| Encrypted DNS--> Privacy? A Traffic Analysis Perspective S Siby, M Juarez, C Diaz, N Vallina-Rodriguez, C Troncoso Network and Distributed Systems Security (NDSS) Symposium 2020, 2019 | 201 | 2019 |
| IoTScanner: Detecting privacy threats in IoT neighborhoods S Siby, RR Maiti, NO Tippenhauer Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and …, 2017 | 158* | 2017 |
| Verifiable management of private data under byzantine failures E Kokoris-Kogias, EC Alp, SD Siby, N Gailly, L Gasser, P Jovanovic, ... IACR ePrint 209, 2018, 2018 | 77* | 2018 |
| Wearable environmental sensors and infrastructure for mobile large-scale urban deployment E Wilhelm, S Siby, Y Zhou, XJS Ashok, M Jayasuriya, S Foong, J Kee, ... IEEE Sensors Journal 16 (22), 8111-8123, 2016 | 77 | 2016 |
| Webgraph: Capturing advertising and tracking information flows for ro-bust blocking S Siby, U Iqbal, S Englehardt, Z Shafiq, C Troncoso USENIX Security 2022, 2021 | 55 | 2021 |
| Cookiegraph: Understanding and detecting first-party tracking cookies S Munir, S Siby, U Iqbal, S Englehardt, Z Shafiq, C Troncoso Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 53* | 2023 |
| Mobile-enabled delay tolerant networking in rural developing regions A Galati, T Bourchas, S Siby, S Frey, M Olivares, S Mangold IEEE Global Humanitarian Technology Conference (GHTC 2014), 699-705, 2014 | 34 | 2014 |
| Link-layer device type classification on encrypted wireless traffic with COTS radios RR Maiti, S Siby, R Sridharan, NO Tippenhauer European Symposium on Research in Computer Security, 247-264, 2017 | 24 | 2017 |
| Evaluating practical QUIC website fingerprinting defenses for the masses S Siby, L Barman, C Wood, M Fayed, N Sullivan, C Troncoso Proceedings on Privacy Enhancing Technologies, 2023 | 22* | 2023 |
| Dns privacy not so private: the traffic analysis perspective S Siby, M Juarez, N Vallina-Rodriguez, C Troncoso The 11th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2018), 2018 | 22 | 2018 |
| GuaranTEE: Towards attestable and private ML with CCA S Siby, S Abdollahi, M Maheri, M Kogias, H Haddadi Proceedings of the 4th Workshop on Machine Learning and Systems, 1-9, 2024 | 13 | 2024 |
| System architecture for delay tolerant media distribution for rural south africa A Galati, T Bourchas, S Siby, S Mangold Proceedings of the 9th ACM international workshop on Wireless network …, 2014 | 11 | 2014 |
| Practical Evaluation of Passive COTS Eavesdropping in 802.11 b/n/ac WLAN D Antonioli, S Siby, NO Tippenhauer International Conference on Cryptology and Network Security, 415-435, 2017 | 10 | 2017 |
| Apparatus and method for monitoring a wireless network NO Tippenhauer, RR MAITI, R SRIDHARAN US Patent 10,567,243, 2020 | 9 | 2020 |
| METhoD: A framework for the emulation of a delay tolerant network scenario for media-content distribution in under-served regions S Siby, A Galati, T Bourchas, M Olivares, TR Gross, S Mangold 2015 24th International Conference on Computer Communication and Networks …, 2015 | 8 | 2015 |
| {PURL}: Safe and Effective Sanitization of Link Decoration S Munir, P Lee, U Iqbal, Z Shafiq, S Siby 33rd USENIX Security Symposium (USENIX Security 24), 4103-4120, 2024 | 7 | 2024 |
| SINBAD: Saliency-informed detection of breakage caused by ad blocking S El Hajj Chehade, S Siby, C Troncoso IEEE Symposium on Security and Privacy (SP), 2024 | 4 | 2024 |
| An Early Experience with Confidential Computing Architecture for On-Device Model Protection S Abdollahi, M Maheri, S Siby, M Kogias, H Haddadi EuroMLSys 2025, 2025 | 1 | 2025 |
| P4: Towards private, personalized, and Peer-to-Peer learning MM Maheri, S Siby, S Abdollahi, A Borovykh, H Haddadi arXiv preprint arXiv:2405.17697, 2024 | 1 | 2024 |
| Method: A framework for the emulation of a delay-tolerant network scenario for media content distribution in under-served regions A Galati, S Siby, T Bourchas, M Olivares, S Mangold, TR Gross Advances in Computer Communications and Networks From Green, Mobile …, 2022 | 1 | 2022 |