Publications

Found 4167 results
Author Title Type [ Year(Asc)]
2018
Tootoonchian, A., Panda A., Lan C., Walls M., Argyraki K., Ratnasamy S., et al. (2018).  ResQ: Enabling SLOs in Network Function Virtualization. Proceedings of NSDI 2018.
Mittal, R., Shpiner A., Panda A., Zahavi E., Krishnamurthy A., Ratnasamy S., et al. (2018).  Revisiting network support for RDMA. Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication SIGCOMM '18.
Scheitle, Q., Gasser O., Nolte T., Amann J., Brent L., Carle G., et al. (2018).  The Rise of Certificate Transparency and Its Implications on the Internet Ecosystem. Proceedings of 18th Internet Measurement Conference (IMC'18).
Weaver, N. (2018).  Risks of Cryptocurrencies. Communications of the ACM. 61(6), 20-24.
Bano, S.., Richter P.., Javed M.., Sundaresan S.., Durumeric Z.., Murdoch S.. J., et al. (2018).   Scanning the Internet for Liveness. Computer Communication Review. 48(2), 
Thiagarajan, V., & Shapiro V. (2018).  Shape Aware Quadratures. Journal of Computational Physics. 374, 1239-1260.
Fountoulakis, K.., Gleich D.. F., & Mahoney M.. W. (2018).  A Short Introduction to Local Graph Clustering Methods and Software. Abstracts of the 7th International Conference on Complex Networks and Their Applications.
Wahlster, W. (2018).  Top Research Requires International Collaboration: 30 Years of German Postdoc Fellowships at ICSI. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Pearce, P.., Ensafi R.., Li F.., Feamster N.., & Paxson V.. (2018).   Toward Continual Measurement of Global Network-Level Censorship. Security and Privacy. 16(1), 
Egelman, S. (2018).  The Usable Security & Privacy Group. 30 Years of Innovation: ICSI 30th Anniversary Celebration.
Chen, J.., Jiang J.., Duan H.., Chen S.., Paxson V., & Yang M.. (2018).   We Still Don't Have Secure Cross-Domain Requests: an Empirical Study of CORS. Proceedings of USENIX Security Symposium.
Malkin, N., Bernd J., Johnson M., & Egelman S. (2018).  “What Can’t Data Be Used For?” Privacy Expectations about Smart TVs in the U.S.. Proceedings of the 3rd European Workshop on Usable Security (EuroUSEC).
Reyes, I., Wijesekera P., Reardon J., Elazari A., Razaghpanah A., Vallina-Rodriguez N., et al. (2018).  "Won't Somebody Think of the Children" Privacy Analysis at Scale: A Case Study With COPPA. Proceedings on Privacy Enhancing Technologies.
2017
ICSI (2017).  2017 Audited Financial Statement.
Vasudeva, K., Simsek M., & López-Pérez D. (2017).  Analysis of Handover Failures in Heterogeneous Networks With Fading. IEEE Transactions on Vehicular Technology. 66(7), 
Hößler, T., Scheuvens L., Franchi N., Simsek M., & Fettweis G. (2017).  Applying Reliability Theory for Future Wireless Communication Networks. Proceedings of the IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 17.
Plane, A. C., Redmiles E. M., Mazurek M. L., & Tschantz M. Carl (2017).  Assessing user perceptions of online targeted advertising. Proceedings of USENIX Security 2017.
Portnoff, R. S., Afroz S., Durrett G., Kummerfeld J. K., Berg-Kirkpatrick T., McCoy D., et al. (2017).  Automated Analysis of Cybercriminal Markets. Proceedings of WWW 2017.
Portnoff, R. S., Huang D. Yuxing, Doerfler P., Afroz S., & McCoy D. (2017).  Backpage and Bitcoin: Uncovering Human Traffickers. Proceedings of KDD 2017.
Virtue, P., Yu S. X., & Lustig M. (2017).  Better than Real: Complex-valued Neural Networks for MRI Fingerprinting. Proceedings of the International Conference on Image Processing 2017.
Singh, R., Nithyanand R., Afroz S., Tschantz M. Carl, Gill P., & Paxson V. (2017).  Characterizing the Nature and Dynamics of Tor Exit Blocking.. Proceedings of USENIX Security 2017.
Dunietz, J., Levin L., & Petruck M. R. L. (2017).  Construction Detection in a Conventional NLP Pipeline. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding. 178-184.
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M. W., et al. (2017).  DCAR: A Discriminative and Compact Audio Representation for Audio Processing. IEEE Transactions on Multimedia. PP(99), 
Bettinson, M., & Bird S. (2017).  Developing a suite of mobile applications for collaborative language documentation. Proceedings of the Second Workshop on the Use of Computational Methods in the Study of Endangered Languages.
Tschantz, M. Carl, Sen S., & Datta A. (2017).  Differential Privacy as a Causal Property.

Pages