Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
76 | Andy Crabtree |
Design in the absence of practice: breaching experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conference on Designing Interactive Systems ![In: Proceedings of the Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques, Cambridge, MA, USA, August 1-4, 2004, pp. 59-68, 2004, ACM, 1-58113-787-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
breaching, ethnography, experiments, multidisciplinary design |
61 | Shouhuai Xu, Weining Zhang |
Knowledge as a Service and Knowledge Breaching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2005 IEEE International Conference on Services Computing (SCC 2005), 11-15 July 2005, Orlando, FL, USA, pp. 87-94, 2005, IEEE Computer Society, 0-7695-2408-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Asia Slowinska, Herbert Bos |
Pointless tainting?: evaluating the practicality of pointer tainting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, pp. 61-74, 2009, ACM, 978-1-60558-482-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, pointer tainting |
33 | Scott Davidoff, Min Kyung Lee, Anind K. Dey, John Zimmerman |
Rapidly Exploring Application Design Through Speed Dating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiComp ![In: UbiComp 2007: Ubiquitous Computing, 9th International Conference, UbiComp 2007, Innsbruck, Austria, September 16-19, 2007, Proceedings, pp. 429-446, 2007, Springer, 978-3-540-74852-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
need validation, user enactments, Speed Dating Matrix, future breaching experiments, prototyping, reflection, sketching, Design methods |
25 | Tiernan J. Cahill, James J. Cummings |
Effects of congruity on the state of user presence in virtual environments: Results from a breaching experiment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Virtual Real. ![In: Frontiers Virtual Real. 4, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Hideaki Takahashi, Jingjing Liu, Yang Liu 0165 |
Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.11436, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Jaroslaw Byrka, Fabrizio Grandoni 0001, Afrouz Jabal Ameli |
Breaching the 2-Approximation Barrier for Connectivity Augmentation: A Reduction to Steiner Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Comput. ![In: SIAM J. Comput. 52(3), pp. 718-739, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Lingshuo Meng, Yijie Bai, Yanjiao Chen, Yutong Hu 0005, Wenyuan Xu 0001, Haiqin Weng |
Devil in Disguise: Breaching Graph Neural Networks Privacy through Infiltration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1153-1167, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Vincent Cohen-Addad, Fabrizio Grandoni 0001, Euiwoong Lee, Chris Schwiegelshohn |
Breaching the 2 LMP Approximation Barrier for Facility Location with Applications to k-Median. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the 2023 ACM-SIAM Symposium on Discrete Algorithms, SODA 2023, Florence, Italy, January 22-25, 2023, pp. 940-986, 2023, SIAM, 978-1-61197-755-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Dimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis, Ioannis Makris, Valeri M. Mladenov, Konstantinos E. Psannis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis |
Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the 18th International Conference on Availability, Reliability and Security, ARES 2023, Benevento, Italy, 29 August 2023- 1 September 2023, pp. 52:1-52:8, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Salma Banu Nazeer Khan, Debbie Richards 0001, Paul Formosa, Sarah Bankins |
To breach or not? Profiling students' likelihood of breaching university ICT Codes of Conduct: Student Profiling of Breach of ICT Codes of Conduct. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: Proceedings of the 2023 Australasian Computer Science Week, ACSW 2023, Melbourne, VIC, Australia, 30 January 2023- 3 February 2023, pp. 50-57, 2023, ACM, 979-8-4007-0005-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Hideaki Takahashi, Jingjing Liu, Yang Liu 0165 |
Breaching FedMD: Image Recovery via Paired-Logits Inversion Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CVPR ![In: IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023, Vancouver, BC, Canada, June 17-24, 2023, pp. 12198-12207, 2023, IEEE, 979-8-3503-0129-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Fabian Denner, Fabien Evrard, Berend G. M. van Wachem |
Breaching the capillary time-step constraint using a coupled VOF method with implicit surface tension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Phys. ![In: J. Comput. Phys. 459, pp. 111128, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Anandarup Mukherjee, Pallav Kumar Deb, Sudip Misra |
Tremors: Privacy-Breaching Inference of Computing Tasks Using Vibration-Based Condition Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 71(10), pp. 2620-2631, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Vincent Cohen-Addad, Fabrizio Grandoni 0001, Euiwoong Lee, Chris Schwiegelshohn |
Breaching the 2 LMP Approximation Barrier for Facility Location with Applications to k-Median. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.05150, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Seunggyun Lee, Seehwan Yoo |
