Follow
Stevens Le Blond
Stevens Le Blond
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Pushing bittorrent locality to the limit
S Le Blond, A Legout, W Dabbous
Computer Networks 55 (3), 541-557, 2011
1352011
Towards efficient traffic-analysis resistant anonymity networks
S Le Blond, D Choffnes, W Zhou, P Druschel, H Ballani, P Francis
ACM SIGCOMM Computer Communication Review 43 (4), 303-314, 2013
1082013
A look at targeted attacks through the lense of an {NGO}
S Le Blond, A Uritesc, C Gilbert, ZL Chua, P Saxena, E Kirda
23rd USENIX Security Symposium (USENIX Security 14), 543-558, 2014
1042014
One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users
SL Blond, P Manils, C Abdelberi, MAD Kaafar, C Castelluccia, A Legout, ...
Proceedings of the 4th USENIX workshop on Large-scale exploits and emergent …, 2011
952011
Herd: A scalable, traffic analysis resistant anonymity network for VoIP systems
S Le Blond, D Choffnes, W Caldwell, P Druschel, N Merritt
Proceedings of the 2015 ACM Conference on Special Interest Group on Data …, 2015
872015
Spying the World from your Laptop--Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
SL Blond, A Legout, FL Fessant, W Dabbous, MA Kaafar
Proceedings of the 3rd USENIX workshop on Large-scale exploits and emergent …, 2010
76*2010
To catch a ratter: Monitoring the behavior of amateur darkcomet rat operators in the wild
B Farinholt, M Rezaeirad, P Pearce, H Dharmdasani, H Yin, S Le Blond, ...
2017 IEEE symposium on Security and Privacy (SP), 770-787, 2017
652017
I know where you are and what you are sharing: exploiting p2p communications to invade users' privacy
S Le Blond, C Zhang, A Legout, K Ross, W Dabbous
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement …, 2011
642011
Clustering in p2p exchanges and consequences on performances
S Le-Blond, JL Guillaume, M Latapy
Proceedings of the 4-th international workshop on Peer-to-Peer Systems (IPTPS), 2005
542005
Finding good partners in availability-aware p2p networks
S Le Blond, F Le Fessant, E Le Merrer
Symposium on Self-Stabilizing Systems, 472-484, 2009
492009
Statistical analysis of a P2P query graph based on degrees and their time-evolution
JL Guillaume, M Latapy, S Le-Blond
Distributed Computing-IWDC 2004: 6th International Workshop, Kolkata, India …, 2005
48*2005
Compromising Tor anonymity exploiting P2P information leakage
P Manils, C Abdelberri, SL Blond, MA Kaafar, C Castelluccia, A Legout, ...
arXiv preprint arXiv:1004.1461, 2010
462010
A Broad View of the Ecosystem of Socially Engineered Exploit Documents.
S Le Blond, C Gilbert, U Upadhyay, M Gomez-Rodriguez, DR Choffnes
NDSS, 2017
242017
On enforcing the digital immunity of a large humanitarian organization
S Le Blond, A Cuevas, JR Troncoso-Pastoriza, P Jovanovic, B Ford, ...
2018 IEEE Symposium on Security and Privacy (SP), 424-440, 2018
212018
Clustering in p2p exchanges and consequences on performances
JL Guillaume, S Le-Blond, M Latapy
Lecture Notes in Computer Sciences (LNCS), proceedings of the 4-th …, 2005
152005
Choosing partners based on availability in P2P networks
SL Blond, FL Fessant, EL Merrer
ACM Transactions on Autonomous and Adaptive Systems (TAAS) 7 (2), 1-14, 2012
132012
Early application experience with the grid application toolkit (gat)
S Le Blond, AM Oprescu, C Zhang
Workshop on Grid Applications held in conjunction with the Fourteenth Global …, 2005
7*2005
Moby: A blackout-resistant anonymity network for mobile devices
A Pradeep, H Javaid, R Williams, A Rault, D Choffnes, S Le Blond, ...
Proceedings on Privacy Enhancing Technologies 2022 (3), 247-267, 2022
62022
Attacking Large-Scale, Real-World Systems
S Le Blond, P Manils, A Chaabane, MA Kaafar
2011
PriFi: A Traffic-Analysis Resistant, Low-Latency Anonymous Communication Protocol for Local Area Networks
L Barman, I Dacosta, M Zamani, E Zhai, S Le Blond, B Ford, JP Hubaux, ...
The system can't perform the operation now. Try again later.
Articles 1–20