Publications

Found 253 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is D  [Clear All Filters]
In Press
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (In Press).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
2018
Bird, S. (2018).  Designing Mobile Applications for Endangered Languages. The Oxford Handbook of Endangered Languages.
Yeom, S., & Tschantz M. Carl (2018).  Discriminative but Not Discriminatory: A Comparison of Fairness Definitions under Different Worldviews. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Metere, A. (2018).  Does free will exist in the universe? (That would be a no.).
2017
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M. W., et al. (2017).  DCAR: A Discriminative and Compact Audio Representation for Audio Processing. IEEE Transactions on Multimedia. PP(99), 
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Tschantz, M. Carl, Sen S., & Datta A. (2017).  Differential Privacy as a Causal Property.
Almeida, M., Finamore A., Perino D., Vallina-Rodriguez N., & Varvello M. (2017).  Dissecting DNS Stakeholders in Mobile Networks. Proceedings of CoNEXT.
2016
Hendricks, L. Anne, Venugopalan S., Rohrbach M., Mooney R., Saenko K., & Darrell T. (2016).  Deep Compositional Captioning: Describing Novel Object Categories Without Paired Training Data. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 1-10.
Andreas, J., Rohrbach M., Darrell T., & Klein D. (2016).  Deep compositional question answering with neural module networks. IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Gao, Y., Hendricks L. Anne, Kuchenbecker K. J., & Darrell T. (2016).  Deep learning for tactile understanding from visual and haptic data. IEEE International Conference on Robotics and Automation (ICRA). 536-543.
Yu, S. X., & Zipser K. (2016).  A Deep Neural Net Trained for Person Categorization Develops Both Detailed Local Features and Broad Contexual Specificities. Poster at Vision Sciences Society Annual Meeting.
Yu, S. X., & Zipser K. (2016).  A Deep Neural Net Trained for Person Categorization Develops Both Detailed Local Features and Broad Contexual Specificities. Poster at Vision Sciences Society Annual Meeting.
Dodge, E. (2016).  A deep semantic corpus-based approach to metaphor analysis: A case study of metaphoric conceptualizations of poverty. MetaNet, Special Issue of Constructions and Frames. 8(2), 
Finn, C., Tan X. Yu, Duan Y., Darrell T., Levine S., & Abbeel P. (2016).  Deep spatial autoencoders for visuomotor learning. IEEE International Conference on Robotics and Automation (ICRA). 512-519.
Marczak, B. (2016).  Defending Dissidents from Targeted Digital Surveillance.
McCauley, M., Zhao M., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. (2016).  The Deforestation of L2.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M. W., et al. (2016).  A discriminative and compact audio representation for event detection. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 57-61.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Diversity Trade-Offs and Joint Coding Schemes for Highly Reliable Wireless Transmissions. Proceedings of Vehicular Technology Conference 2016.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Czyz, J., Luckie M., Allman M., & Bailey M. (2016).  Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Gergen, S., Zeiler S., Abdelaziz A. Hussen, Nickel R., & Kolossa D. (2016).  Dynamic Stream Weighting for Turbo-Decoding-Based Audiovisual ASR. Proceedings of Interspeech 2016.

Pages