Publications

Found 4258 results
Author Title [ Type(Desc)] Year
Conference Paper
Hu, X., Gupta A., Feamster N., Panda A., & Shenker S. J. (2018).  Preserving Privacy at IXPs. Proceedings of the 2nd Asia-Pacific Workshop on Networking APNet '18.
Arianfar, S., Koponen T., Raghavan B., & Shenker S. J. (2011).  On Preserving Privacy in Information-Centric Networks. 19-24.
Moody, J., & Wu L. (1995).  Price Behavior and Hurst Exponents of Tick-By-Tick Interbank Foreign Exchange Rates. Proceedings of Computational Intelligence in Financial Engineering (IEEE IAFE 1995).
Han, C., Reyes I., Feal Á., Reardon J., Wijesekera P., Vallina-Rodriguez N., et al. (2020).  The Price is (Not) Right: Comparing Privacy in Free and Paid Apps. 2020(3), 222-242.
McCoy, D., Dharmdasani H., Kreibich C., Voelker G. M., & Savage S. (2012).  Priceless: The Role of Payments in Abuse-Advertised Goods. 845-856.
Kohli, P., Osokin A., & Jegelka S. (2013).  A Principled Deep Random Field for Image Segmentation. 1971-1978.
Allman, M., Kreibich C., Paxson V., Sommer R., & Weaver N. (2008).  Principles for Developing Comprehensive Network Visibility.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., & Schaub F. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of SOUPS '19.
Frik, A., Nurgalieva L., Bernd J., Lee J. S., Schaub F., & Egelman S. (2019).  Privacy and Security Threat Models and Mitigation Strategies of Older Adults. Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS '19).
Tahaei, M., Frik A., & Vaniae K. (2021).  Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1-15.
Tahaei, M., Frik A., & Vaniea K. (2021).  Privacy Champions in Sofware Teams: Understanding Their Motivations, Strategies, and Challenges. CHI Conference on Human Factors in Computing Systems. 2021,
Gürses, S., Rizk R., & Günther O. (2008).  Privacy Design in Online Social Networks: Learning from Privacy Breaches and Community Feedback.
Boehme, R., & Pötzsch S. (2010).  Privacy in Online Social Lending. 23-28.
Tahaei, M., Bernd J., & Rashid A. (2022).  Privacy, Permissions, and the Health App Ecosystem: A Stack Overflow Exploration. EuroUSEC. 117-130.
Asharov, G., Demmler D., Sachapira M., Schneider T., Segev G., Shenker S. J., et al. (2017).  Privacy-Preserving Interdomain Routing at Internet Scale. Proceedings of PoPETs 2017.
Karp, R. M. (1979).  Probabilistic Analysis of Graph-theoretic Algorithms. Proceedings of the Computer Science and Statistics 12th Annual Symposium on the Interface.
Wendelken, C., & Shastri L. (2000).  Probabilistic inference and learning in a connectionist causal network. Proceedings of the Second International ICSC Symposium on Neural Computation (NC'2000).
Zagordi, O., Töpfer A., Prabhakaran S., Roth V., Halperin E., & Beerenwinkel N. (2012).  Probabilistic Inference of Viral Quasispecies Subject to Recombination. 342-354.
Karayev, S., Fritz M., Fidler S., & Darrell T. (2011).  A Probabilistic Model for Recursive Factorized Image Features. 401-408.
Renals, S., Morgan N., & Bourlard H. (1991).  Probability Estimation by Feed-forward Networks in Continuous Speech Recognition. Proceedings of the IEEE Workshop on Neural Networks for Signal Processing. 309-318.
Bergen, B. K. (2000).  Probability in phonological generalizations: Modeling optional French final consonants. Proceedings of the 26th Annual Meeting of the Berkeley Linguistics Society.
DiCioccio, L., Teixeira R., May M., & Kreibich C. (2012).  Probe and Pray: Using UPnP for Home Network Measurements. 96-105.
Doubleday, S., Trott S., & Feldman J. (2017).  Processing Natural Language About Ongoing Actions in ECG. Proceedings of the AAAI 2017 Spring Symposium on Computational Construction Grammar and Natural Language Understanding.
Dutta, P., Culler D. E., & Shenker S. J. (2007).  Procrastination Might Lead to a Longer and More Useful Life. 1-7.
Sundaresan, S., McCoy D., Afroz S., & Paxson V. (2016).  Profiling Underground Merchants Based on Network Behavior. Proceedings of APWG eCrime 2016.

Pages