Publications
(2023).
Balancing Power Dynamics in Smart Homes: Nannies’ Perspectives on How Cameras Reflect and Affect Relationships.
Symposium on Usable Privacy and Security.
(2022). Blind In/On-Path Attacks and Applications to VPNs.
30th USENIX Security Symposium '21. 3129-3146.
(2021). Bertha: Tunneling through the Network API.
HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 53-59.
(2020).
(2020).
(2018).
Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias.
Proceedings of WEIS '18.
(2018). Bridging the GAP: towards approximate graph analytics.
Proceedings of the 1st ACM SIGMOD Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA).
(2018).
(2018). Backpage and Bitcoin: Uncovering Human Traffickers.
Proceedings of KDD 2017.
(2017). Better than Real: Complex-valued Neural Networks for MRI Fingerprinting.
Proceedings of the International Conference on Image Processing 2017.
(2017). Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
(2016). Blind Non-Intrusive Speech Intelligibility Prediction Using Twin-HMMs.
Proceedings of Interspeech 2016.
(2016). Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR. abs/1510.07338,
(2015). Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
(2015).
(2015). Blocking-resistant communication through domain fronting.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
(2015). Bounded Latency Spanning Tree Reconfiguration.
Computer Networks. 76, 259-274.
(2015).
(2014).
(2014).
(2014).
(2014).
(2013).
(2013).
Beyond the Sentence: Towards a Cognitive-Linguistic Approach to Textual Reference.
In Yearbook of the Cognitive Linguistic Association. 39-58.
(2013).