


Остановите войну!
for scientists:


default search action
Kevin Leach
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c34]Stefan Larson, Gordon Lim, Kevin Leach:
On Evaluation of Document Classifiers using RVL-CDIP. EACL 2023: 2657-2670 - [i12]Kevin Cao, Kevin Leach:
Revisiting Deep Learning for Variable Type Recovery. CoRR abs/2304.03854 (2023) - [i11]Jason Kim, Daniel Genkin, Kevin Leach:
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries. CoRR abs/2305.03934 (2023) - 2022
- [c33]Christopher Clarke, Joseph Peper, Karthik Krishnamurthy, Walter Talamonti, Kevin Leach, Walter S. Lasecki, Yiping Kang, Lingjia Tang, Jason Mars:
One Agent To Rule Them All: Towards Multi-agent Conversational AI. ACL (Findings) 2022: 3258-3267 - [c32]Yunjie Deng, Chenxu Wang
, Shunchang Yu, Shiqing Liu, Zhenyu Ning
, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang:
StrongBox: A GPU TEE on Arm Endpoints. CCS 2022: 769-783 - [c31]Kevin Leach, Christopher Steven Timperley, Kevin Angstadt, Anh Nguyen-Tuong, Jason Hiser, Aaron Paulos, Partha P. Pal
, Patrick Hurley, Carl Thomas, Jack W. Davidson, Stephanie Forrest, Claire Le Goues, Westley Weimer:
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report). ISSRE 2022: 73-84 - [c30]Stefan Larson, Gordon Lim, Yutong Ai, David Kuang, Kevin Leach:
Evaluating Out-of-Distribution Performance on Document Image Classifiers. NeurIPS 2022 - [c29]Stefan Larson, Kevin Leach:
Redwood: Using Collision Detection to Grow a Large-Scale Intent Classification Dataset. SIGDIAL 2022: 468-477 - [i10]Christopher Clarke, Joseph Joshua Peper, Karthik Krishnamurthy, Walter Talamonti, Kevin Leach, Walter S. Lasecki, Yiping Kang, Lingjia Tang, Jason Mars:
One Agent To Rule Them All: Towards Multi-agent Conversational AI. CoRR abs/2203.07665 (2022) - [i9]Stefan Larson, Kevin Leach:
Redwood: Using Collision Detection to Grow a Large-Scale Intent Classification Dataset. CoRR abs/2204.05483 (2022) - [i8]Stefan Larson, Kevin Leach:
A Survey of Intent Classification and Slot-Filling Datasets for Task-Oriented Dialog. CoRR abs/2207.13211 (2022) - [i7]Yifan Zhang, Junwen Yang, Haoyu Dong, Qingchen Wang, Huajie Shao, Kevin Leach, Yu Huang:
ASTRO: An AST-Assisted Approach for Generalizable Neural Clone Detection. CoRR abs/2208.08067 (2022) - [i6]Yifan Zhang, Chen Huang, Yueke Zhang, Kevin Cao, Scott Thomas Andersen, Huajie Shao, Kevin Leach, Yu Huang:
COMBO: Pre-Training Representations of Binary Code Using Contrastive Learning. CoRR abs/2210.05102 (2022) - [i5]Stefan Larson, Gordon Lim, Yutong Ai, David Kuang, Kevin Leach:
Evaluating Out-of-Distribution Performance on Document Image Classifiers. CoRR abs/2210.07448 (2022) - [i4]Andrew Lee, Zhenguo Chen, Kevin Leach, Jonathan K. Kummerfeld:
Augmenting Task-Oriented Dialogue Systems with Relation Extraction. CoRR abs/2210.13344 (2022) - 2021
- [j5]Lei Zhou, Fengwei Zhang
, Jidong Xiao
, Kevin Leach
, Westley Weimer, Xuhua Ding
, Guojun Wang
:
A Coprocessor-Based Introspection Framework Via Intel Management Engine. IEEE Trans. Dependable Secur. Comput. 18(4): 1920-1932 (2021) - [j4]Zohreh Sharafi, Yu Huang, Kevin Leach, Westley Weimer:
Toward an Objective Measure of Developers' Cognitive Activities. ACM Trans. Softw. Eng. Methodol. 30(3): 30:1-30:40 (2021) - [i3]Mohsen Ahmadi, Kevin Leach, Ryan E. Dougherty, Stephanie Forrest, Westley Weimer:
