Publications
Found 748 results
Author Title Type [ Year] Filters: First Letter Of Last Name is H [Clear All Filters]
How Great is the Great Firewall? Measuring China's DNS Censorship.
Proceedings of the 30th USENIX Security Symposium.
(In Press). No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of 32nd USENIX Security Symposium.
(In Press). Cyber and Information Security in the Bioeconomy.
Cyberbiosecurity. 17-36.
(2023). Cyber and Information Security in the Bioeconomy.
Cyberbiosecurity. 17-36.
(2023).
(2022).
(2022).
Democratizing cellular access with CellBricks.
SIGCOMM '21: Proceedings of the 2021 ACM SIGCOMM 2021 Conference.
(2021). Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for Mobile Augmented Reality Apps.
Seventeenth Symposium on Usable Privacy and Security (SOUPS) 2021. 513-534.
(2021).
(2021). Hopper: Modeling and Detecting Lateral Movement.
Proceedings of the 30th USENIX Security Symposium. 3093-3110.
(2021). Lipschitz recurrent neural networks.
International Conference on Learning Representations.
(2021). Noisy Recurrent Neural Networks.
Advances in Neural Information Processing Systems Conference. 34,
(2021). Universal Weakly Supervised Segmentation by Pixel-to-Segment Contrastive Learning.
Proceedings of International Conference on Learning Representations.
(2021). Unsupervised Discriminative Learning of Sounds for Audio Event Classification.
Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing.
(2021). A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic.
Communications of the ACM (CACM). 64(7), 101-108.
(2021). Language (Re)modelling: Towards Embodied Language Understanding.
Proceedings of the Association for Computational Linguistics . 58, 6268–6281.
(2020). Making edge-computing resilient.
SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 253-266.
(2020).
(2020). The Price is (Not) Right: Comparing Privacy in Free and Paid Apps.
2020(3), 222-242.
(2020). A Public Option for the Core.
SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 377-39.
(2020). Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
(2020). Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
(2020). Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization.
ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
(2020). Adversarial Structure Matching for Structured Prediction Tasks.
Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
(2019). Detecting and Characterizing Lateral Phishing at Scale.
Proceedings of USENIX Security Symposium.
(2019).