The Second Annual Advanced Conference On: Fill & Download for Free

GET FORM

Download the form

How to Edit and fill out The Second Annual Advanced Conference On Online

Read the following instructions to use CocoDoc to start editing and filling in your The Second Annual Advanced Conference On:

  • Firstly, look for the “Get Form” button and tap it.
  • Wait until The Second Annual Advanced Conference On is loaded.
  • Customize your document by using the toolbar on the top.
  • Download your completed form and share it as you needed.
Get Form

Download the form

An Easy-to-Use Editing Tool for Modifying The Second Annual Advanced Conference On on Your Way

Open Your The Second Annual Advanced Conference On Right Now

Get Form

Download the form

How to Edit Your PDF The Second Annual Advanced Conference On Online

Editing your form online is quite effortless. It is not necessary to get any software through your computer or phone to use this feature. CocoDoc offers an easy application to edit your document directly through any web browser you use. The entire interface is well-organized.

Follow the step-by-step guide below to eidt your PDF files online:

  • Search CocoDoc official website on your laptop where you have your file.
  • Seek the ‘Edit PDF Online’ icon and tap it.
  • Then you will browse this online tool page. Just drag and drop the PDF, or upload the file through the ‘Choose File’ option.
  • Once the document is uploaded, you can edit it using the toolbar as you needed.
  • When the modification is finished, tap the ‘Download’ icon to save the file.

How to Edit The Second Annual Advanced Conference On on Windows

Windows is the most widely-used operating system. However, Windows does not contain any default application that can directly edit file. In this case, you can get CocoDoc's desktop software for Windows, which can help you to work on documents efficiently.

All you have to do is follow the instructions below:

  • Download CocoDoc software from your Windows Store.
  • Open the software and then append your PDF document.
  • You can also append the PDF file from OneDrive.
  • After that, edit the document as you needed by using the different tools on the top.
  • Once done, you can now save the completed PDF to your cloud storage. You can also check more details about how can you edit a PDF.

How to Edit The Second Annual Advanced Conference On on Mac

macOS comes with a default feature - Preview, to open PDF files. Although Mac users can view PDF files and even mark text on it, it does not support editing. Through CocoDoc, you can edit your document on Mac quickly.

Follow the effortless guidelines below to start editing:

  • In the beginning, install CocoDoc desktop app on your Mac computer.
  • Then, append your PDF file through the app.
  • You can select the file from any cloud storage, such as Dropbox, Google Drive, or OneDrive.
  • Edit, fill and sign your file by utilizing several tools.
  • Lastly, download the file to save it on your device.

How to Edit PDF The Second Annual Advanced Conference On via G Suite

G Suite is a widely-used Google's suite of intelligent apps, which is designed to make your work faster and increase collaboration across departments. Integrating CocoDoc's PDF file editor with G Suite can help to accomplish work easily.

Here are the instructions to do it:

  • Open Google WorkPlace Marketplace on your laptop.
  • Search for CocoDoc PDF Editor and get the add-on.
  • Select the file that you want to edit and find CocoDoc PDF Editor by clicking "Open with" in Drive.
  • Edit and sign your file using the toolbar.
  • Save the completed PDF file on your computer.

PDF Editor FAQ

Who has the world's greatest CV ever?

