Publications

Found 332 results
Author Title [ Type(Desc)] Year
Filters: First Letter Of Last Name is E  [Clear All Filters]
Conference Paper
Reardon, J., Feal Á., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., & Egelman S. (2019).  50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. Proceedings of the 24th USENIX Security Symposium.
Tschantz, M. Carl, Egelman S., Choi J., Weaver N., & Friedland G. (2018).  The Accuracy of the Demographic Inferences Shown on Google's Ad Settings. Proceedings of the 2018 Workshop on Privacy in the Electronic Society. 33-41.
Utrera, F., Kravitz E., N. Erichson B., Khanna R., & Mahoney M. (2021).  Adversarially-Trained Deep Nets Transfer Better: Illustration on Image Classification. International Conference on Learning Representations.
Afroz, S., Biggio B., Carlini N., Elovici Y., & Shabtai A. (2019).  AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
Ferrandez, O.., Ellsworth M., Muñoz R., & Baker C. F. (2010).  Aligning FrameNet and WordNet Based on Semantic Neighborhoods. 310-314.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of CHI '16.
Harbach, M., De Luca A., & Egelman S. (2016).  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Eppe, M., Trott S., Raghuram V., Feldman J., & Janin A. (2016).  Application-Independent and Integration-Friendly Natural Language Understanding. Proceedings of Global Conference on Artificial Intelligence (GCAI 2016), EPiC Series in Computing.
Mitzel, D. J., Estrin D., Shenker S. J., & Zhang L. (1994).  An Architectural Comparison of ST-II and RSVP. Proceedings of the 13th IEEE Conference on Networking for Global Communications (INFOCOM '94). 2, 716-725.
Egelman, S., Jain S., Pottenger R., Liao K., Consolvo S., & Wagner D. (2014).  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors.
Livescu, K., etin Ö. Ç., Hasegawa-Johnson M., King S., Bartels C., Borges N., et al. (2007).  Articulatory Feature-Based Methods for Acoustic and Audio-Visual Speech Recognition: Summary from the 2006 Jhu Summer Workshop.
etin, Ö. Ç., Kantor A., King S., Bartels C., Magimai-Doss M., Frankel J., et al. (2007).  An Articulatory Feature-Based Tandem Approach and Factored Observation Modeling. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2007). 4, 645-648.
Feldman, J., Brown C. M., Ellis C. S., LeBlanc T. J., & Peterson G. L. (1985).  Artificial Intelligence Research on the Butterfly Multicomputer. Proceedings of the Workshop on Artificial Intelligence and Distributed Problem Solving. 109-118.
Elizalde, B. Martinez, Ravanelli M., & Friedland G. (2013).  Audio Concept Ranking for Video Event Detection on User-Generated Content.
Renals, S., & Ellis D. P. W. (2003).  Audio Information Access from Meeting Rooms. Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2003).
Ashraf, K., Elizalde B. Martinez, Iandola F., Moskewicz M., Bernd J., Friedland G., et al. (2015).  Audio-Based Multimedia Event Detection with DNNs and Sparse Sampling. 611-614.
Elizalde, B. Martinez, Ravanelli M., Ni K., Borth D., & Friedland G. (2014).  Audio-Concept Features and Hidden Markov Models for Multimedia Event Detection.
Fonseca, R., Ratnasamy S., Zhao J., Ee C. Tien, Culler D. E., Shenker S. J., et al. (2005).  Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets. Proceedings of the Second USENIX Symposium on Networked Systems Design and Implementation (NSDI 2005). 329-342.
Egelman, S., Harbach M., & Peer E. (2016).  Behavior Ever Follows Intention? A Validation of the Security Behavior Intentions Scale (SeBIS). Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’16).
Frik, A., Egelman S., Harbach M., Malkin N., & Peer E. (2018).  Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias. Proceedings of WEIS '18.

Pages