JavaScript Menu Courtesy of
Stevens Computer Science Engineering & Science Stevens Computer Science
Stevens Institute of Technology Stevens Computer Science Homepage Stevens Computer Science Homepage
Stevens CS
Mission Statement
News & Events
Success Stories

gray gray Share/Save/Bookmark
Stevens CS
Recent Publications

"Information flow monitoring as abstract interpretation for relational logic." Computer Security Foundations Symposium Andrey Chudnov, George Kuan, David Naumann. IEEE Press (2014)

"Local Reasoning for Global Invariants, Part I: Region Logic." Anindya Banerjee, David A. Naumann, Stan Rosenberg. ACM Press Journal of the ACM 3, 60, 18:1-18:56 (2013)

"Local Reasoning for Global Invariants, Part II: Dynamic Boundaries." Anindya Banerjee, David A. Naumann. ACM Press Journal of the ACM 3, 60, 19:1-19:73 (2013)

"State Based Encapsulation for Modular Reasoning about Behavior-Preserving Refactorings." Anindya Banerjee, David A. Naumann. Springer-Verlag LNCS 7850, 319--365 (2013)

"Leveraging Crowsourced Data for Creating Temporal Segmentation Ground Truths of Subjective Tasks." Computer Vision and Pattern Recognition Workshop on Ground Truth M. Burlick, O. Koteoglou, L. Karydas, and G. Kamberov. (2013)

"On the Improvement of Multimodal Voice Activity Detection." Interspeech Matt Burlick, Dimitrios Dimitriadis, Eric Zavesky. (2013)

"Analysis of authentication and key establishment in inter-generational mobile telephony." International Symposium on Trust, Security, and Privacy for Emerging Applications Chunyu Tang, David Naumann, Susanne Wetzel. (2013)

"Nonconvulsive seizures after subarachnoid hemorrhage: Multimodal detection and outcomes." J. Claassen, A. Perotte, D. Albers, S. Kleinberg, J. M. Schmidt, B. Tu, N. Badjatia, H. Lantigua, L. J. Hirsch, S. A. Mayer, E. S. Connolly, and G. Hripcsak. Annals of Neurology 74, (2013)

"Causal Inference with Rare Events in Large-Scale Time-Series Data." Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI) S. Kleinberg. (2013)

"Lessons Learned in Replicating Data-Driven Experiments in Multiple Medical Systems and Patient Populations." AMIA Annual Symposium Proceedings S. Kleinberg and N. Elhadad. (2013)

"Decision Procedures for Region Logic." 13th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI) Stan Rosenberg, Anindya Banerjee, David A Naumann. Springer 7148, 379-395 (2012)

"Refactoring and Representation Independence for Class Hierarchies." David Naumann, Augusto Sampaio, and Leila Silva. Theoretical Computer Science 433, 60-97 (2012)

"." S. Kleinberg. Cambridge University Press (2012)

"SCAR: Dynamic adaptation for person detection and persistence analysis in unconstrained videos." International Symposium on Visual Computing G. Kamberov, M. Burlick, L. Karydas and O. Koteoglou. (2012)

"Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols." In Proceedings, IEEE Computer Security Foundations Symposium François Dupressoir, Andrew D. Gordon, Jan Jurjens, and David A.Naumann. (2011)

"Generalized Learning Problems and Applications to Non-commutative Cryptography ." 5th International Conference on Provable Security (ProvSec 2011), Xi'an, China G. Baumslag, N. Fazio, A. Nicolosi, V. Shpilrain, W.E. Skeith III. LNCS 6980, 324--339 (2011)

"Verifying and Enforcing Network Paths with ICING." 7th ACM International Conference on emerging Networking EXperiments and Technologies (CoNEXT 2011), Tokyo, Japan J.Naous, M.Miller, A.Seehra, M.Walfish, A.Nicolosi, D.Mazieres. (2011)

"Towards Large Scale Land-cover Recognition of Satellite Images." Invited submission to The 8th International Conference on Information, Communications and Signal Processing (ICICS'2011), Singapore Noel C. F. Codella, Gang Hua, Apostol Natsev, and John R. Smith. (2011)

"What Characterizes a Shadow Boundary under the Sun and Sky?." Proc. IEEE International Conf. on Computer Vision (ICCV'2011), Barcelona, Spain Xiang Huang, Gang Hua, Lance Williams, and Jack Tumblin. (2011)

"Automatic Salient Object Extraction with Contextual Cue." Proc. IEEE International Conf. on Computer Vision (ICCV'2011), Barcelona, Spain Le Wang, Jianru Xue, Nanning Zheng, Gang Hua. (2011)

"Spatial-DiscLDA for Visual Recognition." Proc. IEEE Conf. on Computer Vision and Pattern Recognition (CVPR'2011), Colorado Springs, Colorado Zhenxing Niu, Gang Hua, Xinbo Gao, and Qi Tian. (2011)

"Motion Divergence Fields for Dynamic Hand Gesture Recognition." Proc. IEEE 9th IEEE Conf. on Automatic Face and Gesture Recognition (FG'2011), Santa Barbara, CA Xiaohui Shen, Gang Hua, Lance Williams, and Ying Wu. (2011)