This is Mr. Chih-Jen LinMy browser got stuck for a while when I tried to paste this CV here.Anyway, so Mr. Chih-Jen Lin is a notable person who has contributed a lot in the field of Machine Learning and related areas. He is a Professor of Computer Science at National Taiwan University, and a leading researcher in machine learning, optimization, and data mining. He is best known for the open source library LIBSVM, an implementation of support vector machines.This is his home page url : Welcome to Chih-Jen Lin's Home PageAnd here comes his 28 pages long simple CV : http://www.csie.ntu.edu.tw/~cjlin/resume.pdfBrace yourself and scroll down !!Chih-Jen Lin• PERSONAL DATA1. Address: Department of Computer Science and Information Engineering, National TaiwanUniversity, Taipei 106, Taiwan2. Phone: (886) 2-33664923, Fax: (886) 2-236281673. E-mail: [email protected]. Homepage: Welcome to Chih-Jen Lin's Home Page• EDUCATION AND CURRENT POSITION:1. Distinguished professor, Department of Computer Science and Information Engineering,National Taiwan University, Taipei 106, Taiwan, 2011–present2. Adjunct distinguished professor, Graduate Institute of Networking and Multimedia, NationalTaiwan University, Taipei 106, Taiwan, August 2011–present3. Adjunct distinguished professor, Graduate Institute of Industrial Engineering, NationalTaiwan University, Taipei 106, Taiwan, August 2011–present4. Ph.D., Industrial & Operations Engineering, University of Michigan, September 1995 –May 1998.5. M.S.E., Industrial & Operations Engineering, University of Michigan, September 1995–December 1996.6. B.S., Mathematics, National Taiwan University, October 1989–June 1993.• RESEARCH INTERESTS:1. Machine learning: support vector machines, large-scale data classification, and applicationsWe develop popular machine learning software including LIBSVM (http://www.csie.http://ntu.edu.tw/~cjlin/libsvm) and LIBLINEAR (Welcome to Chih-Jen Lin's Home Pageliblinear).According to Most Cited Articles in Computer Science, LIBSVM is amongthe 10 most cited computer science works at all time.2. Large-scale optimization and its applications• AWARDS AND RECOGNITION:– International:1. ACM fellow, 20152. AAAI fellow, 20143. Best paper award, ACM Recommender Systems 2013 (with students Yong Zhuang,Wei-Sheng Chin, and Yu-Chin Juan)4. ACM Distinguished Scientist, 20115. IEEE fellow (class of 2011) for contributions to support vector machine algorithmsand software.6. Member of the NTU team to win the first prize of KDD cup 2010, 2011 and 2013.7. Best research paper award, ACM KDD 2010 (with students Hsiang-Fu Yu, Cho-JuiHsieh, and Kai-Wei Chang).8. Supervising students Chia-Hua Ho and Ming-Hen Tsai to win the 2nd place of ActiveLearning Challenge 2010.Active learning - Causality Workbench9. Member of the NTU team to win the 3rd place of KDD cup 2009 (extended track) .10. Winner of ICML 2008 large-scale learning challenge (linear SVM track; with studentsHsiang-Fu Yu, Cho-Jui Hsieh, and Kai-Wei Chang).http://largescale.first.fraunhofer.de/summary/11. Supervising student Yin-Wen Chang to win WCCI 2008 Causation and Predictionchallenge.Causality Workbench12. Winner of WCCI 2002 competition on sequence recognition (with master studentsMing-Wei Chang and Bo-Juen Chen)13. Winner the EUNITE 2001 world wide competition (18 research groups) on electricityload prediction (Electricity Load Forecast using Intelligent Adaptive Technology). EUNITE is the EuropeanNetwork of Excellence on Intelligent Technology for smart adaptive systems(with master students Ming-Wei Chang and Bo-Juen Chen).14. Winner of IJCNN Challenge 2001. IJCNN is one of the major Neural Networksconferences (with master student Chih-Chung Chang).15. Winner of the OCR (Optical Character Recognition) competition organized by theUniversity of Essex and the UK Post Office, December 2000. (with master studentChih-Chung Chang)16. Second prize of the student paper competition, Fifth Copper Mountain conferenceon iterative methods, 1998.17. Wallace J. Givens Research Associate (twice): competitive positions in Mathematicsand Computer Science Division of Argonne National Laboratory which are intendedto encourage graduate students who are beginning careers in computational science.– Domestic:1. Outstanding research award of Pan Wen Yuan Foundation, Taiwan, 20162. Pegatron Chair Professorship, 20163. Teco Award, 20154. Macronix International Co. Chair Professorship, 20145. K. T. Li Breakthrough Award, Institute of Information & Computing Machinery,Taiwan, 20126. NTU EECS Academic Excellence Award, NTU College of EECS, 2011.7. Ten outstanding young persons of Taiwan, 20118. Distinguished Scholar Research Project, National Science Council, Taiwan, 2009–2012.9. Outstanding Research Award, National Science Council, Taiwan, 2007, 2010, and2013.10. Ta-You Wu Memorial Award, National Science Council, Taiwan, 2006.11. Fu Ssu-Nien Award of National Taiwan University, 200512. Research award for young researchers from Pan Wen-Yuan Foundation, Taiwan,2003.13. K. T. Li award for young researchers from ACM Taipei/Taiwan chapter, July, 2002(one awarded per year for young computer scientists in Taiwan)14. Young investigator award from Academia Sinica, Taiwan, May, 2002 (15 awardedper year in all research areas)15. Prize for Outstanding Performance, National Mathematics Contest, R.O.C. 1989.• PROFESSIONAL EXPERIENCE:1. Visiting researcher, Microsoft, January 2015 – September 2015, August 2016 – February2017.2. Visiting principal research scientist, eBay Research Labs, January 2012 – September2012.3. Visiting scientist, Google Research, February 2008 – September 2008.4. Visiting scientist, Yahoo! Research, Burbank, California, August 2006 – February 2007.5. Distinguished Professor (August 2011–present), Professor (August 2006–present), AssociateProfessor (August 2002–August 2006), Assistant Professor (August 1998–August2002), Department of Computer Science and Information Engineering, National TaiwanUniversity, Taipei 106, Taiwan.6. Adjunct Associate Professor, Graduate Institute of Networking and Multimedia, NationalTaiwan University, Taipei 106, Taiwan, August 2004– August 20067. Adjunct Associate Professor (August 2002–August 2006), Adjunct Assistant Professor(August 2001–August 2002), Graduate Institute of Industrial Engineering, National TaiwanUniversity, Taipei 106, Taiwan.8. Visiting Scientist, Mathematics and Computer Science division, Argonne National Laboratory,January 1999–February 1999, May 1999–August 1999.9. Research Associate, Mathematics and Computer Science division, Argonne National Laboratory,January 1997–April 1997, September 1997–September 1998.10. Wallace J. Givens Research Associate, Mathematics and Computer Science division,Argonne National Laboratory, May 1996–August 1996 and May 1997–August 1997.11. Research Assistant, Department of Industrial and Operations Engineering, University ofMichigan, September 1995–August 1998.12. Teaching Assistant, Department of Industrial and Operations Engineering, University ofMichigan, September 1996–December 1996.13. Second Lieutenant, R.O.C. Army, July 1993 – May 1995.• JOURNAL PAPERS:[1] Wei-Sheng Chin, Bo-Wen Yuan, Meng-Yuan Yang, Yong Zhuang, Yu-Chin Juan, andChih-Jen Lin. LIBMF: A library for parallel matrix factorization in shared-memorysystems. Journal of Machine Learning Research, 17(86):1–5, 2016. URL https://www.http://csie.ntu.edu.tw/~cjlin/papers/libmf/libmf_open_source.pdf.[2] Wei-Sheng Chin, Yong Zhuang, Yu-Chin Juan, and Chih-Jen Lin. A fast parallelstochastic gradient method for matrix factorization in shared memory systems. ACMTransactions on Intelligent Systems and Technology, 6:2:1–2:24, 2015. URL http://www.csie.ntu.edu.tw/~cjlin/papers/libmf/libmf_journal.pdf.[3] Chien-Chih Wang, Chun-Heng Huang, and Chih-Jen Lin. Subsampled Hessian Newtonmethods for supervised learning. Neural Computation, 27:1766–1795, 2015. URL http://www.csie.ntu.edu.tw/~cjlin/papers/sub_hessian/sample_hessian.pdf.[4] Po-Wei Wang and Chih-Jen Lin. Iteration complexity of feasible descent methods forconvex optimization. Journal of Machine Learning Research, 15:1523–1548, 2014. URLhttp://www.csie.ntu.edu.tw/~cjlin/papers/cdlinear.pdf.[5] Ching-Pei Lee and Chih-Jen Lin. Large-scale linear rankSVM. Neural Computation,26(4):781–817, 2014. URL Index of /~cjlin/papers/ranksvmranksvml2.pdf.[6] Ching-Pei Lee and Chih-Jen Lin. A study on L2-loss (squared hinge-loss) multi-classSVM. Neural Computation, 25(5):1302–1323, 2013. URL http://www.csie.ntu.edu.tw/~cjlin/papers/l2mcsvm/l2mcsvm.pdf.[7] Chia-Hua Ho and Chih-Jen Lin. Large-scale linear support vector regression. Journal ofMachine Learning Research, 13:3323–3348, 2012. URL 國立臺灣大學 資訊工程學系~cjlin/papers/linear-svr.pdf.[8] Guo-Xun Yuan, Chia-Hua Ho, and Chih-Jen Lin. An improved GLMNET for l1-regularized logistic regression. Journal of Machine Learning Research, 13:1999–2030,2012. URL http://www.csie.ntu.edu.tw/~cjlin/papers/l1_glmnet/long-glmnet.pdf.[9] Guo-Xun Yuan, Chia-Hua Ho, and Chih-Jen Lin. Recent advances of large-scale linearclassification. Proceedings of the IEEE, 100(9):2584–2603, 2012. URL http://www.csie.http://ntu.edu.tw/~cjlin/papers/survey-linear.pdf.[10] Hsiang-Fu Yu, Cho-Jui Hsieh, Kai-Wei Chang, and Chih-Jen Lin. Large linear classificationwhen data cannot fit in memory. ACM Transactions on Knowledge Discoveryfrom Data, 5(4):23:1–23:23, February 2012. URL 國立臺灣大學 資訊工程學系~cjlin/papers/kdd_disk_decomposition.pdf.[11] Chih-Chung Chang and Chih-Jen Lin. LIBSVM: a library for support vector machines.ACM Transactions on Intelligent Systems and Technology, 2(3):27:1–27:27, 2011. Softwareavailable at LIBSVM -- A Library for Support Vector Machines.[12] Wen-Yen Chen, Yangqiu Song, Hongjie Bai, Chih-Jen Lin, and Edward Y. Chang. Parallelspectral clustering in distributed systems. IEEE Transactions on Pattern Analysisand Machine Intelligence, 33(3):568–586, 2011.[13] Ruby C. Weng and Chih-Jen Lin. A Bayesian approximation method for online ranking.Journal of Machine Learning Research, 12:267–300, 2011. URL http://www.csie.ntu.http://edu.tw/~cjlin/papers/online_ranking/online_journal.pdf.[14] Hsiang-Fu Yu, Fang-Lan Huang, and Chih-Jen Lin. Dual coordinate descent methodsfor logistic regression and maximum entropy models. Machine Learning, 85(1-2):41–75,October 2011. URL http://www.csie.ntu.edu.tw/~cjlin/papers/maxent_dual.pdf.[15] Guo-Xun Yuan, Kai-Wei Chang, Cho-Jui Hsieh, and Chih-Jen Lin. A comparison of optimizationmethods and software for large-scale l1-regularized linear classification. Journalof Machine Learning Research, 11:3183–3234, 2010. URL http://www.csie.ntu.edu.tw/~cjlin/papers/l1.pdf.[16] Yin-Wen Chang, Cho-Jui Hsieh, Kai-Wei Chang, Michael Ringgaard, and Chih-Jen Lin.Training and testing low-degree polynomial data mappings via linear SVM. Journal ofMachine Learning Research, 11:1471–1490, 2010. URL 國立臺灣大學 資訊工程學系~cjlin/papers/lowpoly_journal.pdf.[17] Fang-Lan Huang, Cho-Jui Hsieh, Kai-Wei Chang, and Chih-Jen Lin. Iterative scalingand coordinate descent methods for maximum entropy. Journal of Machine LearningResearch, 11:815–848, 2010. URL Index of /~cjlin/papersmaxent_journal.pdf.[18] Chih-Jen Lin, Stefano Lucidi, Laura Palagi, Arnaldo Risi, and Marco Sciandrone. Decompositionalgorithm model for singly linearly constrained problems subject to lowerand upper bounds. Journal of Optimization Theory and Applications, 141:107–126, 2009.[19] Tzu-Kuo Huang, Chih-Jen Lin, and Ruby C. Weng. Ranking individuals by groupcomparisons. Journal of Machine Learning Research, 9:2187–2216, 2008. URL http://www.csie.ntu.edu.tw/~cjlin/papers/genBTexp/genBTexp-jmlr.pdf.[20] Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Xiang-Rui Wang, and Chih-Jen Lin. LIBLINEAR:a library for large linear classification. Journal of Machine Learning Research,9:1871–1874, 2008. URL http://www.csie.ntu.edu.tw/~cjlin/papers/liblinear.pdf.[21] Kai-Wei Chang, Cho-Jui Hsieh, and Chih-Jen Lin. Coordinate descent method for largescaleL2-loss linear SVM. Journal of Machine Learning Research, 9:1369–1398, 2008.URL http://www.csie.ntu.edu.tw/~cjlin/papers/cdl2.pdf.[22] Chih-Jen Lin, Ruby C. Weng, and S. Sathiya Keerthi. Trust region Newton method forlarge-scale logistic regression. Journal of Machine Learning Research, 9:627–650, 2008.URL http://www.csie.ntu.edu.tw/~cjlin/papers/logistic.pdf.[23] Hsuan-Tien Lin, Chih-Jen Lin, and Ruby C. Weng. A note on Platt’s probabilisticoutputs for support vector machines. Machine Learning, 68:267–276, 2007. URL http://www.csie.ntu.edu.tw/~cjlin/papers/plattprob.pdf.[24] Chih-Jen Lin. On the convergence of multiplicative update algorithms for non-negativematrix factorization. IEEE Transactions on Neural Networks, 18(6):1589–1596, 2007.URL http://www.csie.ntu.edu.tw/~cjlin/papers/multconv.pdf.[25] Chih-Jen Lin. Projected gradient methods for non-negative matrix factorization. NeuralComputation, 19:2756–2779, 2007. URL Welcome to Chih-Jen Lin's Home Pagepapers/pgradnmf.pdf.[26] Tzu-Kuo Huang, Ruby C. Weng, and Chih-Jen Lin. Generalized Bradley-Terry modelsand multi-class probability estimates. Journal of Machine Learning Research, 7:85–115,2006. URL http://www.csie.ntu.edu.tw/~cjlin/papers/generalBT.pdf.[27] Pai-Hsuen Chen, Rong-En Fan, and Chih-Jen Lin. A study on SMO-type decompositionmethods for support vector machines. IEEE Transactions on Neural Networks, 17:893–908, July 2006. URL http://www.csie.ntu.edu.tw/~cjlin/papers/generalSMO.pdf.[28] Rong-En Fan, Pai-Hsuen Chen, and Chih-Jen Lin. Working set selection using secondorder information for training SVM. Journal of Machine Learning Research, 6:1889–1918,2005. URL http://www.csie.ntu.edu.tw/~cjlin/papers/quadworkset.pdf.[29] Ming-Wei Chang and Chih-Jen Lin. Leave-one-out bounds for support vector regressionmodel selection. Neural Computation, 17(5):1188–1222, 2005.[30] Pai-Hsuen Chen, Chih-Jen Lin, and Bernhard Sch¨olkopf. A tutorial on ν-support vectormachines. Applied Stochastic Models in Business and Industry, 21:111–136, 2005. URLhttp://www.csie.ntu.edu.tw/~cjlin/papers/nusvmtoturial.pdf.