Follow
Matthew Wright
Matthew Wright
Professor and Chair of Cybersecurity, Rochester Institute of Technology
Verified email at rit.edu - Homepage
Title
Cited by
Cited by
Year
Timing attacks in low-latency mix systems
BN Levine, MK Reiter, C Wang, M Wright
Financial Cryptography (FC 2004), 251-265, 2004
473*2004
Deep fingerprinting: Undermining website fingerprinting defenses with deep learning
P Sirinam, M Imani, M Juarez, M Wright
ACM Conference on Computer and Communications Security (CCS 2018), 2018
4622018
Location privacy in sensor networks against a global eavesdropper
K Mehta, D Liu, M Wright
IEEE International Conference on Network Protocols (ICNP 2007), 314-323, 2007
3182007
The predecessor attack: An analysis of a threat to anonymous communications systems
MK Wright, M Adler, BN Levine, C Shields
ACM Transactions on Information and System Security (TISSEC) 7 (4), 489-522, 2004
3142004
An analysis of the degradation of anonymous protocols
M Wright, M Adler, BN Levine, C Shields
ISOC Symposium on Network and Distributed Systems Security (NDSS 2002), 39-50, 2002
2982002
WTF-PAD: Toward an Efficient Website Fingerprinting Defense
M Juarez, M Imani, M Perry, C Diaz, M Wright
ESORICS, 27-46, 2016
295*2016
Defending anonymous communications against passive logging attacks
M Wright, M Adler, BN Levine, C Shields
IEEE Symposium on Security and Privacy (S&P 2003), 28-41, 2003
2352003
Protecting location privacy in sensor networks against a global eavesdropper
K Mehta, D Liu, M Wright
IEEE Transactions on Mobile Computing (TMC) 11 (2), 320-336, 2012
2282012
Salsa: A structured approach to large-scale anonymity
A Nambiar, M Wright
ACM Conference on Computer and Communications Security (CCS 2006), 17-26, 2006
2022006
Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning
P Sirinam, N Mathews, MS Rahman, M Wright
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1782019
Recurrent convolutional structures for audio spoof and video deepfake detection
A Chintha, B Thai, SJ Sohrawardi, K Bhatt, A Hickerson, M Wright, ...
IEEE Journal of Selected Topics in Signal Processing 14 (5), 1024-1037, 2020
1552020
Fast detection of replica node attacks in mobile sensor networks using sequential analysis
JW Ho, M Wright, SK Das
IEEE INFOCOM 2009, 1773-1781, 2009
1472009
Tik-Tok: The utility of packet timing in website fingerprinting attacks
MS Rahman, P Sirinam, N Mathews, KG Gangadhara, M Wright
Proceedings on Privacy Enhancing Technologies (PoPETs) 2020 (3), 5-24, 2020
1202020
Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing
JW Ho, M Wright, SK Das
IEEE Transactions on Mobile Computing (TMC) 10 (6), 767-782, 2011
1152011
Fast detection of node replication attacks in mobile sensor networks
JW Ho, M Wright, SK Das
IEEE ICNP, 2008
115*2008
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks
JW Ho, D Liu, M Wright, SK Das
Ad Hoc Networks 7 (8), 1476-1488, 2009
1072009
Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks With Adversarial Traces
MS Rahman, M Imani, N Mathews, M Wright
IEEE Transactions on Information Forensics and Security 16, 1594-1609, 2020
922020
ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing
JW Ho, M Wright, SK Das
IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (4), 494-511, 2012
812012
A study of user password strategy for multiple accounts
SMT Haque, M Wright, S Scielzo
ACM Conference on Data and Application Security and Privacy (CODASPY 2013 …, 2013
742013
Pisces: Anonymous Communication Using Social Networks
P Mittal, M Wright, N Borisov
ISOC Network and Distributed Systems Security Symposium (NDSS 2013), 2013
722013
The system can't perform the operation now. Try again later.
Articles 1–20