1. Compositional Dataflow Circuits Edwards, Stephen A.; Townsend, Richard Morse; Barker, Martha Massee; Kim, Martha Allen 2019 Articles Data flow computingComputer networksBuffer storage (Computer science)Computer science
2. Divide and conquer approach to quantum Hamiltonian simulation Hadfield, Stuart Andrew; Papageorgiou, Anargyros 2018 Articles Hamiltonian systemsQuantum computersQuantum theoryComputer science
3. Image set for deep learning: field images of maize annotated with disease symptoms Wiesner-Hanks, Tyr; Stewart, Ethan L.; Kaczmar, Nicholas; DeChant, Chad; Wu, Harvey; Nelson, Rebecca J.; Lipson, Hod; Gore, Michael A. 2018 Articles Computer scienceMachine learningPlant diseasesCornImage processingNeural networks (Computer science)
4. Measuring discursive influence across scholarship Gerow, Aaron; Hu, Yuening; Boyd-Graber, Jordan; Blei, David Meir; Evans, James A. 2018 Articles Learning and scholarshipBibliographical citationsScholarly publishingInfluence (Literary, artistic, etc.)
5. Readmission prediction via deep contextual embedding of clinical concepts Xiao, Cao; Ma, Tengfei; Dieng, Adji Bousso; Blei, David Meir; Wang, Fei 2018 Articles Computer scienceHospital utilization--ForecastingHospital recordsNeural networks (Computer science)
6. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
7. Accelerated parallel algorithm for gene network reverse engineering He, Jing; Zhou, Zhou; Reed, Michael K.; Califano, Andrea 2017 Articles Parallel programming (Computer science)Gene regulatory networksGene expression--Data processingSystems biology
8. From Functional Programs to Pipelined Dataflow Circuits Townsend, Richard Morse; Kim, Martha Allen; Edwards, Stephen A. 2017 Articles Compilers (Computer programs)Logic designData flow computing
9. Rapid re-identification of human samples using portable DNA sequencing Zaaijer, Sophie; Gordon, Assaf; Speyer, Daniel; Piccone, Robert; Groen, Simon Cornelis; Erlich, Yaniv 2017 Articles CytologyGeneticsGenomicsDNA fingerprintingCell linesComputer science
10. Statistical correction of the Winner’s Curse explains replication variability in quantitative trait genome-wide association studies Palmer, Cameron Douglas; Pe'er, Itshack G. 2017 Articles DNA replicationGenomes--Data processingHuman genetics--VariationGeneticsStatistics
11. Subregional Nowcasts of Seasonal Influenza Using Search Trends Kandula, Sasikiran; Shaman, Jeffrey L. 2017 Articles InfluenzaEpidemiology--Statistical methodsForecasting
12. The time and place of European admixture in Ashkenazi Jewish history Xue, James; Lencz, Todd; Darvasi, Ariel; Pe'er, Itsik; Carmi, Shai 2017 Articles Gene flowGeneticsPopulation geneticsAshkenazimHistorical geography
13. Bias Characterization in Probabilistic Genotype Data and Improved Signal Detection with Multiple Imputation Palmer, Cameron Douglas; Pe’er, Itsik 2016 Articles Multiple imputation (Statistics)Missing observations (Statistics)Genetics--Statistical methodsGeneticsStatistics
14. Cutting Edge: Using mobile sequencers in an academic classroom Zaaijer, Sophie; Erlich, Yaniv; Columbia University Ubiquitous Genomics 2015 class 2016 Articles Nucleotide sequenceScience--Study and teaching--Technological innovationsGenomicsEducational technologyEducation--Curricula
15. Prior Design for Dependent Dirichlet Processes: An Application to Marathon Modeling Pradier, Melanie F.; Ruiz, Francisco Jesus Rodriguez; Perez-Cruz, Fernando 2016 Articles Marathon runningRunning races--Data processingNonparametric statisticsStochastic processesStatisticsInformation science
16. The Impact of Comprehensive Case Management on HIV Client Outcomes Brennan-Ing, Mark; Seidel, Liz; Rodgers, Leslie; Ernst, Jerome; Wirth, Doug; Tietz, Daniel; Moretti, Antonio; Karpiak, Stephen E. 2016 Articles Hospitals--Case management servicesHIV infections--EpidemiologyHIV-positive persons--Care--Government policyEpidemiologyHealth services administrationMedical carePublic health
17. Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment Voris, Jonathan A.; Jermyn, Jill Louise; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2015 Articles Computer science
18. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
19. Stochastic differential equations for quantum dynamics of spin-boson networks Mandt, Stephan; Sadri, Darius; Houck, Andrew A.; Türeci, Hakan E. 2015 Articles Quantum theoryPhase space (Statistical physics)Quantum opticsStochastic differential equationsComputer science
20. Coherent Somatic Mutation in Autoimmune Disease Ross, Kenneth A. 2014 Articles Mutation (Biology)Antibody diversityAutoimmune diseasesComputer science
21. Co-regulated Transcripts Associated to Cooperating eSNPs Define Bi-fan Motifs in Human Gene Networks Kreimer, Anat; Pe'er, Itsik G. 2014 Articles Single nucleotide polymorphismsGene expressionGene regulatory networksGeneticsBiology--Classification
