Publications
Found 469 results
Author Title Type [ Year] Filters: First Letter Of Last Name is D [Clear All Filters]
How Great is the Great Firewall? Measuring China's DNS Censorship.
Proceedings of the 30th USENIX Security Symposium.
(In Press). In-Home Smart Devices: Quantifying Bystander Privacy Experiences and Social Norms in Different Situations.
Symposium on Applications of Contextual Integrity. 4,
(2022). Corelight Sensors detect the ChaChi RAT.
Security Boulevard.
(2021).
(2021). Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium. 3093-3110.
(2021). A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic.
Communications of the ACM (CACM). 64(7), 101-108.
(2021). Human Comprehension of Fairness in Machine Learning.
AIES '20: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 152.
(2020). Q-BERT: Hessian Based Ultra Low Precision Quantization of BERT.
Proceedings of the AAAI-20 Conference.
(2020). Distributed estimation of the inverse Hessian by determinantal averaging.
Proceedings of the 2019 NeurIPS Conference.
(2019). Evaluating Anti-Fingerprinting Privacy Enhancing Technologies.
Proceedings of the WWW'19 (World Wide Web Conference).
(2019). HAWQ: Hessian AWare Quantization of Neural Networks with Mixed-Precision.
Proceedings of ICCV 2019.
(2019). Minimax experimental design: Bridging the gap between statistical and worst-case approaches to least squares regression.
Proceedings of 2019 COLT.
(2019). Privacy and audiovisual content: Protecting users as big multimedia data grows bigger.
Big Data Analytics for Large-Scale Multimedia Search.
(2019). Stable and Practical AS Relationship Inference with ProbLink.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’19).
(2019). Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users.
Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
(2019).
(2018).
(2018).
(2018).
Scanning the Internet for Liveness.
Computer Communication Review. 48(2),
(2018). We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS.
Proceedings of USENIX Security Symposium.
(2018). Automated Analysis of Cybercriminal Markets.
Proceedings of WWW 2017.
(2017). Backpage and Bitcoin: Uncovering Human Traffickers.
Proceedings of KDD 2017.
(2017). Construction Detection in a Conventional NLP Pipeline.
Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding. 178-184.
(2017).
(2017). Grammar Scaling: Leveraging FrameNet Data to Increase Embodied Construction Grammar Coverage.
Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding.
(2017).