Publications
Found 332 results
Author Title Type [ Year] Filters: First Letter Of Last Name is E [Clear All Filters]
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of 32nd USENIX Security Symposium.
(In Press). Comparing Distributional and Curated Approaches for Cross-lingual Frame Alignment.
Workshop on Dimensions of Meaning: Distributional and Curated Semantics. 24-30.
(2022). Developers Say the Darnedest Things: Privacy Compliance Processes Followed by Developers of Child-Directed Apps.
Proceedings on Privacy Enhancing Technologies. 2022, 250-273.
(2022). LSAR: Efficient Leverage Score Sampling Algorithm for the Analysis of Big Time Series Data.
Journal of Machine Learning Research. 23, 1-36.
(2022).
(2022). Runtime Permissions for Privacy in Proactive Intelligent Assistants.
Symposium on Usable Privacy and Security.
(2022). Adversarially-Trained Deep Nets Transfer Better: Illustration on Image Classification.
International Conference on Learning Representations.
(2021). FrameNet and Linguistic Typology.
Third Workshop on Computational Typology and Multilingual NLP. 61-66.
(2021). The Key to Getting People to Be Safer Online: Make the Appeals More Personal.
Wall Street Journal.
(2021). Lipschitz recurrent neural networks.
International Conference on Learning Representations.
(2021). Noise-Response Analysis of Deep Neural Networks Quantifies Robustness and Fingerprints Structural Malware.
Proceedings of the 2021 SIAM International Conference on Data Mining (SDM). 100-108.
(2021). Noisy Recurrent Neural Networks.
Advances in Neural Information Processing Systems Conference. 34,
(2021). Revitalizing the public internet by making it extensible.
ACM SIGCOMM Computer Communication Review . 51(2), 18-24.
(2021).
(2020).
The Price is (Not) Right: Comparing Privacy in Free and Paid Apps.
2020(3), 222-242.
(2020). The Price is (Not) Right: Comparing Privacy in Free and Paid Apps.
2020(3), 222-242.
(2020). Shallow neural networks for fluid flow reconstruction with limited sensors.
Proceedings of the Royal Society A. 476(2238),
(2020). 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System.
Proceedings of the 24th USENIX Security Symposium.
(2019). AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
(2019). Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps.
Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
(2019). Information Design in An Aged Care Context.
Proceedings of Pervasive Health ’19.
(2019). Privacy and audiovisual content: Protecting users as big multimedia data grows bigger.
Big Data Analytics for Large-Scale Multimedia Search.
(2019). Privacy and Security Threat Models and Mitigation Strategies of Older Adults.
Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
(2019). A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions.
Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2019).
(2019). A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions.
Proceedings of CHI '19.
(2019).