Breaching GPU data on a cloud VM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: 13th International Conference on Information and Communication Technology Convergence, ICTC 2022, Jeju Island, Korea, Republic of, October 19-21, 2022, pp. 205-207, 2022, IEEE, 978-1-6654-9939-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Fabrizio Grandoni 0001, Afrouz Jabal Ameli, Vera Traub |
Breaching the 2-approximation barrier for the forest augmentation problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022, pp. 1598-1611, 2022, ACM, 978-1-4503-9264-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Kanika Goel 0002, Arthur H. M. ter Hofstede |
Privacy-Breaching Patterns in NoSQL Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 9, pp. 35229-35239, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | André H. Caron, Kate K. Mays |
Breaching perpetual contact: Withdrawing from mobile and social media use in everyday life. ![Search on Bibsonomy](Pics/bibsonomy.png) |
First Monday ![In: First Monday 26(8), 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Fabrizio Grandoni 0001, Afrouz Jabal Ameli, Vera Traub |
Breaching the 2-Approximation Barrier for the Forest Augmentation Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2112.11799, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
25 | Pedro Pedreira, Amit Dutta, Sergey Pershin, Lin Liu, Sushant Shringarpure, Jialiang Tan, Brian Landers, Ge Gao, Karen Pieper |
Interactive Analytic DBMSs: Breaching the Scalability Wall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: 37th IEEE International Conference on Data Engineering, ICDE 2021, Chania, Greece, April 19-22, 2021, pp. 432-443, 2021, IEEE, 978-1-7281-9184-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Illia Horenko |
On a Scalable Entropic Breaching of the Overfitting Barrier for Small Data Problems in Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. ![In: Neural Comput. 32(8), pp. 1563-1579, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Illia Horenko |
On a scalable entropic breaching of the overfitting barrier in machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.03176, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
25 | Zhi Zhang 0001, Yueqiang Cheng, Yinqian Zhang, Surya Nepal |
GhostKnight: Breaching Data Integrity via Speculative Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2002.00524, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
25 | Richard Harper 0001, Siân E. Lindley, Richard Banks, Philip Gosset, Gavin Smyth |
HCI in the Wild Mêlée of Office Life - Explorations in Breaching the PC Data Store. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Into the Wild: Beyond the Design Research Lab ![In: Into the Wild: Beyond the Design Research Lab, pp. 73-92, 2020, Springer, 978-3-030-18018-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Jaroslaw Byrka, Fabrizio Grandoni 0001, Afrouz Jabal Ameli |
Breaching the 2-approximation barrier for connectivity augmentation: a reduction to Steiner tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2020, Chicago, IL, USA, June 22-26, 2020, pp. 815-825, 2020, ACM, 978-1-4503-6979-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Tommy Nilsson, Andy Crabtree, Joel E. Fischer, Boriana Koleva |
Breaching the future: understanding human challenges of autonomous systems for the home. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 23(2), pp. 287-307, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Vladimir Kaplun, Michael Segal 0001 |
Breaching the privacy of connected vehicles network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1901.01070, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
25 | Jaroslaw Byrka, Fabrizio Grandoni 0001, Afrouz Jabal Ameli |
Breaching the 2-Approximation Barrier for Connectivity Augmentation: a Reduction to Steiner Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1911.02259, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
25 | Tommy Nilsson, Andy Crabtree, Joel E. Fischer, Boriana Koleva |
Breaching the Future: Understanding Human Challenges of Autonomous Systems for the Home. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.01831, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
25 | Vladimir Kaplun, Michael Segal 0001 |
Breaching the privacy of connected vehicles network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 70(4), pp. 541-555, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Pengfei Qiu, Dongsheng Wang 0002, Yongqiang Lyu 0001, Gang Qu 0001 |
VoltJockey: Breaching TrustZone by Software-Controlled Voltage Manipulation over Multi-core Frequencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019., pp. 195-209, 2019, ACM, 978-1-4503-6747-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Puneet Kumar Kaushal, Rajeev Sobti |
Breaching Security of Full Round Tiny Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Secur. Priv. ![In: Int. J. Inf. Secur. Priv. 12(1), pp. 89-98, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Annakaisa Kultima, Timo Nummenmaa, Heikki Tyni, Kati Alha, Jaakko Stenros, Ville Kankainen, Jussi Holopainen, Frans Mäyrä |
