Publications

Found 4178 results
Author Title Type [ Year(Asc)]
In Press
Hoang, N. Phong, Niaki A. Akhavan, Dalek J., Knockel J., Lin P., Marczak B., et al. (In Press).  How Great is the Great Firewall? Measuring China's DNS Censorship. Proceedings of the 30th USENIX Security Symposium.
2021
Ellsworth, M., Baker C. F., & Petruck M. R. L. (2021).  FrameNet and Linguistic Typology. Proceedings of the Third Workshop on Computational Typology and Multilingual NLP. 61-66.
Egelman, S., & Pe'er E. (2021).  The Key to Getting People to Be Safer Online: Make the Appeals More Personal. Wall Street Journal.
2020
Gamba, J.., Rashed M.., Razaghpanah A., Vallina-Rodriguez N., & Tapiador J.. (2020).  An Analysis of Pre-Installed Android Software. IEEE Sympsium on Security and Privacy 2020.
Zhao, T., Choi J., & Friedland G. (2020).  DIME: An Online Tool for the Visual Comparison of Cross-modal Retrieval Models. International Conference on Multimedia Modeling. 729-733.
Martin, C.. H., & Mahoney M. W. (2020).  Heavy-Tailed Universality Predicts Trends in Test Accuracies for Very Large Pre-Trained Deep Neural Networks. Proceedings of 2020 SDM Conference.
Ma, L.., Montague G.., Ye J.., Yao Z.., Gholami A.., Keutzer K.., et al. (2020).  Inefficiency of K-FAC for Large Batch Size Training. Proceedings of the AAAI-20 Conference.
Reardon, J., Good N., Richter R., Vallina-Rodriguez N., Egelman S., & Palfrey Q. (2020).  JPush Away Your Privacy: A Case Study of Jiguang’s Android SDK.
Ronen, T.., Shani C.., Hope T.., Petruck M.. R. L., Abend O., & Shahaf D. (2020).  Language (Re)modelling: Towards Embodied Language Understanding. Proceedings of the Association for Computational Linguistics . 58, 6268–6281.
Torrent, TT., Baker CF., Czulo O., Ohara K., & Petruck M.. R. L. (2020).  Proceedings of the LREC International FrameNet Workshop 2020: Towards a Global, Multilingual FrameNet.
Shen, S.., Dong Z.., Ye J.., Ma L.., Yao Z.., Gholami A.., et al. (2020).  Q-BERT: Hessian Based Ultra Low Precision Quantization of BERT. Proceedings of the AAAI-20 Conference.
N. Erichson, B., Mathelin L., Yao Z., Bruntonq S. L., Mahoney M., & J. Kutz N. (2020).  Shallow neural networks for fluid flow reconstruction with limited sensors. Proceedings of the Royal Society A. 476(2238), 
2019
ICSI (2019).  2019 Audited Financial Statement.
Reardon, J., Feal Á., Wijesekera P., Bar On A. Elazari, Vallina-Rodriguez N., & Egelman S. (2019).  50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. Proceedings of the 24th USENIX Security Symposium.
Hwang, J-J., Ke T-W., Shi J., & Yu S. X. (2019).  Adversarial Structure Matching for Structured Prediction Tasks. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Metere, A. (2019).  AI will never conquer humanity. It’s too rational. Cosmos Magazine.
Afroz, S., Biggio B., Carlini N., Elovici Y., & Shabtai A. (2019).  AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
Zhang, T.., Yao Z.., Gholami A.., Keutzer K.., Gonzalez J.., Biros G.., et al. (2019).  ANODEV2: A Coupled Neural ODE Evolution Framework. Proceedings of the 2019 NeurIPS Conference.
Arefi, M. Navaki, Pandi R., Tschantz M. Carl, Crandall J. R., Fu K-wa., Shi D. Qiu, et al. (2019).  Assessing Post Deletion in Sina Weibo: Multi-modal Classification of Hot Topics.
Zarchy, D., Mittal R., Schapira M., & Shenker S. (2019).   Axiomatizing Congestion Control. Proceedings of the ACM on Measurement and Analysis of Computing Systems. 3(2), 
Zaslavsky, N., Kemp C., Tishby N., & Regier T. (2019).  Communicative need in colour naming. Cognitive Neuropsychology.
Frik, A., Bernd J., & Alomar N. (2019).  The Contextual Preferences of Older Adults on Information Sharing. Proceeding of the 2nd annual Symposium on Applications of Contextual Integrity.
Ho, G.., Cidon A.., Gavish L.., Schweighauser M.., Paxson V., Savage S.., et al. (2019).   Detecting and Characterizing Lateral Phishing at Scale. Proceedings of USENIX Security Symposium.
Byers, J. W., Luby M., & Mitzenmacher M. (2019).  A digital fountain retrospective. ACM SIGCOMM Computer Communication Review. 49(5), 82-85.
Liu, X. (2019).  Distributed Design of Two-Scale Structures With Unit Cells. Proceedings of ASME 2019 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference.

Pages