Jamie Hayes
TitleCited byYear
k-fingerprinting: A robust scalable website fingerprinting technique
J Hayes, G Danezis
25th {USENIX} Security Symposium ({USENIX} Security 16), 1187-1203, 2016
1082016
LOGAN: evaluating privacy leakage of generative models using generative adversarial networks
J Hayes, L Melis, G Danezis, E De Cristofaro
arXiv preprint arXiv:1705.07663, 2017
77*2017
The loopix anonymity system
AM Piotrowska, J Hayes, T Elahi, S Meiser, G Danezis
26th {USENIX} Security Symposium ({USENIX} Security 17), 1199-1216, 2017
492017
Generating steganographic images via adversarial training
J Hayes, G Danezis
Advances in Neural Information Processing Systems, 1954-1963, 2017
482017
Website fingerprinting defenses at the application layer
G Cherubin, J Hayes, M Juarez
Proceedings on Privacy Enhancing Technologies 2017 (2), 186-203, 2017
312017
Guard Sets for Onion Routing
J Hayes, G Danezis
Proceedings on Privacy Enhancing Technologies 1 (2), Pages 65–80, 2015
21*2015
AnNotify: a private notification service
AM Piotrowska, J Hayes, N Gelernter, G Danezis, A Herzberg
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, 5-15, 2017
102017
Learning Universal Adversarial Perturbations with Generative Models
J Hayes, G Danezis
2018 IEEE Security and Privacy Workshops (SPW), 43-49, 2018
92018
Contamination attacks and mitigation in multi-party machine learning
J Hayes, O Ohrimenko
Advances in Neural Information Processing Systems, 6604-6615, 2018
92018
On visible adversarial perturbations & digital watermarking
J Hayes
Proceedings of the IEEE Conference on Computer Vision and Pattern …, 2018
42018
Evading classifiers in discrete domains with provable optimality guarantees
B Kulynych, J Hayes, N Samarin, C Troncoso
arXiv preprint arXiv:1810.10939, 2018
22018
traffic confirmation attacks despite noise
J Hayes
arXiv preprint arXiv:1601.04893, 2016
22016
TASP: Towards anonymity sets that persist
J Hayes, C Troncoso, G Danezis
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society …, 2016
12016
A note on hyperparameters in black-box adversarial examples
J Hayes
arXiv preprint arXiv:1811.06539, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–14