• Publications
  • Influence
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and then recovering up toExpand
  • 285
  • 24
Deep Metric Learning with Angular Loss
The modern image search system requires semantic understanding of image, and a key yet under-addressed problem is to learn a good metric for measuring the similarity between images. While deep metricExpand
  • 182
  • 21
Capriccio: scalable threads for internet services
This paper presents Capriccio, a scalable thread package for use with high-concurrency servers. While recent work has advocated event-based systems, we believe that thread-based systems can provide aExpand
  • 309
  • 20
LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks
The resource efficiency and dependability of a trust system are the most fundamental requirements for any wireless sensor network (WSN). However, existing trust systems developed for WSNs areExpand
  • 164
  • 18
Embedding Label Structures for Fine-Grained Feature Representation
Recent algorithms in convolutional neural networks (CNN) considerably advance the fine-grained image classification, which aims to differentiate subtle differences among subordinate classes. However,Expand
  • 127
  • 16
The Association of Sport Performance with ACE and ACTN3 Genetic Polymorphisms: A Systematic Review and Meta-Analysis
Background Genetic polymorphism is suggested to be associated with human physical performance. The angiotensin I-converting enzyme insertion/deletion (ACE I/D) polymorphism and the α-actinin-3 geneExpand
  • 161
  • 16
Time-Mapping Using Space-Time Saliency
We describe a new approach for generating regular-speed, low-frame-rate (LFR) video from a high-frame-rate (HFR) input while preserving the important moments in the original. We call thisExpand
  • 94
  • 16
SafeDrive: safe and recoverable extensions using language-based techniques
We present SafeDrive, a system for detecting and recovering from type safety violations in software extensions. SafeDrive has low overhead and requires minimal changes to existing source code. ToExpand
  • 171
  • 15
Autolocker: synchronization inference for atomic sections
The movement to multi-core processors increases the need for simpler, more robust parallel programming models. Atomic sections have been widely recognized for their ease of use. They are simpler andExpand
  • 168
  • 12
Cashmere: resilient anonymous routing
Anonymous routing protects user communication from identification by third-party observers. Existing anonymous routing layers utilize Chaum-Mixes for anonymity by relaying traffic through relay nodesExpand
  • 118
  • 12