Publications
2012. Ask WINE: Are We Safer Today? Evaluating Operating System Security Through Big Data Analysis LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats. :11-11.
2012. Automated synthesis of action selection policies for unmanned vehicles operating in adverse environments. Autonomous Robots. 32(2):149-164.
2012. BclAF1 restriction factor is neutralized by proteasomal degradation and microRNA repression during human cytomegalovirus infection. Proceedings of the National Academy of Sciences. 109(24):9575-9580.
2012. BEAGLE: An Application Programming Interface and High-Performance Computing Library for Statistical Phylogenetics. Systematic BiologySyst Biol. 61(1):170-173.
2012. Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World. CCS '12 Proceedings of the 2012 ACM conference on Computer and Communications Security. :833-844.
2012. Besting the Quiz Master: Crowdsourcing Incremental Classification Games. Empirical Methods in Natural Language Processing.
2012. #bias: Measuring the Tweeting Behavior of Propagandists. Sixth International AAAI Conference on Weblogs and Social Media.
2012. A Blur-robust Descriptor with Applications to Face Recognition. IEEE Transactions on Pattern Analysis and Machine Intelligence. PP(99):1-1.
2012. On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
2012. Class consistent k-means: Application to face and action recognition. Computer Vision and Image Understanding. 116(6):730-741.
2012. Co-designing an e-health tutorial for older adults. Proceedings of the 2012 iConference. :240-247.
2012. Collecting Semantic Similarity Ratings to Connect Concepts in Assistive Communication Tools. Modeling, Learning, and Processing of Text Technological Data StructuresModeling, Learning, and Processing of Text Technological Data Structures. 370:81-93.
2012. Conversion of viable but nonculturable enteric bacteria to culturable by co‐culture with eukaryotic cells. Microbiology and Immunology. 56(5):342-345.
2012. Deep Sequencing of the Oral Microbiome Reveals Signatures of Periodontal Disease. PloS one. 7(6)
2012. Density-Based Multifeature Background Subtraction with Support Vector Machine. Pattern Analysis and Machine Intelligence, IEEE Transactions on. 34(5):1017-1023.
2012. The design and evaluation of prototype eco-feedback displays for fixture-level water usage data. :2367-2376.
2012. Design and Synthesis for Multimedia Systems Using the Targeted Dataflow Interchange Format. IEEE Transactions on Multimedia. 14(3):630-640.
2012. Detection, Isolation, and Identification of Vibrio cholerae from the Environment. Current Protocols in Microbiology. 26(1)