Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Christopher Gates 0002
@inproceedings{DBLP:conf/chi/SharifRD0KBC19, author = {Mahmood Sharif and Kevin A. Roundy and Matteo Dell'Amico and Christopher Gates and Daniel Kats and Lujo Bauer and Nicolas Christin}, editor = {Stephen A. Brewster and Geraldine Fitzpatrick and Anna L. Cox and Vassilis Kostakos}, title = {A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats}, booktitle = {Proceedings of the 2019 {CHI} Conference on Human Factors in Computing Systems, {CHI} 2019, Glasgow, Scotland, UK, May 04-09, 2019}, pages = {78}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290605.3300308}, doi = {10.1145/3290605.3300308}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/chi/SharifRD0KBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/HanM0RS19, author = {Yufei Han and Yuzhe Ma and Christopher Gates and Kevin A. Roundy and Yun Shen}, title = {Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2019 Budapest, Hungary, July 14-19, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IJCNN.2019.8851811}, doi = {10.1109/IJCNN.2019.8851811}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/HanM0RS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soups/SimoiuB0G19, author = {Camelia Simoiu and Joseph Bonneau and Christopher Gates and Sharad Goel}, editor = {Heather Richter Lipford}, title = {"I was told to buy a software or lose my computer. {I} ignored it": {A} study of ransomware}, booktitle = {Fifteenth Symposium on Usable Privacy and Security, {SOUPS} 2019, Santa Clara, CA, USA, August 11-13, 2019}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/soups2019/presentation/simoiu}, timestamp = {Mon, 01 Feb 2021 08:41:56 +0100}, biburl = {https://dblp.org/rec/conf/soups/SimoiuB0G19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-02796, author = {Yufei Han and Yuzhe Ma and Christopher Gates and Kevin A. Roundy and Yun Shen}, title = {Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization}, journal = {CoRR}, volume = {abs/1905.02796}, year = {2019}, url = {http://arxiv.org/abs/1905.02796}, eprinttype = {arXiv}, eprint = {1905.02796}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-02796.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvcg/PientaHETRGNC18, author = {Robert S. Pienta and Fred Hohman and Alex Endert and Acar Tamersoy and Kevin A. Roundy and Christopher S. Gates and Shamkant B. Navathe and Duen Horng Chau}, title = {{VIGOR:} Interactive Visual Exploration of Graph Query Results}, journal = {{IEEE} Trans. Vis. Comput. Graph.}, volume = {24}, number = {1}, pages = {215--225}, year = {2018}, url = {https://doi.org/10.1109/TVCG.2017.2744898}, doi = {10.1109/TVCG.2017.2744898}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvcg/PientaHETRGNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KimKKGD18, author = {Doowon Kim and Bum Jun Kwon and Kristi{\'{a}}n Koz{\'{a}}k and Christopher Gates and Tudor Dumitras}, editor = {William Enck and Adrienne Porter Felt}, title = {The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing {PKI}}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {851--868}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/kim}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/KimKKGD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-02931, author = {Kristi{\'{a}}n Koz{\'{a}}k and Bum Jun Kwon and Doowon Kim and Christopher Gates and Tudor Dumitras}, title = {Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate}, journal = {CoRR}, volume = {abs/1803.02931}, year = {2018}, url = {http://arxiv.org/abs/1803.02931}, eprinttype = {arXiv}, eprint = {1803.02931}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-02931.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenHCGHR17, author = {Shang{-}Tse Chen and Yufei Han and Duen Horng Chau and Christopher S. Gates and Michael Hart and Kevin A. Roundy}, title = {Predicting Cyber Threats with Virtual Security Products}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {189--199}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134617}, doi = {10.1145/3134600.3134617}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChenHCGHR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/LiRGV17, author = {Bo Li and Kevin A. Roundy and Christopher S. Gates and Yevgeniy Vorobeychik}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {Large-Scale Identification of Malicious Singleton Files}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {227--238}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029815}, doi = {10.1145/3029806.3029815}, timestamp = {Wed, 16 Sep 2020 11:48:10 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/LiRGV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/SoskaGRC17, author = {Kyle Soska and Christopher S. Gates and Kevin A. Roundy and Nicolas Christin}, title = {Automatic Application Identification from Billions of Files}, booktitle = {Proceedings of the 23rd {ACM} {SIGKDD} International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13 - 17, 2017}, pages = {2021--2030}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3097983.3098196}, doi = {10.1145/3097983.3098196}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/SoskaGRC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CenGSL15, author = {Lei Cen and Christopher