Name
Affiliation
Papers
NICHOLAS HOPPER
University of Minnesota
78
Collaborators
Citations 
PageRank 
74
1469
95.76
Referers 
Referees 
References 
2996
1529
1351
Search Limit
1001000
Title
Citations
PageRank
Year
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification00.342022
Privacy-Preserving Dynamic Learning of Tor Network Traffic.10.352018
Measuring Information Leakage in Website Fingerprinting Attacks and Defenses.60.452018
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Minimal Metadata Leakage00.342018
Consistent Synchronous Group Off-The-Record Messaging with SYM-GOTR.10.382018
End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability.00.342018
Fingerprinting Keywords in Search Queries over Tor.20.362017
Measuring Information Leakage in Website Fingerprinting Attacks.00.342017
Traffic Analysis with Deep Learning.00.342017
Is Bob Sending Mixed Signals?30.432017
PeerFlow: Secure Load Balancing in Tor.30.432017
ABRA CADABRA: Magically Increasing Network Utilization in Tor by Avoiding Bottlenecks.00.342016
E-Embargoes: Discouraging the Deployment of Traffic Manipulating Boxes With Economic Incentives.00.342016
Mailet: Instant Social Networking under Censorship.00.342016
MP3: A More Efficient Private Presence Protocol.10.352016
Anarchy in Tor: Performance Cost of Decentralization.00.342016
The Cost of the Path Not Taken.00.342016
WPES 2015: The 14th Workshop on Privacy in the Electronic Society00.342015
Hijacking the Vuze BitTorrent network: all your hop are belong to us20.382015
IMUX: Managing Tor Connections from Two to Infinity, and Beyond60.462014
Peer Pressure: Exerting Malicious Influence on Routers at a Distance20.472013
Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks210.922013
rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation.60.512013
Cover your ACKs: pitfalls of covert channel censorship circumvention80.512013
How Low Can You Go: Balancing Performance with Anonymity in Tor.80.462013
Improved group off-the-record messaging50.442013
Attacking the kad network - real world evaluation and high fidelity simulation using DVN.10.362013
Efficient Private Proximity Testing with GSM Location Sketches.260.842012
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation.421.592012
KoNKS: konsensus-style network koordinate system20.382012
On the mixing time of directed social graphs and security implications80.492012
Location leaks over the GSM air interface.151.212012
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.00.342012
One-Way Indexing for Plausible Deniability in Censorship Resistant Storage.10.362012
Methodically modeling the Tor network70.492012
Throttling Tor bandwidth parasites80.502012
New attacks on timing-based network flow watermarks80.472012
Routing around decoys140.672012
Accurate and Provably Secure Latency Estimation with Treeple.110.542011
BNymble: more anonymous blacklisting at almost no cost (a short paper)70.452011
FAUST: efficient, TTP-free abuse prevention by anonymous whitelisting80.492011
Understanding Social Networks Properties for Trustworthy Computing50.452011
Keep your friends close: Incorporating trust into social network-based Sybil defenses.160.682011
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems70.502011
Losing control of the internet: using the data plane to attack the control plane351.492010
Recruiting new tor relays with BRAIDS311.122010
Balancing the shadows30.382010
Privacy Enhancing Technologies, 10th International Symposium, PETS 2010, Berlin, Germany, July 21-23, 2010. Proceedings152.532010
How much anonymity does network latency leak?942.772010
Secure latency estimation with treeple20.402010
  • 1
  • 2