[31] Ting-Fan Wu, Chih-Jen Lin, and Ruby C. Weng. Probability estimates for multi-classclassification by pairwise coupling. Journal of Machine Learning Research, 5:975–1005,2004. URL http://www.csie.ntu.edu.tw/~cjlin/papers/svmprob/svmprob.pdf.[32] Bo-Juen Chen, Ming-Wei Chang, and Chih-Jen Lin. Load forecasting using supportvector machines: A study on EUNITE competition 2001. IEEE Transactions on PowerSystems, 19(4):1821–1830, November 2004.[33] Wei-Chun Kao, Kai-Min Chung, Chia-Liang Sun, and Chih-Jen Lin. Decompositionmethods for linear support vector machines. Neural Computation, 16(8):1689–1704, 2004.URL http://www.csie.ntu.edu.tw/~cjlin/papers/linear.pdf.[34] Ming-Wei Chang, Chih-Jen Lin, and Ruby C. Weng. Analysis of switching dynamicswith competing support vector machines. IEEE Transactions on Neural Networks, 15(3):720–727, 2004.[35] Chin-Sheng Yu, Chih-Jen Lin, and Jen-Kang Hwang. Predicting subcellular localizationof proteins for Gram-negative bacteria by support vector machines based on n-peptidecompositions. Protein Science, 13:1402–1406, 2004.[36] Kai-Min Chung, Wei-Chun Kao, Chia-Liang Sun, Li-Lun Wang, and Chih-Jen Lin. Radiusmargin bounds for support vector machines with the RBF kernel. Neural Computation,15:2643–2681, 2003.[37] S. Sathiya Keerthi and Chih-Jen Lin. Asymptotic behaviors of support vector machineswith Gaussian kernel. Neural Computation, 15(7):1667–1689, 2003.[38] Kuan-Min Lin and Chih-Jen Lin. A study on reduced support vector machines. IEEETransactions on Neural Networks, 14(6):1449–1559, 2003. URL http://www.csie.ntu.http://edu.tw/~cjlin/papers/rsvmTEX.pdf.[39] Chin-Sheng Yu, Jung-Ying Wang, Jinn-Moon Yang, Ping-Chiang Lyu, Chih-Jen Lin,and Jen-Kang Hwang. Fine-grained protein fold assignment by support vector machinesusing generalize npeptide coding schemes and jury voting from multiple-parameter sets.Proteins, 50:531–536, 2003.[40] Chih-Jen Lin. A formal analysis of stopping criteria of decomposition methods for supportvector machines. IEEE Transactions on Neural Networks, 13(5):1045–1052, 2002. URLhttp://www.csie.ntu.edu.tw/~cjlin/papers/stop.ps.gz.[41] Chih-Jen Lin. Asymptotic convergence of an SMO algorithm without any assumptions.IEEE Transactions on Neural Networks, 13(1):248–250, 2002. URL http://www.csie.http://ntu.edu.tw/~cjlin/papers/q2conv.pdf.[42] Chih-Chung Chang and Chih-Jen Lin. Training ν-support vector regression: Theory andalgorithms. Neural Computation, 14(8):1959–1977, 2002.[43] Shuo-Peng Liao, Hsuan-Tien Lin, and Chih-Jen Lin. A note on the decomposition methodsfor support vector regression. Neural Computation, 14:1267–1281, 2002.[44] Chih-Wei Hsu and Chih-Jen Lin. A comparison of methods for multi-class support vectormachines. IEEE Transactions on Neural Networks, 13(2):415–425, 2002.[45] Chih-Wei Hsu and Chih-Jen Lin. A simple decomposition method for support vectormachines. Machine Learning, 46:291–314, 2002.[46] Chih-Jen Lin. On the convergence of the decomposition method for support vectormachines. IEEE Transactions on Neural Networks, 12(6):1288–1298, 2001. URL http://www.csie.ntu.edu.tw/~cjlin/papers/conv.ps.gz.[47] Jinn-Moon Yang, Jorng-Tzong Horng, Chih-Jen Lin, and Cheng-Yan Kao. Optical coatingdesign using the family competition evolutionaty algorithm. Evolutionary Computation,9(4):421–444, 2001.[48] Chih-Chung Chang and Chih-Jen Lin. Training ν-support vector classifiers: Theory andalgorithms. Neural Computation, 13(9):2119–2147, 2001.[49] Chih-Jen Lin. Formulations of support vector machines: a note from an optimizationpoint of view. Neural Computation, 13(2):307–317, 2001.[50] Shu-Cherng Fang, Chih-Jen Lin, and Soon-Yi Wu. Solving quadratic semi-infinite programmingproblems by using relaxed cutting plane scheme. Journal of Computationaland Applied Mathematics, 129:89–104, 2001.[51] Soon-Yi Wu, Shu-Cherng Fang, and Chih-Jen Lin. Solving the general capacity problem.Annals of Operations Research, 103:193–211, 2001.[52] Chih-Chung Chang, Chih-Wei Hsu, and Chih-Jen Lin. The analysis of decompositionmethods for support vector machines. IEEE Transactions on Neural Networks, 11(4):1003–1008, 2000.[53] Chih-Jen Lin and Romesh Saigal. An incomplete Cholesky factorization for dense matrices.BIT, 40:536–558, 2000.[54] Chih-Jen Lin and Jorge J. Mor´e. Newton’s method for large-scale bound constrainedproblems. SIAM Journal on Optimization, 9:1100–1127, 1999.[55] Chih-Jen Lin and Jorge J. Mor´e. Incomplete Cholesky factorizations with limited memory.SIAM J. Sci. Comput., 21:24–45, 1999.[56] Shu-Cherng Fang, Soon-Yi Wu, and Chih-Jen Lin. Relaxed cutting plane method forsolving linear semi-infinite programming problems. Journal of Optimization Theory andApplications, 99:759–779, 1998.[57] Chih-Jen Lin, Soon-Yi Wu, and Shu-Cherng Fang. An unconstrained convex programmingapproach for solving linear semi-infinite programming problems. SIAM Journal onOptimization, 8(2), 1998.[58] Chih-Jen Lin, Soon-Yi Wu, and Shu-Cherng Fang. On the parametric linear semi–infiniteoptimization. Applied Mathematics Letter, 9:89–96, 1996.[59] Chih-Jen Lin, E. K. Yang, Shu-Cherng Fang, and Soon-Yi Wu. Implementation of aninexact approach to solving linear semi-infinite programming problems. Journal of Computationaland Applied Mathematics, 61:87–103, 1995.[60] Shu-Cherng Fang, Chih-Jen Lin, and Soon-Yi Wu. On solving convex quadratic semiinfiniteprogramming problems. Optimization, 37:107–125, 1994.• REFEREED CONFERENCE PAPERSSome papers here are preliminary versions of journal papers.[1] Yuchin Juan, Yong Zhuang, Wei-Sheng Chin, and Chih-Jen Lin. Field-aware factorizationmachines for CTR prediction. In Proceedings of the ACM Recommender SystemsConference (RecSys), 2016.[2] Wei-Lin Chiang, Mu-Chu Lee, and Chih-Jen Lin. Parallel dual coordinate descent methodfor large-scale linear classification in multi-core environments. In Proceedings of the22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD), 2016. URL http://www.csie.ntu.edu.tw/~cjlin/papers/multicore_cddual.pdf.[3] Hsin-Yuan Huang and Chih-Jen Lin. Linear and kernel classification: When to use which?In Proceedings of SIAM International Conference on Data Mining (SDM), 2016. URLhttp://www.csie.ntu.edu.tw/~cjlin/papers/kernel-check/kcheck.pdf.[4] Mu-Chu Lee, Wei-Lin Chiang, and Chih-Jen Lin. Fast matrix-vector multiplications forlarge-scale logistic regression on shared-memory systems. In Proceedings of the IEEEInternational Conference on Data Mining (ICDM), 2015. URL http://www.csie.ntu.http://edu.tw/~cjlin/papers/multicore_liblinear_icdm.pdf.[5] Bo-Yu Chu, Chia-Hua Ho, Cheng-Hao Tsai, Chieh-Yen Lin, and Chih-Jen Lin. Warmstart for parameter selection of linear classifiers. In Proceedings of the 21th ACM SIGKDDInternational Conference on Knowledge Discovery and Data Mining (KDD), 2015. URLhttp://www.csie.ntu.edu.tw/~cjlin/libsvmtools/warm-start/warm-start.pdf.[6] Wei-Sheng Chin, Yong Zhuang, Yu-Chin Juan, and Chih-Jen Lin. A learning-rate schedulefor stochastic gradient methods to matrix factorization. In Proceedings of the PacificAsiaConference on Knowledge Discovery and Data Mining (PAKDD), 2015. URLhttp://www.csie.ntu.edu.tw/~cjlin/papers/libmf/mf_adaptive_pakdd.pdf.[7] Yong Zhuang, Wei-Sheng Chin, Yu-Chin Juan, and Chih-Jen Lin. Distributed Newtonmethod for regularized logistic regression. In Proceedings of the Pacific-Asia Conferenceon Knowledge Discovery and Data Mining (PAKDD), 2015.[8] Chieh-Yen Lin, Cheng-Hao Tsai, Ching-Pei Lee, and Chih-Jen Lin. Large-scale logisticregression and linear support vector machines using Spark. In Proceedings of the IEEEInternational Conference on Big Data, pages 519–528, 2014. URL http://www.csie.http://ntu.edu.tw/~cjlin/papers/spark-liblinear/spark-liblinear.pdf.[9] Meng-Chieh Yu, Tong Yu, Shao-Chen Wang, Chih-Jen Lin, and Edward Y. Chang. Bigdata small footprint: The design of a low-power classifier for detecting transportationmodes. Proceedings of the VLDB Endowment, 7:1429–1440, 2014.[10] Cheng-Hao Tsai, Chieh-Yen Lin, and Chih-Jen Lin. Incremental and decremental trainingfor linear classification. In Proceedings of the 20th ACM SIGKDD InternationalConference on Knowledge Discovery and Data Mining, 2014. URL http://www.csie.http://ntu.edu.tw/~cjlin/papers/ws/inc-dec.pdf.[11] Tzu-Ming Kuo, Ching-Pei Lee, and Chih-Jen Lin. Large-scale kernel rankSVM. InProceedings of SIAM International Conference on Data Mining, 2014. URL http://http://www.csie.ntu.edu.tw/~cjlin/papers/ranksvm/kernel.pdf.[12] Yong Zhuang, Wei-Sheng Chin, Yu-Chin Juan, and Chih-Jen Lin. A fast parallel SGD formatrix factorization in shared memory systems. In Proceedings of the ACM RecommenderSystems, 2013. URL http://www.csie.ntu.edu.tw/~cjlin/papers/libmf.pdf.[13] Raffay Hamid, Dennis Decoste, and Chih-Jen Lin. Dense non-rigid point-matching usingrandom projections. In The IEEE Conference on Computer Vision and Pattern Recognition(CVPR), 2013.[14] Aditya Khosla, Raffay Hamid, Chih-Jen Lin, and Neel Sundaresan. Large-scale videosummarization using web-image priors. In Proceedings of the IEEE Conference on ComputerVision and Pattern Recognition (CVPR), 2013.[15] Guo-Xun Yuan, Chia-Hua Ho, and Chih-Jen Lin. An improved GLMNET for l1-regularized logistic regression. In Proceedings of the Seventeenth ACM SIGKDD InternationalConference on Knowledge Discovery and Data Mining, pages 33–41, 2011.[16] Chia-Hua Ho, Ming-Hen Tsai, and Chih-Jen Lin. Active learning and experimentaldesign with SVMs. In JMLR Workshop and Conference Proceedings: Workshop on ActiveLearning and Experimental Design, volume 16, pages 71–84, 2011. URL http://www.http://csie.ntu.edu.tw/~cjlin/papers/activelearning/activelearning.pdf.[17] Hsiang-Fu Yu, Cho-Jui Hsieh, Kai-Wei Chang, and Chih-Jen Lin. Large linear classifi-cation when data cannot fit in memory. In Proceedings of the Sixteenth ACM SIGKDDInternational Conference on Knowledge Discovery and Data Mining, pages 833–842, 2010.URL http://www.csie.ntu.edu.tw/~cjlin/papers/kdd_disk_decomposition.pdf.[18] Fang-Lan Huang, Cho-Jui Hsieh, Kai-Wei Chang, and Chih-Jen Lin. Iterative scalingand coordinate descent methods for maximum entropy. In Proceedings of the 47th AnnualMeeting of the Association of Computational Linguistics (ACL), 2009. Short paper.[19] Yin-Wen Chang and Chih-Jen Lin. Feature ranking using linear SVM. In JMLR Workshopand Conference Proceedings: Causation and Prediction Challenge (WCCI 2008),volume 3, pages 53–64, 2008. URL Index of /~cjlin/paperscausality.pdf.[20] Yangqiu Song, Wen-Yen Chen, Hongjie Bai, Chih-Jen Lin, and Edward Y. Chang.Parallel spectral clustering. In European Conference on Machine Learning and Principlesand Practice of Knowledge Discovery in Databases (ECML/PKDD), 2008. URLhttp://www.csie.ntu.edu.tw/~cjlin/papers/ecml08.pdf.[21] S. Sathiya Keerthi, Sellamanickam Sundararajan, Kai-Wei Chang, Cho-Jui Hsieh, andChih-Jen Lin. A sequential dual method for large scale multi-class linear SVMs. In Proceedingsof the Forteenth ACM SIGKDD International Conference on Knowledge Discoveryand Data Mining, pages 408–416, 2008. URL 國立臺灣大學 資訊工程學系~cjlin/papers/sdm_kdd.pdf.[22] Cho-Jui Hsieh, Kai-Wei Chang, Chih-Jen Lin, S. Sathiya Keerthi, and SellamanickamSundararajan. A dual coordinate descent method for large-scale linear SVM. In Proceedingsof the Twenty Fifth International Conference on Machine Learning (ICML), 2008.URL http://www.csie.ntu.edu.tw/~cjlin/papers/cddual.pdf.[23] Chih-Jen Lin, Ruby C. Weng, and S. Sathiya Keerthi. Trust region Newton method forlarge-scale logistic regression. In Proceedings of the 24th International Conference onMachine Learning (ICML), 2007. Software available at 國立臺灣大學 資訊工程學系~cjlin/liblinear.[24] Tzu-Kuo Huang, Chih-Jen Lin, and Ruby C. Weng. Ranking individuals by group comparisons.In Proceedings of the Twenty Third International Conference on Machine Learning(ICML), 2006.[25] Pai-Hsuen Chen, Rong-En Fan, and Chih-Jen Lin. Training support vector machines viasmo-type decomposition methods. In Proceedings of the 16th International Conferenceon Algorithmic Learning Theory (ALT 2005), pages 45–62, 2005.[26] Tzu-Kuo Huang, Ruby C. Weng, and Chih-Jen Lin. A generalized Bradley-Terry model:From group competition to individual skill. In Advances in Neural Information ProcessingSystems 17. MIT Press, Cambridge, MA, 2005.[27] Ting-Fan Wu, Chih-Jen Lin, and Ruby C. Weng. Probability estimates for multi-classclassification by pairwise coupling. In Sebastian Thrun, Lawrence Saul, and BernhardSch¨olkopf, editors, Advances in Neural Information Processing Systems 16. MIT Press,Cambridge, MA, 2004.[28] Kai-Min Chung, Wei-Chun Kao, Tony Sun, and Chih-Jen Lin. Decomposition methodsfor linear support vector machines. In Proceedings of ICASSP 2003, pages 868–871, 2003.[29] Ming-Wei Chang, Chih-Jen Lin, and Ruby C. Weng. Adaptive deterministic annealingfor two applications: competing SVR of switching dynamics and travelling salesmanproblems. In Proceedings of ICONIP 2002, pages 920–924, 2002.[30] Kai-Min Chung, Wei-Chun Kao, Tony Sun, Li-Lun Wang, and Chih-Jen Lin. Radiusmargin bounds for support vector machines with the RBF kernel. In Proceedings ofICONIP 2002, pages 893–897, 2002.[31] Ming-Wei Chang, Chih-Jen Lin, and Ruby C. Weng. Analysis of nonstationary timeseries using support vector machines. In Seong-Whan Lee and Alessandro Verri, editors,Proceedings of SVM 2002, Lecture Notes in Computer Science 2388, pages 160–170, NewYork, NY, USA, 2002. Springer-Verlag Inc.[32] Ming-Wei Chang, Chih-Jen Lin, and Ruby C. Weng. Analysis of switching dynamicswith competing support vector machines. In Proceedings of IJCNN, pages 2387–2392,2002.[33] Chih-Chung Chang and Chih-Jen Lin. IJCNN 2001 challenge: Generalization ability andtext decoding. In Proceedings of IJCNN. IEEE, 2001.[34] Shuo-Peng Liao, Hsuan-Tien Lin, and Chih-Jen Lin. A note on the decomposition methodsfor support vector regression. In Proceedings of IJCNN, 2001.