22. Measuring Drive-by Download Defense in Depth Boggs, Nathaniel Gordon; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
23. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Articles Computer science
24. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
25. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
26. Aggregated Word Pair Features for Implicit Discourse Relation Disambiguation Biran, Or; McKeown, Kathleen 2013 Articles Computer scienceLinguistics
27. Alcohol Interacts with Genetic Alteration of the Hippo Tumor Suppressor Pathway to Modulate Tissue Growth in Drosophila Ilanges, Anoj; Jahanshahi, Maryam; Balobin, Denis M.; Pfleger, Cathie M. 2013 Articles Cancer--EtiologyDrosophilaTumor suppressor proteinsAlcohol--Physiological effectOncology
28. Metaseq: Privacy Preserving Meta-analysis of Sequencing-based Association Studies Singh, Angad Pal; Zafer, Samreen; Pe'er, Itsik 2013 Articles BioinformaticsGeneticsComputer science
29. Variants in exons and in transcription factors affect gene expression in trans Kreimer, Anat; Pe'er, Itshack G. 2013 Articles Gene regulatory networksGene expressionGeneticsBiology--Classification
30. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
31. A Practical Approach to 3D Scanning in the Presence of Interreflections, Subsurface Scattering and Defocus Gupta, Mohit; Agrawal, Amit; Veeraraghavan, Ashok; Narasimhan, Srinivasa G. 2012 Articles Computer engineering
32. Concurrency Attacks Yang, Junfeng; Cui, Ang; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2012 Articles Computer science
33. Detecting and Correcting Syntactic Errors in Machine Translation Using Feature-Based Lexicalized Tree Adjoining Grammars Ma, Wei-Yun; McKeown, Kathleen 2012 Articles Computer science
35. Exploiting Split Browsers for Efficiently Protecting User Data Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D.; Athanasopoulos, Elias 2012 Articles Information science
36. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
37. Implications for health and disease in the genetic signature of the Ashkenazi Jewish population Guha, Saurav; Rosenfeld, Jeffrey; Malhotra, Anil; Gregersen, Peter; Kane, John; Pe'er, Itsik; Darvasi, Ariel; Lencz, Todd 2012 Articles GeneticsBiometry
38. Improved arabic-to-english statistical machine translation by reordering post-verbal subjects for word alignment Carpuat, Marine; Marton, Yuval; Habash, Nizar Y. 2012 Articles Computer science
39. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science
40. Lost in Translation: Improving Decoy Documents via Automated Translation Voris, Jonathan A.; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2012 Articles Computer science
42. Self-Healing Multitier Architectures Using Cascading Rescue Points Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2012 Articles Information science
43. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization Pappas, Vasilis; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Articles Computer science
44. Software-based Decoy System for Insider Threats Park, Younghee; Stolfo, Salvatore 2012 Articles Computer science
45. Subgroup Detection in Ideological Discussions Abu-Jbara, Amjad; Dasigi, Pradeep; Diab, Mona; Radev, Dragomir R. 2012 Articles Computer scienceLinguistics
46. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
47. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
48. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
49. A highly-underactuated robotic hand with force and joint angle sensors Wang, Long; DelPreto, Joseph Jeffrey; Weisz, Jonathan; Bhattacharyya, Sam; Allen, Peter K. 2011 Articles Robotics
50. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science
51. A learning algorithm for visual pose estimation of continuum robots Reiter, Austin David; Goldman, Roger Eric; Bajo, Andrea; Iliopoulos, Konstantinos; Simaan, Nabil; Allen, Peter K. 2011 Articles Robotics
52. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
53. Behavior-Based Network Traffic Synthesis Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Articles Computer science
54. Cache Impacts of Datatype Acceleration Wu, Lisa K.; Kim, Martha Allen; Edwards, Stephen A. 2011 Articles Computer science
55. CODACT: Towards Identifying Orthographic Variants in Dialectal Arabic Dasigi, Pradeep; Diab, Mona 2011 Articles Computer science
56. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science
57. Cross-domain Collaborative Anomaly Detection: So Far Yet So Close Boggs, Nathaniel Gordon; Hiremagalore, Sharath; Stavrou, Angelos; Stolfo, Salvatore 2011 Articles Computer science
58. Decoy Document Deployment for Effective Masquerade Attack Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
59. Defending Embedded Systems with Software Symbiotes Cui, Ang; Stolfo, Salvatore 2011 Articles Computer science
60. Detecting Traffic Snooping in Tor Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Articles Computer science
