Publications
TSC-DL: Unsupervised trajectory segmentation of multi-modal surgical demonstrations with Deep Learning.
IEEE International Conference on Robotics and Automation (ICRA). 4150-4157.
(2016). Twin-HMM-based Non-intrusive Speech Intelligibility Prediction.
Proceedings of ICASSP.
(2016). Two-Level Spatial Multiplexing using Hybrid Beamforming Antenna Arrays for mmWave Communications.
CoRR. abs/1607.08737,
(2016). Unveiling Parallelization Opportunities in Sequential Programs.
Journal of Systems and Software. 117, 282–295.
(2016). VAST: A Unified Platform for Interactive Network Forensics.
Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
(2016).
(2016). You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications.
Proceedings of the 25th USENIX Security Symposium.
(2016).
(2015).
A 60GHz LOS MIMO Backhaul Design Combining Spatial Multiplexing and Beamforming for a 100Gbps Throughput.
2015 IEEE Global Communications Conference (GLOBECOM). 1-6.
(2015).
(2015).
(2015). Addressing Ethical Considerations in Network Measurement Papers.
Proceedings of ACM SIGCOMM Workshop on Ethics in Networked Systems Research.
(2015).
(2015). An Analysis of China’s “Great Cannon”.
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
(2015). Android Permissions Remystified: A Field Study on Contextual Integrity.
Proceedings of the 24th USENIX Security Symposium.
(2015).
(2015).
(2015). Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination.
Proceedings on Privacy Enhancing Technologies. 2015(1), 92-112.
(2015). Auxiliary Image Regularization for Deep CNNs with Noisy Labels.
CoRR. abs/1511.07069,
(2015). Back to the Future: Malware Detection with Temporally Consistent Labels.
CoRR. abs/1510.07338,
(2015). Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels.
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. 45–56.
(2015).
(2015). Blocking-resistant communication through domain fronting.
Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
(2015). Bounded Latency Spanning Tree Reconfiguration.
Computer Networks. 76, 259-274.
(2015).
(2015).