-
1
-
-
85077969161
-
-
法 律 声 明.
-
GuaGua, 法 律 声 明. Available at http://www.guagua.cn/other/1907.html.
-
GuaGua
-
-
-
2
-
-
84897761903
-
-
Tian Ge Interactive Holdings, Global Offering. Available at http://www.tiange.com/Upload/Pigeon-Cover-IPO-ENG-2d.pdf.
-
Global Offering
-
-
-
3
-
-
85077958014
-
-
Tian Ge Interactive Holdings, Interim Report 2014. Available at http://www.tiange.com/Upload/e101. pdf.
-
Interim Report 2014
-
-
-
5
-
-
85077957951
-
-
University of Hong Kong
-
University of Hong Kong, WeiboScope. Available at http://weiboscope.jmsc.hku.hk/.
-
WeiboScope
-
-
-
6
-
-
84973318500
-
-
YY Inc, 2014 Annual Report. Available at http://investors.yy.com/annuals.cfm.
-
2014 Annual Report
-
-
-
7
-
-
85077959377
-
-
YY Inc, YY主播违规管理方法. http://www.yy.com/1309/242131808402.html
-
YY Inc, YY主播违规管理方法. Available at http://www.yy.com/1309/242131808402.html.
-
-
-
-
8
-
-
85077956140
-
-
Information Office of the State Council of the People’s Republic of China. http://english.gov.cn/2010-06/08/content_1622956.htm, 2010
-
Information Office of the State Council of the People’s Republic of China. Available at http://english.gov.cn/2010-06/08/content_1622956.htm, 2010.
-
-
-
-
9
-
-
85077954929
-
Guagua: Exploring China’s online video community ‘goldmine’
-
Oct
-
Guagua: Exploring China’s Online Video Community ‘Goldmine’. Knowledge@Wharton (Oct. 2013). Available at http://knowledge.wharton.upenn.edu/article/guagua-exploring-chinasonline-video-community-goldmine/.
-
(2013)
Knowledge@Wharton
-
-
-
10
-
-
84904279069
-
-
Steamed Bun Xi
-
China Digital Times, Steamed Bun Xi. Available at http://chinadigitaltimes.net/space/Steamed_ Bun_Xi, 2014.
-
(2014)
China Digital Times
-
-
-
12
-
-
85084161606
-
Towards a comprehensive picture of the great firewall’s dns censorship
-
San Diego, CA, Aug. USENIX Association
-
Towards a comprehensive picture of the great firewall’s dns censorship. In 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14) (San Diego, CA, Aug. 2014), USENIX Association.
-
(2014)
4th USENIX Workshop on Free and Open Communications on the Internet (FOCI 14)
-
-
-
13
-
-
84864017443
-
Censorship and deletion practices in chinese social media
-
BAMMAN, D., O’CONNOR, B., AND SMITH, N. A. Censorship and deletion practices in Chinese social media. First Monday 17, 3 (2012).
-
(2012)
First Monday
, vol.17
, pp. 3
-
-
Bamman, D.1
O’Connor, B.2
Smith, N.A.3
-
16
-
-
84906658788
-
Chat program censorship and surveillance in China: Tracking tom-skype and sina uc
-
CRANDALL, J., CRETE-NISHIHATA, M., KNOCKEL, J., MCKUNE, S., SENFT, A., TSENG, D., AND WISEMAN, G. Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC. First Monday 18, 7 (2013).
-
(2013)
First Monday
, vol.18
, pp. 7
-
-
Crandall, J.1
Crete-Nishihata, M.2
Knockel, J.3
McKune, S.4
Senft, A.5
Tseng, D.6
Wiseman, G.7
-
17
-
-
74049132005
-
ConceptDoppler: A weather tracker for internet censorship
-
CRANDALL, J. R., ZINN, D., BYRD, M., BARR, E., AND EAST, R. ConceptDoppler: A weather tracker for Internet censorship. In 14th ACM Conference on Computer and Communications Security, Oct.29-Nov2, 2007 (2007), pp. 1–18.
-
(2007)
14th ACM Conference on Computer and Communications Security, Oct.29-Nov2, 2007
, pp. 1-18
-
-
Crandall, J.R.1
Zinn, D.2
Byrd, M.3
Barr, E.4
East, R.5
-
18
-
-
85077958359
-
-
CRETE-NISHIHATA, M., DALEK, J., HARDY, S., NG, J. Q., AND SENFT, A. Asia Chats: LINE Censored Keywords Update. Available at https://citizenlab.org/2014/04/line-censoredkeywords-update/, 2014.
-
(2014)
Asia Chats: LINE Censored Keywords Update
-
-
Crete-Nishihata, M.1
Dalek, J.2
Hardy, S.3
Ng, J.Q.4
Senft, A.5
-
19
-
-
84989852758
-
Analyzing the great firewall of China over space and time
-
De Gruyter Open
-
ENSAFI, R., WINTER, P., MUEEN, A., AND CRANDALL, J. R. Analyzing the Great Firewall of China over space and time. In Privacy Enhancing Technologies Symposium (2015), De Gruyter Open.
