Zhao, L., Choi, J., Demirag, D., Butler, K., Mannan, M., Ayday, E., ... Clark, J.(2019).One-Time Programs made Practical. Financial Cryptography (FC),().
Lin, P., Song, R., Wu, Y., & Pi, J.(2019).Discovering Patterns for Fact Checking in Knowledge Graphs. ACM JOURNAL OF DATA AND INFORMATION QUALITY, 11(3).
Zhou, M., Wang, Y., Srivastava, A., Wu, Y., & Banerjee, P.(2019).Ensemble-Based Algorithm for Synchrophasor Data Anomaly Detection. IEEE TRANSACTIONS ON SMART GRID, 10(3), 2979-2988.
Maki, Y., Huang, Y., Hu, Z., Xiao, X., & Liu, X.(2019).Paladin: Automated Generation of Reproducible Test Cases for Android Apps. International Workshop on Mobile Computing Systems and Applications (HotMobile),(), 99--104.
Zhang, X., Xiao, X., He, K., Maki, Y., Huang, Y., Liu, X., ... Liu, C.(2019).PIFA: An Intelligent Phase Identification and Frequency Adjustment Framework for Time-Sensitive Mobile Computing. In Proceedings of the IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS),().
Li, D., Li, Q., Ye, F., & Xu, S.(2019).Enhancing Robustness of Deep Neural Networks Against Adversarial Malware Samples: Principles, Framework, and Application to AICS’2019 Challenge. The AAAI-19 Workshop on Artificial Intelligence for Cyber Security (AICS),().
Ren, Z., Liu, C., Xiao, X., Jiang, N., & Xie, T.(2019).Root Cause Localization for Unreproducible Builds via Causality Analysis over System Call Tracing. International Conference on Automated Software Engineering (ASE),().
Zhu, X., Ayday, E., & Vitenberg, R.(2019).A privacy-preserving framework for outsourcing location-based services to the cloud. IEEE Transactions on Dependable and Secure Computing,().
Chen, H., & Li, J.(2019).Modeling Relational Drug-Target-Disease Interactions via Tensor Factorization with Multiple Web Sources. World Wide Web Conference - WWW,(), 218-227.