Pushing bittorrent locality to the limit S Le Blond, A Legout, W Dabbous Computer Networks 55 (3), 541-557, 2011 | 136 | 2011 |
Towards efficient traffic-analysis resistant anonymity networks S Le Blond, D Choffnes, W Zhou, P Druschel, H Ballani, P Francis ACM SIGCOMM Computer Communication Review 43 (4), 303-314, 2013 | 105 | 2013 |
A look at targeted attacks through the lense of an {NGO} S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda 23rd {USENIX} Security Symposium ({USENIX} Security 14), 543-558, 2014 | 97 | 2014 |
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ... Proceedings of the 4th USENIX workshop on Large-scale exploits and emergent …, 2011 | 87 | 2011 |
Herd: A scalable, traffic analysis resistant anonymity network for VoIP systems S Le Blond, D Choffnes, W Caldwell, P Druschel, N Merritt Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015 | 79 | 2015 |
Spying the World from your Laptop--Identifying and Profiling Content Providers and Big Downloaders in BitTorrent SL Blond, A Legout, FL Fessant, W Dabbous, MA Kaafar Proceedings of the 3rd USENIX workshop on Large-scale exploits and emergent …, 2010 | 73* | 2010 |
I know where you are and what you are sharing: exploiting p2p communications to invade users' privacy S Le Blond, C Zhang, A Legout, K Ross, W Dabbous Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 63 | 2011 |
Clustering in p2p exchanges and consequences on performances S Le-Blond, JL Guillaume, M Latapy Proceedings of the 4-th international workshop on Peer-to-Peer Systems (IPTPS), 2005 | 54 | 2005 |
To catch a ratter: Monitoring the behavior of amateur darkcomet rat operators in the wild B Farinholt, M Rezaeirad, P Pearce, H Dharmdasani, H Yin, S Le Blond, ... 2017 IEEE symposium on security and privacy (SP), 770-787, 2017 | 51 | 2017 |
Statistical analysis of a P2P query graph based on degrees and their time-evolution JL Guillaume, M Latapy, S Le-Blond Distributed Computing-IWDC 2004: 6th International Workshop, Kolkata, India …, 2005 | 50* | 2005 |
Finding good partners in availability-aware p2p networks S Le Blond, F Le Fessant, E Le Merrer Stabilization, Safety, and Security of Distributed Systems: 11th …, 2009 | 49 | 2009 |
Compromising Tor anonymity exploiting P2P information leakage P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ... arXiv preprint arXiv:1004.1461, 2010 | 44 | 2010 |
A Broad View of the Ecosystem of Socially Engineered Exploit Documents. S Le Blond, C Gilbert, U Upadhyay, M Gomez-Rodriguez, DR Choffnes NDSS, 2017 | 22 | 2017 |
On enforcing the digital immunity of a large humanitarian organization S Le Blond, A Cuevas, JR Troncoso-Pastoriza, P Jovanovic, B Ford, ... 2018 IEEE Symposium on Security and Privacy (SP), 424-440, 2018 | 15 | 2018 |
Clustering in p2p exchanges and consequences on performances JL Guillaume, S Le-Blond, M Latapy Lecture Notes in Computer Sciences (LNCS), proceedings of the 4-th …, 2005 | 15 | 2005 |
Choosing partners based on availability in P2P networks SL Blond, FL Fessant, EL Merrer ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-14, 2012 | 13 | 2012 |
Early application experience with the grid application toolkit (gat) S Le Blond, AM Oprescu, C Zhang Workshop on Grid Applications held in conjunction with the Fourteenth Global …, 2005 | 7* | 2005 |
Moby: A blackout-resistant anonymity network for mobile devices A Pradeep, H Javaid, R Williams, A Rault, D Choffnes, S Le Blond, B Ford Proceedings on Privacy Enhancing Technologies 3, 247-267, 2022 | 2 | 2022 |
Attacking Large-Scale, Real-World Systems S Le Blond, P Manils, A Chaabane, MA Kaafar | | 2011 |
Clustering in P2P Exchanges and Consequences S Le Blond, JL Guillaume, M Latapy Peer-to-peer Systems:... International Workshop, IPTPS...: Revised Papers, 193, 2005 | | 2005 |