StegoTorus: A Camouflage Proxy for the Tor Anonymity System Z Weinberg, J Wang, V Yegneswaran, L Briesemeister, S Cheung, ... Proceedings of the 19th ACM conference on Computer and Communications Security, 2012 | 244 | 2012 |
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks Z Weinberg, EY Chen, PR Jayaraman, C Jackson 2011 IEEE Symposium on Security and Privacy, 147-161, 2011 | 162 | 2011 |
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform A Akhavan Niaki, S Cho, Z Weinberg, NP Hoang, A Razaghpanah, ... IEEE Symposium on Security and Privacy (SP), 214-230, 2020 | 107* | 2020 |
How to Catch when Proxies Lie: Verifying the Physical Locations of Network Proxies with Active Geolocation Z Weinberg, S Cho, N Christin, V Sekar, P Gill Proceedings of the Internet Measurement Conference 2018, 203-217, 2018 | 70 | 2018 |
Protecting browsers from Cross-Origin CSS attacks LS Huang, Z Weinberg, C Evans, C Jackson Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 65 | 2010 |
Self-supervised euphemism detection and identification for content moderation W Zhu, H Gong, R Bansal, Z Weinberg, N Christin, G Fanti, S Bhat 2021 IEEE Symposium on Security and Privacy (SP), 229-246, 2021 | 45 | 2021 |
Bootstrapping Communications into an Anti-Censorship System P Lincoln, I Mason, P Porras, V Yegneswaran, Z Weinberg, J Massar, ... Free and Open Communications on the Internet, 2012 | 31 | 2012 |
Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China R Rambert, Z Weinberg, D Barradas, N Christin Web Conference 2021, 472-483, 2021 | 27 | 2021 |
Topics of Controversy: An Empirical Analysis of Web Censorship Lists Z Weinberg, M Sharif, J Szurdi, N Christin Proceedings on Privacy Enhancing Technologies 2017 (1), 42-61, 2017 | 27 | 2017 |
Embodied Verbal Semantics: Evidence from a lexical matching task S Narayan, BK Bergen, Z Weinberg Annual Meeting of the Berkeley Linguistics Society 30 (1), 493-504, 2004 | 12 | 2004 |
A maintenance programmer’s view of GCC Z Weinberg GCC Developer’s Summit, 2003 | 9 | 2003 |
Toward Automated Worldwide Monitoring of Network-Level Censorship Z Weinberg Carnegie Mellon University, 2018 | 3 | 2018 |
STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming B DeBruhl, YS Kim, Z Weinberg, P Tague 9th IEEE International Conference on Mobile Ad hoc and Sensor Systems, 2012 | 2 | 2012 |
Cooperative Meaning Construction in an Interactional Task Z Weinberg, S Narayan, R Núñez Conference presentation at CSDL, 2006 | 1 | 2006 |
Statically Typed Trees in GCC N Sidwell, Z Weinberg GCC Developers’ Summit, 149, 2004 | 1 | 2004 |
Selection of Landmarks for Efficient Active Geolocation S Cho, Z Weinberg, A Bhattacharya, S Dai, R Rauf Network Traffic Measurement and Analysis Conference (TMA), 2024 | | 2024 |
Darwin's Theory of Censorship: Analysing the Evolution of Censored Topics with Dynamic Topic Models A Waheed, S Qunaibi, D Barradas, Z Weinberg Proceedings of the 21st Workshop on Privacy in the Electronic Society, 103-108, 2022 | | 2022 |