Spectre: A dependable introspection framework via system management mode F Zhang, K Leach, K Sun, A Stavrou 2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013 | 72 | 2013 |
Using hardware features for increased debugging transparency F Zhang, K Leach, A Stavrou, H Wang, K Sun 2015 IEEE Symposium on Security and Privacy, 55-69, 2015 | 71 | 2015 |
Assessing social anxiety using GPS trajectories and point-of-interest data Y Huang, H Xiong, K Leach, Y Zhang, P Chow, K Fua, BA Teachman, ... Proceedings of the 2016 ACM International Joint Conference on Pervasive and …, 2016 | 58 | 2016 |
A framework to secure peripherals at runtime F Zhang, H Wang, K Leach, A Stavrou European Symposium on Research in Computer Security, 219-238, 2014 | 46 | 2014 |
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis. C Spensky, H Hu, K Leach NDSS, 2016 | 38 | 2016 |
An evaluation dataset for intent classification and out-of-scope prediction S Larson, A Mahendran, JJ Peper, C Clarke, A Lee, P Hill, JK Kummerfeld, ... arXiv preprint arXiv:1909.02027, 2019 | 37 | 2019 |
M-SEQ: Early detection of anxiety and depression via temporal orders of diagnoses in electronic health data J Zhang, H Xiong, Y Huang, H Wu, K Leach, LE Barnes 2015 IEEE International Conference on Big Data (Big Data), 2569-2577, 2015 | 24 | 2015 |
Trustlogin: Securing password-login on commodity operating systems F Zhang, K Leach, H Wang, A Stavrou Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 20 | 2015 |
An uncrewed aerial vehicle attack scenario and trustworthy repair architecture K Highnam, K Angstadt, K Leach, W Weimer, A Paulos, P Hurley 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016 | 17 | 2016 |
Distilling neural representations of data structure manipulation using fMRI and fNIRS Y Huang, X Liu, R Krueger, T Santander, X Hu, K Leach, W Weimer 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 13 | 2019 |
Scotch: Combining Software Guard Extensions and system management mode to monitor cloud resource usage K Leach, F Zhang, W Weimer International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017 | 12 | 2017 |
Towards transparent introspection K Leach, C Spensky, W Weimer, F Zhang 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016 | 12 | 2016 |
Dyspnea and tracheal mass in an elderly man KR Leach, FJ Martinez, JW Morelock, MT Korobkin, MB Orringer Chest 105 (5), 1555-1557, 1994 | 12 | 1994 |
Neurological divide: an fMRI study of prose and code writing R Krueger, Y Huang, X Liu, T Santander, W Weimer, K Leach 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020 | 10 | 2020 |
Multiple chemodectomas. Carotid body tumor masked by salivary gland uptake on I-123 MIBG scintigraphy. AF Weissman, CE Gonzalez, B Shapiro, B Shulkin, IR Francis, K Leach Clinical nuclear medicine 19 (6), 527-531, 1994 | 9 | 1994 |
Daehr A Discriminant Analysis Framework for Electronic Health Record Data and an Application to Early Detection of Mental Health Disorders H Xiong, J Zhang, Y Huang, K Leach, LE Barnes ACM Transactions on Intelligent Systems and Technology (TIST) 8 (3), 1-21, 2017 | 7 | 2017 |
Towards transparent debugging F Zhang, K Leach, A Stavrou, H Wang IEEE Transactions on Dependable and Secure Computing 15 (2), 321-335, 2016 | 7 | 2016 |
Nighthawk: Transparent system introspection from ring-3 L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang European Symposium on Research in Computer Security, 217-238, 2019 | 4 | 2019 |
Evolutionary computation for improving malware analysis K Leach, R Dougherty, C Spensky, S Forrest, W Weimer 2019 IEEE/ACM International Workshop on Genetic Improvement (GI), 18-19, 2019 | 4 | 2019 |
KShot: Live kernel patching with SMM and SGX L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 3 | 2020 |