Year |
Citation |
Score |
2017 |
Shi E, Chan T-H, Rieffel E, Song D. Distributed Private Data Analysis: Lower Bounds and Practical Constructions Acm Transactions On Algorithms. 13: 50. DOI: 10.1145/3146549 |
0.355 |
|
2013 |
Frank M, Biedert R, Ma E, Martinovic I, Song D. Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication Ieee Transactions On Information Forensics and Security. 8: 136-148. DOI: 10.1109/Tifs.2012.2225048 |
0.392 |
|
2013 |
Caballero J, Song D. Automatic protocol reverse-engineering: Message format extraction and field semantics inference Computer Networks. 57: 451-474. DOI: 10.1016/J.Comnet.2012.08.003 |
0.354 |
|
2012 |
Barth A, Rubinstein BIP, Sundararajan M, Mitchell JC, Song D, Bartlett PL. A Learning-based approach to reactive security Ieee Transactions On Dependable and Secure Computing. 9: 482-493. DOI: 10.1109/Tdsc.2011.42 |
0.385 |
|
2012 |
Song D, Shi E, Fischer I, Shankar U. Cloud data protection for the masses Computer. 45: 39-45. DOI: 10.1109/Mc.2012.1 |
0.348 |
|
2011 |
Chan T-H, Shi E, Song D. Private and Continual Release of Statistics Acm Transactions On Information and System Security. 14: 26. DOI: 10.1145/2043621.2043626 |
0.334 |
|
2011 |
Ateniese G, Burns R, Curtmola R, Herring J, Khan O, Kissner L, Peterson Z, Song D. Remote data checking using provable data possession Acm Transactions On Information and System Security. 14. DOI: 10.1145/1952982.1952994 |
0.46 |
|
2011 |
Zhu D(, Jung J, Song D, Kohno T, Wetherall D. TaintEraser Acm Sigops Operating Systems Review. 45: 142-154. DOI: 10.1145/1945023.1945039 |
0.327 |
|
2010 |
Bethencourt J, Shi E, Song D. Signatures of Reputation Lecture Notes in Computer Science. 6052: 400. DOI: 10.1007/978-3-642-14577-3_35 |
0.482 |
|
2009 |
Bethencourt J, Song D, Waters B. New Techniques for Private Stream Searching Acm Transactions On Information and System Security. 12: 16. DOI: 10.1145/1455526.1455529 |
0.486 |
|
2009 |
Gao D, Reiter MK, Song D. Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance Ieee Transactions On Dependable and Secure Computing. 6: 96-110. DOI: 10.1109/Tdsc.2008.39 |
0.352 |
|
2008 |
Brumley D, Newsome J, Song D, Wang H, Jha S. Theory and techniques for automated generation of vulnerability-based signatures Ieee Transactions On Dependable and Secure Computing. 5: 224-241. DOI: 10.1109/Tdsc.2008.55 |
0.386 |
|
2006 |
Yaar A, Perrig A, Song D. StackPi: New packet marking and filtering mechanisms for DDoS and IP spoofing defense Ieee Journal On Selected Areas in Communications. 24: 1853-1863. DOI: 10.1109/Jsac.2006.877138 |
0.44 |
|
2004 |
Chan H, Perrig A, Song D. Key distribution techniques for sensor networks Wireless Sensor Network. 277-303. DOI: 10.1007/978-1-4020-7884-2_13 |
0.301 |
|
Show low-probability matches. |