Publications

Found 4046 results
Author Title Type [ Year(Asc)]
2016
Hao S, Kantchelian A, Miller B, Paxson V, Feamster N.  2016.  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Thomee B, Borth D, Bernd J.  2016.  Proceedings of the 2016 ACM Workshop on Multimedia COMMONS.
Sundaresan S, McCoy D, Afroz S, Paxson V.  2016.  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.
Ameloot TJ, Van Den Bussche J, Marczak B, Alvaro P, Hellerstein JM.  2016.  Putting logic-based distributed systems on stable grounds. Theory and Practice of Logic Programming. 16(4):378-417.
Gallopoulos E, Drineas P, Ipsen I, Mahoney MW.  2016.  RandNLA, Pythons, and the CUR for Your Data Problems: Reporting from G2S3 2015 in Delphi. SIAM News. (January/February 2016)
Drineas P, Mahoney MW.  2016.  RandNLA: Randomized Numerical Linear Algebra. Communications of the ACM. 59:80-90.
Dharmar M, Simon A, Sadorra C, Friedland G, Sherwood J, Morrow H, Deines D, Nickell D, Lucatorta D, Marcin JP.  2016.  Reducing Loss to Follow-Up with Tele-audiology Diagnostic Evaluations. 22
Girshick R, Donahue J, Darrell T, Malik J.  2016.  Region-Based Convolutional Networks for Accurate Object Detection and Segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence. 38(1):142-158.
Li F, Ho G, Kuan E, Niu Y, Ballard L, Thomas K, Bursztein E, Paxson V.  2016.  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Petruck MRL, Ellsworth M.  2016.  Representing Support Verbs in FrameNet. Proceedings of the 12th Workshop on Multiword Expressions. :72–77.
Miller B, Kantchelian A, Tschantz MC, Afroz S, Bachwani R, Faizullabhoy R, Huang L, Shankar V, Wu T, Yiu G.  2016.  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Yiin-Chang S, Morgan N.  2016.  Robust CNN - based Speech Recognition With Gabor Filter Kernels. Proceedings of Interspeech 2016.
Kellman M, Morgan N.  2016.  Robust Multi-Pitch Tracking: a trained classifier based approach.
Jannesari A, Sato Y, Winter S.  2016.  SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems. SEPS 2016: Proceedings of the 3rd International Workshop on Software Engineering for Parallel Systems.
Veldt N, Gleich DF, Mahoney MW.  2016.  A Simple and Strongly-Local Flow-Based Method for Cut Improvement. Proceedings of the 33rd ICML Conference.
Tschantz MC, Afroz S, Anonymous, Paxson V.  2016.  SoK: Towards Grounding Censorship Circumvention in Empiricism. IEEE Symposium on Security and Privacy.
Caselli M, Zambon E, Amann J, Sommer R, Kargl F.  2016.  Specification Mining for Intrusion Detection in Networked Control Systems. Proceedings of the 25th USENIX Security Symposium. :790-806.
Sommer R, Amann J, Hall S.  2016.  Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data. Proceedings of 2016 Annual Computer Security Applications Conference.
Maresca M.  2016.  The Spreadsheet Space: Eliminating the Boundaries of Data Cross-Referencing. Computer. 49(9):78-85.
Mahoney MW, Drineas P.  2016.  Structural properties underlying high-quality Randomized Numerical Linear Algebra algorithms. Handbook of Big Data. :137-154.
Roosta-Khorasani F, Mahoney MW.  2016.  Sub-Sampled Newton Methods I: Globally Convergent Algorithms.
Roosta-Khorasani F, Mahoney MW.  2016.  Sub-Sampled Newton Methods II: Local Convergence Rates.
Xu P, Yang J, Roosta-Khorasani F, Re C, Mahoney MW.  2016.  Sub-sampled Newton Methods with Non-uniform Sampling. Proceedings of the 2016 NIPS Conference.
Egelman S, Bernd J, Friedland G, Garcia DD.  2016.  The Teaching Privacy Curriculum. Proceedings of the 47th ACM Technical Symposium on Computing Science Education (SIGCSE ’16), Memphis, TN. :591-596.
Holtz R, Amann J, Mehani O, Wachs M, Kaafar MAli.  2016.  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).

Pages