How to find hidden users: A survey of attacks on anonymity networks E Erdin, C Zachor, MH Gunes IEEE Communications Surveys & Tutorials 17 (4), 2296-2316, 2015 | 71 | 2015 |
An overview of anonymity technology usage B Li, E Erdin, MH Gunes, G Bebis, T Shipley Computer Communications 36 (12), 1269-1283, 2013 | 65 | 2013 |
An analysis of anonymizer technology usage B Li, E Erdin, MH Güneş, G Bebis, T Shipley Traffic Monitoring and Analysis: Third International Workshop, TMA 2011 …, 2011 | 24 | 2011 |
Posn: A privacy preserving decentralized social network app for mobile devices E Klukovich, E Erdin, MH Gunes 2016 IEEE/ACM International Conference on Advances in Social Networks …, 2016 | 13 | 2016 |
Posn: A personal online social network E Erdin, E Klukovich, G Gunduz, MH Gunes ICT Systems Security and Privacy Protection: 30th IFIP TC 11 International …, 2015 | 12 | 2015 |
An analysis of anonymity usage B Li, E Erdin, MHI Güneş, G Bebis, T Shipley Traffic monitoring and analysis. Traffic monitoring and analysis. Springer …, 2011 | 8 | 2011 |
An analysis of friend circles of facebook users E Erdin, E Klukovich, MH Gunes 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops …, 2015 | 7 | 2015 |
Cloud Assisted Personal Online Social Network E Erdin, E Klukovich, MH Gunes Machine Learning Techniques for Online Social Networks, 195-218, 2018 | 1 | 2018 |
Anonymous communication networks: Usage analysis and attack mechanisms E Erdin | 1 | 2012 |
Anonymous Communication Systems: Usage Analysis and Attack Mechanisms E Erdin | 1 | 2012 |
Efficient Data Dissemination in Distributed Social Networks E Erdin, MH Gunes Proceedings of the 2017 IEEE/ACM International Conference on Advances in …, 2017 | | 2017 |
Privacy Preserving Efficient Data Dissemination in Decentralized Online Social Networks E Erdin | | 2017 |