Scientific Publications

Journal Article (10)

1.
Journal Article
Davis​​, C. A.; Ciampaglia​​, G. L.; Aiello, L. M.; Chung, K.; Conover, M. D.; Ferrara, E.; Flammini, A.; Fox, G. C.; Gao, X.; Gonçalves, B. et al.; Grabowicz, P.; Hong, K.; Hui, P.-M.; McCaulay, S.; McKelvey, K.; Meiss, M. R.; Patil, S.; Kankanamalage, C. P.; Pentchev, V.; Qiu, J.; Ratkiewicz, J.; Rudnick, A.; Serrette, B.; Shiralkar, P.; Varol, O.; Weng, L.; Wu, T.-L.; Younge, A. J.; Menczer, F.: OSoMe: The IUNI Observatory on Social Media. PeerJ Computer Science 2, e87 (2016)
2.
Journal Article
Backes, M.; Bugiel, S.; Schranz, O.; von Styp-Rekowsky, a. P.: Boxify: Bringing Full-Fledged App Sandboxing to Stock Android. ;login 41 (2), pp. 16 - 21 (2016)
3.
Journal Article
Balegas, V.; Li, C.; Najafzadeh, M.; Porto, D.; Clement, A.; Duarte, S.; Ferreira, C.; Gehrke, J.; Leitão, J.; Preguiça, N. M. et al.; Rodrigues, R.; Shapiro, M.; Vafeiadis, V.: Geo-Replication: Fast If Possible, Consistent If Necessary. Bulletin of the Technical Committee on Data Engineering 39 (1), pp. 81 - 92 (2016)
4.
Journal Article
Esparza, J.; Ganty, P.; Majumdar, R.: Parameterized Verification of Asynchronous Shared-Memory Systems. Journal of the ACM 63 (1), 10 (2016)
5.
Journal Article
Gomez Rodriguez, M.; Song, L.; Daneshmand, H.; Schölkopf, B.: Estimating Diffusion Networks: Recovery Conditions, Sample Complexity and Soft-thresholding Algorithm. Journal of Machine Learning Research 17, 90, pp. 1 - 29 (2016)
6.
Journal Article
Gomez Rodriguez, M.; Song,, L.; Du, N.; Zha, H.; Schöllkopf, B.: Influence Estimation and Maximization in Continuous-Time Diffusion Networks. ACM Transactions on Information Systems 34 (2), 9, pp. 1 - 33 (2016)
7.
Journal Article
Moreno-Sanchez, P.; Zafar, M. B.; Kate, A.: Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network. Proceedings on Privacy Enhancing Technologies 2016 (4), pp. 436 - 453 (2016)
8.
Journal Article
Schmuck, A.-K.; Schneider, S.; Raisch, J.; Nestmann, U.: Supervisory Control Synthesis for Deterministic Context Free Specification Languages. Discrete Event Dynamic Systems 26 (1), pp. 5 - 32 (2016)
9.
Journal Article
Valera, I.; Ruiz, F. J. R.; Olmos, P. M.; Blanco, C.; Perez-Cruz, F.: Infinite Continuous Feature Model for Psychiatric Comorbidity Analysis. Neural Computation 28 (2), pp. 354 - 381 (2016)
10.
Journal Article
Valera, I.; Ruiz, F. J. R.; Perez-Cruz, F.: Infinite Factorial Unbounded-State Hidden Markov Model. IEEE Transactions on Pattern Analysis and Machine Intelligence 38 (9), pp. 1816 - 1828 (2016)

Book Chapter (1)

11.
Book Chapter
Backes, M.; Berrang, P.; Manoharan, P.: From Zoos to Safaris -- From Closed-World Enforcement to Open-World Assessment of Privacy. In: Foundations of Security Analysis and Design VIII, pp. 87 - 138 (Eds. Aldini, A.; Lopez, J.; Martinelli, F.). Springer, Berlin (2016)

Proceedings (1)

12.
Proceedings
Bodik, R.; Majumdar, R. (Eds.): POPL'16. 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, St. Petersburg, FL, USA, January 20, 2015 - January 22, 2015. ACM, New York, NY (2016), XVI, 817 pp.

Conference Paper (73)

13.
Conference Paper
Lahav, O.; Vafeiadis, V.: Explaining Relaxed Memory Models with Program Transformations. In: FM 2016: Formal Methods, pp. 479 - 495 (Eds. Fitzgerald, J.; Heitmeyer, C.; Gnesi, S.; Philippou, A.). 21st International Symposium on Formal Methods, Limassol, Cyprus, November 02, 2016 - November 11, 2016. Springer, Berlin (2016)
14.
Conference Paper
He, M.; Vafeiadis, V.; Qin, S.: Reasoning about Fences and Relaxed Atomics. In: PDP 2016, pp. 520 - 527. 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, Heraklion Crete, Greece, February 17, 2016 - February 19, 2016. IEEE, Piscataway, NJ (2016)
15.
Conference Paper
Acar, Y.; Backes, M.; Bugiel, S.; Fahl, S.; McDaniel, P.; Smith, M.: SoK: Lessons Learned From Android Security Research For Appified Software Platforms. In: IEEE Symposium on Security and Privacy, pp. 433 - 451. 37th IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 23, 2016 - May 25, 2016. IEEE, Piscataway, NJ (2016)
16.
Conference Paper
Acar, Y.; Backes, M.; Fahl, S.; Kim, D.; Mazurek, M. L.; Stransky, C.: You Get Where You're Looking for: The Impact of Information Sources on Code Security. In: IEEE Symposium on Security and Privacy, pp. 289 - 305. 37th IEEE Symposium on Security and Privacy, San Jose, CA, USA, May 23, 2016 - May 25, 2016. IEEE, Piscataway, NJ (2016)
17.
Conference Paper
Aditya, P.; Sen, R.; Druschel, P.; Oh, S. J.; Benenson, R.; Fritz, M.; Schiele, B.; Bhattachariee, B.; Wu, T. T.: I-Pic: A Platform for Privacy-Compliant Image Capture. In: MobiSys'16, pp. 235 - 248. 4th Annual International Conference on Mobile Systems, Applications, and Services, Singapore, June 25, 2016 - June 30, 2016. ACM, New York, NY (2016)
18.
Conference Paper
Babaei, M.; Grabowicz, P.; Valera, I.; Gummadi, K. P.; Gomez Rodriguez, M.: On the Efficiency of the Information Networks in Social Media. In: WSDM'16, pp. 82 - 93. 9th ACM International Conference on Web Search and Data Mining, San Francisco, CA, USA, February 22, 2016 - February 25, 2016. ACM, New York, NY (2016)
19.
Conference Paper
Backes, M.; Berrang, P.; Goga, O.; Gummadi, K. P.; Manoharan, P.: On Profile Linkability despite Anonymity in Social Media Systems. In: WPES'16, pp. 25 - 35. ACM Workshop on Privacy in the Electronic Society, Vienna, Austria, October 24, 2016. ACM, New York, NY (2016)
20.
Conference Paper
Backes, M.; Berrang, P.; Hecksteden, A.; Humbert, M.; Keller, A.; Meyer, T.: Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles. In: Proceedings of the 25th USENIX Security Symposium, pp. 1223 - 1240. 25th USENIX Security Symposium, Austin, TX, USA, August 10, 2016 - August 12, 2016. USENIX Association, Berkeley, CA (2016)
Go to Editor View