Publications

Found 734 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is H  [Clear All Filters]
In Press
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
2021
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Ke, T-W., Hwang J-J., & Yu S. X. (2021).  Universal Weakly Supervised Segmentation by Pixel-to-Segment Contrastive Learning. Proceedings of International Conference on Learning Representations.
Hornauer, S., Li K., Yu S. X., Ghaffarzadegan S., & Ren L. (2021).  Unsupervised Discriminative Learning of Sounds for Audio Event Classification. Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing.
Feldmann, A., Gasser O., Lichtblau F., Pujol E., Poese I., Dietzel C., et al. (2021).  A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic. Communications of the ACM (CACM). 64(7), 101-108.
2020
Ronen, T.., Shani C.., Hope T.., Petruck M. R. L., Abend O., & Shahaf D. (2020).  Language (Re)modelling: Towards Embodied Language Understanding. Proceedings of the Association for Computational Linguistics . 58, 6268–6281.
Harchol, Y., Mushtaq A., Fang V., McCauley J. Murphy, Panda A., & Shenker S. J. (2020).  Making edge-computing resilient. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 253-266.
Hodgkinson, L., & Mahoney M. W. (2020).  Multiplicative Noise and Heavy Tails in Stochastic Optimization.
Harchol, Y., Bergemann D., Feamster N., Friedman E., Krishnamurthy A., Panda A., et al. (2020).  A Public Option for the Core. SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 377-39.
2019
Hwang, J-J., Ke T-W., Shi J., & Yu S. X. (2019).  Adversarial Structure Matching for Structured Prediction Tasks. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).
Hornauer, S., Yellapragada B., Ranjbar A., & Yu S. X. (2019).  Driving Scene Retrieval by Example from Large-Scale Data. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition .
Hermalin, N., & Regier T. (2019).  Efficient use of ambiguity in an early writing system: Evidence from Sumerian cuneiform. Proceedings of the 41st Annual Meeting of the Cognitive Science Society.
McCauley, J., Harchol Y., Panda A., Raghavan B., & Shenker S. J. (2019).   Enabling a permanent revolution in internet architecture. Proceedings of the ACM Special Interest Group on Data Communication SIGCOMM '19.
Choi, J., Larson M., Friedland G., & Hanjalic A. (2019).  From Intra-Modal to Inter-Modal Space: Multi-Task Learning of Shared Representations for Cross-Modal Retrieval. Proceedings of 2019 IEEE Fifth International Conference on Multimedia Big Data (BigMM). 1-10.
Simsek, M., Hößler T., Jorswieck E., Klessig H., & Fettweis G. (2019).  Multiconnectivity in Multicellular, Multiuser Systems: A Matching- Based Approach. Proceedings of the IEEE. 107(2), 394-413.
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems (CHI 2019).
Frik, A., Malkin N., Harbach M., Peer E., & Egelman S. (2019).  A Promise Is A Promise: The Effect Of Commitment Devices On Computer Security Intentions. Proceedings of CHI '19.
Hwang, J-J., Yu S. X., Shi J., Collins M. D., Yang T-J., Zhang X., et al. (2019).  SegSort: Segmentation by Discriminative Sorting of Segments. Proceedings of the International Conference on Computer Vision.
Hayes, D. (2019).  What just happened? Evaluating retrofitted distributional word vectors. Proceedings of the 2019 Annual Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT).
2018
Frik, A., Egelman S., Harbach M., Malkin N., & Peer E. (2018).  Better Late(r) than Never: Increasing Cyber-Security Compliance by Reducing Present Bias. Proceedings of WEIS '18.
Harchol, Y., Mushtaq A., McCauley J., Panda A., & Shenker S. J. (2018).  CESSNA: Resilient Edge-Computing. Proceedings of the 2018 Workshop on Mobile Edge Communications.
Woo, S., Sherry J., Han S., Moon S., Ratnasamy S., & Shenker S. J. (2018).  Elastic Scaling of Stateful Network Functions. Proceedings of NSDI '18.
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. J. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.

Pages