CENSORS
cn China (Great Firewall)
Encompasses GFW operator infrastructure across China Telecom, China Unicom, China Mobile, and the smaller carriers. Distinct from corporate or campus filtering inside China.
Synonyms: GFW, Great Firewall, China
68 PAPERS ON FILE
- 2026-ablove-characterizing Characterizing the Implementation of Censorship Policies in Chinese LLM Services
- 2025-ahmed-llm-censorship-bias An Analysis of Chinese Censorship Bias in LLMs
- 2025-amnesty-pakistan-shadows Shadows of Control: Censorship and mass surveillance in Pakistan
- 2025-fan-wallbleed Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
- 2025-geedge-mesa-leak Geedge & MESA Leak: Analyzing the Great Firewall's Largest Document Leak
- 2025-gfw-port443-rst Analysis of the GFW's Unconditional Port 443 Block on August 20, 2025
- 2025-interseclab-internet-coup The Internet Coup
- 2025-jfm-silk-road-surveillance Silk Road of Surveillance
- 2025-tai-irblock IRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran
- 2025-wu-regional-censorship A Wall Behind A Wall: Emerging Regional Censorship in China
- 2025-zohaib-quic-sni Exposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China
- 2017-frolov-water-pluggable WATER: a programmable framework for pluggable transports
- 2024-hoang-gfweb GFWeb: Measuring the Great Firewall's Web Censorship at Scale
- 2024-sakamoto-bleeding Bleeding Wall: A Hematologic Examination on the Great Firewall
- 2024-zhang-toothless How Do Toothless Tigers Bite? Extra-institutional Governance and Internet Censorship by Local Governments in China
- 2023-feng-study A Study of China's Censorship and Its Evasion Through the Lens of Online Gaming
- 2023-gfw-blocking-1111 The blocking of 1.1.1.1 in China, starting from 2023-10-01
- 2023-niere-poster Poster: Circumventing the GFW with TLS Record Fragmentation
- 2023-ramesh-certainty CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates
- 2023-streisand-where Where Have All the Paragraphs Gone? Detecting and Exposing Censorship in Chinese Translation
- 2023-wu-fully-encrypted-detect How the Great Firewall of China detects and blocks fully encrypted traffic
- 2022-blocking-tls-circumvention Large scale blocking of TLS-based censorship circumvention tools in China
- 2022-chang-covid-19 COVID-19 increased censorship circumvention and access to sensitive topics in China
- 2021-bock-even Even Censors Have a Backup: Examining China's Double HTTPS Censorship Middleboxes
- 2021-hoang-great How Great is the Great Firewall? Measuring China's DNS Censorship
- 2021-knockel-measuring Measuring QQMail's Automated Email Censorship in China
- 2021-rambert-chinese Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China
- 2020-alice-shadowsocks-detection How China Detects and Blocks Shadowsocks
- 2020-anonymous-triplet-censors Triplet Censors: Demystifying Great Firewall's DNS Censorship Behavior
- 2020-gfw-esni-blocking Exposing and Circumventing China's Censorship of ESNI
- 2020-v2ray-weaknesses Summary on Recently Discovered V2Ray Weaknesses
- 2020-zhu-characterizing Characterizing Transnational Internet Performance and the Great Bottleneck of China
- 2015-frolov-the-use-of-tls The use of TLS in censorship circumvention
- 2019-chen-impact The Impact of Media Censorship: 1984 or Brave New World?
- 2019-ververis-shedding Shedding Light on Mobile App Store Censorship
- 2019-xiong-efficient An Efficient Method to Determine which Combination of Keywords Triggered Automatic Filtering of a Message
- 2018-dunna-analyzing Analyzing China's Blocking of Unpublished Tor Bridges
- 2018-hounsel-automatically Automatically Generating a Large, Culture-Specific Blocklist for China
- 2018-knockel-analysis An analysis of automatic image filtering on WeChat Moments
- 2018-ng-detecting Detecting Censorable Content on Sina Weibo: A Pilot Study
- 2017-deng-random The Random Forest based Detection of Shadowsock's Traffic
- 2017-knockel-measuring Measuring Decentralization of Chinese Keyword Censorship via Mobile Games
- 2017-lu-accessing Accessing Google Scholar under Extreme Internet Censorship: A Legal Avenue
- 2016-farnan-poisoning Poisoning the Well -- Exploring the Great Firewall's Poisoned DNS Responses
- 2015-ensafi-active-probing Examining how the Great Firewall discovers hidden circumvention servers
- 2015-ensafi-analyzing Analyzing the Great Firewall of China Over Space and Time
- 2015-fifield-blocking-resistant Blocking-resistant communication through domain fronting
- 2015-hiruncharoenvate-algorithmically Algorithmically Bypassing Censorship on Sina Weibo with Nondeterministic Homophone Substitutions
- 2015-holowczak-cachebrowser CacheBrowser: Bypassing Chinese Censorship without Proxies Using Cached Content
- 2015-knockel-every Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in China
- 2015-marczak-analysis An Analysis of China's ``Great Cannon''
- 2014-anonymous-towards Towards a Comprehensive Picture of the Great Firewall's DNS Censorship
- 2014-king-reverse-engineering Reverse-engineering censorship in China: Randomized experimentation and participant observation
- 2014-morrison-toward Toward automatic censorship detection in microblogs
- 2014-wang-gohop GoHop: Personal VPN to Defend from Censorship
- 2013-chen-tweeting Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on Sina Weibo
- 2013-robinson-collateral Collateral Freedom: A Snapshot of Chinese Internet Users Circumventing Censorship
- 2013-zhu-velocity The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions
- 2012-aase-whiskey Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations
- 2012-appelbaum-technical Technical analysis of the Ultrasurf proxying software
- 2012-king-censorship How Censorship in China Allows Government Criticism but Silences Collective Expression
- 2012-winter-great How the Great Firewall of China is Blocking Tor
- 2012-wright-regional Regional Variation in Chinese Internet Filtering
- 2011-knockel-three Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
- 2011-xu-internet Internet Censorship in China: Where Does the Filtering Occur?
- 2010-park-empirical Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of HTML Responses in China
- 2007-lowe-great The Great DNS Wall of China
- 2006-clayton-ignoring Ignoring the Great Firewall of China