• Publications
  • Influence
End-to-end text recognition with convolutional neural networks
TLDR
In this paper, we take a different route and combine the representational power of large, multilayer neural networks together with recent developments in unsupervised feature learning, which allows us to use a common framework to train highly-accurate text detector and character recognizer modules. Expand
  • 713
  • 78
  • PDF
Effective Attacks and Provable Defenses for Website Fingerprinting
TLDR
We show a new attack that achieves significantly higher accuracy than previous attacks in the same field, further highlighting website fingerprinting as a genuine threat to web privacy. Expand
  • 215
  • 55
  • PDF
Deep learning with COTS HPC systems
TLDR
We present an alternative approach to training extremely large neural networks that leverages inexpensive computing power in the form of GPUs and introduces the use of high-speed communications infrastructure to tightly coordinate distributed gradient computations. Expand
  • 615
  • 42
  • PDF
Improved website fingerprinting on Tor
TLDR
In this paper, we propose new website fingerprinting techniques that achieve a higher classification accuracy on Tor than previous works. Expand
  • 179
  • 42
  • PDF
PMRD: plant microRNA database
TLDR
The plant miRNA database (PMRD) integrates publicly deposited miRNA data deposited in public databases, gleaned from the recent literature, and data generated in-house. Expand
  • 292
  • 36
  • PDF
Convolutional Neural Networks over Tree Structures for Programming Language Processing
TLDR
We propose a novel tree-based convolutional neural network for programming language processing, in which a convolution kernel is designed over programs' abstract syntax trees to capture structural information. Expand
  • 252
  • 34
  • PDF
Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks
TLDR
We present Walkie-Talkie, an effective and efficient WF defense, with the following properties: 1. Effective: Many WF defenses have failed against newer WF attacks. 2. Efficient: A high bandwidth overhead burdens the network, while a high time overhead frustrates the user. Expand
  • 72
  • 28
  • PDF
A Systematic Approach to Developing and Evaluating Website Fingerprinting Defenses
TLDR
Fingerprinting attacks have emerged as a serious threat against privacy mechanisms, such as SSL, Tor, and encrypting tunnels, but published defenses have high overhead, poor security, or both. Expand
  • 122
  • 25
  • PDF
Automatic Gait Optimization with Gaussian Process Regression
TLDR
Gait optimization is a basic yet challenging problem for both quadrupedal and bipedal robots. Expand
  • 238
  • 16
  • PDF
On Realistically Attacking Tor with Website Fingerprinting
TLDR
We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page. Expand
  • 72
  • 15
  • PDF