"Dynamic Hand Gesture Recognition: An Exemplar based Approach from Motion Divergence Fields." Xiaohui Shen, Gang Hua, Lance Williams, and Ying Wu. Image and Vision Computing (2011)

"Discriminative Learning of Local Image Descriptors." Matthew Brown, Gang Hua, and Simon Winder. IEEE Trans. on Pattern Analysis and Machine Intelligence 1, 33, pp.43-57 (2011)

"Generating Descriptive Visual Words and Visual Phrases for Large-Scale Image Applications." Shiliang Zhang, Qi Tian, Gang Hua, Qingming Huang, and Wen Gao. IEEE Trans. on Image Processing 9, 20, pp.2664-2677 (2011)

"Semantic Model Vectors for Complex Video Event Recognition." Michele Merler, Bert Huang, Lexing Xie, Gang Hua, and Apostol Natsev. IEEE Trans. on Multimedia (2011)

"Improving the Parallel Schnorr-Euchner LLL Algorithm." Proceedings of 11th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP) Backes, W., Wetzel, S. (2011)

"Analyzing Massively Collaborative Mathematics Projects." Savarte, D., Wetzel, S., Patterson, W. Springer The Mathematical Intelligencer 1, 33, 9-18 (2011)

"Parallel Lattice Basis Reduction - The Road to Many-Core." Proceedings of the 13th IEEE International Conference on High Performance Computing and Communications (HPCC) Backes, W., Wetzel, S. (2011)

"Symbolic Analysis for Security of Roaming Protocols in Mobile Networks." Proceedings of 7th International Conference on Security and Privacy in Communication Networks (Securecomm) Tang, C., Naumann, D., Wetzel, S. (2011)

"Enabling Fair and Privacy-preserving Applications Using Reconciliation Protocols on Ordered Sets." Proceedings of the 34th IEEE Sarnoff Symposium Mayer, D., Neugebauer, G., Meyer, U., Wetzel, S. (2011)

"Implementation and Performance Evaluation of Privacy-preserving Fair Reconciliation Protocols on Ordered Sets." Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (CODASPY) Mayer, D., Teubert, D., Wetzel, S., Meyer, U. 109-120 (2011)

"Identifying and Evaluating the Threat of Transitive Information Leakage in Healthcare Systems." Proceedings of the 44th Hawaii International Conference on System Sciences (HICSS 44) Lechler, T., Wetzel, S., Jankowski, R. (2011)

"A review of causal inference for biomedical informatics." S. Kleinberg and G. Hripcsak. Journal of Biomedical Informatics 6, 44, 1102-1112 (2011)

"A Logic for Causal Inference in Time Series with Discrete and Continuous Variables." International Joint Conference on Artificial Intelligence (IJCAI) S. Kleinberg. (2011)

"Track Analysis, Data Cleansing, and Labeling." International Symposium on Visual Computing George Kamberov, Gerda Kamberova, Matt Burlick, Lazaros Karydas, Bart Luczynski. (2011)

"Information Flow Monitor Inlining." Computer Security Foundations Symposium Andrey Chudnov and David A Naumann. IEEE Press (2010)

"Towards Publishing Recommendation Data With Predictive Anonymization." ACM Symposium on Information, Computer and Communications Security (AsiaCCS), 2010 Chih-Cheng Chang, Brian Thompson, Hui Wang, Danfeng Yao. (2010)

"Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions." European Symposium on Programming David A Naumann and Anindya Banerjee. Springer LNCS 6012, 2-22 (2010)

"Evaluation of Stereo Confidence Indoors and Outdoors", International Conference on Computer Vision and Pattern Recognition." X. Hu and P. Mordohai. (2010)

"Detecting and Parsing Architecture at City Scale from Range Data", International Conference on Computer Vision and Pattern Recognition." A. Toshev, P. Mordohai and B. Taskar. (2010)

"Efficient Mutual Authentication for Multi-Domain RFID Systems Using Distributed Signatures (Award for Most Innovative Technology-Related Paper)." 4th International IFIP WG 11.2 Workshop for Information Security Theory and Practices (WISTP) Braun, M., Meyer, U., Wetzel, S.. 122-137 (2010)

"Friends of An Enemy: Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts." 26th Annual Computer Security Applications Conference, Austin, TX. Baris Coskun, Sven Dietrich, Nasir Memon. (2010)

"Measurement-based Underwater Acoustic Physical Layer Simulation." MTS/IEEE Oceans 2010 (Seattle) Brian Borowski and Dan Duchamp. (2010)

"Computational Modeling for the Activation Cycle of G-proteins by G-protein-coupled Receptors." 4th Workshop on Membrane Computing and Biologically Inspired Process Calculi, Jena, Germany (MeCBIC 2010) Yifei Bao, Adriana Compagnoni, Joseph Glavy, and Tommy White. (2010)

"redicting Malaria Interactome Classifications from Time-Course Transcriptomic Data along the Intra-Erythrocytic Developmental Cycle." A. Mitrofanova, S. Kleinberg, J. Carlton, S. Kasif, and B. Mishra. Artificial Intelligence in Medicine 3, 49, 167-176 (2010)

