Scientific Publications

Journal Article (10)

1.
Journal Article
Davis​​, C. A.; Ciampaglia​​, G. L.; Aiello, L. M.; Chung, K.; Conover, M. D.; Ferrara, E.; Flammini, A.; Fox, G. C.; Gao, X.; Gonçalves, B. et al.; Grabowicz, P.; Hong, K.; Hui, P.-M.; McCaulay, S.; McKelvey, K.; Meiss, M. R.; Patil, S.; Kankanamalage, C. P.; Pentchev, V.; Qiu, J.; Ratkiewicz, J.; Rudnick, A.; Serrette, B.; Shiralkar, P.; Varol, O.; Weng, L.; Wu, T.-L.; Younge, A. J.; Menczer, F.: OSoMe: The IUNI Observatory on Social Media. PeerJ Computer Science 2, e87 (2016)
2.
Journal Article
Backes, M.; Bugiel, S.; Schranz, O.; von Styp-Rekowsky, a. P.: Boxify: Bringing Full-Fledged App Sandboxing to Stock Android. ;login 41 (2), pp. 16 - 21 (2016)
3.
Journal Article
Balegas, V.; Li, C.; Najafzadeh, M.; Porto, D.; Clement, A.; Duarte, S.; Ferreira, C.; Gehrke, J.; Leitão, J.; Preguiça, N. M. et al.; Rodrigues, R.; Shapiro, M.; Vafeiadis, V.: Geo-Replication: Fast If Possible, Consistent If Necessary. Bulletin of the Technical Committee on Data Engineering 39 (1), pp. 81 - 92 (2016)
4.
Journal Article
Esparza, J.; Ganty, P.; Majumdar, R.: Parameterized Verification of Asynchronous Shared-Memory Systems. Journal of the ACM 63 (1), 10 (2016)
5.
Journal Article
Gomez Rodriguez, M.; Song,, L.; Du, N.; Zha, H.; Schöllkopf, B.: Influence Estimation and Maximization in Continuous-Time Diffusion Networks. ACM Transactions on Information Systems 34 (2), 9, pp. 1 - 33 (2016)
6.
Journal Article
Gomez Rodriguez, M.; Song, L.; Daneshmand, H.; Schölkopf, B.: Estimating Diffusion Networks: Recovery Conditions, Sample Complexity and Soft-thresholding Algorithm. Journal of Machine Learning Research 17, 90, pp. 1 - 29 (2016)
7.
Journal Article
Moreno-Sanchez, P.; Zafar, M. B.; Kate, A.: Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network. Proceedings on Privacy Enhancing Technologies 2016 (4), pp. 436 - 453 (2016)
8.
Journal Article
Schmuck, A.-K.; Schneider, S.; Raisch, J.; Nestmann, U.: Supervisory Control Synthesis for Deterministic Context Free Specification Languages. Discrete Event Dynamic Systems 26 (1), pp. 5 - 32 (2016)
9.
Journal Article
Valera, I.; Ruiz, F. J. R.; Perez-Cruz, F.: Infinite Factorial Unbounded-State Hidden Markov Model. IEEE Transactions on Pattern Analysis and Machine Intelligence 38 (9), pp. 1816 - 1828 (2016)
10.
Journal Article
Valera, I.; Ruiz, F. J. R.; Olmos, P. M.; Blanco, C.; Perez-Cruz, F.: Infinite Continuous Feature Model for Psychiatric Comorbidity Analysis. Neural Computation 28 (2), pp. 354 - 381 (2016)

Book Chapter (1)

11.
Book Chapter
Backes, M.; Berrang, P.; Manoharan, P.: From Zoos to Safaris -- From Closed-World Enforcement to Open-World Assessment of Privacy. In: Foundations of Security Analysis and Design VIII, pp. 87 - 138 (Eds. Aldini, A.; Lopez, J.; Martinelli, F.). Springer, Berlin (2016)

Proceedings (1)

12.
Proceedings
Bodik, R.; Majumdar, R. (Eds.): POPL'16. 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, St. Petersburg, FL, USA, January 20, 2015 - January 22, 2015. ACM, New York, NY (2016), XVI, 817 pp.

Conference Paper (73)

13.
Conference Paper
Lahav, O.; Vafeiadis, V.: Explaining Relaxed Memory Models with Program Transformations. In: FM 2016: Formal Methods, pp. 479 - 495 (Eds. Fitzgerald, J.; Heitmeyer, C.; Gnesi, S.; Philippou, A.). 21st International Symposium on Formal Methods, Limassol, Cyprus, November 02, 2016 - November 11, 2016. Springer, Berlin (2016)
14.
Conference Paper
He, M.; Vafeiadis, V.; Qin, S.: Reasoning about Fences and Relaxed Atomics. In: PDP 2016, pp. 520 - 527. 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, Heraklion Crete, Greece, February 17, 2016 - February 19, 2016. IEEE, Piscataway, NJ (2016)
15.
Conference Paper
Acar, Y.; Backes, M.; Bugiel, S.; Fahl, S.; McDaniel, P.; Smith, M.: SoK: Lessons Learned From Android Security Research For Appified Software Platforms. In: IEEE Symposium on Security and Privacy, pp. 433 - 451. 37th IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 23, 2016 - May 25, 2016. IEEE, Piscataway, NJ (2016)
16.
Conference Paper
Acar, Y.; Backes, M.; Fahl, S.; Kim, D.; Mazurek, M. L.; Stransky, C.: You Get Where You're Looking for: The Impact of Information Sources on Code Security. In: IEEE Symposium on Security and Privacy, pp. 289 - 305. 37th IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 23, 2016 - May 25, 2016. IEEE, Piscataway, NJ (2016)
17.
Conference Paper
Aditya, P.; Sen, R.; Druschel, P.; Oh, S. J.; Benenson, R.; Fritz, M.; Schiele, B.; Bhattachariee, B.; Wu, T. T.: I-Pic: A Platform for Privacy-Compliant Image Capture. In: MobiSys'16, pp. 235 - 248. 4th Annual International Conference on Mobile Systems, Applications, and Services, Singapore, June 25, 2016 - June 30, 2016. ACM, New York, NY (2016)
18.
Conference Paper
Babaei, M.; Grabowicz, P.; Valera, I.; Gummadi, K. P.; Gomez Rodriguez, M.: On the Efficiency of the Information Networks in Social Media. In: WSDM'16, pp. 82 - 93. 9th ACM International Conference on Web Search and Data Mining, San Francisco, CA, USA, February 22, 2016 - February 25, 2016. ACM, New York, NY (2016)
19.
Conference Paper
Backes, M.; Berrang, P.; Humbert, M.; Shen,, X.; Wolf, V.: Simulating the Large-Scale Erosion of Genomic Privacy Over Time. In: Proceedings of the 3rd International Workshop on Genome Privacy and Security. 3rd International Workshop on Genome Privacy and Security, Chicago, IL, USA, November 12, 2016. (2016)
20.
Conference Paper
Backes, M.; Berrang, P.; Humbert, M.; Manoharan, P.: Membership Privacy in MicroRNA-based Studies. In: CCS'16, pp. 319 - 330. 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, October 24, 2016 - October 28, 2016. ACM, New York, NY (2016)
Go to Editor View