Publications
(2015).
The Usable Security & Privacy Group.
30 Years of Innovation: ICSI 30th Anniversary Celebration.
(2018).
(2014). Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS).
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’15).
(2015). The Myth of the Average User: Improving Privacy and Security Systems through Individualization.
Proceedings of the 2015 New Security Paradigms Workshop (NSPW ’15).
(2015).
(1990). No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning.
Proceedings of 32nd USENIX Security Symposium.
(In Press).
(2006).
(1992). Competitive analysis of financial games.
Proceedings 33rd Annual Symposium on Foundations of Computer Science. 327-333.
(1992).
(1997). The mortgage problem.
Proceedings of the Second Israel Symposium on Theory and Computing Systems . 304-312.
(1993). There is No Data Like Less Data: Percepts for Video Concept Detection on Consumer-Produced Media.
27-32.
(2012).
(2013).
(2014).
(2013).
(2013).
(2013).
(2013).
(2013).
(2013).
(2012). Genome-Wide In-silico Determination of Transcriptional Regulation Modules Controlling Cell Cycle in Human Cells.
Genome Research. 773-780.
(2003). Size Matters: An Empirical Study of Neural Network Training for Large Vocabulary Continuous Speech Recognition.
Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1999).
(1999). The Weft: A Representation for Periodic Sounds.
The 22nd International Conference on Acoustics, Speech, and Signal Processing (ICASSP 1997). 2, 1307-1310.
(1997).