Needles in a Haystack: Using PORT to Catch Bad Behaviors within Application Recordings | 0 | 0.34 | 2022 |
Verifying concurrent multicopy search structures | 0 | 0.34 | 2021 |
Data Flow Refinement Type Inference | 0 | 0.34 | 2021 |
Verifying concurrent search structure templates | 0 | 0.34 | 2020 |
VACCINE: Using Contextual Integrity ForData Leakage Detection | 1 | 0.35 | 2019 |
Clock Bound Repair For Timed Systems | 0 | 0.34 | 2019 |
RECIPE: Applying Open Domain Question Answering to Privacy Policies. | 1 | 0.36 | 2018 |
Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms. | 0 | 0.34 | 2016 |