Playful Furniture: Breaching a Serious Setting With Interactive Seats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Games Cult. ![In: Games Cult. 13(3), pp. 301-321, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Jérémy Rohmer 0001, Déborah Idier, François Paris, Rodrigo Pedreros, Jessie Louisor |
Casting light on forcing and breaching scenarios that lead to marine inundation: Combining numerical simulations with a random-forest classification approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Environ. Model. Softw. ![In: Environ. Model. Softw. 104, pp. 64-80, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Tomer Ashur, Orr Dunkelman, Nimrod Talmon |
Breaching the Privacy of Israel's Paper Ballot Voting System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1608.08020, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
25 | Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac |
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1606.00887, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
25 | YoonSeok Shim, Seehwan Yoo |
Poster: Breaching Pattern Screen Lock Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys (Companion Volume) ![In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services Companion, Singapore, Singapore, June 25-30, 2016, pp. 78, 2016, ACM, 978-1-4503-4416-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Tomer Ashur, Orr Dunkelman, Nimrod Talmon |
Breaching the Privacy of Israel's Paper Ballot Voting System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-VOTE-ID ![In: Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings, pp. 108-124, 2016, Springer, 978-3-319-52239-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Hong Ren, Barbara Gray, David A. Harrison |
Triggering Faultline Effects in Teams: The Importance of Bridging Friendship Ties and Breaching Animosity Ties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Organ. Sci. ![In: Organ. Sci. 26(2), pp. 390-404, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Marcus A. Butavicius, Kathryn Parsons, Malcolm R. Pattinson, Agata McCormac |
Breaching the Human Firewall: Social engineering in Phishing and Spear-Phishing Emails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS ![In: Australasian Conference on Information Systems, ACIS 2015, Adelaide, SA, Australia, 30 November - 4 December 2015., pp. 98, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
25 | Gorkem Turgut Ozer, Edward G. Anderson Jr. |
Innovation and breaching strategies in multi-sided platform markets: Insights from a simulation study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the International Conference on Information Systems - Exploring the Information Frontier, ICIS 2015, Fort Worth, Texas, USA, December 13-16, 2015, 2015, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
25 | Saad Saleh, Mamoon Raja, Muhammad Shahnawaz, Muhammad Usman Ilyas, Khawar Khurshid, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha, Shirish S. Karande |
Breaching IM session privacy using causality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2014, Austin, TX, USA, December 8-12, 2014, pp. 686-691, 2014, IEEE, 978-1-4799-3512-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Sebastiano Peluso, Roberto Palmieri, Paolo Romano 0002, Binoy Ravindran, Francesco Quaglia |
Breaching the Wall of Impossibility Results on Disjoint-Access Parallel TM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing - 28th International Symposium, DISC 2014, Austin, TX, USA, October 12-15, 2014. Proceedings, pp. 548-549, 2014, Springer, 978-3-662-45173-1. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
25 | K. Asli Basoglu, John D'Arcy |
'Breaching' Auditor Judgments of Information Security Effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the International Conference on Information Systems - Building a Better World through Information Systems, ICIS 2014, Auckland, New Zealand, December 14-17, 2014, 2014, Association for Information Systems, 978-0-615-15788-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
25 | Dragana Martinovic, Victor Ralevich, Joshua McDougall, Michael Perklin |
"You are what you play": Breaching privacy and identifying users in online gaming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014, pp. 31-39, 2014, IEEE Computer Society, 978-1-4799-3502-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Trine Heinemann, Robb Mitchell |
Breaching barriers to collaboration in public spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TEI ![In: Eighth International Conference on Tangible, Embedded, and Embodied Interaction, TEI'14, Munich, Germany, February 16-19, 2014, pp. 213-220, 2014, ACM, 978-1-4503-2635-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Yaniv Erlich, Arvind Narayanan |
Routes for breaching and protecting genetic privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1310.3197, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Chris Giannella, Kun Liu 0001, Hillol Kargupta |
Breaching Euclidean distance-preserving data perturbation using few known inputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Knowl. Eng. ![In: Data Knowl. Eng. 83, pp. 93-110, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Martin Wischenbart, Stefan Mitsch, Elisabeth Kapsammer, Angelika Kusel, Stephan Lechner, Birgit Pröll, Werner Retschitzegger, Johannes Schönböck, Wieland Schwinger, Manuel Wimmer |
