- Improving Storage Systems Using Machine Learning.
- Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams.
- MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime.
- Synthesizing Pareto-Optimal Signal-Injection Attacks on ICDs.
- Navigating Murky Waters: Automated Browser Feature Testing for Uncovering Tracking Vectors.
- Runtime-Assured, Real-Time Neural Control of Microgrids.
- Multi-Agent Spatial Predictive Control with Application to Drone Flocking (Extended Version).
- Measuring the Accessibility of Domain Name Encryption and Its Impact on Internet Filtering.
- An REE-independent Approach to Identify Callers of TEEs in TrustZone-enabled Cortex-M Devices.
- Cloud Computing Security: Foundations and Research Directions.
- An Approach for Multi-Level Visibility Scoping of IoT Services in Enterprise Environments.
- Verba Volant, Scripta Volant: Understanding Post-publication Title Changes in News Outlets.
- The Black-Box Simplex Architecture for Runtime Assurance of Autonomous CPS.
- Programming with rules and everything else, seamlessly.
- PC-Expo: A Metrics-Based Interactive Axes Reordering Method for Parallel Coordinate Displays.