1. Symposium on Advances in Ocean Observation Rajan, Kanna; Alvera-Azcárate, Aida; Eidsvik, Jo; Subramaniam, Ajit 2023 Articles OceanographyOceanography--ObservationsRoboticsComputer science
2. Compositional Dataflow Circuits Edwards, Stephen A.; Townsend, Richard Morse; Barker, Martha Massee; Kim, Martha Allen 2019 Articles Data flow computingComputer networksBuffer storage (Computer science)Computer science
3. A physical model for efficient ranking in networks De Bacco, Caterina; Larremore, Daniel B.; Moore, Cristopher 2018 Articles Computer scienceComputer networks--Mathematical modelsComputer networksLinear control systemsHierarchies--Mathematical modelsAlgorithms
4. Community-based benchmarking improves spike rate inference from two-photon calcium imaging data Berens, Philipp; Freeman, Jeremy; Deneux, Thomas; Chenkov, Nikolay; McColgan, Thomas; Speiser, Artur; Macke, Jakob H.; Turaga, Srinivas C.; Mineault, Patrick; Rupprecht, Peter; Gerhard, Stephan; Friedrich, Rainer W.; Friedrich, Johannes; Paninski, Liam; Pachitariu, Marius; Harris, Kenneth; Bolte, Ben; Machado, Timothy Aloysius; Ringach, Dario; Stone, Jasmine; Rogerson, Luke E.; Sofroniew, Nicolas J.; Reimer, Jacob; Froudarakis, Emmanouil; Euler, Thomas; Roson, Miroslav Roman; Theis, Lucas; Tolias, Andreas S.; Bethge, Matthias 2018 Articles Computational biologyAlgorithmsNeurosciencesComputer science
5. Divide and conquer approach to quantum Hamiltonian simulation Hadfield, Stuart Andrew; Papageorgiou, Anargyros 2018 Articles Hamiltonian systemsQuantum computersQuantum theoryComputer science
6. Image set for deep learning: field images of maize annotated with disease symptoms Wiesner-Hanks, Tyr; Stewart, Ethan L.; Kaczmar, Nicholas; DeChant, Chad; Wu, Harvey; Nelson, Rebecca J.; Lipson, Hod; Gore, Michael A. 2018 Articles Computer scienceMachine learningPlant diseasesCornImage processingNeural networks (Computer science)
7. Latent human traits in the language of social media: An open-vocabulary approach Kulkarni, Vivek; Kern, Margaret L.; Stillwell, David J.; Kosinski, Michal; Matz, Sandra C.; Ungar, Lyle; Skiena, Steven; Schwartz, H. Andrew 2018 Articles Social mediaPersonalityLanguage and languagesComputer scienceBusiness
8. Readmission prediction via deep contextual embedding of clinical concepts Xiao, Cao; Ma, Tengfei; Dieng, Adji Bousso; Blei, David Meir; Wang, Fei 2018 Articles Computer scienceHospital utilization--ForecastingHospital recordsNeural networks (Computer science)
9. Simulated User Bots: Real Time Testing of Insider Threat Detection Systems Stolfo, Salvatore 2018 Articles Computer scienceComputer networksComputer networks--Security measuresComputer securityIntrusion detection systems (Computer security)
10. Rapid re-identification of human samples using portable DNA sequencing Zaaijer, Sophie; Gordon, Assaf; Speyer, Daniel; Piccone, Robert; Groen, Simon Cornelis; Erlich, Yaniv 2017 Articles CytologyGeneticsGenomicsDNA fingerprintingCell linesComputer science
11. The folded k-spectrum kernel: A machine learning approach to detecting transcription factor binding sites with gapped nucleotide dependencies Elmas, Abdulkadir; Wang, Xiaodong; Dresch, Jacqueline M. 2017 Articles Machine learningNucleotide sequence--Data processingElectrical engineeringComputer science
12. Fox in the Trap: Thwarting Masqueraders via Automated Decoy Document Deployment Voris, Jonathan A.; Jermyn, Jill Louise; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2015 Articles Computer science
13. Keys under doormats: mandating insecurity by requiring government access to all data and communications Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Green, Matthew; Landau, Susan; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce; Specter, Michael A.; Weitzner, Daniel J. 2015 Articles Computer networks--Security measuresComputer securityInternet--Security measuresComputer science
14. Stochastic differential equations for quantum dynamics of spin-boson networks Mandt, Stephan; Sadri, Darius; Houck, Andrew A.; Türeci, Hakan E. 2015 Articles Quantum theoryPhase space (Statistical physics)Quantum opticsStochastic differential equationsComputer science