[35] Chih-Chung Chang, Chih-Wei Hsu, and Chih-Jen Lin. The analysis of decompositionmethods for support vector machines. In Workshop on Support Vector Machines, IJCAI99,1999.[36] Chih-Jen Lin, Nestor Michelena, and Romesh Saigal. Topological fixture synthesis usingsemidefinite programming. In Proceedings of the Third World Congress of Structural andMultidisciplinary Optimization (WCSMO-3), May 17-21 1999.[37] Chih-Jen Lin. Preconditioning dense linear systems from large-scale semidefinite programmingproblems. In Proceedings of the Fifth Copper Mountain conference on iterativemethods, 1998.• BOOK CHAPTERS[1] L´eon Bottou and Chih-Jen Lin. Support vector machine solvers. In L´eon Bottou, OlivierChapelle, Dennis DeCoste, and Jason Weston, editors, Large Scale Kernel Machines, pages1–28. MIT Press, Cambridge, MA., 2007. URL Welcome to Chih-Jen Lin's Home Pagepapers/bottou_lin.pdf.[2] Yi-Wei Chen and Chih-Jen Lin. Combining SVMs with various feature selection strategies.In Isabelle Guyon, Steve Gunn, Masoud Nikravesh, and Lofti Zadeh, editors, Featureextraction, foundations and applications. Springer, 2006.[3] Soon-Yi Wu, Shu-Cherng Fang, and Chih-Jen Lin. Analytic center based cutting planemethod for linear semi-infinite programming. In M. Goberna and M. Lopez, editors,Semi-infinite programming: recent advances. Kluwer, 2001.[4] Chih-Jen Lin, Shu-Cherng Fang, and Soon-Yi Wu. A dual affine scaling based algorithmfor solving linear semi-infinite programming problems. In D. Z. Du and J. Sun, editors,Advances in Optimization and Application, pages 217–234. Kluwer Academic Publishers,1994.• TECHNICAL REPORTS:[1] Chih-Wei Hsu, Chih-Chung Chang, and Chih-Jen Lin. A practical guide to support vectorclassification. Technical report, Department of Computer Science, National Taiwan University,2003. URL http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf.[2] Hsuan-Tien Lin and Chih-Jen Lin. A study on sigmoid kernels for SVM and the trainingof non-PSD kernels by SMO-type methods. Technical report, Department of ComputerScience, National Taiwan University, 2003. URL Welcome to Chih-Jen Lin's Home Pagepapers/tanh.pdf.[3] Jen-Hao Lee and Chih-Jen Lin. Automatic model selection for support vector machines.Technical report, Department of Computer Science and Information Engineering, NationalTaiwan University, 2000.[4] Chih-Jen Lin. Study in Large-Scale optimization. PhD thesis, University of Michigan, AnnArbor, Michigan, 1998.[5] Chih-Jen Lin and Romesh Saigal. A predictor corrector method for semi-definite linearprogramming. Technical report, Department of Industrial and Operations Engineering,University of Michigan, Ann Arbor, MI 48109-2117, 1995.[6] Chih-Jen Lin and Romesh Saigal. An infeasible start predictor corrector method for semi–definite linear programming. Technical report, Department of Industrial and OperationsEngineering, University of Michigan, Ann Arbor, MI 48109-2117, 1995.• SOFTWARE1. LIBSVM: an integrated software for support vector classification and regression, releasedApril 2000. (with C.-C. Chang)(LIBSVM -- A Library for Support Vector Machines)More then 900,000 downloads from April 2000 to October 2016.About 28,000 Google Scholar citations (up to October 2016).2. LIBLINEAR: a library for large linear classification, released April 2007. (with my researchgroup)(LIBLINEAR -- A Library for Large Linear Classification)More then 150,000 downloads from April 2007 to October 2016.3. BSVM: a decomposition method for large-scale support vector machines, released February2000. (with C.-W. Hsu)(BSVM)4. TRON: a bound-constrained optimization software, released in May 1999. (with J. J.Mor´e)(http://www.mcs.anl.gov/~more/tron)5. ICFS: an incomplete Cholesky factorization for sparse matrices, released August 1998.(with J. J. Mor´e)(http://www.mcs.anl.gov/~more/icf)• INVITED TALKS AND MISCELLANEOUS PRESENTATIONS1. “Matrix factorization and factorization machines for recommender systems.” Keynoteat the 4th Workshop on Large-Scale Recommender Systems, Boston, September 20162. “When and when not to use distributedl machine learning?” Keynote at InternationalWinter School on Big Data, Bilbao, Spain, February 20163. “Large-scale Linear and Kernel Classification.” Invited talk at Microsoft Research IndiaSummer School 2015 on Machine Learning, June 15, 20154. “Matrix factorization and factorization machines for recommender systems.” Invitedtalk at SDM workshop on Machine Learning Methods on Recommender Systems, May2, 2015.5. “Big-data machine learning: status and challenges.” Invited talk at China R Conference,Hangzhou, China, October 29, 20146. “Experiences and lessons in developing machine learning software.” Invited talk at IndustryTrack, ACM Conference on Information and Knowledge Management (CIKM),Shanghai, November 4, 20147. “Large-scale linear classification: status and challenges.” Invited talk at San FranciscoMachine Learning Meetup, October 30, 20148. “Big-data machine learning.” Invited speech at eBay Data Summit, Shanghai, China,October 25, 20149. “Big-data analytics: challenges and opportunities.” Kenote speech at Taiwan DataScience Conference, Taipei, August 30, 2014.10. “Distributed data classification.” Invited talk at Workshop on New Learning Frameworksand Models for Big Data, ICML, June 25, 2014.11. “Distributed data classification.” Invited talk at Workshop on Scalable Data Analytics,PAKDD, May 13, 201412. “Large-scale machine learning.” Invited talk at International Conference on Big Dataand Cloud Computing, Xiamen, China, December 29, 2013.13. “Distributed Newton methods for CTR (Click Through Rate) prediction.” Invited talk atMysore park workshop on distributed computing for machine learning and optimization,India, December 19, 2013.14. “Recent advances in large-scale linear classification.” Invited talk at Asian Conferenceon Machine Learning, November 15, 201315. “Experiences and lessons in developing machine learning and data mining software,”Invited talk at China R Conference, Shanghai, China, November 2, 201316. “Optimization and machine learning.” Plenary talk at 11th EUROPT Workshop onAdvances in Continuous Optimization, Florence, Italy, June 26, 201317. “Optimization and machine learning,” 25th Simon Stevin Lecture, K. U. Leuven Optimizationin Engineering Center, Leuven, Belgium, January 17, 2013.18. “Machine learning software: design and practical use,” invited talk at Machine LearningSummer School (MLSS), Kyoto, August 2012.19. “Experiences and lessons in developing industry-strength machine learning and datamining software,” invited talk at Industry Practice Expo of ACM KDD 2012, Beijing,August 2012.20. “Machine learning software: design and practical use,” invited talk at Machine LearningSummer School (MLSS), Santa Cruz, July 2012.21. “Large-scale machine learning in distributed environments,” tutorial at ACM InternationalConference on Multimedia Retrieval, June, 201222. “Support vector machines and kernel methods,” invited tutorial at Asian Conference onMachine Learning, Tokyo, Japan, November 8, 201023. “Support vector machines and kernel methods,” plenary talk at International Workshopon Recent Trends in Learning, Computation, and Finance, Pohang, Korea, August 30,2010.24. “Training support vector machines: status and challenges,” invited speaker at ICML2008 Workshop on Large Scale Learning Challenge.25. “Training support vector machines: status and challenges,” invited speaker at GoogleMachine Learning Summit, May 2008.26. “Support vector machines,” invited tutorial speaker at Machine Learning Summer School(MLSS), Taipei, July 2006.27. “Training linear and non-linear SVMs,” invited talk at Workshop on Mathematics andMedical Diagnosis, Erice, Italy, July 2006.28. “Support vector machines for data classification,” invited tutorial at ICONIP 2005, Taiwan,October 30, 2005.29. “Optimization issues in training support vector machines,” the 16th international conferenceon Algorithmic Learning Theory, Singapore, October 9, 2005 (invited talk).30. “Support vector machines for data classification,” XXXVI Annual Conference of the ItalianOperational Research Society, Camerino, Italy, September 8, 2005 (invited plenarytalk).31. “Generalized Bradley-Terry model and multi-class probability estimates,” ISI (InternationalStatistical Institute) 2005, Australia, April 6, 2005 (talk in an invited session).32. “Report on NIPS 2003 Feature Selection Competition,” NIPS workshop on feature selectioncompetition, Canada, December 12, 2003.33. “Optimization techniques for data mining and machine learning,” invited talk in Workshopon Optimization and Control, National Cheng Kung University, Tainan, Taiwan,January 6, 2003.34. “Support vector machines for time series segmentation,” invited talk in the 2002 TaipeiInternational Statistical Symposium and Bernoulli Society EAPR Conference, Taipei,July 7-10, 2002.35. “Support vector machines for protein classification/prediction,” invited talk at the 8thSymposium on Recent Advances in Biophysics, Taipei, May 23, 2002.36. “Automatic model selection using the decomposition methods,” NIPS workshop on kernelmethods, Breckenridge, CO, December 1, 2000.37. “Newton’s method for support vector machines.” Talk at the Sixth SIAM Conferenceon Optimization, Atlanta, May 1999.38. “Structural optimization and semidefinite programming,” Talk at INFORMS Fall meeting,Seattle, October 1998.39. “Preconditioning dense linear systems from large-scale semidefinite programming problems,”Talk at the Fifth Copper Mountain Conference on Iterative Methods, CopperMountain, Colorado, April, 1998.40. “Incomplete Cholesky factorizations with limited memory.” Talk at the Fourth KalamazooSymposium on Matrix Analysis & Applications, Kalamazoo, MI, October, 1997.41. “Newton’s method for large bound-constrained optimization problems.” Talk at InternationalSymposium on Mathematical Programming, Lausanne, Switzerland , August,1997.42. “An unconstrained convex programming approach for solving linear semi-infinite programmingproblems.” Talk at International Symposium on Mathematical Programming,Lausanne, Switzerland , August, 1997.43. “An infeasible start predictor corrector method for semidefinite linear programming .”Talk at Fifth SIAM Optimization Conference, Victoria, British Columbia, Canada, May1996.• ACADEMIC SERVICES1. Editorial services– Action editor, Data Mining and Knowledge Discovery, 2009–– Editorial board member, ACM Transactions on Intelligent Systems and Technology,2012–– Associate editor, IEEE Transactions on Neural Networks, 2005–2010– Associate editor, Journal of Information Science and Engineering, 2009–2013– Guest editor: special issue on Support Vector Machines, Neurocomputing, 2003.2. Reviewer for the following journals– Journal of Machine Learning Research– Machine Learning– Neural Computation– SIAM Journal on Matrix Analysis and Applications– SIAM Journal on Optimization– IEEE Transactions on Neural Networks– IEEE Transactions on Pattern Analysis and Machine Intelligence– IEEE Transactions on Knowledge and Data Engineering– IEEE Transactions on Big Data– IEEE Transactions on Fuzzy Systems– IEEE Transactions on Image Processing– IEEE Transactions on Signal Processing– IEEE Signal Processing Letters– IEEE Transactions on Evolutionary Computation– IEEE Transactions on Systems, Man, and Cybernetics– IEEE Transactions on Semiconductor Manufacturing– IEEE Transactions on Antennas and Propagation– IEEE Transactions on Automation Science and Engineering– IEEE Transactions on Audio, Speech and Language Processing– Biometrika– Neurocomputing– Bioinformatics– BMC Bioinformatics– Theory of Computing Systems– Neural Processing Letters– Signal Processing– International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI)– Artificial Intelligence Review– Pattern Analysis & Applications– Computational Intelligence and Neuroscience– IIE Transactions– Annals of the Institute of Statistical Mathematics– Journal of Statistical Planning and Inference– Statistics and Computing– Communications in Statistics– Pattern Recognition– Pattern Recognition Letters– Knowledge and Information Systems– Computational Optimization and its Applications– INFORMS Journal on Computing– Journal of Global Optimization– Optimization– Numerical Algorithms– Information Processing and Management– Internet Electronic Journal of Molecular Design– International Journal of Operations and Quantitative Management– International Journal of Computer Mathematics– Journal of Information Science and Engineering– Journal of Computer Science and Technology (JCST)– Journal of Formosan Medical Association– Journal of Chinese Institute of Industrial Engineers– Journal of the Chinese Institute of Engineers– Journal of the Chinese Institute of Electrical Engineering3. Reviewer for several book chapters4. Conference chair, Area chair, or senior program committee member:– General co-chair, Mysore park workshop on distributed computing for machine learningand optimization, India, 2013– Senior PC, ACM SIGKDD international conference on Knowledge discovery anddata mining (KDD), 2013, 2014, 2015, 2016– Senior PC, SIAM international conference on data mining (SDM), 2017– Area chair, Neural Information Processing Systems (NIPS) 2007, 2010, 2011, 2015– Area chair, International Conference on Machine Learning (ICML), 2016, 2017– General co-chair, Asian Conference on Machine Learning (ACML) 2011– Senior PC, Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD),2013, 2014, 2015, 2016– Senior PC, AAAI 2017– Senior PC, IJCAI 2011 (IEAI track)– Senior PC, Asian Conference on Machine Learning (ACML) 20105. Program committee member:– AAAI 2016– International Joint Conference on Artificial Intelligence (IJCAI) , 2015– Workshop on Large-Scale Recommender Systems at ACM RecSys, 2014– The International Workshop on advances in Regularization, Optimization, Kernelmethods and Support vector machines: theory and applications (ROKS-2013), Belgium.