Found 4169 results
Author Title Type [ Year(Asc)]
In Press
Gamba, J.., Rashed M.., Razaghpanah A., Vallina-Rodriguez N., & Tapiador J.. (In Press).  An Analysis of Pre-Installed Android Software. IEEE Sympsium on Security and Privacy 2020.
Frik, A., Bernd J., & Alomar N. (In Press).  The Contextual Preferences of Older Adults on Information Sharing. Proceeding of the 2nd annual Symposium on Applications of Contextual Integrity.
Schulz, P., Ong L., Littlewood P., Abdullah B., Simsek M., & Fettweis G. (In Press).  End-to-End Latency Analysis in Wireless Networks with Queing Models for General Prioritized Traffic. Proceedings of the IEEE International Conference on Communications 2019.
N. Erichson, B., Mathelin L., Yao Z., Bruntonq S. L., Mahoney M., & J. Kutz N. (In Press).  Shallow neural networks for fluid flow reconstruction with limited sensors. Proceedings of the Royal Society A. 476(2238), 
Khodapanah, B., Awada A., Viering I., Baretto A., Simsek M., & Fettweis G. (In Press).  Slice Management in Radio Access Networks via Iterative Adaptation. Proceedings of IEEE International Conference on Communications 2019.
Malkin, N., Deatrick J., Tong A., Wijesekera P., Wagner D., & Egelman S. (In Press).  Uninformed but Unconcerned: Privacy Attitudes of Smart Speaker Users. Proceedings on Privacy Enhancing Technologies (PoPETS), 2019.
ICSI (2019).  2019 Audited Financial Statement.
Reardon, J., Feal Á., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., & Egelman S. (2019).  50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. Proceedings of the 24th USENIX Security Symposium.
Hwang, J-J., Ke T-W., Shi J., & Yu S. X. (2019).  Adversarial Structure Matching for Structured Prediction Tasks. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Metere, A. (2019).  AI will never conquer humanity. It’s too rational. Cosmos Magazine.
Afroz, S., Biggio B., Carlini N., Elovici Y., & Shabtai A. (2019).  AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
Zhang, T.., Yao Z.., Gholami A.., Keutzer K.., Gonzalez J.., Biros G.., et al. (2019).  ANODEV2: A Coupled Neural ODE Evolution Framework. Proceedings of the 2019 NeurIPS Conference.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Zarchy, D., Mittal R., Schapira M., & Shenker S. (2019).   Axiomatizing Congestion Control. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3(2), 
Zaslavsky, N., Kemp C., Tishby N., & Regier T. (2019).  Communicative need in colour naming. Cognitive Neuropsychology.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Byers, J. W., Luby M., & Mitzenmacher M. (2019).  A digital fountain retrospective. ACM SIGCOMM Computer Communication Review. 49(5), 82-85.
Liu, X. (2019).  Distributed Design of Two-Scale Structures With Unit Cells. Proceedings of ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference.
Derezinski, M.., & Mahoney M. W. (2019).  Distributed estimation of the inverse Hessian by determinantal averaging. Proceedings of the 2019 NeurIPS Conference.
Han, C., Reyes I., Bar On A. Elazari, Reardon J., Feal Á., Bamberger K. A., et al. (2019).  Do You Get What You Pay For? Comparing The Privacy Behaviors of Free vs. Paid Apps. Proceedings of the Workshop on Technology and Consumer Protection (ConPro 2019).