Name
Affiliation
Papers
NINA TAFT
Intel Research, Berkeley, CA
76
Collaborators
Citations 
PageRank 
152
2109
154.92
Referers 
Referees 
References 
4189
1485
903
Search Limit
1001000
Title
Citations
PageRank
Year
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale00.342022
Analyzing User Perspectives on Mobile App Privacy at Scale00.342022
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions00.342021
"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome00.342021
Reducing Permission Requests in Mobile Apps20.362019
Exploring decision making with Android's runtime permission dialogs using in-context surveys.20.382017
Cache Content-Selection Policies For Streaming Video Services80.552016
Privacy Mediators: Helping IoT Cross the Chasm.221.552016
Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the US.20.362016
GraphSC: Parallel Secure Computation Made Easy411.122015
Sppm: Sparse Privacy Preserving Mappings20.462014
Privacy tradeoffs in predictive analytics40.402014
Managing your Private and Public Data: Bringing down Inference Attacks against your Privacy.40.452014
Recommending with an agenda: active learning of private attributes using matrix factorization180.672013
Predicting user dissatisfaction with Internet application performance at end-hosts40.522013
Privacy-preserving matrix factorization791.902013
How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data40.412013
Private decayed predicate sums on streams170.712013
Finding a needle in a haystack of reviews: cold start context-based hotel recommender system demo581.932012
Finding a needle in a haystack of reviews: cold start context-based hotel recommender system221.192012
CARE: content aware redundancy elimination for challenged networks150.632012
CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks30.392012
BlurMe: inferring and obfuscating user gender based on ratings491.502012
Mixture models of endhost network traffic20.452012
Private Decayed Sum Estimation under Continual Observation30.402011
Performance of networked applications: the challenges in capturing the user's perception30.472011
A disruption-tolerant architecture for secure and efficient disaster response communications30.472010
Perspectives on tracing end-hosts: a survey summary50.812010
ASTUTE: detecting a different class of traffic anomalies401.882010
HostView: annotating end-host performance measurements with user feedback170.952010
Detecting traffic anomalies using an equilibrium property10.352010
Stealthy poisoning attacks on PCA-based anomaly detectors140.762009
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning311.662009
Exploiting Temporal Persistence to Detect Covert Botnet Channels342.192009
Skilled in the art of being idle: reducing energy waste in networked systems755.502009
ANTIDOTE: understanding and defending against poisoning of anomaly detectors582.492009
Impact of IT monoculture on behavioral end host intrusion detection30.392009
Macroscope: end-point approach to networked application dependency discovery150.862009
Evading Anomaly Detection through Variance Injection Attacks on PCA50.702008
The cubicle vs. the coffee shop: behavioral modes in enterprise end-users161.082008
Race Conditions in Coexisting Overlay Networks120.812008
Spectral Clustering with Perturbed Data421.892008
How healthy are today's enterprise networks?201.912008
Public Health for the Internet (PHI)30.392007
Communication-Efficient Online Detection of Network-Wide Anomalies633.372007
Communication-Efficient Tracking of Distributed Cumulative Triggers160.792007
IGP Link Weight Assignment for Operational Tier-1 Backbones271.172007
Profiling the end host402.362007
Estimating dynamic traffic matrices by using viable routing changes80.862007
In-Network PCA and Anomaly Detection593.082006
  • 1
  • 2