Automatic Data Transformation - Breaching the Walled Gardens of Social Network Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCCM ![In: Ninth Asia-Pacific Conference on Conceptual Modelling, APCCM 2013, Adelaide, Australia, January 29-Feburary 1, 2013., pp. 89-98, 2013, Australian Computer Society, 978-1-921770-28-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Mu Zhang 0001, Heng Yin 0001 |
TransBlocker: Transforming and Taming Privacy-Breaching Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 20th Annual Network and Distributed System Security Symposium, NDSS 2013, San Diego, California, USA, February 24-27, 2013, 2013, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Muhammad Usman Ilyas, Muhammad Zubair Shafiq, Alex X. Liu, Hayder Radha |
Who are you talking to? Breaching privacy in encrypted IM networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 2013 21st IEEE International Conference on Network Protocols, ICNP 2013, Göttingen, Germany, October 7-10, 2013, pp. 1-10, 2013, IEEE Computer Society, 978-1-4799-1270-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Christian Roth 0001, Ivar E. Vermeulen |
Breaching Interactive Storytelling's Implicit Agreement: A Content Analysis of Façade User Behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIDS ![In: Interactive Storytelling - 6th International Conference, ICIDS 2013, Istanbul, Turkey, November 6-9, 2013, Proceedings, pp. 168-173, 2013, Springer, 978-3-319-02755-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Alfred Inselberg |
Parallel Coordinates - Breaching 3-D and Onward to BIG DATA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VISAPP (1) ![In: VISAPP 2013 - Proceedings of the International Conference on Computer Vision Theory and Applications, Volume 1, Barcelona, Spain, 21-24 February, 2013., 2013, SciTePress, 978-989-8565-47-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Catherine Heeney |
Breaching the Contract? Privacy and the UK Census. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Soc. ![In: Inf. Soc. 28(5), pp. 316-328, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Michal Sramka |
Breaching Privacy Using Data Mining: Removing Noise from Perturbed Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computational Intelligence for Privacy and Security ![In: Computational Intelligence for Privacy and Security, pp. 135-157, 2012, Springer, 978-3-642-25236-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Cristiano Giuffrida, Stefano Ortolani, Bruno Crispo |
Memoirs of a browser: a cross-browser detection model for privacy-breaching extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: 7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS '12, Seoul, Korea, May 2-4, 2012, pp. 10-11, 2012, ACM, 978-1-4503-1648-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Erika Shehan Poole |
Interacting with infrastructure: a case for breaching experiments in home computing research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: CSCW '12 Computer Supported Cooperative Work, Seattle, WA, USA, February 11-15, 2012, pp. 759-768, 2012, ACM, 978-1-4503-1086-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Rui Ferreira 0001, Rui L. Aguiar |
Breaching location privacy in XMPP based messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, USA, December 3-7, 2012, pp. 917-922, 2012, IEEE, 978-1-4673-0920-2. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Robb Mitchell |
Social contraptions as breaching environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TEI ![In: Proceedings of the 6th International Conference on Tangible and Embedded Interaction 2012, Kingston, Ontario, Canada, February 19-22, 2012, pp. 393-394, 2012, ACM, 978-1-4503-1174-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Julio R. Tuma |
Nanoethics and the Breaching of Boundaries: A Heuristic for Going from Encouragement to a Fuller Integration of Ethical, Legal and Social Issues and Science - Commentary on: "Adding to the Mix: Integrating ELSI into a National Nanoscale Science and Technology Center". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Eng. Ethics ![In: Sci. Eng. Ethics 17(4), pp. 761-767, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Peter F. Ainsworth, Mike Meredith |
Breaching the Strongroom - A Pervasive Informatics Approach to Working with Medieval Manuscripts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KMIS ![In: KMIS 2011 - Proceedings of the International Conference on Knowledge Management and Information Sharing, Paris, France, 26-29 October, 2011, pp. 264-271, 2011, SciTePress, 978-989-8425-81-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
25 | Robert W. Gregory 0001, Roman Beck, Michael Prifling |
Breaching the Knowledge Transfer Blockade in IT Offshore Outsourcing Projects - A Case from the Financial Services Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), Proceedings (CD-ROM and online), 5-8 January 2009, Waikoloa, Big Island, HI, USA, pp. 1-10, 2009, IEEE Computer Society, 978-0-7695-3450-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Srivatsava Ranjit Ganta, Raj Acharya |
