Hark: A Deep Learning System for Navigating Privacy Feedback at Scale | 0 | 0.34 | 2022 |
Analyzing User Perspectives on Mobile App Privacy at Scale | 0 | 0.34 | 2022 |
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions | 0 | 0.34 | 2021 |
"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome | 0 | 0.34 | 2021 |
Reducing Permission Requests in Mobile Apps | 2 | 0.36 | 2019 |
Exploring decision making with Android's runtime permission dialogs using in-context surveys. | 2 | 0.38 | 2017 |
Cache Content-Selection Policies For Streaming Video Services | 8 | 0.55 | 2016 |
Privacy Mediators: Helping IoT Cross the Chasm. | 22 | 1.55 | 2016 |
Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the US. | 2 | 0.36 | 2016 |
GraphSC: Parallel Secure Computation Made Easy | 41 | 1.12 | 2015 |
Sppm: Sparse Privacy Preserving Mappings | 2 | 0.46 | 2014 |
Privacy tradeoffs in predictive analytics | 4 | 0.40 | 2014 |
Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy. | 4 | 0.45 | 2014 |
Recommending with an agenda: active learning of private attributes using matrix factorization | 18 | 0.67 | 2013 |
Predicting user dissatisfaction with Internet application performance at end-hosts | 4 | 0.52 | 2013 |
Privacy-preserving matrix factorization | 79 | 1.90 | 2013 |
How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data | 4 | 0.41 | 2013 |
Private decayed predicate sums on streams | 17 | 0.71 | 2013 |
Finding a needle in a haystack of reviews: cold start context-based hotel recommender system demo | 58 | 1.93 | 2012 |
Finding a needle in a haystack of reviews: cold start context-based hotel recommender system | 22 | 1.19 | 2012 |
CARE: content aware redundancy elimination for challenged networks | 15 | 0.63 | 2012 |
CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks | 3 | 0.39 | 2012 |
BlurMe: inferring and obfuscating user gender based on ratings | 49 | 1.50 | 2012 |
Mixture models of endhost network traffic | 2 | 0.45 | 2012 |
Private Decayed Sum Estimation under Continual Observation | 3 | 0.40 | 2011 |
Performance of networked applications: the challenges in capturing the user's perception | 3 | 0.47 | 2011 |
A disruption-tolerant architecture for secure and efficient disaster response communications | 3 | 0.47 | 2010 |
Perspectives on tracing end-hosts: a survey summary | 5 | 0.81 | 2010 |
ASTUTE: detecting a different class of traffic anomalies | 40 | 1.88 | 2010 |
HostView: annotating end-host performance measurements with user feedback | 17 | 0.95 | 2010 |
Detecting traffic anomalies using an equilibrium property | 1 | 0.35 | 2010 |
Stealthy poisoning attacks on PCA-based anomaly detectors | 14 | 0.76 | 2009 |
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning | 31 | 1.66 | 2009 |
Exploiting Temporal Persistence to Detect Covert Botnet Channels | 34 | 2.19 | 2009 |
Skilled in the art of being idle: reducing energy waste in networked systems | 75 | 5.50 | 2009 |
ANTIDOTE: understanding and defending against poisoning of anomaly detectors | 58 | 2.49 | 2009 |
Impact of IT monoculture on behavioral end host intrusion detection | 3 | 0.39 | 2009 |
Macroscope: end-point approach to networked application dependency discovery | 15 | 0.86 | 2009 |
Evading Anomaly Detection through Variance Injection Attacks on PCA | 5 | 0.70 | 2008 |
The cubicle vs. the coffee shop: behavioral modes in enterprise end-users | 16 | 1.08 | 2008 |
Race Conditions in Coexisting Overlay Networks | 12 | 0.81 | 2008 |
Spectral Clustering with Perturbed Data | 42 | 1.89 | 2008 |
How healthy are today's enterprise networks? | 20 | 1.91 | 2008 |
Public Health for the Internet (PHI) | 3 | 0.39 | 2007 |
Communication-Efficient Online Detection of Network-Wide Anomalies | 63 | 3.37 | 2007 |
Communication-Efficient Tracking of Distributed Cumulative Triggers | 16 | 0.79 | 2007 |
IGP Link Weight Assignment for Operational Tier-1 Backbones | 27 | 1.17 | 2007 |
Profiling the end host | 40 | 2.36 | 2007 |
Estimating dynamic traffic matrices by using viable routing changes | 8 | 0.86 | 2007 |
In-Network PCA and Anomaly Detection | 59 | 3.08 | 2006 |