Skip to main content

Search

Reset

Add filters:

Use filters to refine the search results.


Item hits:
Publication DateArticle TitleAuthor(s)
21-Jun-2017Secure Pick Up: Implicit authentication when you start using the smartphoneLee, W-H; Liu, X; Shen, Y; Jin, H; Lee, Ruby B
31-Aug-2017Implicit Smartphone User Authentication with Sensors and Contextual Machine LearningLee, W-H; Lee, Ruby B
19-Feb-2017Quantification of de-anonymization risks in social networksLee, W-H; Liu, C; Ji, S; Mittal, Prateek; Lee, Ruby
30-Oct-2017Blind De-anonymization Attacks using Social NetworksLee, W-H; Ji, S; Liu, C; Mittal, Prateek; Lee, Ruby B
Jun-2014Alignment of the CMS tracker with LHC and cosmic ray dataChatrchyan, S; Khachatryan, V; Sirunyan, AM; Tumasyan, A; Adam, W, et al
2013Two-Dimensional Tomography from Noisy Projections Taken at Unknown Random DirectionsSinger, Amit; Wu, H-T
2013Orientation Determination of Cryo-EM Images Using Least Unsquared DeviationsWang, Lanhui; Singer, Amit; Wen, Zaiwen
2016Readout of two-kilopixel transition-edge sensor arrays for Advanced ACTPolHenderson, Shawn W; Stevens, Jason R; Amiri, Mandana; Austermann, Jason; Beall, James A, et al
17-Aug-2020The Sec1/Munc18 protein Vps45 holds the Qa-SNARE Tlg2 in an open conformationEisemann, Travis J; Allen, Frederick; Lau, Kelly; Shimamura, Gregory R; Jeffrey, Philip D, et al
1-Jan-2013Martingale optimal transport and robust hedging in continuous timeDolinsky, Y; Soner, H Mete