Rarest first and choke algorithms are enough A Legout, G Urvoy-Keller, P Michiardi Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 203-216, 2006 | 540 | 2006 |
Social clicks: What and who gets read on Twitter? M Gabielkov, A Ramachandran, A Chaintreau, A Legout Proceedings of the 2016 ACM SIGMETRICS international conference on …, 2016 | 427 | 2016 |
Network characteristics of video streaming traffic A Rao, A Legout, Y Lim, D Towsley, C Barakat, W Dabbous Proceedings of the seventh conference on emerging networking experiments and …, 2011 | 425 | 2011 |
Clustering and sharing incentives in bittorrent systems A Legout, N Liogkas, E Kohler, L Zhang ACM SIGMETRICS Performance Evaluation Review 35 (1), 301-312, 2007 | 380 | 2007 |
PLM: fast convergence for cumulative layered multicast transmisson schemes A Legout, EW Biersack ACM SIGMETRICS Performance Evaluation Review 28 (1), 13-22, 2000 | 271 | 2000 |
Recon: Revealing and controlling pii leaks in mobile network traffic J Ren, A Rao, M Lindorfer, A Legout, D Choffnes Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | 243 | 2016 |
Understanding bittorrent: An experimental perspective A Legout, G Urvoy-Keller, P Michiardi | 157 | 2005 |
Pushing bittorrent locality to the limit S Le Blond, A Legout, W Dabbous Computer Networks 55 (3), 541-557, 2011 | 136 | 2011 |
Bandwidth-allocation policies for unicast and multicast flows A Legout, J Nonnenmacher, EW Biersack IEEE/ACM Transactions on Networking 9 (4), 464-478, 2001 | 127 | 2001 |
Pathological Behaviors for RLM and RLC A Legout, EW Biersack Proc. of NOSSDAV, 2000 | 93 | 2000 |
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ... arXiv preprint arXiv:1103.1518, 2011 | 87 | 2011 |
Network non-neutrality debate: An economic analysis E Altman, A Legout, Y Xu NETWORKING 2011: 10th International IFIP TC 6 Networking Conference …, 2011 | 79 | 2011 |
Spying the world from your laptop: identifying and profiling content providers and big downloaders in BitTorrent S Le Blond, A Legout, F Lefessant, W Dabbous, MA Kaafar Proceedings of the 3rd USENIX conference on Large-scale exploits and …, 2010 | 71* | 2010 |
Studying social networks at scale: macroscopic anatomy of the twitter social graph M Gabielkov, A Rao, A Legout The 2014 ACM international conference on Measurement and modeling of …, 2014 | 70 | 2014 |
I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy S Le Blond, C Zhang, A Legout, K Ross, W Dabbous Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011 | 63 | 2011 |
Understanding the properties of the bittorrent overlay AA Hamra, A Legout, C Barakat arXiv preprint arXiv:0707.1820, 2007 | 61 | 2007 |
The complete picture of the Twitter social graph M Gabielkov, A Legout Proceedings of the 2012 ACM conference on CoNEXT student workshop, 19-20, 2012 | 56 | 2012 |
Small is not always beautiful P Marciniak, N Liogkas, A Legout, E Kohler arXiv preprint arXiv:0802.1015, 2008 | 55 | 2008 |
Missed by filter lists: Detecting unknown third-party trackers with invisible pixels N Bielova, A Legout, N Sarafijanovic-Djukic Proceedings on Privacy Enhancing Technologies 2020 (2), 499-518, 2020 | 48 | 2020 |
Compromising Tor anonymity exploiting P2P information leakage P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ... arXiv preprint arXiv:1004.1461, 2010 | 44 | 2010 |