Scientific Publications

Journal Article (10)

Journal Article
Davis​​, C. A.; Ciampaglia​​, G. L.; Aiello, L. M.; Chung, K.; Conover, M. D.; Ferrara, E.; Flammini, A.; Fox, G. C.; Gao, X.; Gonçalves, B. et al.; Grabowicz, P.; Hong, K.; Hui, P.-M.; McCaulay, S.; McKelvey, K.; Meiss, M. R.; Patil, S.; Kankanamalage, C. P.; Pentchev, V.; Qiu, J.; Ratkiewicz, J.; Rudnick, A.; Serrette, B.; Shiralkar, P.; Varol, O.; Weng, L.; Wu, T.-L.; Younge, A. J.; Menczer, F.: OSoMe: The IUNI Observatory on Social Media. PeerJ Computer Science 2, e87 (2016)
Journal Article
Backes, M.; Bugiel, S.; Schranz, O.; von Styp-Rekowsky, a. P.: Boxify: Bringing Full-Fledged App Sandboxing to Stock Android. ;login 41 (2), pp. 16 - 21 (2016)
Journal Article
Balegas, V.; Li, C.; Najafzadeh, M.; Porto, D.; Clement, A.; Duarte, S.; Ferreira, C.; Gehrke, J.; Leitão, J.; Preguiça, N. M. et al.; Rodrigues, R.; Shapiro, M.; Vafeiadis, V.: Geo-Replication: Fast If Possible, Consistent If Necessary. Bulletin of the Technical Committee on Data Engineering 39 (1), pp. 81 - 92 (2016)
Journal Article
Esparza, J.; Ganty, P.; Majumdar, R.: Parameterized Verification of Asynchronous Shared-Memory Systems. Journal of the ACM 63 (1), 10 (2016)
Journal Article
Gomez Rodriguez, M.; Song,, L.; Du, N.; Zha, H.; Schöllkopf, B.: Influence Estimation and Maximization in Continuous-Time Diffusion Networks. ACM Transactions on Information Systems 34 (2), 9, pp. 1 - 33 (2016)
Journal Article
Gomez Rodriguez, M.; Song, L.; Daneshmand, H.; Schölkopf, B.: Estimating Diffusion Networks: Recovery Conditions, Sample Complexity and Soft-thresholding Algorithm. Journal of Machine Learning Research 17, 90, pp. 1 - 29 (2016)
Journal Article
Moreno-Sanchez, P.; Zafar, M. B.; Kate, A.: Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network. Proceedings on Privacy Enhancing Technologies 2016 (4), pp. 436 - 453 (2016)
Journal Article
Schmuck, A.-K.; Schneider, S.; Raisch, J.; Nestmann, U.: Supervisory Control Synthesis for Deterministic Context Free Specification Languages. Discrete Event Dynamic Systems 26 (1), pp. 5 - 32 (2016)
Journal Article
Valera, I.; Ruiz, F. J. R.; Perez-Cruz, F.: Infinite Factorial Unbounded-State Hidden Markov Model. IEEE Transactions on Pattern Analysis and Machine Intelligence 38 (9), pp. 1816 - 1828 (2016)
Journal Article
Valera, I.; Ruiz, F. J. R.; Olmos, P. M.; Blanco, C.; Perez-Cruz, F.: Infinite Continuous Feature Model for Psychiatric Comorbidity Analysis. Neural Computation 28 (2), pp. 354 - 381 (2016)

Book Chapter (1)

Book Chapter
Backes, M.; Berrang, P.; Manoharan, P.: From Zoos to Safaris -- From Closed-World Enforcement to Open-World Assessment of Privacy. In: Foundations of Security Analysis and Design VIII, pp. 87 - 138 (Eds. Aldini, A.; Lopez, J.; Martinelli, F.). Springer, Berlin (2016)

Proceedings (1)

Bodik, R.; Majumdar, R. (Eds.): POPL'16. 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, St. Petersburg, FL, USA, January 20, 2015 - January 22, 2015. ACM, New York, NY (2016), XVI, 817 pp.

Conference Paper (73)

Conference Paper
Lahav, O.; Vafeiadis, V.: Explaining Relaxed Memory Models with Program Transformations. In: FM 2016: Formal Methods, pp. 479 - 495 (Eds. Fitzgerald, J.; Heitmeyer, C.; Gnesi, S.; Philippou, A.). 21st International Symposium on Formal Methods, Limassol, Cyprus, November 02, 2016 - November 11, 2016. Springer, Berlin (2016)
Conference Paper
He, M.; Vafeiadis, V.; Qin, S.: Reasoning about Fences and Relaxed Atomics. In: PDP 2016, pp. 520 - 527. 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, Heraklion Crete, Greece, February 17, 2016 - February 19, 2016. IEEE, Piscataway, NJ (2016)
Conference Paper
Acar, Y.; Backes, M.; Bugiel, S.; Fahl, S.; McDaniel, P.; Smith, M.: SoK: Lessons Learned From Android Security Research For Appified Software Platforms. In: IEEE Symposium on Security and Privacy, pp. 433 - 451. 37th IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 23, 2016 - May 25, 2016. IEEE, Piscataway, NJ (2016)
Conference Paper
Acar, Y.; Backes, M.; Fahl, S.; Kim, D.; Mazurek, M. L.; Stransky, C.: You Get Where You're Looking for: The Impact of Information Sources on Code Security. In: IEEE Symposium on Security and Privacy, pp. 289 - 305. 37th IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 23, 2016 - May 25, 2016. IEEE, Piscataway, NJ (2016)
Conference Paper
Aditya, P.; Sen, R.; Druschel, P.; Oh, S. J.; Benenson, R.; Fritz, M.; Schiele, B.; Bhattachariee, B.; Wu, T. T.: I-Pic: A Platform for Privacy-Compliant Image Capture. In: MobiSys'16, pp. 235 - 248. 4th Annual International Conference on Mobile Systems, Applications, and Services, Singapore, June 25, 2016 - June 30, 2016. ACM, New York, NY (2016)
Conference Paper
Babaei, M.; Grabowicz, P.; Valera, I.; Gummadi, K. P.; Gomez Rodriguez, M.: On the Efficiency of the Information Networks in Social Media. In: WSDM'16, pp. 82 - 93. 9th ACM International Conference on Web Search and Data Mining, San Francisco, CA, USA, February 22, 2016 - February 25, 2016. ACM, New York, NY (2016)
Conference Paper
Backes, M.; Berrang, P.; Humbert, M.; Shen,, X.; Wolf, V.: Simulating the Large-Scale Erosion of Genomic Privacy Over Time. In: Proceedings of the 3rd International Workshop on Genome Privacy and Security. 3rd International Workshop on Genome Privacy and Security, Chicago, IL, USA, November 12, 2016. (2016)
Conference Paper
Backes, M.; Berrang, P.; Humbert, M.; Manoharan, P.: Membership Privacy in MicroRNA-based Studies. In: CCS'16, pp. 319 - 330. 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, October 24, 2016 - October 28, 2016. ACM, New York, NY (2016)
Go to Editor View