S. Gates and Luo Si and Ninghui Li}, title = {A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {4}, pages = {400--412}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2355839}, doi = {10.1109/TDSC.2014.2355839}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/CenGSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JorgensenCGLPY15, author = {Zach Jorgensen and Jing Chen and Christopher S. Gates and Ninghui Li and Robert W. Proctor and Ting Yu}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {Dimensions of Risk in Mobile Applications: {A} User Study}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {49--60}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699108}, doi = {10.1145/2699026.2699108}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/JorgensenCGLPY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ParkMCXGL15, author = {Youngja Park and Ian M. Molloy and Suresh N. Chari and Zenglin Xu and Christopher S. Gates and Ninghui Li}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9327}, pages = {396--414}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24177-7\_20}, doi = {10.1007/978-3-319-24177-7\_20}, timestamp = {Sat, 19 Oct 2019 20:00:24 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ParkMCXGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GatesLPSQPNM14, author = {Christopher S. Gates and Ninghui Li and Hao Peng and Bhaskar Pratim Sarma and Yuan Qi and Rahul Potharaju and Cristina Nita{-}Rotaru and Ian M. Molloy}, title = {Generating Summary Risk Scores for Mobile Applications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {238--251}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2014.2302293}, doi = {10.1109/TDSC.2014.2302293}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/GatesLPSQPNM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GatesCLP14, author = {Christopher S. Gates and Jing Chen and Ninghui Li and Robert W. Proctor}, title = {Effective Risk Communication for Android Apps}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {3}, pages = {252--265}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.58}, doi = {10.1109/TDSC.2013.58}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GatesCLP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GatesLXCMP14, author = {Christopher S. Gates and Ninghui Li and Zenglin Xu and Suresh N. Chari and Ian M. Molloy and Youngja Park}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Detecting Insider Information Theft Using Features from File Access Logs}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {383--400}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_22}, doi = {10.1007/978-3-319-11212-1\_22}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/GatesLXCMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ParkGG13, author = {Youngja Park and Christopher S. Gates and Stephen C. Gates}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Estimating Asset Sensitivity by Profiling Users}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {94--110}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_6}, doi = {10.1007/978-3-642-40203-6\_6}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ParkGG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GatesLCP12, author = {Christopher S. Gates and Ninghui Li and Jing Chen and Robert W. Proctor}, editor = {Robert H'obbes' Zakon}, title = {CodeShield: towards personalized application whitelisting}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {279--288}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420992}, doi = {10.1145/2420950.2420992}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GatesLCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PengGSLQPNM12, author = {Hao Peng and Christopher S. Gates and Bhaskar Pratim Sarma and Ninghui Li and Yuan Qi and Rahul Potharaju and Cristina Nita{-}Rotaru and Ian M. Molloy}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Using probabilistic generative models for ranking risks of Android apps}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {241--252}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382224}, doi = {10.1145/2382196.2382224}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PengGSLQPNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SarmaLGPNM12, author = {Bhaskar Pratim Sarma and Ninghui Li and Christopher S. Gates and Rahul Potharaju and Cristina Nita{-}Rotaru and Ian M. Molloy}, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {Android permissions: a perspective combining risks and benefits}, booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, pages = {13--22}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136.2295141}, doi = {10.1145/2295136.2295141}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/SarmaLGPNM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ChenLGM10, author = {Hong Chen and Ninghui Li and Christopher S. Gates and Ziqing Mao}, editor = {James B. D. Joshi and Barbara Carminati}, title = {Towards analyzing complex operating system access control configurations}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {13--22}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809848}, doi = {10.1145/1809842.1809848}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ChenLGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.