Found 4258 results
Author Title Type [ Year(Asc)]
Krishnapriyan, A. S., Gholami A., Zhe S., Kirby R. M., & Mahoney M. W. (2021).  Characterizing Possible Failure Modes in Physics-Informed Neural Networks. NeurIPS.
Dokas, P., Jones K., Kasza A., Nadji Y., & Paxson V. (2021).  Corelight Sensors detect the ChaChi RAT. Security Boulevard.
Luo, Z., Fu S., Theis M., Hasan S., Ratnasamy S., & Shenker S. (2021).  Democratizing cellular access with CellBricks. SIGCOMM '21: Proceedings of the 2021 ACM SIGCOMM 2021 Conference.
Castor, A. (2021).  Did a CryptoPunk NFT Just Sell for $500 Million? Sort of, in a Transaction That Illuminates How the NFT Market Differs From the Art Market.
Weaver, N. (2021).  Disrupting Cryptocurrencies 2: Lessons From the Poly 'Hack'. Lawfare.
Harborth, D., & Frik A. (2021).  Evaluating and Redefining Smartphone Permissions with Contextualized Justifications for Mobile Augmented Reality Apps. Seventeenth Symposium on Usable Privacy and Security (SOUPS) 2021. 513-534.
Ellsworth, M., Baker C. F., & Petruck M. R. L. (2021).  FrameNet and Linguistic Typology. Third Workshop on Computational Typology and Multilingual NLP. 61-66.
Stoica, I., & Shenker S. J. (2021).  From cloud computing to sky computing. HotOS '21: Proceedings of the Workshop on Hot Topics in Operating Systems. 26-32.
Yao, Z., Dong Z., Zheng Z., Gholami A., Yu J., Tan E., et al. (2021).  HAWQV3: Dyadic Neural Network Quantization.
Ho, G., Dhiman M., Akhawe D., Paxson V., Savage S., Voelker G. M., et al. (2021).  Hopper: Modeling and Detecting Lateral Movement. Proceedings of the 30th USENIX Security Symposium. 3093-3110.
Schneier, B., & Weaver N. (2021).  How to Cut Down on Ransomware Attacks Without Banning Bitcoin. Slate.
Weaver, N. (2021).  How to Start Disrupting Cryptocurrencies: “Mining” Is Money Transmission. Lawfare.
Kim, S., Gholami A., Yao Z., Mahoney M., & Keutzer K. (2021).  I-BERT: Integer-only BERT Quantization.
Shanley, L.. A., Fortson L.., Berger-Wolf T.., Crowston K.., & Michelucci M.. (2021).  Imagine All the People: Citizen Science, Artificial Intelligence, and Computational Research. Computing Community Consortium (CCC).
Shanley, L. A., Fortson L., Berger-Wolf T., Crowston K., & Michelucci P. (2021).  Imagine All the People: Citizen Science, Artificial Intelligence, and Computational Research.
Petruck, M. R. L., & Ohara K. (2021).  Interactional Frames in a Literary Context: Multiple Levels of Interaction. 17th International Pragmatics Conference.
Egelman, S., & Pe'er E. (2021).  The Key to Getting People to Be Safer Online: Make the Appeals More Personal. Wall Street Journal.
N. Erichson, B., Azencot O., Queiruga A., Hodgkinson L., & Mahoney M. (2021).  Lipschitz recurrent neural networks. International Conference on Learning Representations.
Wang, X., Lian L., Miao Z., Liu Z., & Yu S. X. (2021).  Long-tailed Recognition by Routing Diverse Distribution-Aware Experts. Proceedings of International Conference on Learning Representations.
Yeh, C-H., Yu S. X., & Lin M. C. (2021).  Meibography Phenotyping and Classification From Unsupervised Discriminative Feature Learning. Translational Vision Science and Technology. 10(4), 
Wang, K., Kellman M., Sandino C. M., Zhang K., Vasanawala S. S., Tamir J. I., et al. (2021).  Memory-efficient Learning for High-Dimensional MRI Reconstruction. Proceedings of International Society for Magnetic Resonance in Medicine.
Weaver, N. (2021).  The Microsoft Exchange Hack and the Great Email Robbery.
N. Erichson, B., Taylor D., Wu Q., & Mahoney M. (2021).  Noise-Response Analysis of Deep Neural Networks Quantifies Robustness and Fingerprints Structural Malware. Proceedings of the 2021 SIAM International Conference on Data Mining (SDM). 100-108.
Lim, S. Hoe, N. Erichson B., Hodgkinson L., & Mahoney M. (2021).  Noisy Recurrent Neural Networks. Advances in Neural Information Processing Systems Conference. 34,
Tahaei, M., Frik A., & Vaniae K. (2021).  Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. 1-15.