Follow
Matthew Wright
Matthew Wright
Professor and Chair of Cybersecurity, Rochester Institute of Technology
Verified email at rit.edu - Homepage
Title
Cited by
Cited by
Year
Timing attacks in low-latency mix systems
BN Levine, MK Reiter, C Wang, M Wright
Financial Cryptography (FC 2004), 251-265, 2004
4592004
Location privacy in sensor networks against a global eavesdropper
K Mehta, D Liu, M Wright
IEEE International Conference on Network Protocols (ICNP 2007), 314-323, 2007
3192007
Deep fingerprinting: Undermining website fingerprinting defenses with deep learning
P Sirinam, M Imani, M Juarez, M Wright
ACM Conference on Computer and Communications Security (CCS 2018), 2018
3152018
The predecessor attack: An analysis of a threat to anonymous communications systems
MK Wright, M Adler, BN Levine, C Shields
ACM Transactions on Information and System Security (TISSEC) 7 (4), 489-522, 2004
3132004
An analysis of the degradation of anonymous protocols
M Wright, M Adler, BN Levine, C Shields
ISOC Symposium on Network and Distributed Systems Security (NDSS 2002), 39-50, 2002
2932002
Defending anonymous communications against passive logging attacks
M Wright, M Adler, BN Levine, C Shields
IEEE Symposium on Security and Privacy (S&P 2003), 28-41, 2003
2392003
Protecting location privacy in sensor networks against a global eavesdropper
K Mehta, D Liu, M Wright
IEEE Transactions on Mobile Computing (TMC) 11 (2), 320-336, 2012
2282012
WTF-PAD: Toward an Efficient Website Fingerprinting Defense
M Juarez, M Imani, M Perry, C Diaz, M Wright
ESORICS, 27-46, 2016
226*2016
Salsa: A structured approach to large-scale anonymity
A Nambiar, M Wright
ACM Conference on Computer and Communications Security (CCS 2006), 17-26, 2006
2032006
Fast detection of replica node attacks in mobile sensor networks using sequential analysis
JW Ho, M Wright, SK Das
IEEE INFOCOM 2009, 1773-1781, 2009
1392009
Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning
P Sirinam, N Mathews, MS Rahman, M Wright
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1222019
Fast detection of mobile replica node attacks in wireless sensor networks using sequential hypothesis testing
JW Ho, M Wright, SK Das
IEEE Transactions on Mobile Computing (TMC) 10 (6), 767-782, 2011
1092011
Fast detection of node replication attacks in mobile sensor networks
JW Ho, M Wright, SK Das
IEEE ICNP, 2008
109*2008
Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks
JW Ho, D Liu, M Wright, SK Das
Ad Hoc Networks 7 (8), 1476-1488, 2009
1062009
Recurrent convolutional structures for audio spoof and video deepfake detection
A Chintha, B Thai, SJ Sohrawardi, K Bhatt, A Hickerson, M Wright, ...
IEEE Journal of Selected Topics in Signal Processing 14 (5), 1024-1037, 2020
802020
ZoneTrust: Fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing
JW Ho, M Wright, SK Das
IEEE Transactions on Dependable and Secure Computing (TDSC) 9 (4), 494-511, 2012
752012
Pisces: Anonymous Communication Using Social Networks
P Mittal, M Wright, N Borisov
ISOC Network and Distributed Systems Security Symposium (NDSS 2013), 2013
702013
A study of user password strategy for multiple accounts
SMT Haque, M Wright, S Scielzo
ACM Conference on Data and Application Security and Privacy (CODASPY 2013 …, 2013
662013
Using Data Mules to Preserve Source Location Privacy in Wireless Sensor Networks
M Raj, N Li, D Liu, M Wright, SK Das
Pervasive and Mobile Computing 11 (1), 244-260, 2014
642014
Using data mules to preserve source location privacy in wireless sensor networks
N Li, M Raj, D Liu, M Wright, SK Das
International Conference on Distributed Computing and Networking (ICDCN 2012 …, 2012
64*2012
The system can't perform the operation now. Try again later.
Articles 1–20