Publications

Found 4258 results
Author Title Type [ Year(Desc)]
2016
Marczak, B. (2016).  Defending Dissidents from Targeted Digital Surveillance.
McCauley, M., Zhao M., Jackson E. J., Raghavan B., Ratnasamy S., & Shenker S. J. (2016).  The Deforestation of L2.
Jones, B., Feamster N., Paxson V., Weaver N., & Allman M. (2016).  Detecting DNS Root Manipulation. Proceedings of Passive and Active Measurement Conference (PAM).
Jing, L., Liu B., Choi J., Janin A., Bernd J., Mahoney M., et al. (2016).  A discriminative and compact audio representation for event detection. Proceedings of the 2016 ACM Conference on Multimedia (MM '16). 57-61.
hmann, D. Ö., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Diversity Trade-Offs and Joint Coding Schemes for Highly Reliable Wireless Transmissions. Proceedings of Vehicular Technology Conference 2016.
Forget, A., Pearman S., Thomas J., Acquisti A., Christin N., Cranor L. Faith, et al. (2016).  Do or Do Not, There Is No Try: User Engagement May Not Improve Security Outcomes. Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS ’16).
Khattak, S., Fifield D., Afroz S., Javed M., Sundaresan S., Paxson V., et al. (2016).  Do You See What I See? Differential Treatment of Anonymous Users. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Czyz, J., Luckie M., Allman M., & Bailey M. (2016).  Don’t Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy. Proceedings of the Network and Distributed System Security Symposium (NDSS).
Gergen, S., Zeiler S., Abdelaziz A. Hussen, Nickel R., & Kolossa D. (2016).  Dynamic Stream Weighting for Turbo-Decoding-Based Audiovisual ASR. Proceedings of Interspeech 2016.
Friedman, E., Landsberg A. S., Owen J., Hsieh W., Kam L., & Mukherjee P. (2016).  Edge correlations in spatial networks. Journal of Complex Networks. 1-14.
Jannesari, A., Wolf F., & Tichy W. F. (2016).  Editorial of Special Issue on Software Engineering for Parallel Systems. Elsevier Journal of Systems and Software.
Lysenko, M., & Shapiro V. (2016).  Effective contact measures. Computer-Aided Design. 70, 134-143.
Levine, S., Finn C., Darrell T., & Abbeel P. (2016).  End-to-end training of deep visuomotor policies. Journal of Machine Learning Research. 17, 1–40.
Eppe, M., Trott S., & Feldman J. (2016).  Exploiting Deep Semantics and Compositionality in Natural Language for Human-Robot-Interaction. Proceedings of International Conference on Inteligent Robots and Systems (IROS 2016).
Fountoulakis, K., Chen X., Shun J., Roosta-Khorasani F., & Mahoney M. (2016).  Exploiting Optimization for Local Graph Clustering.
Bertasius, G., Yu S. X., & Shi J. (2016).  Exploiting Visual-Spatial First-Person Co-Occurrence for Action-Object Detection without Labels.
Amann, J., & Sommer R. (2016).  Exploring Tor's Activity Through Long-term Passive TLS Traffic Measurement. Proceedings of Passive and Active Measurement Conference (PAM).
Su, H., & Wegmann S. (2016).  Factor analysis based speaker verification using ASR. Proceedings of Interspeech 2016.
Tesema, F. B., Awada A., Viering I., Simsek M., & Fettweis G. (2016).  Fast Cell Select for Mobility Robustness in Intra-frequency 5G Ultra Dense Networks. Proceedings of International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC) 2016.
Yang, J., Mahoney M., Saunders M. A., & Sun Y. (2016).  Feature-distributed sparse regression: a screen-and-clean approach. Proceedings of the 2016 NIPS Conference.
Peng, X., Hoffman J., Yu S. X., & Saenko K. (2016).  Fine-to-Coarse Knowledge Transfer for Low-Res Image Classification. Proceedings of International Conference on Image Processing.
Bertasius, G., Park H. Soo, Yu S. X., & Shi J. (2016).  First Person Action-Object Detection with EgoNet.
Chen, X., Roosta-Khorasani F., Bartlett P. L., & Mahoney M. (2016).  FLAG: Fast Linearly-Coupled Adaptive Gradient Method.
Stickles, E., David O., Dodge E., & Hong J. (2016).  Formalizing contemporary conceptual metaphor theory: A structured repository for metaphor analysis. MetaNet, Special Issue of Constructions and Frames. 8(2), 
Chen, J., Jiang J., Zheng X., Duan H., Liang J., Li K., et al. (2016).  Forwarding-Loop Attacks in Content Delivery Networks. Proceedings of the Network and Distributed System Security Symposium (NDSS).

Pages