Publications
Found 823 results
Author [ Title] Type Year Filters: First Letter Of Last Name is B [Clear All Filters]
(2004).
50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System.
Proceedings of the 24th USENIX Security Symposium.
(2019).
(1992).
(1989).
Accountable Internet Protocol (AIP).
339-350.
(2008).
(2015). Adaptive Language Modeling with Varied Sources to Cover New Vocabulary Items.
IEEE Transactions on Speech and Audio Processing. 12(3), 334-342.
(2004).
(2009).
(2009).
(2009).
(2009). An Admission Control Approach for Elastic Flows in the Internet.
Proceedings of the 9th IFIP Working Conference on Performance Modeling and Evaluation of ATM and IP Networks (IFIP ATM and IP 2001).
(2001).
(1991).
(1999). Advances in Network Simulation.
IEEE Computer. 59-67.
(2000). Adversarial Active Learning.
Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (AISec '14). 3–14.
(2014). Aggregate Congestion Control.
ACM SIGCOMM Computer Communication Review. 32(1), 69.
(2002). AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2707-2708.
(2019).
(1974).
(1996).
(1993).
(2010). All in a Day's Week.
Proceedings of the Workshop on Frame Semantics.
(2003). AltAnalyze and DomainGraph: Analyzing and Visualizing Exon Expression Data.
Nucleic Acids Research. 38, W755-W762.
(2010).
(2016).