15. Coherent Somatic Mutation in Autoimmune Disease Ross, Kenneth A. 2014 Articles Mutation (Biology)Antibody diversityAutoimmune diseasesComputer science
16. Measuring Drive-by Download Defense in Depth Boggs, Nathaniel Gordon; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
17. Model Aggregation for Distributed Content Anomaly Detection Whalen, Sean; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2014 Articles Computer science
18. Synthetic Data Generation and Defense in Depth Measurement of Web Applications Boggs, Nathaniel Gordon; Zhao, Hang; Du, Senyao; Stolfo, Salvatore 2014 Articles Computer science
19. Unsupervised Anomaly-based Malware Detection using Hardware Features Tang, Adrian; Sethumadhavan, Simha; Stolfo, Salvatore 2014 Articles Computer science
20. Aggregated Word Pair Features for Implicit Discourse Relation Disambiguation Biran, Or; McKeown, Kathleen 2013 Articles Computer scienceLinguistics
21. A negative selection heuristic to predict new transcriptional targets Cerulo, Luigi; Paduano, Vincenzo; Zoppoli, Pietro; Ceccarelli, Michele 2013 Articles BioinformaticsComputer science
22. Metaseq: Privacy Preserving Meta-analysis of Sequencing-based Association Studies Singh, Angad Pal; Zafer, Samreen; Pe'er, Itsik 2013 Articles BioinformaticsGeneticsComputer science
23. Redundancy in electronic health record corpora: analysis, impact on text mining performance and mitigation strategies Cohen, Raphael; Elhadad, Michael; Elhadad, Noemie 2013 Articles BioinformaticsComputer science
24. A Combined Theory of Defocused Illumination and Global Light Transport Gupta, Mohit; Tian, Yuandong; Narasimhan, Srinivasa G.; Zhang, Li 2012 Articles Computer science
25. Concurrency Attacks Yang, Junfeng; Cui, Ang; Stolfo, Salvatore; Sethumadhavan, Lakshminarasimhan 2012 Articles Computer science
26. Detecting and Correcting Syntactic Errors in Machine Translation Using Feature-Based Lexicalized Tree Adjoining Grammars Ma, Wei-Yun; McKeown, Kathleen 2012 Articles Computer science
28. Efficient Point-to-Subspace Query in ℓ1 with Application to Robust Face Recognition Sun, Ju; Zhang, Yuqian; Wright, John N. 2012 Articles Computer scienceArtificial intelligence
29. Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud Stolfo, Salvatore; Ben Salem, Malek; Keromytis, Angelos D. 2012 Articles Computer science
30. Improved arabic-to-english statistical machine translation by reordering post-verbal subjects for word alignment Carpuat, Marine; Marton, Yuval; Habash, Nizar Y. 2012 Articles Computer science
31. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems Kemerlis, Vasileios; Portokalidis, Georgios; Jee, Kangkook; Keromytis, Angelos D. 2012 Articles Computer science
32. Lost in Translation: Improving Decoy Documents via Automated Translation Voris, Jonathan A.; Boggs, Nathaniel Gordon; Stolfo, Salvatore 2012 Articles Computer science
34. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization Pappas, Vasilis; Polychronakis, Michalis; Keromytis, Angelos D. 2012 Articles Computer science
35. Software-based Decoy System for Insider Threats Park, Younghee; Stolfo, Salvatore 2012 Articles Computer science
36. Subgroup Detection in Ideological Discussions Abu-Jbara, Amjad; Dasigi, Pradeep; Diab, Mona; Radev, Dragomir R. 2012 Articles Computer scienceLinguistics
37. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation Gessiou, Eleni; Pappas, Vasilis; Athanasopoulos, Ilias; Keromytis, Angelos D.; Ioannidis, Sotiris 2012 Articles Computer science
38. Usable Secure Private Search Raykova, Mariana Petrova; Cui, Ang; Vo, Binh D.; Liu, Bin; Malkin, Tal G.; Bellovin, Steven Michael; Stolfo, Salvatore 2012 Articles Computer science
39. A Comprehensive Survey of Voice over IP Security Research Keromytis, Angelos D. 2011 Articles Computer science
40. ALDR: A New Metric for Measuring Effective Layering of Defenses Boggs, Nathaniel Gordon; Stolfo, Salvatore 2011 Articles Computer science
41. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS Geneiatakis, Dimitris; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
42. Behavior-Based Network Traffic Synthesis Song, Yingbo; Stolfo, Salvatore; Jebara, Tony 2011 Articles Computer science
