Measuring the Security of Website Fingerprinting Defences
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Intrusion detection systems are a commonly deployed defense that examines network traffic, host operations, or both to detect attacks. However, more attacks bypass IDS defenses each year, and with the sophistication of attacks increasing as well, we must e ...
The technical community has so far defined network neutrality in terms of specific mechanisms, e.g., policing or shaping. We argue that these definitions are problematic: according to them, a non-neutral network may be preferable (for all users) to a neutr ...
2015
,
A method produces a conductive paste comprising 15-20% by weight of PDMS and 80-85% by weight of metallic micro-nano particles, wherein the conductive paste is obtained by repeated addition of singular doses of PDMS to a heptane diluted PDMS low viscosity ...
2017
By the end of 2013, the number of internet-connected mobile devices is expected to exceed that of humans. Omnipresent and context-aware, mobile devices enable people to communicate and exchange data anytime and almost anywhere. The myriad of ”digital footp ...
EPFL2014
The present invention aims at providing a method to produce modified images of a human face while removing all defects, such as such as pigmentation irregularities (e.g., moles, freckles), irritation, roughness, or wrinkles This is achieved thanks to a met ...
2016
,
Wireless sensors and actuators connected by the Internet-of-Things (IoT) are central to the design of advanced cyber-physical systems (CPSs). In such complex, heterogeneous systems, communication links must meet stringent requirements on throughput, latenc ...
Secure documents often comprise an information layer that is hard to reproduce. Moiré techniques for the prevention of counterfeiting rely on the superposition of an array of transparent lines or microlenses on top of a base layer containing hidden informa ...
Poly(2-hydroxyethyl methacrylate) (PHEMA) and poly(poly(ethylene glycol) methacrylate) (PPEGMA) brushes represent a class of thin, surface-tethered polymer films that have been extensively used e.g. to generate non-biofouling surfaces or as model systems t ...
We consider a multiuser OFDM system in which users want to transmit videos via a base station. The base station knows the channel state information (CSI) as well as the rate distortion (RD) information of the video streams and tries to allocate power and s ...
Institute of Electrical and Electronics Engineers2013
Molecular sensing system including: a sensing device (5) comprising at least one support layer (10), and an active layer (6) mounted on said support layer and having at least one nano-pore (12) configured for translocation of a molecular analyte (18) there ...