Nina Taft

According to our database1, Nina Taft authored at least 90 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Decade of Privacy-Relevant Android App Reviews: Large Scale Trends.
Proceedings of the 33rd USENIX Security Symposium, 2024

2022
Balancing privacy and serendipity in cyberspace.
Proceedings of the HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications, Tempe, Arizona, USA, March 9, 2022

Hark: A Deep Learning System for Navigating Privacy Feedback at Scale.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Analyzing User Perspectives on Mobile App Privacy at Scale.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions.
Proceedings of the 30th USENIX Security Symposium, 2021

"Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification Permission Prompts on Chrome.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
Reducing Permission Requests in Mobile Apps.
Proceedings of the Internet Measurement Conference, 2019

2017
Exploring decision making with Android's runtime permission dialogs using in-context surveys.
Proceedings of the Thirteenth Symposium on Usable Privacy and Security, 2017

2016
Privacy Mediators: Helping IoT Cross the Chasm.
Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, 2016

Intuitions, Analytics, and Killing Ants: Inference Literacy of High School-educated Adults in the US.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Cache content-selection policies for streaming video services.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

2015
Managing Your Private and Public Data: Bringing Down Inference Attacks Against Your Privacy.
IEEE J. Sel. Top. Signal Process., 2015

GraphSC: Parallel Secure Computation Made Easy.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
SPPM: Sparse Privacy Preserving Mappings.
Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence, 2014

Privacy tradeoffs in predictive analytics.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2014

Recommending with an agenda: active learning of private attributes using matrix factorization.
Proceedings of the Eighth ACM Conference on Recommender Systems, 2014

2013
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Predicting user dissatisfaction with Internet application performance at end-hosts.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Mixture models of endhost network traffic.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Private decayed predicate sums on streams.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data.
Proceedings of the IEEE Global Conference on Signal and Information Processing, 2013

Privacy-preserving matrix factorization.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Learning in a Large Function Space: Privacy-Preserving Mechanisms for SVM Learning.
J. Priv. Confidentiality, 2012

CARE: Content Aware Redundancy Elimination for Disaster Communications on Damaged Networks
CoRR, 2012

BlurMe: inferring and obfuscating user gender based on ratings.
Proceedings of the Sixth ACM Conference on Recommender Systems, 2012

Finding a needle in a haystack of reviews: cold start context-based hotel recommender system demo.
Proceedings of the Sixth ACM Conference on Recommender Systems, 2012

Finding a needle in a haystack of reviews: cold start context-based hotel recommender system.
Proceedings of the Sixth ACM Conference on Recommender Systems, 2012

Characterizing end-host application performance across multiple networking environments.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

CARE: content aware redundancy elimination for challenged networks.
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

2011
Private Decayed Sum Estimation under Continual Observation
CoRR, 2011

Performance of networked applications: the challenges in capturing the user's perception.
Proceedings of the first ACM SIGCOMM workshop on Measurements up the stack, 2011

2010
HostView: annotating end-host performance measurements with user feedback.
SIGMETRICS Perform. Evaluation Rev., 2010

Perspectives on tracing end-hosts: a survey summary.
Comput. Commun. Rev., 2010

Detecting traffic anomalies using an equilibrium property.
Proceedings of the SIGMETRICS 2010, 2010

ASTUTE: detecting a different class of traffic anomalies.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

A disruption-tolerant architecture for secure and efficient disaster response communications.
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010

2009
Stealthy poisoning attacks on PCA-based anomaly detectors.
SIGMETRICS Perform. Evaluation Rev., 2009

Impact of IT monoculture on behavioral end host intrusion detection.
Proceedings of the 1st ACM SIGCOMM 2009 Workshop on Research on Enterprise Networking, 2009

Exploiting Temporal Persistence to Detect Covert Botnet Channels.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Skilled in the Art of Being Idle: Reducing Energy Waste in Networked Systems.
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, 2009

ANTIDOTE: understanding and defending against poisoning of anomaly detectors.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Macroscope: end-point approach to networked application dependency discovery.
Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technology, 2009

2008
Race conditions in coexisting overlay networks.
IEEE/ACM Trans. Netw., 2008

Evading Anomaly Detection through Variance Injection Attacks on PCA.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

The Cubicle vs. The Coffee Shop: Behavioral Modes in Enterprise End-Users.
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008

Spectral Clustering with Perturbed Data.
Proceedings of the Advances in Neural Information Processing Systems 21, 2008