On Breaching Enterprise Data Privacy Through Adversarial Information Fusion ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0801.1715, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
25 | Srivatsava Ranjit Ganta, Raj Acharya |
On breaching enterprise data privacy through adversarial information fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 24th International Conference on Data Engineering Workshops, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 246-249, 2008, IEEE Computer Society, 978-1-4244-2161-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Jeffery Collmann, Ted Cooper |
Case report: Breaching the Security of the Kaiser Permanente Internet Patient Portal: the Organizational Foundations of Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Medical Informatics Assoc. ![In: J. Am. Medical Informatics Assoc. 14(2), pp. 239-243, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Umar Kalim, Hassan Jameel, Ali Sajjad, Sungyoung Lee |
Mobile-to-Grid Middleware: An Approach for Breaching the Divide Between Mobile and Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (1) ![In: Networking - ICN 2005, 4th International Conference on Networking, ReunionIsland, France, April 17-21, 2005, Proceedings, Part I, pp. 1-8, 2005, Springer, 3-540-25339-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Lingli Deng, Yeping He, Ziyao Xu |
Separation of Duty in Trust-Based Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 370-388, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Collaboration, Statically Mutual Exclusive Roles, Role-Based Access Control, Separation of Duty |
18 | Peter Tolmie, Andy Crabtree |
Deploying research technology in the home. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCW ![In: Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW 2008, San Diego, CA, USA, November 8-12, 2008, pp. 639-648, 2008, ACM, 978-1-60558-007-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
challenges to deployment, home technology, ethnomethodology |
18 | Mafruz Zaman Ashrafi, See-Kiong Ng |
Enabling Privacy-Preserving e-Payment Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 13th International Conference, DASFAA 2008, New Delhi, India, March 19-21, 2008. Proceedings, pp. 596-603, 2008, Springer, 978-3-540-78567-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Justin Zhan, Gary Blosser, Christopher C. Yang, Lisa Singh |
Privacy-Preserving Collaborative Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 114-125, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Privacy, Social Networks |
18 | Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda |
Panorama: capturing system-wide information flow for malware detection and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 116-127, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, spyware, malware detection, malware analysis |
18 | Justin Z. Zhan |
Using Homomorphic Encryption For Privacy-Preserving Collaborative Decision Tree Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIDM ![In: Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, CIDM 2007, part of the IEEE Symposium Series on Computational Intelligence 2007, Honolulu, Hawaii, USA, 1-5 April 2007, pp. 637-645, 2007, IEEE, 1-4244-0705-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Ravi Kumar 0001, Jasmine Novak, Bo Pang 0001, Andrew Tomkins |
On anonymizing query logs via token-based hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 629-638, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hash-based anonymization, privacy, query logs |
18 | Spyros Kopsidas, Dimitris Zisiadis, Leandros Tassiulas |
Implementing a VIPSec based application for handhelds: design and optimization issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiMedia ![In: Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007, pp. 55, 2007, ICST, 978-963-06-2670-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
VoIP applications, privacy, mobile devices, personal communications |
18 | Justin Zhan |
Collaboratively mining sequential patterns over private data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 3323-3326, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Justin Zhan |
Privacy preserving K-Medoids clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 3600-3603, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Chunhua Su, Feng Bao 0001, Jianying Zhou 0001, Tsuyoshi Takagi, Kouichi Sakurai |
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 385-391, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
secure approximation, clustering, privacy-preserving |
18 | P. Krishna Prasad, C. Pandu Rangan |
Privacy Preserving BIRCH Algorithm for Clustering over Arbitrarily Partitioned Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADMA ![In: Advanced Data Mining and Applications, Third International Conference, ADMA 2007, Harbin, China, August 6-8, 2007, Proceedings, pp. 146-157, 2007, Springer, 978-3-540-73870-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Kun Liu 0001, Hillol Kargupta, Jessica Ryan |
Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(1), pp. 92-106, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multiplicative data perturbation, privacy preserving data mining, Random projection |
