Pushing bittorrent locality to the limit S Le Blond, A Legout, W Dabbous Computer Networks 55 (3), 541-557, 2011 | 136 | 2011 |
Towards efficient traffic-analysis resistant anonymity networks S Le Blond, D Choffnes, W Zhou, P Druschel, H Ballani, P Francis ACM SIGCOMM Computer Communication Review 43 (4), 303-314, 2013 | 110 | 2013 |
A look at targeted attacks through the lense of an {NGO} S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda 23rd USENIX Security Symposium (USENIX Security 14), 543-558, 2014 | 108 | 2014 |
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ... Proceedings of the 4th USENIX workshop on Large-scale exploits and emergent …, 2011 | 99 | 2011 |
Herd: A scalable, traffic analysis resistant anonymity network for VoIP systems S Le Blond, D Choffnes, W Caldwell, P Druschel, N Merritt Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015 | 93 | 2015 |
Spying the World from your Laptop--Identifying and Profiling Content Providers and Big Downloaders in BitTorrent SL Blond, A Legout, FL Fessant, W Dabbous, MA Kaafar Proceedings of the 3rd USENIX workshop on Large-scale exploits and emergent …, 2010 | 75* | 2010 |
To catch a ratter: Monitoring the behavior of amateur darkcomet rat operators in the wild B Farinholt, M Rezaeirad, P Pearce, H Dharmdasani, H Yin, S Le Blond, ... 2017 IEEE symposium on Security and Privacy (SP), 770-787, 2017 | 74 | 2017 |
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy S Le Blond, C Zhang, A Legout, K Ross, W Dabbous Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 62 | 2011 |
Clustering in p2p exchanges and consequences on performances S Le-Blond, JL Guillaume, M Latapy Proceedings of the 4-th international workshop on Peer-to-Peer Systems (IPTPS), 2005 | 54 | 2005 |
Finding good partners in availability-aware p2p networks S Le Blond, F Le Fessant, E Le Merrer Symposium on Self-Stabilizing Systems, 472-484, 2009 | 52 | 2009 |
Statistical analysis of a P2P query graph based on degrees and their time-evolution JL Guillaume, M Latapy, S Le-Blond International Workshop on Distributed Computing, 126-137, 2004 | 49* | 2004 |
Compromising Tor anonymity exploiting P2P information leakage P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ... arXiv preprint arXiv:1004.1461, 2010 | 46 | 2010 |
A Broad View of the Ecosystem of Socially Engineered Exploit Documents. S Le Blond, C Gilbert, U Upadhyay, M Gomez-Rodriguez, DR Choffnes NDSS, 2017 | 29 | 2017 |
On enforcing the digital immunity of a large humanitarian organization S Le Blond, A Cuevas, JR Troncoso-Pastoriza, P Jovanovic, B Ford, ... 2018 IEEE Symposium on Security and Privacy (SP), 424-440, 2018 | 25 | 2018 |
Clustering in p2p exchanges and consequences on performances JL Guillaume, S Le-Blond, M Latapy Lecture Notes in Computer Sciences (LNCS), proceedings of the 4-th …, 2005 | 15 | 2005 |
Choosing partners based on availability in P2P networks SL Blond, FL Fessant, EL Merrer ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-14, 2012 | 13 | 2012 |
Moby: A blackout-resistant anonymity network for mobile devices A Pradeep, H Javaid, R Williams, A Rault, D Choffnes, S Le Blond, ... Proceedings on Privacy Enhancing Technologies 2022 (3), 247-267, 2022 | 11 | 2022 |
Early application experience with the grid application toolkit (gat) S Le Blond, AM Oprescu, C Zhang Workshop on Grid Applications held in conjunction with the Fourteenth Global …, 2005 | 7* | 2005 |
Attacking Large-Scale, Real-World Systems S Le Blond, P Manils, A Chaabane, MA Kaafar | | 2011 |
PriFi: A Traffic-Analysis Resistant, Low-Latency Anonymous Communication Protocol for Local Area Networks L Barman, I Dacosta, M Zamani, E Zhai, S Le Blond, B Ford, JP Hubaux, ... | | |