43. Cache Impacts of Datatype Acceleration Wu, Lisa K.; Kim, Martha Allen; Edwards, Stephen A. 2011 Articles Computer science
44. CODACT: Towards Identifying Orthographic Variants in Dialectal Arabic Dasigi, Pradeep; Diab, Mona 2011 Articles Computer science
45. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent Johnson, Maritza Lupe; Bellovin, Steven Michael; Keromytis, Angelos D. 2011 Articles Computer science
46. Cross-domain Collaborative Anomaly Detection: So Far Yet So Close Boggs, Nathaniel Gordon; Hiremagalore, Sharath; Stavrou, Angelos; Stolfo, Salvatore 2011 Articles Computer science
47. Decoy Document Deployment for Effective Masquerade Attack Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
48. Defending Embedded Systems with Software Symbiotes Cui, Ang; Stolfo, Salvatore 2011 Articles Computer science
49. Detecting Traffic Snooping in Tor Using Decoys Chakravarty, Sambuddho; Portokalidis, Georgios; Polychronakis, Michalis; Keromytis, Angelos D. 2011 Articles Computer science
50. From Prey to Hunter: Transforming Legacy Embedded Devices into Exploitation Sensor Grids Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
51. High Performance Firewalls in MANETs Zhao, Hang; Bellovin, Steven Michael 2011 Articles Computer science
52. Identifying Justifications in Written Dialogs By Classifying Text as Argumentative Biran, Or; Rambow, Owen 2011 Articles Computer science
53. Information Status Distinctions and Referring Expressions: An Empirical Study of References to People in News Summaries Siddharthan, Advaith; Nenkova, Ani; McKeown, Kathleen 2011 Articles Computer science
54. Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design Cui, Ang; Kataria, Jatin; Stolfo, Salvatore 2011 Articles Computer science
55. Measuring the Deployment Hiccups of DNSSEC Pappas, Vasileios; Keromytis, Angelos D. 2011 Articles Computer science
56. Measuring the Human Factor of Cyber Security Bowen, Brian M.; Devarajan, Ramaswamy; Stolfo, Salvatore 2011 Articles Computer science
57. Misuse Detection in Consent-based Networks Alicherry, Mansoor; Keromytis, Angelos D. 2011 Articles Computer science
58. Modeling User Search Behavior for Masquerade Detection Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
59. Multiplexed Illumination for Scene Recovery in the Presence of Global Illumination Gu, Jinwei; Kobayashi, Toshihiro; Gupta, Mohit; Nayar, Shree K. 2011 Articles Computer science
60. On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Ben Salem, Malek; Stolfo, Salvatore 2011 Articles Computer science
61. Policy Refinement of Network Services for MANETs Zhao, Hang; Lobo, Jorge; Roy, Arnab; Bellovin, Steven Michael 2011 Articles Computer science
62. REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
63. Reflections on the Engineering and Operation of a Large-Scale Embedded Device Vulnerability Scanner Cui, Ang; Stolfo, Salvatore 2011 Articles Computer scienceInternet
64. Retrofitting Security in COTS Software with Binary Rewriting O'Sullivan, Pádraig; Anand, Kapil; Kotha, Aparna; Smithson, Matthew; Barua, Rajeev; Keromytis, Angelos D. 2011 Articles Computer science
65. ROP Payload Detection Using Speculative Code Execution Polychronakis, Michalis; Keromytis, Angelos D. 2011 Articles Computer science
66. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking Zavou, Angeliki; Portokalidis, Georgios; Keromytis, Angelos D. 2011 Articles Computer science
67. The Efficient Dual Receiver Cryptosystem and Its Applications Diament, Ted; Lee, Homin K.; Keromytis, Angelos D.; Yung, Moti 2011 Articles Computer science
68. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security Keromytis, Angelos D.; Stolfo, Salvatore; Yang, Junfeng; Stavrou, Angelos; Ghosh, Anup; Engler, Dawson; Dacier, Marc; Elder, Matthew; Kienzle, Darrell 2011 Articles Computer science
69. The SPARCHS Project: Hardware Support for Software Security Sethumadhavan, Lakshminarasimhan; Stolfo, Salvatore; Keromytis, Angelos D.; Yang, Junfeng; August, David 2011 Articles Computer science
70. Towards a Forensic Analysis for Multimedia Communication Services Geneiatakis, Dimitris; Keromytis, Angelos D. 2011 Articles Computer science
