Kevin Leach
Title
Cited by
Cited by
Year
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
762015
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
732013
Assessing social anxiety using GPS trajectories and point-of-interest data
Y Huang, H Xiong, K Leach, Y Zhang, P Chow, K Fua, BA Teachman, ...
Proceedings of the 2016 ACM International Joint Conference on Pervasive and …, 2016
602016
An evaluation dataset for intent classification and out-of-scope prediction
S Larson, A Mahendran, JJ Peper, C Clarke, A Lee, P Hill, JK Kummerfeld, ...
arXiv preprint arXiv:1909.02027, 2019
502019
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
European Symposium on Research in Computer Security, 219-238, 2014
492014
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
402016
M-SEQ: Early detection of anxiety and depression via temporal orders of diagnoses in electronic health data
J Zhang, H Xiong, Y Huang, H Wu, K Leach, LE Barnes
2015 IEEE International Conference on Big Data (Big Data), 2569-2577, 2015
242015
Trustlogin: Securing password-login on commodity operating systems
F Zhang, K Leach, H Wang, A Stavrou
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
202015
An uncrewed aerial vehicle attack scenario and trustworthy repair architecture
K Highnam, K Angstadt, K Leach, W Weimer, A Paulos, P Hurley
2016 46th Annual IEEE/IFIP International Conference on Dependable Systems …, 2016
172016
Distilling neural representations of data structure manipulation using fMRI and fNIRS
Y Huang, X Liu, R Krueger, T Santander, X Hu, K Leach, W Weimer
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
162019
Dyspnea and tracheal mass in an elderly man
KR Leach, FJ Martinez, JW Morelock, MT Korobkin, MB Orringer
Chest 105 (5), 1555-1557, 1994
141994
Neurological divide: an fMRI study of prose and code writing
R Krueger, Y Huang, X Liu, T Santander, W Weimer, K Leach
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE …, 2020
132020
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
132016
Scotch: Combining Software Guard Extensions and system management mode to monitor cloud resource usage
K Leach, F Zhang, W Weimer
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
122017
Multiple chemodectomas. Carotid body tumor masked by salivary gland uptake on I-123 MIBG scintigraphy.
AF Weissman, CE Gonzalez, B Shapiro, B Shulkin, IR Francis, K Leach
Clinical nuclear medicine 19 (6), 527-531, 1994
91994
Towards transparent debugging
F Zhang, K Leach, A Stavrou, H Wang
IEEE Transactions on Dependable and Secure Computing 15 (2), 321-335, 2016
82016
Daehr A Discriminant Analysis Framework for Electronic Health Record Data and an Application to Early Detection of Mental Health Disorders
H Xiong, J Zhang, Y Huang, K Leach, LE Barnes
ACM Transactions on Intelligent Systems and Technology (TIST) 8 (3), 1-21, 2017
72017
Open source vulnerability notification
B Carlson, K Leach, D Marinov, M Nagappan, A Prakash
IFIP International Conference on Open Source Systems, 12-23, 2019
62019
Nighthawk: Transparent system introspection from ring-3
L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang
European Symposium on Research in Computer Security, 217-238, 2019
52019
A Human Study of Comprehension and Code Summarization
S Stapleton, Y Gambhir, A LeClair, Z Eberhart, W Weimer, K Leach, ...
Proceedings of the 28th International Conference on Program Comprehension, 2-13, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20