Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/secdr/awesome-anonymity-papers
๐ A list of anonymity papers published from 2012 to 2024.
https://github.com/secdr/awesome-anonymity-papers
List: awesome-anonymity-papers
anonymity cryptography cybersecurity
Last synced: 29 days ago
JSON representation
๐ A list of anonymity papers published from 2012 to 2024.
- Host: GitHub
- URL: https://github.com/secdr/awesome-anonymity-papers
- Owner: secdr
- License: mit
- Created: 2024-01-09T03:12:31.000Z (12 months ago)
- Default Branch: main
- Last Pushed: 2024-03-25T13:27:06.000Z (9 months ago)
- Last Synced: 2024-04-18T14:40:40.996Z (8 months ago)
- Topics: anonymity, cryptography, cybersecurity
- Homepage:
- Size: 426 KB
- Stars: 5
- Watchers: 2
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- ultimate-awesome - awesome-anonymity-papers - ๐ A list of anonymity papers published from 2012 to 2024. (Other Lists / Monkey C Lists)
README
# Awesome Anonymity Papers
We believe that there exist *classic* anonymity papers which are worth reading regardless of their application domain. Rather than providing overwhelming amount of papers, we would like to provide a *curated list* of the awesome anonymity papers which are considered as *must-reads* in certain research domains.
## Table of Contents
- [Awesome Anonymity Papers](#awesome-anonymity-papers)
- [Table of Contents](#table-of-contents)
- [Awesome list criteria](#awesome-list-criteria)
- [Papers](#papers)
- [By Journals \& Conferences](#by-journals--conferences)
- [By Time](#by-time)
- [2024](#2024)
- [2023](#2023)
- [2022](#2022)
- [2021](#2021)
- [2020](#2020)
- [2019](#2019)
- [2018](#2018)
- [2017](#2017)
- [2016](#2016)
- [2015](#2015)
- [2014](#2014)
- [2013](#2013)
- [2012](#2012)
- [Acknowledgement](#acknowledgement)
- [Contact \& Feedback](#contact--feedback)
- [License](#license)## Awesome list criteria
> A list of **anonymity papers** published from 2012 to 2024.
## Papers
### By Journals & Conferences
+ #### USENIX Security
- 1971 | *xxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)
+ #### S&P
- 1971 | *xxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)
+ #### CCS
- 1971 | *xxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)
+ #### NDSS
- 2024 | *MirageFlow: A New Bandwidth Inflation Attack on Tor*, [`PDF`](https://www.ndss-symposium.org/wp-content/uploads/2024-1133-paper.pdf)
+ #### Other
- 2024 | *Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning*, [`PDF`](https://arxiv.org/pdf/2402.09200.pdf)
- 2024 | FOCI, *Extended Abstract: Traffic Splitting for Pluggable Transports*, [`PDF`](https://petsymposium.org/foci/2024/foci-2024-0004.pdf)
- 2024 | Wireless Networks, *Updated exploration of the Tor network: advertising, availability and protocols of onion services*, [`PDF`](https://link.springer.com/article/10.1007/s11276-024-03679-4)
- 2024 | N/A, *GFWeb: Measuring the Great Firewallโs Web Censorship at Scale*, [`PDF`](https://www3.cs.stonybrook.edu/~mikepo/papers/gfweb.sec24.pdf)
- 2023 | IEEE Transactions on Information Forensics and Security, *Exploring Uncharted Waters of Website Fingerprinting*, [`PDF`](https://ieeexplore.ieee.org/abstract/document/10356094)
- 2019 | IEEE Conference on Computer Communications Workshops, *FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition*, [`PDF`](https://ieeexplore.ieee.org/abstract/document/8845315)
- 2018 | IEEE International Conference on Knowledge Innovation and Invention (ICKII), *Tor Traffic Classification from Raw Packet Header using Convolutional Neural Network*, [`PDF`](https://ieeexplore.ieee.org/abstract/document/8569113)
- 2017 | IEEE International Conference on Big Data, *Tor traffic analysis and detection via machine learning techniques*, [`PDF`](https://ieeexplore.ieee.org/abstract/document/8258487)***
### By Time
#### 2024
- NDSS, *MirageFlow: A New Bandwidth Inflation Attack on Tor*, [`PDF`](https://www.ndss-symposium.org/wp-content/uploads/2024-1133-paper.pdf)
- *Discovering Command and Control (C2) Channels on Tor and Public Networks Using Reinforcement Learning*, [`PDF`](https://arxiv.org/pdf/2402.09200.pdf)
- FOCI, *Extended Abstract: Traffic Splitting for Pluggable Transports*, [`PDF`](https://petsymposium.org/foci/2024/foci-2024-0004.pdf)
- Wireless Networks, *Updated exploration of the Tor network: advertising, availability and protocols of onion services*, [`PDF`](https://link.springer.com/article/10.1007/s11276-024-03679-4)
- N/A, *GFWeb: Measuring the Great Firewallโs Web Censorship at Scale*, [`PDF`](https://www3.cs.stonybrook.edu/~mikepo/papers/gfweb.sec24.pdf)#### 2023
- IEEE Transactions on Information Forensics and Security, *Exploring Uncharted Waters of Website Fingerprinting*, [`PDF`](https://ieeexplore.ieee.org/abstract/document/10356094)#### 2022
- xxxxxxxxxxxxxxxxxxxxxxxx, *xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)#### 2021
- xxxxxxxxxxxxxxxxxxxxxxxx, *xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)#### 2020
- xxxxxxxxxxxxxxxxxxxxxxxx, *xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)#### 2019
- IEEE Conference on Computer Communications Workshops, *FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition*, [`PDF`](https://ieeexplore.ieee.org/abstract/document/8845315)#### 2018
- IEEE International Conference on Knowledge Innovation and Invention (ICKII), *Tor Traffic Classification from Raw Packet Header using Convolutional Neural Network*, [`PDF`](https://ieeexplore.ieee.org/abstract/document/8569113)#### 2017
- IEEE International Conference on Big Data, *Tor traffic analysis and detection via machine learning techniques*, [`PDF`](https://ieeexplore.ieee.org/abstract/document/8258487)#### 2016
- xxxxxxxxxxxxxxxxxxxxxxxx, *xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)#### 2015
- xxxxxxxxxxxxxxxxxxxxxxxx, *xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)#### 2014
- xxxxxxxxxxxxxxxxxxxxxxxx, *xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)#### 2013
- xxxxxxxxxxxxxxxxxxxxxxxx, *xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)#### 2012
- xxxxxxxxxxxxxxxxxxxxxxxx, *xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx*, xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx, [`PDF`](https://arxiv.org/pdf/0000.04528.pdf)***
## Acknowledgement
Special thanks to everyone who contributed to this project.| Name | Bio |
| :--------: | :--------: |
| [Qiang Zhang](https://github.com/imzqqq) | PhD Student @SCU |## Contact & Feedback
If you have any suggestions (missing papers, new papers, key researchers or typos), feel free to pull a request. Also you can mail to:
+ Qiang Zhang ([email protected]).## License
[MIT](LICENSE).