How healthy are today's enterprise networks?
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

2007
Estimating dynamic traffic matrices by using viable routing changes.
IEEE/ACM Trans. Netw., 2007

IGP link weight assignment for operational Tier-1 backbones.
IEEE/ACM Trans. Netw., 2007

Profiling the End Host.
Proceedings of the Passive and Active Network Measurement, 8th Internatinoal Conference, 2007

Communication-Efficient Online Detection of Network-Wide Anomalies.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Communication-Efficient Tracking of Distributed Cumulative Triggers.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

Public Health for the Internet (PHI).
Proceedings of the Third Biennial Conference on Innovative Data Systems Research, 2007

2006
A fast lightweight approach to origin-destination IP traffic estimation using partial measurements.
IEEE Trans. Inf. Theory, 2006

In-Network PCA and Anomaly Detection.
Proceedings of the Advances in Neural Information Processing Systems 19, 2006

Toward sophisticated detection with distributed triggers.
Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, 2006

Sleeping Coordination for Comprehensive Sensing Using Isotonic Regression and Domatic Partitions.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

An independent-connection model for traffic matrices.
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, 2006

2005
Long-term forecasting of Internet backbone traffic.
IEEE Trans. Neural Networks, 2005

Traffic matrix tracking using Kalman filters.
SIGMETRICS Perform. Evaluation Rev., 2005

Increasing the Link Utilization in IP over WDM Networks Using Availability as QoS.
Photonic Netw. Commun., 2005

The problem of synthetically generating IP traffic matrices: initial recommendations.
Comput. Commun. Rev., 2005

Traffic matrices: balancing measurements, inference and modeling.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

Combining Filtering and Statistical Methods for Anomaly Detection.
Proceedings of the 5th Internet Measurement Conference, 2005

Can coexisting overlays inadvertently step on each other?
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

2004
Controlled use of excess backbone bandwidth for providing new services in IP-over-WDM networks.
IEEE J. Sel. Areas Commun., 2004

Flow classification by histograms: or how to go on safari in the internet.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

How to identify and estimate the largest traffic matrix elements in a dynamic environment.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Structural analysis of network traffic flows.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

Maximum entropy models: convergence rates and applications in dynamic system monitoring.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Impact of Flow Dynamics on Traffic Engineering Design Principles.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Design of IGP Link Weights for Estimation of Traffic Matrices.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

A distributed approach to measure IP traffic matrices.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

Can ISPs and Overlay Networks Form a Synergistic Co-existence?
Proceedings of the Utility Computing: 15th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, 2004

Fast Flow Classification over Internet.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

2003
Network Availability Based Service Differentiation.
Proceedings of the Quality of Service, 2003

Long-Term Forecasting of Internet Backbone Traffic: Observations and Initial Models.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

An approach to alleviate link overload as observed on an IP backbone.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

Increasing the Robustness of IP Backbones in the Absence of Optical Level Protection.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

2002
Geographical and temporal characteristics of inter-POP flows: View from a single pop.
Eur. Trans. Telecommun., 2002

Traffic matrix estimation: existing techniques and new directions.
Proceedings of the ACM SIGCOMM 2002 Conference on Applications, 2002

A pragmatic definition of elephants in internet backbone traffic.
Proceedings of the 2nd ACM SIGCOMM Internet Measurement Workshop, 2002

2001
A Protection-Based Approach to QoS in Packet over Fiber Networks.
Proceedings of the Evolutionary Trends of the Internet, 2001

1999
Using ATM Services for (In)Efficient Support of TCP.
Proceedings of the MASCOTS 1999, 1999

1997
The Rate Mismatch Problem in Heterogeneous ABR Flow Control.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
Neural Network Methods with Traffic Descriptor Compression for Call Admission Control.
Proceedings of the Proceedings IEEE INFOCOM '96, 1996

1995
The Converging Flows Problem: An Analytical Study.
Proceedings of the Proceedings IEEE INFOCOM '95, 1995

The Entropy of Cell Streams as a Traffic Descriptor in ATM Networks.
Proceedings of the Data Communications and their Performance, 1995

1994
The Entropy of Traffic Streams in ATM Virtual Circuits.
Proceedings of the Proceedings IEEE INFOCOM '94, 1994

1993
Performance Analysis of Parallel ATM Connections for Gigabit Speed Applications.
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993


  Loading...