MIMOSA: Reducing Malware Analysis Overhead with Coverings. CoRR abs/2101.07328 (2021) - 2020
- [c28]Yujun Qin, Samuel Gonzalez, Kevin Angstadt
, Xiaowei Wang, Stephanie Forrest
, Reetuparna Das, Kevin Leach, Westley Weimer:
MARTINI: Memory Access Traces to Detect Attacks. CCSW@CCS 2020: 77-90 - [c27]Chad Spensky, Aravind Machiry, Marcel Busch, Kevin Leach, Rick Housley, Christopher Kruegel, Giovanni Vigna:
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems. CNS 2020: 1-9 - [c26]Stefan Larson, Adrian Cheung, Anish Mahendran, Kevin Leach, Jonathan K. Kummerfeld:
Inconsistencies in Crowdsourced Slot-Filling Annotations: A Typology and Identification Methods. COLING 2020: 5035-5046 - [c25]Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, Guojun Wang:
KShot: Live Kernel Patching with SMM and SGX. DSN 2020: 1-13 - [c24]Stefan Larson, Anthony Zheng, Anish Mahendran, Rishi Tekriwal, Adrian Cheung, Eric Guldan, Kevin Leach, Jonathan K. Kummerfeld:
Iterative Feature Mining for Constraint-Based Data Collection to Increase Data Diversity and Model Robustness. EMNLP (1) 2020: 8097-8106 - [c23]Yu Huang, Kevin Angstadt
, Kevin Leach, Westley Weimer:
Selective Symbolic Type-Guided Checkpointing and Restoration for Autonomous Vehicle Repair. ICSE (Workshops) 2020: 3-10 - [c22]Ryan Krueger, Yu Huang, Xinyu Liu, Tyler Santander, Westley Weimer, Kevin Leach:
Neurological divide: an fMRI study of prose and code writing. ICSE 2020: 678-690 - [c21]Sean Stapleton, Yashmeet Gambhir, Alexander LeClair, Zachary Eberhart, Westley Weimer, Kevin Leach, Yu Huang:
A Human Study of Comprehension and Code Summarization. ICPC 2020: 2-13 - [c20]Stefan Larson, Eric Guldan, Kevin Leach:
Data Query Language and Corpus Tools for Slot-Filling and Intent Classification Data. LREC 2020: 7060-7068 - [c19]Yu Huang, Kevin Leach, Zohreh Sharafi, Nicholas McKay, Tyler Santander, Westley Weimer:
Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machines. ESEC/SIGSOFT FSE 2020: 456-468
2010 – 2019
- 2019
- [j3]William B. Langdon, Westley Weimer, Christopher Steven Timperley, Oliver Krauss, Zhen Yu Ding, Yiwei Lyu, Nicolas Chausseau, Eric M. Schulte, Shin Hwei Tan, Kevin Leach, Yu Huang, Gabin An:
The State and Future of Genetic Improvement. ACM SIGSOFT Softw. Eng. Notes 44(3): 25-29 (2019) - [c18]Stefan Larson, Anish Mahendran, Joseph J. Peper, Christopher Clarke, Andrew Lee, Parker Hill, Jonathan K. Kummerfeld
, Kevin Leach, Michael A. Laurenzano, Lingjia Tang, Jason Mars:
An Evaluation Dataset for Intent Classification and Out-of-Scope Prediction. EMNLP/IJCNLP (1) 2019: 1311-1316 - [c17]Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang:
Nighthawk: Transparent System Introspection from Ring -3. ESORICS (2) 2019: 217-238 - [c16]Kevin Leach, Ryan E. Dougherty, Chad Spensky, Stephanie Forrest
, Westley Weimer:
Evolutionary computation for improving malware analysis. GI@ICSE 2019: 18-19 - [c15]Yu Huang, Xinyu Liu, Ryan Krueger, Tyler Santander, Xiaosu Hu
, Kevin Leach, Westley Weimer:
Distilling neural representations of data structure manipulation using fMRI and fNIRS. ICSE 2019: 396-407 - [c14]Brandon Carlson, Kevin Leach, Darko Marinov, Meiyappan Nagappan, Atul Prakash:
