Skip to main content

Search

Reset

Add filters:

Use filters to refine the search results.


Item hits:
Publication DateArticle TitleAuthor(s)
29-Mar-2016Constrained sampling and counting: Universal hashing meets SAT solvingMeel, KS; Vardi, MY; Chakraborty, S; Fremont, DJ; Seshia, SA, et al
18-Jul-2018Lazy self-composition for security verificationYang, W; Vizel, Y; Subramanyan, P; Gupta, A; Malik, Sharad
21-Jun-2017Secure Pick Up: Implicit authentication when you start using the smartphoneLee, W-H; Liu, X; Shen, Y; Jin, H; Lee, Ruby B
31-Aug-2017Implicit Smartphone User Authentication with Sensors and Contextual Machine LearningLee, W-H; Lee, Ruby B
19-Feb-2017Quantification of de-anonymization risks in social networksLee, W-H; Liu, C; Ji, S; Mittal, Prateek; Lee, Ruby
30-Oct-2017Blind De-anonymization Attacks using Social NetworksLee, W-H; Ji, S; Liu, C; Mittal, Prateek; Lee, Ruby B
6-Jun-2014Trustworthiness of medical devices and body area networksZhang, M; Raghunathan, A; Jha, Niraj K
5-May-2016Benchmark data for identifying multi-functional types of membrane proteinsWan, S; Mak, M-W; Kung, Sun-Yuan
Mar-2014Rate-Distortion-Based Physical Layer Secrecy with Applications to Multimode FiberSong, Eva C; Soljanin, Emina; Cuff, Paul; Poor, H Vincent; Guan, Kyle
Apr-2016The Likelihood Encoder for Lossy CompressionSong, Eva C; Cuff, Paul; Poor, H Vincent