61. Evidence for somatic gene conversion and deletion in bipolar disorder, Crohn's disease, coronary artery disease, hypertension, rheumatoid arthritis, type-1 diabetes, and type-2 diabetes Ross, Kenneth A. 2011 Articles Gene conversionPathologyGeneticsMedical sciences
62. From Prey to Hunter: Transforming Legacy Embedded Devices into Exploitation Sensor Grids Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
63. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
64. Identifying Justifications in Written Dialogs By Classifying Text as Argumentative Biran, Or; Rambow, Owen 2011 Articles Computer science
65. Information Status Distinctions and Referring Expressions: An Empirical Study of References to People in News Summaries Siddharthan, Advaith; Nenkova, Ani; McKeown, Kathleen 2011 Articles Computer science
66. Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
67. Measuring the Deployment Hiccups of DNSSEC Pappas, Vasileios; Keromytis, Angelos D. 2011 Articles Computer science
68. Measuring the Human Factor of Cyber Security Bowen, Brian M.; Devarajan, Ramaswamy; Stolfo, Salvatore 2011 Articles Computer science
69. Misuse Detection in Consent-based Networks Alicherry, Mansoor; Keromytis, Angelos D. 2011 Articles Computer science
70. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
71. Multiplexed Illumination for Scene Recovery in the Presence of Global Illumination Gu, Jinwei; Kobayashi, Toshihiro; Gupta, Mohit; Nayar, Shree K. 2011 Articles Computer science
72. On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
73. Policy Refinement of Network Services for MANETs Zhao, Hang; Lobo, Jorge; Roy, Arnab; Bellovin, Steven Michael 2011 Articles Computer science
74. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
75. Reflections on the Engineering and Operation of a Large-Scale Embedded Device Vulnerability Scanner Cui, Ang; Stolfo, Salvatore 2011 Articles Computer scienceInternet
76. Retrofitting Security in COTS Software with Binary Rewriting O'Sullivan, Pádraig; Anand, Kapil; Kotha, Aparna; Smithson, Matthew; Barua, Rajeev; Keromytis, Angelos D. 2011 Articles Computer science
77. ROP Payload Detection Using Speculative Code Execution Polychronakis, Michalis; Keromytis, Angelos D. 2011 Articles Computer science
78. Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
79. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
80. The Efficient Dual Receiver Cryptosystem and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2011 Articles Computer science
81. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security Keromytis, Angelos D.; Stolfo, Salvatore; Yang, Junfeng; Stavrou, Angelos; Ghosh, Anup; Engler, Dawson; Dacier, Marc; Elder, Matthew; Kienzle, Darrell 2011 Articles Computer science
82. The SPARCHS Project: Hardware Support for Software Security Sethumadhavan, Lakshminarasimhan; Stolfo, Salvatore; Keromytis, Angelos D.; Yang, Junfeng; August, David 2011 Articles Computer science
83. Towards a Forensic Analysis for Multimedia Communication Services Geneiatakis, Dimitris; Keromytis, Angelos D. 2011 Articles Computer science
84. Video from a Single Coded Exposure Photograph using a Learned Over-Complete Dictionary Hitomi, Yasunobu; Gu, Jinwei; Gupta, Mohit; Mitsunaga, Tomoo; Nayar, Shree K. 2011 Articles Computer science
86. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
87. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
88. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
89. An online learning approach to in-vivo tracking using synergistic features Reiter, Austin David; Allen, Peter K. 2010 Articles Robotics
90. A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Cui, Ang; Stolfo, Salvatore 2010 Articles Computer science
91. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
92. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
93. Buffer Sharing in Rendezvous Programs Vasudevan, Nalini; Edwards, Stephen A. 2010 Articles Computer science
95. Computation vs. Memory Systems: Pinning Down Accelerator Bottlenecks Kim, Martha Allen; Edwards, Stephen A. 2010 Articles Computer science
96. Crimeware Swindling without Virtual Machines Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
97. Data-driven optimization for underactuated robotic hands Ciocarlie, Matei; Allen, Peter K. 2010 Articles Robotics
98. Design, simulation and evaluation of kinematic alternatives for Insertable Robotic Effectors Platforms in Single Port Access Surgery Ding, Jienan; Xu, Kai; Goldman, Roger Eric; Allen, Peter K.; Fowler, Dennis L.; Simaan, Nabil 2010 Articles RoboticsSurgery
99. Determinism Should Ensure Deadlock-Freedom Vasudevan, Nalini; Edwards, Stephen A. 2010 Articles Computer science
100. DIPLOMA: Distributed Policy Enforcement Architecture for MANETs Alicherry, Mansoor; Keromytis, Angelos D. 2010 Articles Computer science