Found 300 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is A  [Clear All Filters]
Raghavan, B. (2015).  Abstraction, Indirection, and Sevareid's Law: Towards Benign Computing.
Thomas, K., Bursztein E., Jagpal N., Rajab M. Abu, Provos N., Pearce P., et al. (2015).  Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Partridge, C., & Allman M. (2015).  Addressing Ethical Considerations in Network Measurement Papers. Proceedings of ACM SIGCOMM Workshop on Ethics in Networked Systems Research.
Tsai, T.. J., & Stolcke A. (2015).  Aligning Meeting Recordings Via Adaptive Fingerprinting. 786-790.
Marczak, B., Weaver N., Dalek J., Ensafi R., Fifield D., McKune S., et al. (2015).  An Analysis of China’s “Great Cannon”. Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI).
Wijesekera, P., Baokar A., Hosseini A., Egelman S., Wagner D., & Beznosov K. (2015).  Android Permissions Remystified: A Field Study on Contextual Integrity. Proceedings of the 24th USENIX Security Symposium.
Tsai, T.. J. (2015).  Are You TED Talk Material? Comparing Prosody in Professors and TED Speakers.
Ashraf, K., Elizalde B. Martinez, Iandola F., Moskewicz M., Bernd J., Friedland G., et al. (2015).  Audio-Based Multimedia Event Detection with DNNs and Sparse Sampling. 611-614.
Datta, A., Tschantz M. Carl, & Datta A. (2015).  Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination. Proceedings on Privacy Enhancing Technologies. 2015(1), 92-112.
Azadi, S., Feng J., Jegelka S., & Darrell T. (2015).  Auxiliary Image Regularization for Deep CNNs with Noisy Labels. CoRR. abs/1511.07069,