Open Source Vulnerability Notification. OSS 2019: 12-23 - [i2]William B. Langdon, Westley Weimer, Christopher Steven Timperley, Oliver Krauss, Zhen Yu Ding, Yiwei Lyu, Nicolas Chausseau, Eric M. Schulte, Shin Hwei Tan, Kevin Leach, Yu Huang, Gabin An:
The State and Future of Genetic Improvement. CoRR abs/1907.03773 (2019) - [i1]Stefan Larson, Anish Mahendran, Joseph J. Peper, Christopher Clarke, Andrew Lee, Parker Hill, Jonathan K. Kummerfeld, Kevin Leach, Michael A. Laurenzano, Lingjia Tang, Jason Mars:
An Evaluation Dataset for Intent Classification and Out-of-Scope Prediction. CoRR abs/1909.02027 (2019) - 2018
- [j2]Fengwei Zhang
, Kevin Leach, Angelos Stavrou
, Haining Wang:
Towards Transparent Debugging. IEEE Trans. Dependable Secur. Comput. 15(2): 321-335 (2018) - 2017
- [j1]Haoyi Xiong
, Jinghe Zhang, Yu Huang, Kevin Leach, Laura E. Barnes:
Daehr: A Discriminant Analysis Framework for Electronic Health Record Data and an Application to Early Detection of Mental Health Disorders. ACM Trans. Intell. Syst. Technol. 8(3): 47:1-47:21 (2017) - [c13]Jacob Breiholz, Farah B. Yahya, Christopher J. Lukas, Xing Chen, Kevin Leach, David D. Wentzloff, Benton H. Calhoun:
A 4.4 nW lossless sensor data compression accelerator for 2.9x system power reduction in wireless body sensors. MWSCAS 2017: 1041-1044 - [c12]Kevin Leach, Fengwei Zhang, Westley Weimer:
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage. RAID 2017: 403-424 - 2016
- [c11]Nicholas J. Napoli
, Kevin Leach, Laura E. Barnes, Westley Weimer:
A MapReduce framework to improve template matching uncertainty. BigComp 2016: 77-84 - [c10]Kate Highnam, Kevin Angstadt
, Kevin Leach, Westley Weimer, Aaron Paulos, Patrick Hurley:
An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture. DSN Workshops 2016: 222-225 - [c9]Yu Huang, Haoyi Xiong, Kevin Leach, Yuyan Zhang, Philip Chow, Karl C. Fua, Bethany A. Teachman, Laura E. Barnes:
Assessing social anxiety using gps trajectories and point-of-interest data. UbiComp 2016: 898-903 - [c8]Chad Spensky, Hongyi Hu, Kevin Leach:
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis. NDSS 2016 - [c7]Kevin Leach, Chad Spensky, Westley Weimer, Fengwei Zhang:
Towards Transparent Introspection. SANER 2016: 248-259 - 2015
- [c6]Jinghe Zhang, Haoyi Xiong, Yu Huang, Hao Wu, Kevin Leach, Laura E. Barnes:
M-SEQ: Early detection of anxiety and depression via temporal orders of diagnoses in electronic health data. IEEE BigData 2015: 2569-2577 - [c5]Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou
:
TrustLogin: Securing Password-Login on Commodity Operating Systems. AsiaCCS 2015: 333-344 - [c4]Fengwei Zhang, Kevin Leach, Angelos Stavrou
, Haining Wang, Kun Sun
:
Using Hardware Features for Increased Debugging Transparency. IEEE Symposium on Security and Privacy 2015: 55-69 - 2014
- [c3]Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou
:
A Framework to Secure Peripherals at Runtime. ESORICS (1) 2014: 219-238 - 2013
- [c2]Kevin Leach:
BARLEY: Modelling program behavior with resource usage. DSN Workshops 2013: 1-4 - [c1]Fengwei Zhang, Kevin Leach, Kun Sun
, Angelos Stavrou
:
SPECTRE: A dependable introspection framework via System Management Mode. DSN 2013: 1-12
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-05-12 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint