Nikita Borisov
Nikita Borisov
Professor of Electrical and Computer Engineering, University of Illinois at Urbana
Verified email at - Homepage
Cited by
Cited by
Intercepting mobile communications: The insecurity of 802.11
N Borisov, I Goldberg, D Wagner
Proceedings of the 7th annual international conference on Mobile computing …, 2001
The tangled web of password reuse.
A Das, J Bonneau, M Caesar, N Borisov, XF Wang
NDSS 14 (2014), 23-26, 2014
EASiER: Encryption-based access control in social networks with efficient revocation
S Jahid, P Mittal, N Borisov
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
The Ninja architecture for robust Internet-scale systems and services
SD Gribble, M Welsh, R Von Behren, EA Brewer, D Culler, N Borisov, ...
Computer Networks 35 (4), 473-497, 2001
Off-the-record communication, or, why not to use PGP
N Borisov, I Goldberg, E Brewer
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 77-84, 2004
Property inference attacks on fully connected neural networks using permutation invariant representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Flybynight: mitigating the privacy risks of social networking
MM Lucas, N Borisov
Proceedings of the 7th ACM workshop on Privacy in the electronic society, 1-8, 2008
BotGrep: Finding P2P bots with structured graph analysis
S Nagaraja, P Mittal, CY Hong, M Caesar, N Borisov
Proceedings of the 19th USENIX conference on Security, 7-7, 2010
Detecting ai trojans using meta neural analysis
X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li
2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021
Denial of service or denial of security?
N Borisov, G Danezis, P Mittal, P Tabriz
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Computational puzzles as sybil defenses
N Borisov
Peer-to-Peer Computing, 2006. P2P 2006. Sixth IEEE International Conference …, 2006
A tune-up for Tor: Improving security and performance in the Tor network
R Snader, N Borisov
Proceedings of the Network and Distributed Security Symposium-NDSS 8, 2008
Do you hear what i hear? fingerprinting smart devices through embedded acoustic components
A Das, N Borisov, M Caesar
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Rainbow: A robust and invisible non-blind watermark for network flows
A Houmansadr, N Kiyavash, N Borisov
Proceedings of the Network and Distributed System Security Symposium (NDSS …, 2009
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
A Das, N Borisov, M Caesar
NDSS, 2016
DECENT: A decentralized architecture for enforcing privacy in online social networks
S Jahid, S Nilizadeh, P Mittal, N Borisov, A Kapadia
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
Cirripede: circumvention infrastructure using router redirection with plausible deniability
A Houmansadr, GTK Nguyen, M Caesar, N Borisov
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Cachet: a decentralized architecture for privacy preserving social networking with caching
S Nilizadeh, S Jahid, P Mittal, N Borisov, A Kapadia
Proceedings of the 8th international conference on Emerging networking …, 2012
A generic application-level protocol analyzer and its language
N Borisov, DJ Brumley, HJ Wang, J Dunagan, P Joshi, C Guo
14h Symposium on Network and Distributed System Security (NDSS), 2007
Enabling privacy-preserving incentives for mobile crowd sensing systems
H Jin, L Su, B Ding, K Nahrstedt, N Borisov
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20