– ACM SIGKDD international conference on Knowledge discovery and data mining(KDD), Washington D.C. 2010, San Diego, 2011, Beijing, 2012– SIAM international conference on data mining (SDM), 2013– AI & Statistics 2010, 2014– NIPS Workshop on Optimization for Machine Learning (2008, 2009, 2010, 2011,2012, 2013)– NIPS Workshop on AutoML (2014)– International Conference on Machine Learning (ICML), Helsinki 2008, Montreal2009, Haifa 2010, Bellevue, WA 2011, Scotland, 2012, Atlanta, 2013, Beijing, 2014– European Conference on Machine Learning (ECML) and European Conference onPrinciples and Practice of Knowledge Discovery in Databases (PKDD), 2008, 2010,– International Joint Conference on Neural Networks (IJCNN), Hong Kong 2008, SanJose, CA 2011– Pacific-Rim Conference on Multimedia (PCM), Hong Kong 2007, Bangkok, Thailand2009, Shanghai, China 2010.– IEEE International Conference on Multimedia & Expo (ICME), Beijing 2007, Hannover2008.– Asian Conference on Machine Learning (ACML), 2009– NIPS 2006 Workshop on Machine Learning Open Source Software.– ACM Multimedia Conference (ACM MM), Santa Barbara 2006– International Colloquium on Grammatical Inference (ICGI), Japan 2006– International workshops on Statistical Techniques in Pattern Recognition (SPR),Hong Kong 2006, Orlando, Florida, 2008, Turkey, 2010.– Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Singapore2006, China 2007, Osaka, Japan 2008, Thailand 2009– International Conference on Neural Information Processing (ICONIP), India 2004,Hong Kong 2006– International Workshop on Pattern Recognition with Support Vector Machines (SVM2002),Canada– Fourth Asia-Pacific Conference on Industrial Engineering and Management Systems,2002, Taiwan6. Reviewer for the following conferences– Neural Information Processing Systems (NIPS), 2003, 2004, 2005, 2006, 2014, 2016– Conference on Learning Theory (COLT), 2003, 2009– International Joint Conference on Neural Networks (IJCNN), 2003, 2004, 2005– IEEE International Conference on Multimedia & Expo (ICME), 2009– First Asia-Pacific Bioinformatics Conference, Australia, 2003– The Seventh Pacific Rim International Conference on Artificial Intelligence, (PRICAI-02)7. Other conference planning and administration– Special session organizer, ICONIP 2002, Singapore8. Thesis External Reviewers:– University of Trento, Italy: Nicola Segata (Ph.D. 2009)– Jin Yu: Australian National University (Ph.D. 2009)– Ruhr-Universit¨at Bochum: Tobias Glasmachers (Ph.D. 2008)– Hongkong University of Science and Techonology: Ivor Tsang (Ph.D. 2007)– National University of Singapore: Chu Wei (Ph.D. 2003), Kaibo Duan (Ph.D. 2003),Jianbo Yang (Ph.D., 2011)– Nanyang Technological University, Mingkui Tan (Ph.D. 2014)– Chinese University of Hongkong: Wan Zhang (M. Phil. 2003)9. Proposal Reviewers:– Research Grants Council, Hong Kong, 2006, 2007, 2008, 2009, 2010– American University of Beirut, 2009– Czech Science Foundation, 201010. Other Services:– IEEE CS society fellow evaluation committee member (2011, 2012)• TALKS IN ACADEMIC INSTITUTES AND INDUSTRY– International:1. Microsoft, Redmond, Washington, October 6, 20162. Guangdong University of Technology, Guangzhou, China, June 20, 20163. Samsung Research America, California, June 10, 20164. UC Davis, California, May 4, 20165. Netflix, California, May 3, 20166. Huawei Research Labs, Shenzhen, China, April 19, 20167. Chinese University of Hong Kong, Shenzhen, China, April 18, 20168. Facebook, California, November 13, 20159. Quora, California, November 12, 201510. Nanjing University, December 25, 201411. University of Electronic Science and Technology of China, Chengdu, China, November30 and December 1, 2014 (two talks)12. Twitter, California, October 31, 201413. eBay China, October 24, 201414. Microsoft Research, New York City, August 22, 2014 (open machine learning softwareworkshop)15. Microsoft, Redmond, Washington, August 18, 201416. Criteo, California, August 1, 201417. Databricks, California, July 31, 201418. Research Center on Fictitious Economy and Data Science, Chinese Academy ofSciences, Beijing, China, June 27, 201419. Institute of Computational Mathematics and Scientific/Engineering Computing, ChineseAcademy of Sciences, Beijing, China, June 26, 201420. Samsung Research America, California, May 23, 201421. Walmart Labs, California, April 23, 201422. Pandora, California, April 22, 201423. Alibaba, Hangzhou, China, December 27, 201324. eBay China, November 1, 201325. Shanghai Jiao Tong University, October 31, 201326. Microsoft Research, Redmond, August 15, 201327. University of Rome “La Sapienza,” June 25, 201328. K. U. Leuven, Belgium, January 14-16, 201329. Baidu, China, October 24, 201230. Luminescent technology, California, August 24, 201231. eBay Machine Learning Forum, San Jose, California, February 17, 201232. City University of Hong Kong, December 30, 201133. NEC Labs, Cupertino, California, August 26, 201134. Adobe, California, August 25, 201135. eBay research, San Jose, California, December 7, 201036. Facebook, Palo Alto, California, December 6, 201037. Baidu, China, September 3, 201038. Google Research New York, July 29, 201039. Yahoo! Research, Santa Clara, California, July 23, 201040. China Agriculture University, October 16, 200941. Microsoft Research Asia, October 13, 200942. Department of Computer Science and Engineering, Hong Kong University of Scienceand Technology, February 5, 200943. Department of Computer Science and Technology, Tsinghua University, China, September5, 200844. HP Labs China, June 26, 200845. IBM T. J. Watson Research Center, May 16, 200846. Department of Industrial and Operations Engineering, University of Michigan, August15, 200747. Yahoo! Research, Santa Clara, California, February 20, 200748. NEC Labs, Princeton, New Jersey, February 15, 200749. Siemens Corporate Research, Princeton, New Jersey, February 14, 200750. AT&T Research, February 13, 200751. California Institute of Technology, November 14, 200652. School of Information and Computer Science, University of California, Irvine, November6, 200653. Yahoo! Research, Burbank, California, August 30, 200654. Mathematics and computer science division, Argonne National Lab., June 23, 200655. Chinese University of Hong Kong, Hone Kong, December 12, 200556. Nanyang Technological University, Singapore, October 10, 200557. Universit`a di Roma ”La Sapienza” and Isituto di Analisi dei Sistemi ed Informaticadel CNR, Italy, September 1-2, 2005 (a short course).58. CWI (Dutch National Research Institute for Mathematics and Computer Science),February 9, 200459. Department of Electronics and Computer Science, University of Southampton, February2-6, 2004 (two talks)60. Department of Computer Science, University of Essex, January 22, 200461. Department of Statistics and Probability Theory, Vienna University of Technology,September 4, 200362. Fraunhofer Institute for Computer Architecture and Software Technology, Germany,August 18, 200363. Department of Computer Science, University of Essex, August 13, 200364. University of Freiburg, Germany, July 15, 200365. Max Planck Institute of Biological Cybernetics, Germany, July 9, 200366. University of Tuebingen, Germany, July 8, 200367. KXEN Corporation, Suresnes, France, February 17, 200368. Max Planck Institute of Informatics (Computer Science), Germany, February 10-16,2003 (two talks)69. Max Planck Institute of Biological Cybernetics, Germany, January 12-February 10,2003 (three talks)70. Department of Electrical and Computer Engineering, University of Michigan-Dearborn,August 27, 200271. Siemens Corporate Research, Princeton, New Jersey, August 21, 200272. Department of Computer Science, Binghamton University, August 19, 200273. Merck research Lab., New Jersey, August 16, 200274. Agilent Inc., Colorado, July 31, 200175. Ford Research Lab., Michigan, July 24, 200176. Department of Electrical Engineering, Ohio State University, August 29, 2000.– Domestic:1. Institute of Statistics, National Tsing Hua University, April 29, 20162. Industrial Technology Research Institute, October 7, 8, 21, and 22, 2015 (a shortcourse on data mining)3. Industrial Technology Research Institute, July 18, 22, 24, and August 12, 2014 (ashort course on data mining)4. Interdisplinary Science Program, National Chiao Tung University, March 28, 20145. Institute of Biomedical Electronics and Bioinformatics, National Taiwan University,September 24, 20126. Department of Mathematics, National Taiwan University, October 17, 20117. Department of Financial and Computational Mathematics, Providence University,September 22, 20118. Department of Mathematics, National Taiwan Normal University, April 20, 20119. Department of Applied Informatics, Fo Guang University, April 14, 201110. Department of Information Management, National Taiwan University, February 25,11. Institute of Information Science, Academia Sinica, February 16, 201112. Department Computer Science and Information Engineering, Chaoyang Universityof Technology, October 29, 201013. Graduate Institute of Communication Engineering, National Taiwan University,September 27, 201014. Department Computer Science and Information Engineering, National Central University,November 12, 200815. Department of Information Management, Chaoyang University of Technology, October30, 200716. Department Computer Science and Information Engineering, National Cheng-KungUniversity, October 26, 200717. Department of Computer Science, National Chengchi University, November 10, 200518. Department of Computer Science, National Chi-Nan University, September 24, 200419. Institute of Information Science, Academia Sinica, April 15, 200420. Department of Statistics, National Chiao Tung University, April 9, 200421. Computer and Communications Research Laboratories, Industrial Technology ResearchInstitute, February 27 and March 3, 2004 (8 hours)22. Computer and Communications Research Laboratories, Industrial Technology ResearchInstitute, November 18, 200323. Department of Information Management, Chaoyang University of Technology, November4, 200324. Graduate Institute of Industrial Engineering, National Taiwan University, April 23,25. Department Mathematics, National Taiwan University, March 10, 200326. Department of Information and Computer Engineering, Chung Yuan Christian University,December 16, 200227. Department of Statistics, Feng Chia University, November 1, 200228. Department of Statistics, National Chengche University, October 14, 200229. Asian BioInnovations Corporation, Taipei, June 14, 200230. Graduate Program in Bioinformatics, National Yang Ming University, March 29,31. Department of Information Science and Management, Providence University, March22, 200232. Department of Computer Science and Information Engineering, National TaiwanUniversity of Science and Technology, March 11, 200233. Institute of Statistical Science, Academia Sinica, January 16, 200234. Department Mathematics, National Taiwan University, January 5, 200235. Institute of Computer Science and Information Engineering, Chang Gung University,December 4, 2001.36. Graduate Institute of Medical Informatics, Taipei Medical University, November 22,2001.37. Department of Information Management, National Taichung Institute of Technology,October 23, 2001.38. Graduate Institute of Industrial Engineering, National Taiwan University, October3, 200139. Department of Information Management, National Taiwan University of Science andTechnology, September 27, 200140. Department of Biological Science and Technology, National Chiao Tung University,September 26, 200141. Institute of Information Science, Academia Sinica, August 28-29, 200142. Department Computer Science and Information Engineering, National Cheng-KungUniversity, May 25, 200143. Department of Information and Computer Education, National Taiwan Normal University,April 9, 200144. Institute of Statistical Science, Academia Sinica, February 19, 200145. Department Computer Science and Information Engineering, National Central University,January 17, 200146. Division of Biostatistics and Bioinformatics, National Health Research Institutes,December 6, 200047. Institute of Biochemistry, National Yang-Ming University, June 5, 200048. Department Computer Science and Information Engineering, National Chung ChengUniversity, May 22, 200049. Institute of Information Science, Academia Sinica, November 19, 199950. Department of Computer Science, National Tsing Hua University, June 2, 199951. Department Computer Science and Information Engineering, National Taiwan University,March 5, 199952. Department of Industrial Engineering, National Tsing Hua University, December 24,53. Department Computer Science and Information Engineering, National Taiwan University,December 26, 199754. Department Mathematics, National Cheng-Kung University, December 19, 199755. Institute of Information Management, National Chi-Nan University, December 18,56. Department of Industrial Engineering, National Tsing Hua University, December 17,57. Department Mathematics, National Cheng-Kung University, May, 1997• TEACHING EXPERIENCE1. Operations Research (Fall 1998, Fall 1999, Fall 2000)2. Scientific computing (Winter 1999, Winter 2000)3. Numerical methods (Winter 2001, Winter 2002, Winter 2003, Winter 2009, Winter 2010,Winter 2011, Winter 2013, Winter 2014, Winter 2016)4. Statistical learning theory (Fall 1999, Fall 2000, Fall 2001, Fall 2002, Fall 2003, Fall 2004,Fall 2005)5. Data mining and machine learning (Fall 2001, Fall 2002, Winter 2004, Winter 2005,Winter 2006, Winter 2007)6. Introduction to the theory of computation (Fall 2003, Fall 2004, Fall 2005, Fall 2007,Fall 2008, Fall 2009, Fall 2010, Fall 2011, Fall 2012, Fall 2013, Fall 2014, Fall 2015)7. Machine learning: theory and practice (Winter 2007, Winter 2010, Winter 2013)8. Optimization and machine learning (Fall 2010, Fall 2011, Winter 2014, Fall 2015)• MEMBERSHIPS: IEEE (fellow), ACM (fellow), AAAI (fellow)That’s all folks !! Hope you had a nice trip. :)

