Publications

Found 4046 results
Author Title Type [ Year(Asc)]
2016
VanderSloot B, Amann J, Bernhard M, Durumeric Z, Bailey M, J. Halderman A.  2016.  Towards a Complete View of the Certificate Ecosystem. Proceeings of 16th Internet Measurement Conference (IMC'16).
Schomp K, Rabinovich M, Allman M.  2016.  Towards a Model of DNS Client Behavior. Proceedings of Passive and Active Measurement Conference (PAM).
Jain S, Javed M, Paxson V.  2016.  Towards Mining Latent Client Identifiers from Network Traffic. Proceedings of Privacy Enhancing Technologies Symposium.
Vallina-Rodriguez N, Sundaresan S, Razaghpanah A, Nithyanand R, Allman M, Kreibich C, Gill P.  2016.  Tracking the Trackers: Towards Understanding the Mobile Advertising and Tracking Ecosystem. Proceedings of Workshop on Data and Algorithmic Transparency.
Murali A, Garg A, Krishnan S, Pokory FT, Abbeel P, Darrell T, Goldberg K.  2016.  TSC-DL: Unsupervised trajectory segmentation of multi-modal surgical demonstrations with Deep Learning. IEEE International Conference on Robotics and Automation (ICRA). :4150-4157.
Karbasi M, Abdelaziz AHussen, Kolossa D.  2016.  Twin-HMM-based Non-intrusive Speech Intelligibility Prediction. Proceedings of ICASSP.
Song X, Babu N, Rave W, Majhi S, Fettweis G.  2016.  Two-Level Spatial Multiplexing using Hybrid Beamforming Antenna Arrays for mmWave Communications. CoRR. abs/1607.08737
Li Z, Atre R, Huda ZUl, Jannesari A, Wolf F.  2016.  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117:282–295.
Vallentin M, Paxson V, Sommer R.  2016.  VAST: A Unified Platform for Interactive Network Forensics. Proceedings of USENIX Sympyosium on Networked Systems Design and Implementation.
Choi J, Larson M, Li X, Friedland G, Hanjalic A.  2016.  Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy.
Li F, Durumeric Z, Czyz J, Karami M, Bailey M, McCoy D, Savage S, Paxson V.  2016.  You’ve Got Vulnerability: Exploring Effective Vulnerability Notifications. Proceedings of the 25th USENIX Security Symposium.
2015
[Anonymous].  2015.  2015 Audited Financial Statement.
Song X, Jans C, Landau L, Cvetkovski D, Fettweis G.  2015.  A 60GHz LOS MIMO Backhaul Design Combining Spatial Multiplexing and Beamforming for a 100Gbps Throughput. 2015 IEEE Global Communications Conference (GLOBECOM). :1-6.
Raghavan B.  2015.  Abstraction, Indirection, and Sevareid's Law: Towards Benign Computing.
Thomas K, Bursztein E, Jagpal N, Rajab MAbu, Provos N, Pearce P, Ho G, McCoy D, Grier C, Paxson V et al..  2015.  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Partridge C, Allman M.  2015.  Addressing Ethical Considerations in Network Measurement Papers. Proceedings of ACM SIGCOMM Workshop on Ethics in Networked Systems Research.
Tsai T.J, Stolcke A.  2015.  Aligning Meeting Recordings Via Adaptive Fingerprinting. :786-790.
Marczak B, Weaver N, Dalek J, Ensafi R, Fifield D, McKune S, Rey A, Scott-Railton J, Deibert R, Paxson V.  2015.  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Wijesekera P, Baokar A, Hosseini A, Egelman S, Wagner D, Beznosov K.  2015.  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Tsai T.J.  2015.  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers
Ashraf K, Elizalde BMartinez, Iandola F, Moskewicz M, Bernd J, Friedland G, Keutzer K.  2015.  Audio-Based Multimedia Event Detection with DNNs and Sparse Sampling. :611-614.
Datta A, Tschantz MC, Datta A.  2015.  Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination. Proceedings on Privacy Enhancing Technologies. 2015(1):92-112.
Azadi S, Feng J, Jegelka S, Darrell T.  2015.  Auxiliary Image Regularization for Deep CNNs with Noisy Labels. CoRR. abs/1511.07069
Miller B, Kantchelian A, Tschantz MC, Afroz S, Bachwani R, Faizullabhoy R, Huang L, Shankar V, Wu T, Wu G et al..  2015.  Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR. abs/1510.07338
Kantchelian A, Tschantz MC, Afroz S, Miller B, Shankar V, Bachwani R, Joseph AD, Tygar J.D..  2015.  Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security. :45–56.

Pages