Publications

Found 725 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is H  [Clear All Filters]
2016
Zhu, L., Amann J., & Heidemann J. (2016).  Measuring the Latency and Pervasiveness of TLS Certificate Revocation. Proceedings of Passive and Active Measurement Conference (PAM).
Hu, R., Xu H., Rohrbach M., Feng J., Saenko K., & Darrell T. (2016).  Natural Language Object Retrieval. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
Panda, A., Han S., Walls M., Ratnasamy S., & Shenker S. (2016).  NetBricks: Taking the V out of NFV. Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16).
Hao, S., Kantchelian A., Miller B., Paxson V., & Feamster N. (2016).  PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration. Proceedings of ACM CCS.
Ameloot, T. J., Van Den Bussche J., Marczak B., Alvaro P., & Hellerstein J. M. (2016).  Putting logic-based distributed systems on stable grounds. Theory and Practice of Logic Programming. 16(4), 378-417.
Li, F., Ho G., Kuan E., Niu Y., Ballard L., Thomas K., et al. (2016).  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension. Proceedings of the International World Wide Web Conference.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2016).  Reviewer Integration and Performance Measurement for Malware Detection. 13th Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA).
Sommer, R., Amann J., & Hall S. (2016).  Spicy: A Unified Deep Packet Inspection Framework for Safely Dissecting All Your Data. Proceedings of 2016 Annual Computer Security Applications Conference.
Holtz, R., Amann J., Mehani O., Wachs M., & Kaafar M. Ali (2016).  TLS in the Wild: An Internet-Wide Analysis of TLS-Based Protocols for Electronic Communication. Proceedings of the Network and Distributed System Security Symposium (NDSS).
VanderSloot, B., Amann J., Bernhard M., Durumeric Z., Bailey M., & J. Halderman A. (2016).  Towards a Complete View of the Certificate Ecosystem. Proceeings of 16th Internet Measurement Conference (IMC'16).
Li, Z., Atre R., Huda Z. Ul, Jannesari A., & Wolf F. (2016).  Unveiling Parallelization Opportunities in Sequential Programs. Journal of Systems and Software. 117, 282–295.
Choi, J., Larson M., Li X., Friedland G., & Hanjalic A. (2016).  Where to be wary: The impact of widespread photo-taking and image enhancement practices on users' geo-privacy.
2015
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Miller, B., Kantchelian A., Tschantz M. Carl, Afroz S., Bachwani R., Faizullabhoy R., et al. (2015).  Back to the Future: Malware Detection with Temporally Consistent Labels. CoRR. abs/1510.07338,
Fifield, D., Lan C., Hynes R., Wegmann P., & Paxson V. (2015).  Blocking-resistant communication through domain fronting. Proceedings of the Privacy Enhancing Technologies Symposium (PETS).
Hasan, S., Ben-David Y., Bittman M., & Raghavan B. (2015).  The Challenges of Scaling WISPs.
Hoffman, J., Pathak D., Darrell T., & Saenko K. (2015).  Detector Discovery in the Wild: Joint Multiple Instance and Representation Learning. The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). 2883-2891.
Donahue, J., Hendricks L. Anne, Guadarrama S., Rohrbach M., Venugopalan S., Saenko K., et al. (2015).  Long-Term Recurrent Convolutional Networks for Visual Recognition and Description.
Javed, M., Herley C., Peinado M., & Paxson V. (2015).  Measurement and Analysis of Traffic Exchange Services. Proceedings of ICM Internet Measurement Conference.
Fisher, J., Darrell T., Galup L., How J., Krause A., & Soatto S. (2015).  Nonparametric Representations for Integrated Inference, Control, and Sensing.
Beijbom, O., Hoffman J., Yao E., Darrell T., Rodriguez-Ramirez A., Gonzalez-Rivero M., et al. (2015).  Quantification in-the-wild: data-sets and baselines. CoRR. abs/1510.04811,
Beijbom, O., Hoffman J., Yao E., Darrell T., Rodriguez-Ramirez A., Gonzalez-Rivero M., et al. (2015).  Quantification in-the-wild: data-sets and baselines. CoRR. abs/1510.04811,
Chu, V., McMahon I., Riano L., McDonald C. G., He Q., Perez-Tejada J. Martinez, et al. (2015).  Robotic Learning of Haptic Adjectives Through Physical Interaction. Robot. Auton. Syst.. 63(P3), 279–292.
Tzeng, E., Hoffman J., Darrell T., & Saenko K. (2015).  Simultaneous Deep Transfer Across Domains and Tasks. The IEEE International Conference on Computer Vision (ICCV). 4068-4076.

Pages