What are the latest topics for research papers on cryptography?

You can use any of the research paper as reference for latest topics in Cryptography:Source:Security, Cryptography, and Privacy200 PublicationsAd Injection at Scale: Assessing Deceptive Advertisement ModificationsKurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu RajabProceedings of the IEEE Symposium on Security and Privacy (2015)Adding Third-Party Authentication to Open edX: A Case StudyJohn Cox, Pavel SimakovProceedings of the Second (2015) ACM Conference on Learning @ Scale, ACM, New York, NY, USA, pp. 277-280Framing Dependencies Introduced by Underground CommoditizationKurt Thomas, Danny Huang, David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni VignaWorkshop on the Economics of Information Security (2015)GraphSC: Parallel Secure Computation Made EasyKartik Nayak, Xiao S. Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine ShiIEEE Symposium on Security and Privacy, IEEE (2015) (to appear)Improving SSL Warnings: Comprehension and AdherenceAdrienne Porter Felt, Alex Ainslie, Robert W. Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, Jeff GrimesProceedings of the Conference on Human Factors and Computing Systems, ACM (2015)Internal Access ControlsGeetanjali SampemaneCommunications of the ACM, vol. 58 (2015), pp. 62-65SAC070 - SSAC Advisory on the Use of Static TLD / Suffix ListsWarren Kumari, Jaap Akkerhuis, Patrik FältströmICANN SSAC Reports and Advisories, ICANN (2015), pp. 32 (to appear)Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at GoogleJoseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, Mike WilliamsonWWW'15 - Proceedings of the 22nd international conference on World Wide Web, ACM (2015)Swapsies on the Internet: First Steps towards Reasoning about Risk and Trust in an Open WorldSophia Drossopoulou, James Noble, Mark S. MillerTenth Workshop on Programming Languages and Analysis for Security (PLAS 2015), ACMThe Correctness-Security Gap in Compiler OptimizationVijay D'Silva, Mathias Payer, Dawn SongSecurity and Privacy Workshops (SPW), 2015 IEEE, IEEE, pp. 73-87The Performance Cost of Shadow Stacks and Stack CanariesThurston H.Y. Dang, Petros Maniatis, David WagnerProceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS), ACM (2015), pp. 555-566Thwarting Fake OSN Accounts by Predicting their VictimsYazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, Elizeu Santos-NetoAI-Sec'2015, ACM (to appear)Trends and Lessons from Three Years Fighting Malicious ExtensionsNav Jagpal, Eric Dingle, Jean-Philippe Gravel, Panayiotis Mavrommatis, Niels Provos, Moheeb Abu Rajab, Kurt ThomasUSENIX Security Symposium (2015)Understanding Sensitivity by Analyzing AnonymitySai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali SampemaneIEEE Security & Privacy, vol. 13 (2015), pp. 14-21A Language-Based Approach to Secure Quorum ReplicationLantian Zheng, Andrew C. MyersProceedings of the Ninth Workshop on Programming Languages and Analysis for Security (2014), pp. 27-39BeyondCorp: A New Approach to Enterprise SecurityRory Ward, Betsy Beyer;login:, vol. Vol. 39, No. 6 (2014), pp. 6-11Cloak and Swagger: Understanding Data Sensitivity through the Lens of User AnonymitySai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, IEEE Computer Society, pp. 493-508Communities, Random Walks, and Social Sybil Defense.Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro PanconesiInternet Mathematics (2014)Dialing Back Abuse on Phone Verified AccountsKurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoyProceedings of the 21st ACM Conference on Computer and Communications Security (2014)Dividing secrets to secure data outsourcingFatih Emekci, Ahmed Methwally, Divyakant Agrawal, Amr El AbbadiInformation Sciences, vol. 263 (2014), pp. 198-210Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVMCaroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff PikeProceedings of the 23rd Usenix Security Symposium, USENIX, San Diego, CA (2014)Experimenting At Scale With Google Chrome's SSL WarningAdrienne Porter Felt, Robert W. Reeder, Hazim Almuhimedi, Sunny ConsolvoACM CHI Conference on Human Factors in Computing Systems (2014)Handcrafted Fraud and Extortion: Manual Account Hijacking in the WildElie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan SavageIMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference, ACM, 1600 Amphitheatre Parkway, pp. 347-358Helping You Protect YouM. Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, L. Jean CampIEEE (2014), pp. 39-42Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the CloudArnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, Mark LentcznerNetwork and Distributed System Security Symposium, Internet Society (2014)MiniBox: A Two-Way Sandbox for x86 Native CodeYanlin Li, Jonathan McCune, James Newsome, Adrian Perrig, Brandon Baker, Will DrewryProceedings of the Usenix Annual Technical Conference, Usenix (2014)Moving Targets: Security and Rapid-Release in FirefoxSandy Clark, Michael Collis, Matt Blaze, Jonathan M. SmithProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, New York, NY, pp. 1256-1266RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal ResponseÚlfar Erlingsson, Vasyl Pihur, Aleksandra KorolovaProceedings of the 21st ACM Conference on Computer and Communications Security, ACM, Scottsdale, Arizona (2014) (to appear)RFC7344 - Automating DNSSEC Delegation Trust MaintenanceWarren KumariIETF RFCs, Internet Engineering Task Force (2014)SSAC Advisory on Search List ProcessingWarren Kumari, Jaap Akkerhuis, Don BlumenthalICANN SSAC Reports and Advisories, ICANN (2014), pp. 17Securing the Tangled WebChristoph KernCommunications of the ACM, vol. 57, no. 9 (2014), pp. 38-47The End is Nigh: Generic Solving of Text-based CAPTCHAsElie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. MitchellWOOT'14 Proceedings of the 8th USENIX conference on Offensive Technologies, Usenix (2014)Tick Tock: Building Browser Red Pills from Timing Side ChannelsGrant Ho, Dan Boneh, Lucas Ballard, Niels Provos8th USENIX Workshop on Offensive Technologies (WOOT 14), USENIX Association (2014)Would a Privacy Fundamentalist Sell Their DNA for $1000...If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and ConsequencesAllison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, Alessandro AcquistiProceedings of the Symposium On Usable Privacy and Security: SOUPS '14, USENIX (2014)Your Reputation Precedes You: History, Reputation, and the Chrome Malware WarningHazim Almuhimedi, Adrienne Porter Felt, Robert W. Reeder, Sunny ConsolvoProceedings of the Symposium On Usable Privacy and Security: SOUPS '14, USENIX (2014)ZARATHUSTRA: Extracting WebInject Signatures from Banking TrojansClaudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico MaggiTwelfth Annual International Conference on Privacy, Security and Trust, IEEE (2014), pp. 139-148“My religious aunt asked why I was trying to sell her viagra”: Experiences with account hijackingRichard Shay, Iulia Ion, Robert W. Reeder, Sunny ConsolvoProceedings of the SIGCHI Conference on Human Factors in Computing Systems: CHI '14, ACM, New York, NY, USA (2014), pp. 2657-2666Advisory on Internal Name CertificatesWarren Kumari, Steve Crocker, Patrik Fältström, Ondrej Filip, James Galvin, Danny McPherson, Ram Mohan, Doron ShikmoniICANN SSAC Reports and Advisories, ICANN (Internet Corporation for Assigned Names and Numbers) (2013)Alice in Warningland: A Large-Scale Field Study of Browser Security Warning EffectivenessDevdatta Akhawe, Adrienne Porter FeltUSENIX Security Symposium, USENIX (2013)Anti-forensic resilient memory acquisitionJohaness Stuerrgen, Michael CohenDigital Investigation, vol. 10 (2013), S105-S115Authentication at ScaleEric Grosse, Mayank UpadhyayIEEE Security and Privacy, vol. 11 (2013), pp. 15-22CAMP: Content-Agnostic Malware ProtectionMoheeb Abu Rajab, Lucas Ballard, Noe Lutz, Panayiotis Mavrommatis, Niels ProvosNetwork and Distributed Systems Security Symposium (NDSS), Network and Distributed Systems Security Symposium (NDSS), USA (2013)Cross Platform Network Access ControlPaul (Tony) WatsonRVASec 2013, RVASec 2013, RIchmond, VACrowd-Sourced Call Identification and SuppressionDaniel V. Klein, Dean K. JacksonFederal Trade Commission Robocall Challenge (2013)Design, Implementation and Verification of an eXtensible and Modular Hypervisor FrameworkAmit Vasudevan, Sagar Chaki, Limin Jia, Jonathan McCune, James Newsome, Anupam DattaIEEE Symposium on Security and Privacy (2013) (to appear)Distributed Electronic Rights in JavaScriptMark S. Miller, Tom Van Cutsem, Bill TullohESOP'13 22nd European Symposium on Programming, Springer (2013)Hunting in the Enterprise: Forensic Triage and Incident ResponseAndreas Moser, Michael CohenDigital Investigation, vol. 10 (2013), pp. 89-98Identifying and Exploiting Windows Kernel Race Conditions via Memory Access PatternsMateusz Jurczyk, Gynvael ColdwindBochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns, The Symposium on Security for Asia Network, 102F Pasir Panjang Road, #08-02, Singapore 118530 (2013), pp. 69Making programs forget: Enforcing Lifetime for Sensitive DataJayanthkumar Kannan, Gautam Altekar, Petros Maniatis, Byung-Gon ChunProceedings of the 13th USENIX conference on Hot topics in operating systems, USENIX Association, Berkeley, CA, USA (2013)Rogue Femtocell Owners: How Mallory Can Monitor My DevicesDavid Malone, Darren F Kavanagh, Niall Richard Murphy2013 Proceedings IEEE INFOCOM, IEEE, New Jersey, USA, pp. 3553-3558S-links: Why distributed security policy requires secure introductionJoseph BonneauWeb 2.0 Security & Privacy 2013, IEEESAC062 - SSAC Advisory Concerning the Mitigation of Name Collision RiskWarren KumariICANN SSAC Reports and Advisories, ICANN (2013)Sok: The Evolution of Sybil Defense via Social NetworksLorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro Panconesi2013 IEEE Symposium on Security and Privacy, SP 2013Strato: A Retargetable Framework for Low-level Inlined Reference MonitorsBin Zeng, Gang Tan, Úlfar ErlingssonProceedings of the 22nd USENIX Conference on Security, USENIX Association, Berkeley, CA, USA (2013), pp. 369-382The Dangers of Composing Anonymous ChannelsEmilia Kasper, George DanezisInformation Hiding - 14th International Conference, IH 2012, Revised Selected Papers, Springer, Lecture notes in Computer Science (2013), pp. 191-206Trustworthy Proxies: Virtualizing Objects with InvariantsTom Van Cutsem, Mark S. MillerECOOP 2013Verified Boot on Chrome OS and How to do it yourselfSimon GlassEmbedded Linux Conference Europe, Linux Foundation, 660 York Street, Suite 102, San Francisco, CA 94110, USA (2013)Verifying Cloud Services: Present and FutureSara Bouchenak, Gregory Chockler, Hana Chockler, Gabriela Gheorghe, Nuno Santos, Alexander ShraerOperating Systems Review (2013)A taste of Capsicum: practical capabilities for UNIXRobert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris KennawayCommunications of the ACM, vol. 55(3) (2012), pp. 97-104Advisory on Impacts of Content Blocking via the Domain Name SystemWarren Kumari, Alain Aina, Jaap Akkerhuis, Don Blumenthal, KC Claffy, David Conrad, Patrik Fältström, James Galvin, Jason Livingood, Danny McPherson, Ram Mohan, Paul VixieICANN SSAC Reports and Advisories, ICANN (Internet Corporation for Assigned Names and Numbers) (2012)Browser Exploits as a Service: The Monetization of Driveby DownloadsC. Grier, L. Ballard, J. Caballero, N. Chachra, C. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, Z. Rafique, M. Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, G. VoelkerProceedings of 19th ACM Conference on Computer and Communications Security (2012)Cloud Data Protection for the MassesDawn Song, Elaine Shi, Ian Fischer, Umesh ShankarComputer, vol. 45, no. 1 (2012), pp. 39-45Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware TokensAssaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti YungApplied Cryptography and Network Security - 10th International Conference, ACNS 2012, Springer, pp. 30-47Enhanced multi-factor authenticationLantian ZhengPatent (2012)How well can congestion pricing neutralize denial of service attacks?Ashish Vulimiri, Gul A. Agha, Philip Brighten Godfrey, Karthik LakshminarayananProceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, ACM, New York, NY, USA (2012), pp. 137-150Let's Parse to Prevent PwnageMike Samuel, Úlfar ErlingssonUSENIX workshop on Large-Scale Exploits and Emergent Threats, USENIX (2012)Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity PlatformsAmit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian PerrigTRUST 2012, Lecture Notes in Computer Science, pp. 21Manufacturing Compromise: The Emergence of Exploit-as-a-ServiceChris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. VoelkerProceedings of 19th ACM Conference on Computer and Communications Security (2012)Non-interactive CCA-Secure threshold cryptosystems with adaptive security: new framework and constructionsBenoit Libert, Moti YungProceedings of the 9th international conference on Theory of Cryptography, Springer-Verlag, Berlin, Heidelberg (2012), pp. 75-93Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the WebMichael Dietz, Alexei Czeskis, Dirk Balfanz, Dan Wallach21st USENIX Security Symposium, The USENIX Association (2012), pp. 317-332RFC6583 - Operational Neighbor Discovery ProblemsWarren Kumari, Igor Gashinsky, Yahoo!, Joel Jaeggli, ZyngaIETF RFCs, Internet Engineering Task Force (2012)Robust Trait Composition for JavaScriptTom Van Cutsem, Mark S. MillerScience of Computer Programming: Special Issue on Advances in Dynamic Languages (2012)Scalable group signatures with revocationBenoit Libert, Thomas Peters, Moti YungProceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, Springer-Verlag, Berlin, Heidelberg (2012), pp. 609-627Security and TestingKurt RosenfeldIntroduction to Hardware Security and Trust, Springer (2012) (to appear)Vanity or Privacy? Social Media as a Facilitator of Privacy and TrustJessica StaddonCSCW Workshop: Reconciling Privacy with Social Media (2012)Address space randomization for mobile devicesHristo Bojinov, Dan Boneh, Rich Cannings, Iliyan MalchevWiSec '11 - Proceedings of the fourth ACM conference on wireless network security, ACM, New York, NY (2011)App Isolation: Get the Security of Multiple Browsers with Just OneEric Y. Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson18th ACM Conference on Computer and Communications Security, ACM (2011)Automated Analysis of Security-Critical JavaScript APIsAnkur Taly, Úlfar Erlingsson, John C. Mitchell, Mark S. Miller, Jasvir NagraIEEE Symposium on Security & Privacy (SP), IEEE (2011)Digital Forensics with Open Source ToolsCory Altheide, Harlan CarveySyngress (2011)Distributed forensics and incident response in the enterpriseMichael Cohen, Darren Bilby, Germano CaronniJournal of Digital Investigation, vol. 8 (2011), S101-S110Fast Elliptic Curve Cryptography in OpenSSLEmilia KasperFinancial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR, SpringerHardware Trojan Detection Solutions and Design-for-Trust ChallengesKurt RosenfeldIEEE Computer (2011), pp. 64-72Indirect Content Privacy Surveys: Measuring Privacy Without Asking About ItAlex Braunstein, Laura Granka, Jessica StaddonSymposium on Usable Privacy and Security (SOUPS), ACM SIGCHI (2011)Public vs. Publicized: Content Use Trends and Privacy ExpectationsJessica Staddon, Andrew Swerdlow6th USENIX Workshop on Hot Topics in Security (HotSec '11), USENIX (2011)Rootkits in your web applicationArtur Janc28C3: Chaos Communications Congress, Berlin, Germany (2011)Security Challenges During VLSI TestKurt RosenfeldProceedings of 2011 IEEE NEWCAS Conference, IEEESecurity-Aware SoC Test Access MechanismsKurt RosenfeldProceedings of the 2011 IEEE VLSI Test SymposiumShellOS: Enabling fast detection and forensic analysis of code injection attacksKevin Snow, Srinivas Krishnan, Fabian Monrose, Niels ProvosUSENIX Security Symposium (2011)Third International Symposium on Engineering Secure Software and Systems, ESSoS 2011Úlfar Erlingsson, Roel Wieringa, Nicola Zannone, editors.Springer Verlag, Berlin / HeidelbergTransparency and Choice: Protecting Consumer Privacy in an Online WorldAlma Whitten, Sean Harvey, Ian Fette, Betsy Masiello, Jochen Eisinger, Jane HorvathW3C Workshop on Web Tracking and User Privacy, W3C (2011), pp. 3Automata Evaluation and Text Search Protocols with Simulation Based SecurityCarmit Hazay, Rosario Gennaro, Jeffrey SorensenGoogle, Inc. (2010)Dagstuhl Seminar 09141: Web Application Security (Abstracts collection)Dan Boneh, Úlfar Erlingsson, Martin Johns, Benjamin LivshitsDagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, Dagstuhl, Germany (2010)Drac: An Architecture for Anonymous Low-Volume CommunicationsGeorge Danezis, Claudia Diaz, Carmela Troncosco, Ben LauriePETS 2010 (to appear)Engineering Privacy in an Age of Information AbundanceBetsy Masiello, Alma WhittenIntelligent Privacy Management Symposium (2010)Group Message AuthenticationBartosz Przydatek, Douglas WikströmSecurity and Cryptography for Networks, SCN 2010, Springer Verlag, pp. 399-417Improving users' security choices on home wireless networksJustin T. Ho, David Dearman, Khai