"The Temporal Logic of Token Causes." International Conference on the Principles of Knowledge Repre- sentation and Reasoning (KR) S. Kleinberg and B. Mishra. (2010)

"A Policy Framework for the Future Internet ." The Eighth ACM Workshop on Hot Topics in Networks (HotNets-VIII) Arun Seehra, Jad Naous, Michael Walfish, David Mazières, Antonio Nicolosi, Scott Shenker . ACM (2009)

"Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research.." In (Poster at) Proceedings of the 16th ACM Conference on Computer and Communication Security (CCS-09), Chicago, Illinois, USA. David Dittrich, Michael D. Bailey, and Sven Dietrich. (2009)

"The Softwater Modem: A Software Modem for Underwater Acoustic communication." The Fourth ACM International Workshop on UnderWater Networks (WUWNet) Brian Borowski and Dan Duchamp. ACM (2009)

"Pict Correctness Revisited." Philippe Bidinger, and Adriana Compagnoni. Elsevier Theoretical Computer Science 2-3, 410, 114-127 (2009)

"The Self-Aware Matching Measure for Stereo", International Conference on Computer Vision." P. Mordohai. (2009)

"Parallel Lattice Basis Reduction using a Multi-Threaded Schnorr-Euchner LLL Algorithm." 15th International European Conference on Parallel and Distributed Computing (Euro-Par) Backes, W., Wetzel, S.. 960-973 (2009)

"An Attacker Model for MANET Routing Security." 2nd ACM Conference on Wireless Network Security (WiSec) Cordasco, J., Wetzel, S.. 87-94 (2009)

"Metamorphosis: the Coming Transformation of Translational Systems Biology." S. Kleinberg and B. Mishra. Queue 9, 7, 40-52 (2009)

"The Temporal Logic of Causal Structures." Conference on Uncertainty in Artificial Intelligence (UAI) S. Kleinberg and B. Mishra. (2009)

"Love and Authentication." ACM Computer/Human Interaction Conference (CHI) Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.. (2008)

"P2P as botnet command and control: a deeper insight." 3rd International Conference on Malicious and Unwanted Software (Malware'08) David Dittrich and Sven Dietrich. IEEE Computer Society (2008)

"Efficient Bounded-Distance Decoders for Barnes-Wall Lattices." IEEE International Symposium on Information Theory D. Micciancio and A. Nicolosi. IEEE CNF 2484–2488 (2008)

"Expressive Declassification Policies and Modular Static Enforcement." IEEE Symposium on Security and Privacy Anindya Banerjee and David Naumann and Stan Rosenberg. IEEE Press 339-353 (2008)

"Regional Logic for Local Reasoning about Global Invariants." European Conference on Object-Oriented Programming (ECOOP) Anindya Banerjee and David Naumann and Stan Rosenberg. 387-411 (2008)

"Boogie Meets Regions: a Verification Experience Report." Verified Software: Theories, Tools, Experiments (VSTTE) Anindya Banerje and Mike Barnett and David Naumann. 177-191 (2008)

" "Detailed Real-Time Urban 3D Reconstruction From Video", International Journal of Computer Vision." M. Pollefeys, D. Nistér, J.-M. Frahm, A. Akbarzadeh, P. Mordohai, B. Clipp, C. Engels, D. Gallup, S.-J. Kim, P. Merrell, C. Salmi, S. Sinha, B. Talton, L. Wang, Q. Yang, H. Stewénius, R. Yang, G. Welch, H. Towles, . 2-3, vol. 78, 143-167 (2008)

"Object Detection from Large-Scale 3D Datasets using Bottom-up and Top-down Descriptors", European Conference on Computer Vision." A. Patterson, P. Mordohai and K. Daniilidis. (2008)

"Crimeware-Resistant Authentication." Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.. Symantec Press (2008)

"Quantifying the Security of Preference-based Authentication." ACM CCS 2008 Workshop on Digital Identity Management (DIM) Jakobsson, M., Yang, L., Wetzel, S.. 61-69 (2008)

"Cryptographic versus Trust-based Methods for MANET Routing Security." Cordasco, J., Wetzel, S.. Elsevier Electronic Notes in Theoretical Computer Science 2, 197, 131-140 (2008)

"Theory and Applications of Subtyping: Introduction." Adriana Compagnoni and Healfdene Goguen (Guest Editors). Cambridge University Press Mathematical Structures in Computer Science 5, 18, 795-796 (2008)

"Role-based Access Control for Boxed Ambients." Adriana Compagnoni, Elsa L. Gunter, and Philippe Bidinger. Theoretical Computer Science 1-3, 398, 203-216 (2008)

"Fusion of acoustic measurements with video surveillance for estuarine threat detection." SPIE Barry Bunin, Alexander Sutin, George Kamberov, Heui-Seol Roh, Bart Luczynski, and Matt Burlick. (2008)

Stevens CS

gray gray Share/Save/Bookmark

 Institute Policies


 Visit Stevens

Stevens CS
Stevens CS Stevens CS Stevens CS
View my Iframe Content