Publications

Found 1067 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is F  [Clear All Filters]
2019
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2019).
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of CHI '19.
Khodapanah, B., Awada A., Viering I., Francis J., Simsek M., & Fettweis G. (2019).  Radio Resource Management in Context of Network Slicing: What is Missing in Existing Mechanisms?. Proceedings of the IEEE Wireless Communications and Networking Conference 2019.
Khodapanah, B., Awada A., Viering I., Francis J., Simsek M., & Fettweis G. (2019).  Radio Resource Management in Context of Network Slicing: What is Missing in Existing Mechanisms?. Proceedings of the IEEE Wireless Communications and Networking Conference 2019.
Friedland, G. (2019).  Reproducibility and Experimental Design for Machine Learning on Audio and Multimedia Data. Proceedings of the 27th ACM International Conference on Multimedia. 2709-2710.
Okoyomon, E., Samarin N., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., Feal Á., et al. (2019).  On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies. Proceedings of the Workshop on Technology and Consumer Protection (ConPro ’19).
Khodapanah, B., Awada A., Viering I., Baretto A., Simsek M., & Fettweis G. (2019).  Slice Management in Radio Access Networks via Iterative Adaptation. Proceedings of IEEE International Conference on Communications 2019.
Bernd, J., Frik A., Johnson M., & Malkin N. (2019).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd annual Symposium on Applications of Contextual Integrity.
Bernd, J., Frik A., Johnson M., & Malkin N. (2019).  Smart Home Bystanders: Further Complexifying a Complex Context. Proceedings of the 2nd Symposium on Applications of Contextual Integrity.
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Ye, Z., Choi J., & Friedland G. (2019).  Supervised Deep Hashing for Highly Efficient Cover Song Detection. Proceedings of the 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR).
Vallina, P.., Feal Á., Gamba J.., Vallina-Rodriguez N., & Anta A.F.. (2019).  Tales From the Porn: A Comprehensive Privacy Analysis of the Web Porn Ecosystem. Proceedings of the Internet Measurement Conference. 245-258.
2018
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Frik, A., Egelman S., Harbach M., Malkin N., & Peer E. (2018).  Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias. Proceedings of WEIS '18.
Choi, J., Akkus I. Ekin, Egelman S., Friedland G., Sommer R., Tschantz M. Carl, et al. (2018).  Cybercasing 2.0: You Get What You Pay For.
Reeder, R. W., Felt A. Porter, Consolvo S., Malkin N., Thompson C., & Egelman S. (2018).  An Experience Sampling Study of User Reactions to Browser Warnings in the Field. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’18).
Feldman, J. (2018).  ICSI Research Plan 1990-92. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Taber, A., Kumar G., Freytag M., & Shapiro V. (2018).  A moment-vector approach to interoperable analysis. Computer-Aided Design. 102, 139-147.
Ma, D., Friedland G., & Krell M. Michael (2018).  OrigamiSet1.0: Two New Datasets for Origami Classification and Difficulty Estimation. Proceedings of the 7th International Meeting on Origami in Science, Mathematics and Education (7OSME).
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. J. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Fountoulakis, K.., Gleich D.. F., & Mahoney M.. W. (2018).  A Short Introduction to Local Graph Clustering Methods and Software. Abstracts of the 7th International Conference on Complex Networks and Their Applications.
Pearce, P.., Ensafi R.., Li F.., Feamster N.., & Paxson V.. (2018).   Toward Continual Measurement of Global Network-Level Censorship. Security and Privacy. 16(1), 
2017
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M. W., et al. (2017).  DCAR: A Discriminative and Compact Audio Representation for Audio Processing. IEEE Transactions on Multimedia. PP(99), 

Pages