N. TruongProceedings of the Sixth Symposium on Usable Privacy and Security, ACM, New York, NY, USA (2010), 12:1-12:12Large-Scale Automatic Classification of Phishing PagesColin Whittaker, Brian Ryner, Marria NazifNDSS '10 (2010)Making Privacy a Fundamental Component of Web ResourcesThomas Duebendorfer, Christoph Renner, Tyrone Grandison, Michael Maximilien, Mark WeitzelW3C Workshop on Privacy for Advanced Web APIs, W3C (2010), pp. 5Practical Privacy Concerns in a Real World BrowserIan Fette, Jochen EisingerW3C Workshop on Privacy for Advanced Web APIs, W3C (2010), pp. 4Protecting Browsers from Extension VulnerabilitiesAdam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron BoodmanNetwork and Distributed System Security Symposium (2010)PseudoID: Enhancing Privacy in Federated LoginArkajit Dey, Stephen WeisHot Topics in Privacy Enhancing Technologies (2010), pp. 95-107Public-Key Encryption in the Bounded-Retrieval ModelJoel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel WichsAdvances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, Springer, pp. 113-134Technology Companies are Best Positioned to Offer Health Record TrustsShirley Gaw, Umesh ShankarHealthSec '10 Position Paper (2010)The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus DistributionMoheeb Abu Rajab, Lucas Ballard, Panayiotis Marvrommatis, Niels Provos, Xin ZhaoLarge-Scale Exploits and Emergent Threats, USENIX (2010)Trustworthy Hardware: Identifying and Classifying Hardware TrojansKurt RosenfeldIEEE Design and Test of Computers (2010), pp. 39-46Universally optimal privacy mechanisms for minimax agentsMangesh Gupte, Mukund SundararajanProc. ACM SIGMOD, ACM, Indianapolis, Indiana (2010), pp. 135-146Using the Wave Protocol to Represent Individuals’ Health RecordsShirley Gaw, Umesh ShankarHealthSec '10 Position Paper (2010)Web Application ObfuscationEduardo Alberto Vela NavaSyngress (2010), pp. 282A New Randomness Extraction Paradigm for Hybrid EncryptionEike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti YungEUROCRYPT '09: Proceedings of the 28th Annual International Conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 590-609A Unified Framework for the Analysis of Side-Channel Key Recovery AttacksFrançois-Xavier Standaert, Tal G. Malkin, Moti YungEUROCRYPT '09: Proceedings of the 28th Annual International Conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 443-461Balancing Usability and Security in a Video CAPTCHAKurt Alfred Kluever, Richard ZanibbiProceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09), ACM Press (2009)Browser Security: Lessons from Google ChromeCharles Reis, Adam Barth, Carlos PizanoACM Queue, vol. 7, no. 5 (2009), pp. 3Capacity of Steganographic ChannelsJeremiah Harmsen, William PearlmanIEEE Transactions on Information Theory, vol. 55 (2009), pp. 1775-1792Composability and On-Line Deniability of AuthenticationYevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi WalfishSpringer, pp. 146-162Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPsDebra L. Cook, Moti Yung, Angelos KeromytisInformation Security and Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 157-180E Unum Pluribus - Google Network Filtering ManagementPaul (Tony) Watson, Peter MoodyLISA'09 23rd Large Installation System Administration Conference (2009)Efficient Robust Private Set IntersectionDana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti YungACNS '09: Proceedings of the 7th International Conference on Applied Cryptography and Network Security, Springer-Verlag, Berlin, Heidelberg (2009), pp. 125-142Efficient Traceable Signatures in the Standard ModelBenoît Libert, Moti YungPairing '09: Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography, Springer-Verlag, Berlin, Heidelberg (2009), pp. 187-205Efficient and secure authenticated key exchange using weak passwordsJonathan Katz, Rafail Ostrovsky, Moti YungJ. ACM, vol. 57 (2009), pp. 1-39Elastic block ciphers: method, security and instantiationsDebra L. Cook, Moti Yung, Angelos D. KeromytisInt. J. Inf. Secur., vol. 8 (2009), pp. 211-231Expecting the Unexpected: Towards Robust Credential InfrastructureShouhuai Xu, Moti YungFinancial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg (2009), pp. 201-221Firefox (In)Security Update Dynamics ExposedStefan Frei, Thomas Duebendorfer, Bernhard PlattnerACM Sigcomm Comput. Commun. Rev., vol. 39 Issue 1 (2009), pp. 16-22Generative usability: security and user centered design beyond the applianceLuke Church, Alma WhittenNew Security Paradigms Workshop (2009)Key Evolution Systems in Untrusted Update EnvironmentsBenoît Libert, Jean-Jacques Quisquater, Moti YungInformation Security and Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 12-21MAC ReforgeabilityJohn Black, Martin CochranFast Software Encryption, Springer (2009), pp. 345-362On the Portability of Generalized Schnorr ProofsJan Camenisch, Aggelos Kiayias, Moti YungEUROCRYPT '09: Proceedings of the 28th Annual International Conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 425-442Plinko: polling with a physical implementation of a noisy channelChris Alexander, Joel Reardon, Ian GoldbergWPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society, ACM, New York, NY, USA (2009), pp. 109-112Privacy-Preserving Information Markets for Computing Statistical DataAggelos Kiayias, Bülent Yener, Moti YungFinancial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg (2009), pp. 32-50Privacy-preserving indexing of documents on the networkMayank Bawa, Roberto J. Bayardo, Rakesh Agrawal, Jaideep VaidyaThe VLDB Journal, vol. 18 (2009), pp. 837-856Redirects to login pages are bad, or are they?Eric SachsSOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security, ACM, New York, NY, USA (2009), pp. 1-1Secure EPC Gen2 Compliant Radio Frequency IdentificationMike Burmester, Breno Medeiros, Jorge Munilla, Alberto PeinadoADHOC-NOW '09: Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks, Springer-Verlag, Berlin, Heidelberg (2009), pp. 227-240Secure Function Collection with Sublinear StorageMaged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong-Sheng ZhouICALP '09: Proceedings of the 36th Internatilonal Collogquium on Automata, Languages and Programming, Springer-Verlag, Berlin, Heidelberg (2009), pp. 534-545The Goals and Challenges of Click Fraud Penetration Testing SystemsCarmelo Kintana, David Turner, Jia-Yu Pan, Ahmed Metwally, Neil Daswani, Erika Chin, Andrew BortzInternational Symposium on Software Reliability Engineering, International Symposium on Software Reliability Engineering (2009)The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secureSeung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee, Moti YungInf. Process. Lett., vol. 109 (2009), pp. 897-901Why Silent Updates Boost SecurityThomas Duebendorfer, Stefan FreiETH Zurich (2009), pp. 1-9xBook: Redesigning Privacy Control in Social Networking PlatformsKapil Singh, Sumeer Bhola, Wenke Lee18th Usenix Security Symposium, Usenix (2009)(Under)mining Privacy in Social NetworksMonica Chew, Dirk Balfanz, Ben LaurieW2SP 2008: Web 2.0 Security and Privacy 2008A block cipher based pseudo random number generator secure against side-channel key recoveryChristophe Petit, François-Xavier Standaert, Olivier Pereira, Tal G. Malkin, Moti YungASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, ACM, New York, NY, USA, pp. 56-65Access ControlBen LaurieGoogle, Inc. (2008)All Your iFrames Point to UsNiels Provos, Panayiotis Mavrommatis, Moheeb Rajab, Fabian Monrose17th USENIX Security Symposium (2008)Anonymous RFID authentication supporting constant cost key lookup against active adversariesM. Burmester, B. De Medeiros, R. MottaInt. J. Appl. Cryptol., vol. 1 (2008), pp. 79-90Asynchronous Multi-Party Computation with Quadratic CommunicationMartin Hirt, Jesper Buus Nielsen, Bartosz PrzydatekInternational Colloquium on Automata, Languages and Programming, ICALP 2008, Springer Verlag, pp. 473-485Choose the Red Pill and the Blue PillBen Laurie, Abe SingerNew Security Paradigms Workshop 2008Competition and Fraud in Online Advertising MarketsBob Mungamuru, Stephen A. WeisFinancial Cryptography (2008)Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution AuthorityDavid Dagon, Chris Lee, Wenke Lee, Niels ProvosProc. 15th Network and Distributed System Security Symposium (NDSS), Internet Society, San Diego, CA (2008)Distributed divide-and-conquer techniques for effective DDoS attack defensesMuthuprasanna Muthusrinivasan, Manimaran GovindarasuIEEE International Conference on Distributed Computing Systems (ICDCS) (2008)Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)François-Xavier Standaert, Tal G. Malkin, Moti YungICITS '08: Proceedings of the 3rd international conference on Information Theoretic Security, Springer-Verlag, Berlin, Heidelberg (2008), pp. 70-70Efficient Constructions of Composable Commitments and Zero-Knowledge ProofsYevgeniy Dodis, Victor Shoup, Shabsi WalfishProceedings of Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, pp. 515-535Error-Tolerant Combiners for Oblivious PrimitivesBartosz Przydatek, Jürg WullschlegerInternational Colloquium on Automata, Languages and Programming, ICALP 2008, Springer Verlag, pp. 461-472Fair Traceable Multi-Group SignaturesVicente Benjumea, Seung Geol Choi, Javier Lopez, Moti YungFinancial Cryptography, Springer-Verlag, Berlin, Heidelberg (2008), pp. 231-246Ghost Turns Zombie: Exploring the Life Cycle of Web-based MalwareMichalis Polychronakis, Panayiotis Mavrommatis, Niels ProvosProceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) (2008)Insecure Context Switching: Innoculating regular expressions for survivabilityWill Drewry, Tavis Ormandy2nd USENIX Workshop on Offensive Technologies (WOOT '08) (2008)Methods for Linear and Differential Cryptanalysis of Elastic Block CiphersDebra L. Cook, Moti Yung, Angelos D. KeromytisACISP '08: Proceedings of the 13th Australasian conference on Information Security and Privacy, Springer-Verlag, Berlin, Heidelberg (2008), pp. 187-202On the Evolution of User Authentication: Non-bilateral FactorsMoti YungInformation Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Springer-Verlag, Berlin, Heidelberg (2008), pp. 5-10Peeking Through the CloudMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos6th Conference on Applied Cryptography and Network Security (2008)Plan 9 Authentication in LinuxAshwin GantiACM SIGOPS OSR special issue on Research and Developments in the Linux Kernel, vol. 42, Issue 5 (July 2008) (2008)Please Permit Me: Stateless Delegated Authorization in MashupsRagib Hasan, Marianne Winslett, Richard Conlan, Brian Slesinsky, Nandakumar RamaniProceedings of the Annual Computer Security Applications Conference, IEEE Press, Anaheim, CA (2008), pp. 173-182Privacy Preserving Data Mining within Anonymous Credential SystemsAggelos Kiayias, Shouhuai Xu, Moti YungSCN '08: Proceedings of the 6th international conference on Security and Cryptography for Networks, Springer-Verlag, Berlin, Heidelberg (2008), pp. 57-76Provably Secure Grouping-Proofs for RFID TagsMike Burmester, Breno Medeiros, Rossana MottaCARDIS '08: Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, Springer-Verlag, Berlin, Heidelberg (2008), pp. 176-190Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstractAggelos Kiayias, Moti YungDRM '08: Proceedings of the 8th ACM workshop on Digital rights management, ACM, New York, NY, USA (2008), pp. 9-18Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti YungFinancial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg (2008), pp. 307-313Securing Nonintrusive Web Encryption through Information FlowLantian Zheng, Andrew C. MyersProceedings of the 2008 workshop on programming languages and analysis for securitySecurity aspects of the Authentication used in Quantum CryptographyJörgen Cederlöf, Jan-Åke LarssonIEEE Transactions on Information Theory, vol. 54 (2008), pp. 1735-1741To Catch a Predator: A Natural Language Approach for Eliciting Protocol InteractionSam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield17th USENIX Security Symposium (2008)Understanding the Web browser threatStefan Frei, Thomas Duebendorfer, Gunter Ollmann, Martin MayETH ZurichVideo CAPTCHAs: Usability vs. SecurityKurt Alfred Kluever, Richard ZanibbiProceedings of the IEEE Western New York Image Processing Workshop (WNYIP '08), IEEE Press (2008)A Framework for Detection and Measurement of Phishing AttacksSujata Garera, Niels Provos, Monica Chew, Aviel D. RubinWORM'07, ACM, Alexandria, VA (2007)An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized EnvironmentsTavis OrmandyCanSecWest 2007Byzantine Attacks on Anonymity SystemsNikita Borisov, George Danezis, Parisa TabrizDigital Privacy: Theory, Technologies, and Practices (2007)Cyberassault on EstoniaMarc DonnerIEEE Security and Privacy, vol. 5, no. 4 (2007), pp. 4Defining Strong Privacy for RFIDAri Juels, Stephen A. WeisProc. 5th International Conf. on Pervasive Computing and Communications Workshops, IEEE (2007), pp. 342-347Delegating Responsibility in Digital Systems: Horton'sMark S. Miller, Jed Donnelley, Alan H. Karp2nd USENIX Workshop on Hot Topics in Security, USENIX (2007), pp. 5Denial of Service or Denial of Security? How Attacks can Compromize AnonymityNikita Borisov, George Danezis, Prateek Mittal, Parisa TabrizConference on Computer and Communications Security, ACM, Alexandria, VA (2007)Dynamic Pharming Attacks and Locked Same-Origin Policies for Web BrowsersChris Karlof, Umesh Shankar, J. D. Tygar, David WagnerConference on Computer and Communications Security, ACM, Alexandria, VA (2007)Flayer: Exposing Application InternalsWill Drewry, Tavis OrmandyFirst USENIX Workshop on Offensive Technologies (WOOT '07), Online Proceedings, First USENIX Workshop on Offensive Technologies (WOOT '07) (2007)Foundations of Security: What Every Programmer Needs to KnowNeil Daswani, Christoph Kern, Anita KesavanAPress, New York (2007)Memsherlock: An Automated Debugger for Unknown Memory Corruption VulnerabilitiesEmre C. Sezer, Peng Ning, ChongKyung Kil, Jun XuConference on Computer and Communication Security, ACM, Alexandria, VA (2007)Provable Data Possession at Untrusted StoresGiuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn SongConference on Computer and Communications Security, ACM, Alexandria, VA (2007)Selective DisclosureBen LaurieBen Laurie (2007)The Ghost In The Browser: Analysis of Web-based MalwareNiels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, Nagendra ModaduguFirst Workshop on Hot Topics in Understanding Botnets (HotBots '07), Online Proceedings, First Workshop on Hot Topics in Understanding Botnets (HotBots '07) (2007)Tradeoffs in Retrofitting Security: An Experience ReportMark S. MillerDynamic Languages Symposium, ACM (2007)Virtual Honeypots: From Botnet Tracking to Intrusion DetectionNiels Provos, Thorsten HolzAddison Wesley (2007)A Method for Making Password-Based Key Exchange Resilient to Server CompromiseCraig Gentry, Philip MacKenzie, Zulfikar RamzanAdvances in Cryptology - CRYPTO 2006, Springer, pp. 142-159Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood ProtectionMartin Casado, Aditya Akella, Pei Cao, Niels Provos, Scott ShenkerIn Proceedings of Steps To Reduce Unwated Traffic From The Internet (2006)Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding AttacksMartin Casado, Pei Cao, Aditya Akella, Niels ProvosProceedings of the IEEE Workshop on QoS (2006)Language Modeling and Encryption on Packet Switched NetworksKevin S. McCurleyAdvances in Cryptology: Proc. Eurocrypt 2006, Springer, St. Petersburg, pp. 359-372Limits to Anti PhishingJeff Nelson, David JeskeProceedings of the W3c Security and Usability Workshop (2006), pp. 5Packet vaccine: black-box exploit detection and signature generationXiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl ChoiProc. 13th ACM Conference on Computer and Communications Security, ACM, Alexandria, VA (2006), pp. 37-46Privacy-Enhancing TechnologiesStephen A. WeisIEEE Security and Privacy, vol. 4 (2006), pp. 59Resource Fairness and Composability of Cryptographic ProtocolsJuan Garay, Philip MacKenzie, Manoj Prabhakaran, Ke YangTheory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Springer, pp. 404-428Search WormsNiels Provos, Joe McClain, Ke WangWORM '06: Proceedings of the 4th ACM workshop on Recurring malcode, ACM Press, Alexandria, Virginia, USA (2006), pp. 1-8A Virtual Honeypot FrameworkNiels ProvosUSENIX Security Symposium (2004), pp. 1-14Cygnus - An Approach for Large Scale Network Security MonitoringPaul (Tony) WatsonSyscan 2004, SingaporeImproving Host Security with System Call PoliciesNiels Provos12th USENIX Security Symposium (2003)Preventing Privilege EscalationNiels Provos, Markus Friedl, Peter Honeyman12th USENIX Security Symposium (2003)Defending Against Statistical SteganalysisNiels Provos10th USENIX Security Symposium (2001)Encrypting Virtual MemoryNiels Provos9th USENIX Security Symposium (2000)A Future-Adaptable Password SchemeNiels Provos, David Mazi{\`e}resUSENIX Annual Technical Conference, FREENIX Track (1999)Cryptography in OpenBSD: An OverviewTheo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels ProvosUSENIX Annual Technical Conference, FREENIX Track (1999)