18 | Umar Malik, Imad M. Jaimoukha, G. D. Halikias, S. K. Gungah |
On the gap between the quadratic integer programming problem and its semidefinite relaxation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Math. Program. ![In: Math. Program. 107(3), pp. 505-515, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Quadratic integer programming, Semidefinite relaxation, Zonotopes, Linear matrix inequalities, Hyperplane arrangements |
18 | Justin Zhijun Zhan, Stan Matwin |
A Crypto-Based Approach to Privacy-Preserving Collaborative Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM Workshops ![In: Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 18-22 December 2006, Hong Kong, China, pp. 546-550, 2006, IEEE Computer Society, 0-7695-2702-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Ranieri Baraglia, Claudio Lucchese, Salvatore Orlando 0001, Massimo Serranó, Fabrizio Silvestri |
A privacy preserving web recommender system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pp. 559-563, 2006, ACM, 1-59593-108-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy preserving user modeling, web recommender systems |
18 | Justin Z. Zhan |
Using Cryptography for Privacy Protection in Data Mining Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WImBI ![In: Web Intelligence Meets Brain Informatics, First WICI International Workshop, WImBI 2006, Beijing, China, December 15-16, 2006, Revised Selected and Invited Papers, pp. 494-513, 2006, Springer, 978-3-540-77027-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Simon Denman, Clinton Fookes, Jamie Cook, Chris Davoren, Anthony Mamic, Graeme Farquharson, Daniel Chen 0002, Brenden Chen, Sridha Sridharan |
Multi-view Intelligent Vehicle Surveillance System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Advanced Video and Signal Based Surveillance, 2006 IEEE International Conference on Video and Signal Based Surveillance (AVSS'06), 22-24 November 2006, Sydney, Australia., pp. 26, 2006, IEEE Computer Society, 0-7695-2688-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad |
Breaking and Fixing Public-Key Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers, pp. 167-181, 2006, Springer, 978-3-540-77504-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Wendy L. Cukier, Susan Cody, Eva J. Nesselroth |
Genres of Spam: Expectations and Deceptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Da-Wei Wang 0004, Churn-Jung Liau, Tsan-sheng Hsu |
A GrC-Based Approach to Social Network Data Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSCTC ![In: Rough Sets and Current Trends in Computing, 5th International Conference, RSCTC 2006, Kobe, Japan, November 6-8, 2006, Proceedings, pp. 438-447, 2006, Springer, 3-540-47693-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Ioan Alfred Letia, Adrian Groza |
Automating the Dispute Resolution in a Task Dependency Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: Proceedings of the 2005 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Compiegne, France, September 19-22, 2005, pp. 365-371, 2005, IEEE Computer Society, 0-7695-2416-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Mafruz Zaman Ashrafi, David Taniar, Kate A. Smith |
Reducing Communication Cost in a Privacy Preserving Distributed Association Rule Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advances Applications, 9th International Conference, DASFAA 2004, Jeju Island, Korea, March 17-19, 2004, Proceedings, pp. 381-392, 2004, Springer, 3-540-21047-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Christopher R. Baker, Zachary Omohundro, Scott Thayer, William Whittaker, Michael Montemerlo, Sebastian Thrun |
A Case Study in Robotic Mapping of Abandoned Mines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSR ![In: Field and Service Robotics, Recent Advances in Reserch and Applications, FSR 2003, Lake Yamanaka, Japan, 14-16 July 2003, pp. 487-495, 2003, Springer, 978-3-540-32801-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | James Noble 0001, David G. Clarke, John Potter |
Object Ownership for Dynamic Alias Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (32) ![In: TOOLS Pacific 1999: 32nd International Conference on Technology of Object-Oriented Languages and Systems, 22-25 November 1999, Melbourne, Australia, pp. 176-187, 1999, IEEE Computer Society, 0-7695-0462-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
object-orientation, aliasing, encapsulation, ownership |
18 | Walter Hussak, John A. Keane |
Concurrency Control of Tiered Flat Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 13th British National Conference on Databases, BNCOD 13, Manchester, United Kingdom, July 12-14, 1995, Proceedings, pp. 172-182, 1995, Springer, 3-540-60100-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
18 | Edwin L. Harder |
The expanding world of computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 11(4), pp. 231-239, 1968. The full citation details ...](Pics/full.jpeg) |
1968 |
DBLP DOI BibTeX RDF |
introduction, problem-oriented languages, education, computer-aided design, survey, computer science, developments, forecast, data communication, barriers, philosophy |