Seguir
Kevin Leach
Kevin Leach
Dirección de correo verificada de vanderbilt.edu - Página principal
Título
Citado por
Citado por
Año
An evaluation dataset for intent classification and out-of-scope prediction
S Larson, A Mahendran, JJ Peper, C Clarke, A Lee, P Hill, JK Kummerfeld, ...
arXiv preprint arXiv:1909.02027, 2019
4542019
Assessing social anxiety using GPS trajectories and point-of-interest data
Y Huang, H Xiong, K Leach, Y Zhang, P Chow, K Fua, BA Teachman, ...
Proceedings of the 2016 ACM international joint conference on pervasive and …, 2016
1002016
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
992015
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
972013
STING enhances cell death through regulation of reactive oxygen species and DNA damage
TJ Hayman, M Baro, T MacNeil, C Phoomak, TN Aung, W Cui, K Leach, ...
Nature Communications 12 (1), 2327, 2021
872021
A human study of comprehension and code summarization
S Stapleton, Y Gambhir, A LeClair, Z Eberhart, W Weimer, K Leach, ...
Proceedings of the 28th International Conference on Program Comprehension, 2-13, 2020
722020
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
562016
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
552014
Neurological divide: an fMRI study of prose and code writing
R Krueger, Y Huang, X Liu, T Santander, W Weimer, K Leach
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
412020
An uncrewed aerial vehicle attack scenario and trustworthy repair architecture
K Highnam, K Angstadt, K Leach, W Weimer, A Paulos, P Hurley
2016 46th annual IEEE/IFIP international conference on dependable systems …, 2016
372016
M-SEQ: Early detection of anxiety and depression via temporal orders of diagnoses in electronic health data
J Zhang, H Xiong, Y Huang, H Wu, K Leach, LE Barnes
2015 IEEE International Conference on Big Data (Big Data), 2569-2577, 2015
362015
Distilling neural representations of data structure manipulation using fMRI and fNIRS
Y Huang, X Liu, R Krueger, T Santander, X Hu, K Leach, W Weimer
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
352019
Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machines
Y Huang, K Leach, Z Sharafi, N McKay, T Santander, W Weimer
Proceedings of the 28th ACM joint meeting on European software engineering …, 2020
252020
Mimosa: Reducing malware analysis overhead with coverings
M Ahmadi, K Leach, R Dougherty, S Forrest, W Weimer
arXiv preprint arXiv:2101.07328, 2021
242021
Trustlogin: Securing password-login on commodity operating systems
F Zhang, K Leach, H Wang, A Stavrou
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
222015
Scotch: Combining Software Guard Extensions and system management mode to monitor cloud resource usage
K Leach, F Zhang, W Weimer
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
212017
Toward an objective measure of developers’ cognitive activities
Z Sharafi, Y Huang, K Leach, W Weimer
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-40, 2021
202021
Substituent effects of 2-pyridones on selective O-arylation with diaryliodonium salts: synthesis of 2-aryloxypyridines under transition-metal-free conditions
XH Li, AH Ye, C Liang, DL Mo
Synthesis 50 (08), 1699-1710, 2018
202018
Strongbox: A gpu tee on arm endpoints
Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach, J Li, S Yan, Z He, J Cao, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
192022
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
182016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20