71. Video from a Single Coded Exposure Photograph using a Learned Over-Complete Dictionary Hitomi, Yasunobu; Gu, Jinwei; Gupta, Mohit; Mitsunaga, Tomoo; Nayar, Shree K. 2011 Articles Computer science
72. A General Approach to Model Biomedical Data from 3D Unorganised Point Clouds with Medial Scaffolds Leymarie, Frederic Fol; Imielinska, Celina Z.; Chang, Ming-Ching; Kimia, Benjamin B. 2010 Articles Diagnostic imagingComputer science
74. A Market-based Bandwidth Charging Framework Turner, David Michael; Prevelakis, Vassilis; Keromytis, Angelos D. 2010 Articles and Preprints Computer science
75. An Adversarial Evaluation of Network Signaling and Control Mechanisms Jee, Kangkook; Sidiroglou, Stelios; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
76. An Analysis of Rogue AV Campaigns Cova, Marco; Leita, Corrado; Thonnard, Olivier; Keromytis, Angelos D.; Dacier, Marc 2010 Articles Computer science
77. A Quantitative Analysis of the Insecurity of Embedded Network Devices: Results of a Wide-Area Scan Cui, Ang; Stolfo, Salvatore 2010 Articles Computer science
78. Automating the Injection of Believable Decoys to Detect Snooping Bowen, Brian M.; Kemerlis, Vasileios; Rabhu, Pratap; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
79. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection Bowen, Brian M.; Prabhu, Pratap; Kemerlis, Vasileios; Sidiroglou, Stelios; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
80. Buffer Sharing in Rendezvous Programs Vasudevan, Nalini; Edwards, Stephen A. 2010 Articles Computer science
82. Computation vs. Memory Systems: Pinning Down Accelerator Bottlenecks Kim, Martha Allen; Edwards, Stephen A. 2010 Articles Computer science
83. Crimeware Swindling without Virtual Machines Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
84. Determinism Should Ensure Deadlock-Freedom Vasudevan, Nalini; Edwards, Stephen A. 2010 Articles Computer science
85. DIPLOMA: Distributed Policy Enforcement Architecture for MANETs Alicherry, Mansoor; Keromytis, Angelos D. 2010 Articles Computer science
86. Ensuring Deterministic Concurrency through Compilation Vasudevan, Nalini; Edwards, Stephen A. 2010 Articles Computer science
87. Ethics in Security Vulnerability Research Matwyshyn, Andrea M.; Cui, Ang; Keromytis, Angelos D.; Stolfo, Salvatore 2010 Articles Computer science
88. Evaluation of a Spyware Detection System Using Thin Client Computing Pappas, Vasileios; Bowen, Brian M.; Keromytis, Angelos D. 2010 Articles Computer science
89. Fast and Practical Instruction-Set Randomization for Commodity Systems Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
90. Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
91. Identity and Security Bellovin, Steven Michael 2010 Articles Computer scienceComputer securityOperating systems (Computers)--Security measures
92. iLeak: A Lightweight System for Detecting Inadvertent Information Leaks Kemerlis, Vasileios; Pappas, Vasileios; Portokalidis, Georgios; Keromytis, Angelos D. 2010 Articles Computer science
93. On The General Applicability of Instruction-Set Randomization Boyd, Stephen W.; Kc, Gaurav S.; Locasto, Michael E.; Keromytis, Angelos D.; Prevelakis, Vassilis 2010 Articles Computer science
94. Securing MANET Multicast Using DIPLOMA Alicherry, Mansoor; Keromytis, Angelos D. 2010 Articles Computer science
95. Shadow Honeypots Anagnostakis, Kostas G.; Sidiroglou, Stelios; Akritidis, Periklis; Polychronakis, Michalis; Keromytis, Angelos D.; Markatos, Evangelos P. 2010 Articles Computer science
96. Simple and Fast Biased Locks Vasudevan, Nalini; Namjoshi, Kedar S.; Edwards, Stephen A. 2010 Articles Computer science
97. The Use of yig-cha and chos-kyi-rnam-grangs in Computing Lexical Cohesion for Tibetan Topic Boundary Detection Hackett, Paul G. 2010 Articles Computer science
98. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation Chakravarty, Sambuddho; Stavrou, Angelos; Keromytis, Angelos D. 2010 Articles Computer science
99. Voice-over-IP Security: Research and Practice Keromytis, Angelos D. 2010 Articles Computer science
100. A2M: Access-Assured Mobile Desktop Computing Stavrou, Angelos; Barrato, Ricardo A.; Keromytis, Angelos D.; Nieh, Jason 2009 Articles Computer science