Publications

Found 725 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is H  [Clear All Filters]
2019
Hwang, J-J., Ke T-W., Shi J., & Yu S. X. (2019).  Adversarial Structure Matching for Structured Prediction Tasks. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Hornauer, S., Yellapragada B., Ranjbar A., & Yu S. X. (2019).  Driving Scene Retrieval by Example from Large-Scale Data. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition .
Hermalin, N., & Regier T. (2019).  Efficient use of ambiguity in an early writing system: Evidence from Sumerian cuneiform. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Choi, J., Larson M., Friedland G., & Hanjalic A. (2019).  From Intra-Modal to Inter-Modal Space: Multi-Task Learning of Shared Representations for Cross-Modal Retrieval. Proceedings of 2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM). 1-10.
Simsek, M., Hößler T., Jorswieck E., Klessig H., & Fettweis G. (2019).  Multiconnectivity in Multicellular, Multiuser Systems: A Matching- Based Approach. Proceedings of the IEEE. 107(2), 394-413.
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2019).
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of CHI '19.
Hwang, J-J., Yu S. X., Shi J., Collins M. D., Yang T-J., Zhang X., et al. (2019).  SegSort: Segmentation by Discriminative Sorting of Segments. Proceedings of the International Conference on Computer Vision.
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
2018
Frik, A., Egelman S., Harbach M., Malkin N., & Peer E. (2018).  Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias. Proceedings of WEIS '18.
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Woo, S., Sherry J., Han S., Moon S., Ratnasamy S., & Shenker S. (2018).  Elastic Scaling of Stateful Network Functions. Proceedings of NSDI '18.
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Savary, A., Ramisch C., Hwang J., Schneider N., Andresen M., Pradhan S., et al. (2018).  Proceedings of the Joint Workshop on Linguistic Annotation, Multiword Expressions and Constructions. Proceedings of the Joint Workshop on Linguistic Annotation, Multiword Expressions and Constructions.
Mathur, A., Malkin N., Harbach M., Peer E., & Egelman S. (2018).  Quantifying Users’ Beliefs about Software Updates. Proceedings of the NDSS Workshop on Usable Security (USEC ’18).
Scheitle, Q., Gasser O., Nolte T., Amann J., Brent L., Carle G., et al. (2018).  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Proceedings of 18th Internet Measurement Conference (IMC'18).
2017
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Portnoff, R. S., Huang D. Yuxing, Doerfler P., Afroz S., & McCoy D. (2017).  Backpage and Bitcoin: Uncovering Human Traffickers. Proceedings of KDD 2017.
Simsek, M., Zhang D., hmann D. Ö., Matthé M., & Fettweis G. (2017).  On the Flexibility and Autonomy of 5G Wireless Networks View Document. IEEE Access. 5,
Choi, J., Larson M., Li X., Li K., Friedland G., & Hanjalic A. (2017).  The Geo-Privacy Bonus of Popular Photo Enhancements. Proceedings of the 2017 ACM on International Conference on Multimedia Retrieval. 84-92.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Mobility on the Reliability Performance of 5G Multi-Connectivity Architectures. Proceedings of Wireless Communications and Networking Conference (WCNC) 2017.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2017).  Impact of Mobility on the Reliability Performance of 5G Multi-Connectivity Architectures. Proceedings of IEEE Wireless Communications and Networking Conference (WCNC).

Pages