Where can civil engineers publish their thesis papers?

Find conferences for your Domain, there are good journals too for civil engineering.As per available reports about 207 journals, 769 Conferences, 30 workshops are presently dedicated exclusively to Civil Engineering and about 1,930,000 articles are being published on the current trends in Civil Engineering. In terms of research annually, USA, India, Japan, Brazil and Canada are some of the leading countries where maximum studies related to proteomics are being carried out. As reported in Wikipedia, Civil engineering is a professional engineering discipline that deals with the design, construction, and maintenance of the physical and naturally built environment, including works like roads, bridges, canals, dams, and buildings. Civil engineering takes place in the public sector from municipal through to national governments, and in the private sector from individual homeowners through to international companies.The Journal of Civil & Environmental Engineeringis an academic journal – hosted by OMICS publishing group – a pioneer in open access publishing–and is listed among the top 10 journals in Civil Engineering. Each year research scientists have noticed a rise in the number of congresses being held in this field. The Journal of Civil & Environmental Engineering provides a unique platform to researchers and scientist to explore the advanced and latest research developments in the field of civil and environmental engineering, thus bridging the gap between researchers and young scientists.OMICS publishing GROUP – a pioneer in organizing international conferences. Earth Science-2014 - OMICS Group Conference deals with the engineering behaviour of earth materials and its uses in military, mining, petroleum, or any other engineering concerned with construction on or in the ground. Geotechnical engineering generally uses principles of soil mechanics and rock mechanics to examine subsurface conditions and materials.OMICS International hosts over 700 leading-edge peer reviewed Open Access Journals and organize over 1000 International Conferences annually all over the world. OMICS International journals have over 3 million readers and the fame and success of the same can be attributed to the strong editorial board which contains over 50000 eminent personalities that ensure a rapid, quality and quick review process. OMICS International signed an agreement with more than 1000 International Societies to make healthcare information Open Access.List of major Civil Engineering and related journalsJournal of Civil and Environmental EngineeringACI Structural JournalAgronomy for Sustainable DevelopmentAICHE JournalAutomation in ConstructionBiochemical Engineering JournalBiodegradationBioresource TechnologyBuilding and EnvironmentBulletin of Earthquake EngineeringCoastal EngineeringComposite StructuresComputers and StructuresConstruction and Building MaterialsCritical Reviews in Environmental Science and TechnologyEcological EngineeringEnergy and BuildingsEngineering in Life SciencesEngineering StructuresEnvironmental Geochemistry and HealthEnvironmental Modelling and SoftwareGreenhouse Gases: Science and TechnologyIndoor AirInternational Journal of Impact EngineeringInternational Journal of Sustainable TransportationJournal of Biological EngineeringJournal of Composites for ConstructionJournal of Constructional Steel ResearchJournal of Earthquake EngineeringJournal of Environmental ManagementJournal of Environmental QualityJournal of Environmental SciencesJournal of Hazardous MaterialsJournal of Polymers and the EnvironmentJournal of Structural EngineeringMechanical Systems and Signal ProcessingOcean EngineeringProbabilistic Engineering MechanicsProcess Safety and Environmental ProtectionReviews in Environmental Science and BiotechnologyRock Mechanics and Rock EngineeringScience of the Total EnvironmentSoils and FoundationsStochastic Environmental Research and Risk AssessmentStructural Control and Health MonitoringStructural SafetyThin-Walled StructuresTransportationTransportation Research, Part A: Policy and PracticeWater, Air, and Soil PollutionList of major Civil Engineering and related ConferencesEACEF5 - 5th Euro Asia Civil Engineering Forum Conference 2015International Conference on Disaster Management and Civil Engineering (ICDMCE'15)2015 International Conference on Civil Engineering and Geology (ICCEG 2015)6 th International Conference On Innovative Trends in “Civil Engineering, Architecture and Environmental Engineering for Sustainable Infrastructure Development” (CEAESID- 2015)7th Asia and Pacific Young Researchers and Graduates Symposium (YRGS 2015): Innovations in Structural Engineering PracticesConcrete 2015 - National Conference of the Concrete Institute of AustraliaCECAR — Civil Engineering Conference in the Asian RegionSMAR 2015 - 3rd conference on Smart Monitoring Assessment and Rehabilitation of Civil StructuresBIM 2015 — International Conference on Building Information Modelling (BIM) in Design, Construction and OperationsFC 2015 — Fibre Concrete 2015 – Technology, Design, ApplicationSmart City 2015 — Smart City Landscape 2015ICSSC 2015 - International Conference on Sustainable Structural ConcreteASA 2015 — 49th International Conference of the Architectural Science AssociationPLSE 2015 — Second International Conference on Performance-based and Lifecycle Structural EngineeringICRS-10 — 10th International Conference on Residual StressesSIPDA — International Symposium on Lightning ProtectionSmart Cities’ – Exhibition and Conference for South - East EuropeLiftBalkans -Conference & Exhibition on Elevators and Escalators for South-East EuropeSustainable City 2015 — 10th International Conference on Urban Regeneration and Sustainability70th RILEM Annual WeekInternational Conference On: Conservation Of Architectural Heritage4th international Conference on Structural and Geotechnical EngineeringNDT-CE — International Symposium on Non-Destructive Testing in Civil Engineering (NDT-CE) 2015Weiterbildung — Schimmelpilzsanierung Modul 1: SachkundeICCRRR 2015 - 4th International Conference on Concrete Repair, Rehabilitation and RetrofittingBuilding Simulation 201571th RILEM Annual Week2nd INTERNATIONAL CONFERENCE ON CIVIL ENGINEERING RESEARCH3rd ICRMCE 2015 — 3rd International Conference on Rehabilitation and Maintenance in Civil EngineeringCUPD 2015 — The 1st International Conference on Urban Planning & DevelopmentInternational conference on Urban Planning And Architectural Design For Sustainable Development ConferenceBCEE2 — 2nd International Conference on Buildings, Construction and Environmental Engineering7th Asia and Pacific Young Researchers and Graduates Symposium (YRGS 2015): Innovations in Structural Engineering Practices72th RILEM Annual WeekBMC 11 - 11th International Symposium on Brittle Matrix CompositesICSA 2016 - 3rd International Conference on Structures and ArchitectureShotcrete for Underground Support XIIBuildTech Asia 2015ACCTA 2016 - International conferenceon Advances in Cement and Concrete TechnologySPU15 — Smart Parking UAESMAR 2015 - 3rd conference on Smart Monitoring Assessment and Rehabilitation of Civil StructuresIWCEA-2015 — 2nd International Workshop on Civil Engineering and ArchitectureSBIC-2015 — 8th International Symposium on Steel Bridges: Innovation & New Challenges 20153TDMSK-2015 — 3rd National Conference on Earthquake Engineering and SeismologySHC 2015, the International Conference on Solar Heating and Cooling for Buildings and IndustryInternational Association for Bridge and Structural Engineering Conference Geneva 2015BIM 2015 — International Conference on Building Information Modelling (BIM) in Design, Construction and OperationsUK Construction WeekCECAR — Civil Engineering Conference in the Asian Region

View Our Customer Reviews

I had problems using a CocoDoc package. I contacted them and I received accurate information from them very quickly. Great support! Thank you support-people from CocoDoc!

Justin Miller