Publications

Found 701 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is G  [Clear All Filters]
2015
P. Godfrey, B., Caesar M., Haken I., Singer Y., Shenker S., & Stoica I. (2015).  Stabilizing Route Selection in BGP. IEEE/ACM Transactions on Networking. 23(1), 282-299.
Egelman, S., Friedland G., Bernd J., Garcia D. D., & Gordo B. (2015).  The Teaching Privacy Curriculum.
Egelman, S., Friedland G., Bernd J., Garcia D. D., & Gordo B. (2015).  The Teaching Privacy Curriculum.
Bernd, J., Gordo B., Choi J., Morgan B., Henderson N., Egelman S., et al. (2015).  Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia. 12-19.
Bernd, J., Gordo B., Choi J., Morgan B., Henderson N., Egelman S., et al. (2015).  Teaching Privacy: Multimedia Making a Difference. IEEE MultiMedia. 12-19.
Friedland, G., Egelman S., & Garcia D. D. (2015).  Teaching Privacy: What Every Student Needs to Know. 713.
Guadarrama, S., Rodner E., Saenko K., & Darrell T. (2015).  Understanding object descriptions in robotics by open-vocabulary object retrieval and detection. The International Journal of Robotics Research. 35(1-3), 265-280.
Gleich, D., & Mahoney M. W. (2015).  Using Local Spectral Methods to Robustify Graph-Based Learning Algorithms. Proceedings of the 21st Annual SIGKDD.
Garg, A., Krishnan S., Murali A., Pokorny F. T., Abbeel P., Darrell T., et al. (2015).  On Visual Feature Representations for Transition State Learning in Robotic Task Demonstrations. 44,
Garg, A., Krishnan S., Murali A., Pokorny F. T., Abbeel P., Darrell T., et al. (2015).  On Visual Feature Representations for Transition State Learning in Robotic Task Demonstrations. 44,
Bernd, J., Borth D., Elizalde B. Martinez, Friedland G., Gallagher H., Gottlieb L., et al. (2015).  The YLI?MED Corpus: Characteristics, Procedures, and Plans.
Bernd, J., Borth D., Elizalde B. Martinez, Friedland G., Gallagher H., Gottlieb L., et al. (2015).  The YLI?MED Corpus: Characteristics, Procedures, and Plans.
2014
Gleich, D., & Mahoney M. W. (2014).  Anti-Differentiating Approximation Algorithms: A Case Study with Min-Cuts, Spectral, and Flow.
Jia, Y., Shelhamer E., Donahue J., Karayev S., Long J., Girshick R., et al. (2014).  Caffe: Convolutional Architecture for Fast Feature Embedding. 675-678.
Jia, Y., Shelhamer E., Donahue J., Karayev S., Long J., Girshick R., et al. (2014).  Caffe: Convolutional Architecture for Fast Feature Embedding. 675-678.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Pearce, P., Dave V., Grier C., Levchenko K., Guha S., McCoy D., et al. (2014).  Characterizing Large-Scale Click Fraud in ZeroAccess.
Thomas, K., Li F., Grier C., & Paxson V. (2014).  Consequences of Connectivity: Characterizing Account Hijacking on Twitter.
Gottlieb, L., Friedland G., Choi J., Kelm P., & Sikora T. (2014).  Creating Experts From the Crowd: Techniques for Finding Workers for Difficult Tasks. IEEE Transactions on Multimedia. 16(7), 2075-2079.
Iandola, F., Moskewicz M., Karayev S., Girshick R., Darrell T., & Keutzer K. (2014).  DenseNet: Implementing Efficient ConvNet Descriptor Pyramids.
Sherr, M., Gill H., Saeed T. Aquil, Mao A., Marczak B., Soundararajan S., et al. (2014).  The Design and Implementation of the A^3 Application-Aware Anonymity Platform. Computer Networks. 58, 206-227.
Thomas, K., Iatskiv D., Bursztein E., Pietraszek T., Grier C., & McCoy D. (2014).  Dialing Back Abuse on Phone Veri?ed Accounts.
Marczak, B., Guarnieri C., Marquis-Boire M., & Scott-Railton J. (2014).  Hacking Team and the Targeting of Ethiopian Journalists. The Citizen Lab.
Marczak, B., Guarnieri C., Marquis-Boire M., Scott-Railton J., & McKune S. (2014).  Hacking Team's US Nexus. The Citizen Lab.
Kapravelos, A., Grier C., Chachra N., Kruegel C., Vigna G., & Paxson V. (2014).  Hulk: Eliciting Malicious Behavior in Browser Extensions.

Pages