-
(2015)
Privacy Enhancing Technologies Symposium
-
-
Ensafi, R.1
Winter, P.2
Mueen, A.3
Crandall, J.R.4
-
21
-
-
84877264447
-
How censorship in China allows government criticism but silences collective expression
-
KING, G., PAN, J., AND ROBERTS, M. E. How censorship in china allows government criticism but silences collective expression. American Political Science Review 107 (2013), 1–18.
-
(2013)
American Political Science Review
, vol.107
, pp. 1-18
-
-
King, G.1
Pan, J.2
Roberts, M.E.3
-
22
-
-
84906707964
-
Reverse-engineering censorship in China: Randomized experimentation and participant observation
-
KING, G., PAN, J., AND ROBERTS, M. E. Reverse-engineering censorship in china: Randomized experimentation and participant observation. Science 345 (2014), 1–10.
-
(2014)
Science
, vol.345
, pp. 1-10
-
-
King, G.1
Pan, J.2
Roberts, M.E.3
-
23
-
-
85084163803
-
Three researchers, five conjectures: An empirical analysis of tom-skype censorship and surveillance
-
KNOCKEL, J., CRANDALL, J. R., AND SAIA, J. Three researchers, five conjectures: An empirical analysis of tom-skype censorship and surveillance. In FOCI 2011: Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (2011).
-
(2011)
FOCI 2011: Proceedings of the USENIX Workshop on Free and Open Communications on the Internet
-
-
Knockel, J.1
Crandall, J.R.2
Saia, J.3
-
25
-
-
66149094636
-
China’s censorship 2.0: How companies censor bloggers
-
Number 2 February 2009
-
MACKINNON, R. China’s Censorship 2.0: How companies censor bloggers. First Monday; Volume 14, Number 2 - 2 February 2009 (2009).
-
(2009)
First Monday
, vol.14
, Issue.2
-
-
Mackinnon, R.1
-
26
-
-
80051608281
-
China’s “networked authoritarianism
-
MACKINNON, R. China’s “networked authoritarianism”. Journal of Democracy 22, 2 (2011), 32–46.
-
(2011)
Journal of Democracy
, vol.22
, Issue.2
, pp. 32-46
-
-
Mackinnon, R.1
-
29
-
-
77955877109
-
Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China
-
PARK, J. C., AND CRANDALL, J. R. Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China. In 30th International Conference on Distributed Computing Systems (ICDCS) 2010 (2010), pp. 1–12.
-
(2010)
30th International Conference on Distributed Computing Systems (ICDCS) 2010
, pp. 1-12
-
-
Park, J.C.1
Crandall, J.R.2
-
33
-
-
84874760778
-
Assessing censorship on microblogs in China: Discriminatory keyword analysis and the real-name registration policy
-
WA FU, K., HONG CHAN, C., AND CHAU, M. Assessing censorship on microblogs in china: Discriminatory keyword analysis and the real-name registration policy. IEEE Internet Computing 17, 3 (2013), 42–50.
-
(2013)
IEEE Internet Computing
, vol.17
, Issue.3
, pp. 42-50
-
-
Wa Fu, K.1
Hong Chan, C.2
Chau, M.3
-
34
-
-
85180628784
-
Detecting forged TCP reset packets
-
The Internet Society
-
WEAVER, N., SOMMER, R., AND PAXSON, V. Detecting forged tcp reset packets. In NDSS (2009), The Internet Society.
-
(2009)
NDSS
-
-
Weaver, N.1
Sommer, R.2
Paxson, V.3
-
35
-
-
85084161332
-
How the great firewall of China is blocking tor
-
Bellevue, WA, USA, USENIX Association
-
WINTER, P., AND LINDSKOG, S. How the Great Firewall of China is Blocking Tor. In Free and Open Communications on the Internet (Bellevue, WA, USA, 2012), USENIX Association.
-
(2012)
Free and Open Communications on the Internet
-
-
Winter, P.1
Lindskog, S.2
-
36
-
-
85076283490
-
The velocity of censorship: High-fidelity detection of microblog post deletions
-
Washington, D.C, USENIX
-
ZHU, T., PHIPPS, D., PRIDGEN, A., CRANDALL, J. R., AND WALLACH, D. S. The velocity of censorship: High-fidelity detection of microblog post deletions. In Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13) (Washington, D.C., 2013), USENIX, pp. 227–240.
-
(2013)
Presented as Part of the 22nd USENIX Security Symposium (USENIX Security 13)
, pp. 227-240
-
-
Zhu, T.1
Phipps, D.2
Pridgen, A.3
Crandall, J.R.4
Wallach, D.S.5
-
37
-
-
0037363021
-
Internet filtering in China
-
ZITTRAIN, J., AND EDELMAN, B. Internet filtering in China. Internet Computing 7, 2 (2003), 70–77.
-
(2003)
Internet Computing
, vol.7
, Issue.2
, pp. 70-77
-
-
Zittrain, J.1
Edelman, B.2
|