1. Compositional Dataflow Circuits Edwards, Stephen A.; Townsend, Richard Morse; Barker, Martha Massee; Kim, Martha Allen 2019 Articles Data flow computingComputer networksBuffer storage (Computer science)Computer science
2. Divide and conquer approach to quantum Hamiltonian simulation Hadfield, Stuart Andrew; Papageorgiou, Anargyros 2018 Articles Hamiltonian systemsQuantum computersQuantum theoryComputer science
3. Image set for deep learning: field images of maize annotated with disease symptoms Wiesner-Hanks, Tyr; Stewart, Ethan L.; Kaczmar, Nicholas; DeChant, Chad; Wu, Harvey; Nelson, Rebecca J.; Lipson, Hod; Gore, Michael A. 2018 Articles Computer scienceMachine learningPlant diseasesCornImage processingNeural networks (Computer science)
4. Readmission prediction via deep contextual embedding of clinical concepts Xiao, Cao; Ma, Tengfei; Dieng, Adji Bousso; Blei, David Meir; Wang, Fei 2018 Articles Computer scienceHospital utilization--ForecastingHospital recordsNeural networks (Computer science)
5. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
6. Rapid re-identification of human samples using portable DNA sequencing Zaaijer, Sophie; Gordon, Assaf; Speyer, Daniel; Piccone, Robert; Groen, Simon Cornelis; Erlich, Yaniv 2017 Articles CytologyGeneticsGenomicsDNA fingerprintingCell linesComputer science
7. Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment Voris, Jonathan A.; Jermyn, Jill Louise; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2015 Articles Computer science
8. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
9. Stochastic differential equations for quantum dynamics of spin-boson networks Mandt, Stephan; Sadri, Darius; Houck, Andrew A.; Türeci, Hakan E. 2015 Articles Quantum theoryPhase space (Statistical physics)Quantum opticsStochastic differential equationsComputer science
10. Coherent Somatic Mutation in Autoimmune Disease Ross, Kenneth A. 2014 Articles Mutation (Biology)Antibody diversityAutoimmune diseasesComputer science
11. Measuring Drive-by Download Defense in Depth Boggs, Nathaniel Gordon; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
12. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Articles Computer science
13. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
14. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
15. Aggregated Word Pair Features for Implicit Discourse Relation Disambiguation Biran, Or; McKeown, Kathleen 2013 Articles Computer scienceLinguistics
16. Metaseq: Privacy Preserving Meta-analysis of Sequencing-based Association Studies Singh, Angad Pal; Zafer, Samreen; Pe'er, Itsik 2013 Articles BioinformaticsGeneticsComputer science
17. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
18. Concurrency Attacks Yang, Junfeng; Cui, Ang; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2012 Articles Computer science
19. Detecting and Correcting Syntactic Errors in Machine Translation Using Feature-Based Lexicalized Tree Adjoining Grammars Ma, Wei-Yun; McKeown, Kathleen 2012 Articles Computer science
21. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
22. Improved arabic-to-english statistical machine translation by reordering post-verbal subjects for word alignment Carpuat, Marine; Marton, Yuval; Habash, Nizar Y. 2012 Articles Computer science
23. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science
24. Lost in Translation: Improving Decoy Documents via Automated Translation Voris, Jonathan A.; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2012 Articles Computer science
26. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization Pappas, Vasilis; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Articles Computer science
27. Software-based Decoy System for Insider Threats Park, Younghee; Stolfo, Salvatore 2012 Articles Computer science
28. Subgroup Detection in Ideological Discussions Abu-Jbara, Amjad; Dasigi, Pradeep; Diab, Mona; Radev, Dragomir R. 2012 Articles Computer scienceLinguistics
29. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
30. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
31. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
32. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science
33. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
34. Behavior-Based Network Traffic Synthesis Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Articles Computer science
35. Cache Impacts of Datatype Acceleration Wu, Lisa K.; Kim, Martha Allen; Edwards, Stephen A. 2011 Articles Computer science
36. CODACT: Towards Identifying Orthographic Variants in Dialectal Arabic Dasigi, Pradeep; Diab, Mona 2011 Articles Computer science
37. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science
38. Cross-domain Collaborative Anomaly Detection: So Far Yet So Close Boggs, Nathaniel Gordon; Hiremagalore, Sharath; Stavrou, Angelos; Stolfo, Salvatore 2011 Articles Computer science
39. Decoy Document Deployment for Effective Masquerade Attack Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
40. Defending Embedded Systems with Software Symbiotes Cui, Ang; Stolfo, Salvatore 2011 Articles Computer science
41. Detecting Traffic Snooping in Tor Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Articles Computer science
42. From Prey to Hunter: Transforming Legacy Embedded Devices into Exploitation Sensor Grids Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
43. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
44. Identifying Justifications in Written Dialogs By Classifying Text as Argumentative Biran, Or; Rambow, Owen 2011 Articles Computer science
45. Information Status Distinctions and Referring Expressions: An Empirical Study of References to People in News Summaries Siddharthan, Advaith; Nenkova, Ani; McKeown, Kathleen 2011 Articles Computer science
46. Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
47. Measuring the Deployment Hiccups of DNSSEC Pappas, Vasileios; Keromytis, Angelos D. 2011 Articles Computer science
48. Measuring the Human Factor of Cyber Security Bowen, Brian M.; Devarajan, Ramaswamy; Stolfo, Salvatore 2011 Articles Computer science
49. Misuse Detection in Consent-based Networks Alicherry, Mansoor; Keromytis, Angelos D. 2011 Articles Computer science
50. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science