular Phone Calls. ARES 2015: 626-631 - 2014
- [j4]Eric Chan-Tin, Qi Cheng:
Secure Routing and Scheduling in Ad-Hoc Cognitive Radio Networks for Public Safety. Int. J. Handheld Comput. Res. 5(2): 44-60 (2014) - [c12]Qi Cheng, Eric Chan-Tin:
A unified framework for robust cooperative spectrum sensing. ACSSC 2014: 1589-1593 - [c11]Jiangmin Yu, Eric Chan-Tin:
Identifying Webbrowsers in Encrypted Communications. WPES 2014: 135-138 - 2013
- [j3]Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim:
Attacking the kad network - real world evaluation and high fidelity simulation using DVN. Secur. Commun. Networks 6(12): 1556-1575 (2013) - [c10]Eric Chan-Tin, Jiyoung Shin, Jiangmin Yu:
Revisiting Circuit Clogging Attacks on Tor. ARES 2013: 131-140 - [c9]Praveen Khethavath, Johnson P. Thomas, Eric Chan-Tin, Hong Liu:
Introducing a Distributed Cloud Architecture with Efficient Resource Discovery and Optimal Resource Allocation. SERVICES 2013: 386-392 - 2012
- [c8]Eric Chan-Tin, Nicholas Hopper:
KoNKS: konsensus-style network koordinate system. AsiaCCS 2012: 61-62 - 2011
- [j2]Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim:
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems. ACM Trans. Inf. Syst. Secur. 14(3): 27:1-27:23 (2011) - [c7]Eric Chan-Tin, Nicholas Hopper:
Accurate and Provably Secure Latency Estimation with Treeple. NDSS 2011 - 2010
- [j1]Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin:
How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur. 13(2): 13:1-13:28 (2010) - [c6]Eric Chan-Tin, Nicholas Hopper:
Secure latency estimation with treeple. CCS 2010: 660-662
2000 – 2009
- 2009
- [c5]Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet. AsiaCCS 2009: 23-34 - [c4]Hun Jeong Kang, Eric Chan-Tin, Nicholas Hopper, Yongdae Kim:
Why Kad Lookup Fails. Peer-to-Peer Computing 2009: 121-130 - [c3]Eric Chan-Tin, Daniel Feldman, Nicholas Hopper, Yongdae Kim:
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems. SecureComm 2009: 448-458 - 2008
- [c2]Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim:
Attacking the Kad network. SecureComm 2008: 23 - 2007
- [c1]Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Tin:
How much anonymity does network latency leak? CCS 2007: 82-91
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint