Publications

Found 4258 results
Author Title Type [ Year(Asc)]
2020
Reardon, J., Good N., Richter R., Vallina-Rodriguez N., Egelman S., & Palfrey Q. (2020).  JPush Away Your Privacy: A Case Study of Jiguang’s Android SDK.
Zhang, W., Fang V., Panda A., & Shenker S. J. (2020).  Kappa: a programming framework for serverless computing. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 328-343.
Ronen, T.., Shani C.., Hope T.., Petruck M. R. L., Abend O., & Shahaf D. (2020).  Language (Re)modelling: Towards Embodied Language Understanding. Proceedings of the Association for Computational Linguistics . 58, 6268–6281.
Harchol, Y., Mushtaq A., Fang V., McCauley J. Murphy, Panda A., & Shenker S. J. (2020).  Making edge-computing resilient. SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing. 253-266.
Hodgkinson, L., & Mahoney M. (2020).  Multiplicative Noise and Heavy Tails in Stochastic Optimization.
Han, C., Reyes I., Feal Á., Reardon J., Wijesekera P., Vallina-Rodriguez N., et al. (2020).  The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. 2020(3), 222-242.
Torrent, TT., Baker CF., Czulo O., Ohara K., & Petruck M. R. L. (2020).  Proceedings of the LREC International FrameNet Workshop 2020: Towards a Global, Multilingual FrameNet.
Harchol, Y., Bergemann D., Feamster N., Friedman E., Krishnamurthy A., Panda A., et al. (2020).  A Public Option for the Core. SIGCOMM '20: Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 377-39.
Shen, S.., Dong Z.., Ye J.., Ma L.., Yao Z.., Gholami A.., et al. (2020).  Q-BERT: Hessian Based Ultra Low Precision Quantization of BERT. Proceedings of the AAAI-20 Conference.
Amaro, E., Luo Z., Ousterhout A., Krishnamurthy A., Panda A., Ratnasamy S., et al. (2020).  Remote Memory Calls. HotNets '20: Proceedings of the 19th ACM Workshop on Hot Topics in Networks. 38-44.
N. Erichson, B., Mathelin L., Yao Z., Bruntonq S. L., Mahoney M., & J. Kutz N. (2020).  Shallow neural networks for fluid flow reconstruction with limited sensors. Proceedings of the Royal Society A. 476(2238), 
Weaver, N. (2020).  The SolarWinds Breach: Why Your Work Computers Are Down Today.
Holz, R., Hiller J., Amann J., Razaghpanah A., Hohleld O., Vallina-Rodriguez N., et al. (2020).  Tracking the deployment of TLS 1.3 on the web: a story of experimentation and centralization. ACM SIGCOMM Computer Communication Review. 50(3), 3-15.
2019
ICSI (2019).  2019 Audited Financial Statement.
Reardon, J., Feal Á., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., & Egelman S. (2019).  50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. Proceedings of the 24th USENIX Security Symposium.
Hwang, J-J., Ke T-W., Shi J., & Yu S. X. (2019).  Adversarial Structure Matching for Structured Prediction Tasks. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Metere, A. (2019).  AI will never conquer humanity. It’s too rational. Cosmos Magazine.
Afroz, S., Biggio B., Carlini N., Elovici Y., & Shabtai A. (2019).  AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
Zhang, T.., Yao Z.., Gholami A.., Keutzer K.., Gonzalez J.., Biros G.., et al. (2019).  ANODEV2: A Coupled Neural ODE Evolution Framework. Proceedings of the 2019 NeurIPS Conference.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Zarchy, D., Mittal R., Schapira M., & Shenker S. J. (2019).   Axiomatizing Congestion Control. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3(2), 
Zaslavsky, N., Kemp C., Tishby N., & Regier T. (2019).  Communicative need in colour naming. Cognitive Neuropsychology.
Frik, A., Bernd J., & Alomar N. (2019).  The Contextual Preferences of Older Adults on Information Sharing. Proceeding of the 2nd annual Symposium on Applications of Contextual Integrity.
Mushtaq, A., Mittal R., McCauley J., Alizadeh M., Ratnasamy S., & Shenker S. J. (2019).  Datacenter congestion control: identifying what is essential and making it practical. ACM SIGCOMM Computer Communication Review. 49(3), 32-38.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.

Pages