Publications

Found 541 results
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is W  [Clear All Filters]
2022
Weaver, N. (2022).  The Death of Cryptocurrency: The Case for Regulation. Yale Law School Information Society Project. Digital Future Whitepaper Series,
Malkin, N., Wagner D., & Egelman S. (2022).  Runtime Permissions for Privacy in Proactive Intelligent Assistants. Symposium on Usable Privacy and Security.
2021
Chen, J., Zheng L., Yao Z., Wang D., Stoica I., Mahoney M., et al. (2021).  ActNN: Reducing Training Memory Footprint via 2-Bit Activation Compressed Training.
Weaver, N. (2021).  Disrupting Cryptocurrencies 2: Lessons From the Poly 'Hack'. Lawfare.
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
Schneier, B., & Weaver N. (2021).  How to Cut Down on Ransomware Attacks Without Banning Bitcoin. Slate.
Weaver, N. (2021).  How to Start Disrupting Cryptocurrencies: “Mining” Is Money Transmission. Lawfare.
Wang, X., Lian L., Miao Z., Liu Z., & Yu S. X. (2021).  Long-tailed Recognition by Routing Diverse Distribution-Aware Experts. Proceedings of International Conference on Learning Representations.
Wang, K., Kellman M., Sandino C. M., Zhang K., Vasanawala S. S., Tamir J. I., et al. (2021).  Memory-efficient Learning for High-Dimensional MRI Reconstruction. Proceedings of International Society for Magnetic Resonance in Medicine.
Weaver, N. (2021).  The Microsoft Exchange Hack and the Great Email Robbery.
N. Erichson, B., Taylor D., Wu Q., & Mahoney M. (2021).  Noise-Response Analysis of Deep Neural Networks Quantifies Robustness and Fingerprints Structural Malware. Proceedings of the 2021 SIAM International Conference on Data Mining (SDM). 100-108.
Weaver, N. (2021).  The Ransomware Problem Is a Bitcoin Problem.
Wang, J., Chakraborty R., & Yu S. X. (2021).  Spatial Transformer for 3D Point Clouds. IEEE Transactions on Pattern Analysis and Machine Intelligence.
Wang, X., & Yu S. X. (2021).  Tied Block Convolution: Leaner and Better CNNs with Shared Thinner Filters. Proceedings of AAAI Conference on Artificial Intelligence.
Wang, X., Liu Z., & Yu S. X. (2021).  Unsupervised Feature Learning by Cross-Level Instance-Group Discrimination. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Wang, X., Lian L., & Yu S. X. (2021).  Unsupervised Visual Attention and Invariance for Reinforcement Learning. Proceedings of IEEE Conference on Computer Vision and Pattern Recognition.
Weaver, N. (2021).  What Happened in the Kaseya VSA Incident?. Lawfare.
Weaver, N. (2021).  What's the Deal with the Log4Shell Security Nightmare?. Lawfare.
Feldmann, A., Gasser O., Lichtblau F., Pujol E., Poese I., Dietzel C., et al. (2021).  A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic. Communications of the ACM (CACM). 64(7), 101-108.
Feldmann, A., Gasser O., Lichtblau F., Pujol E., Poese I., Dietzel C., et al. (2021).  A Year in Lockdown: How the Waves of COVID-19 Impact Internet Traffic. Communications of the ACM (CACM). 64(7), 101-108.

Pages