Kevin A. Roundy

Orcid: 0000-0002-8285-1647

According to our database1, Kevin A. Roundy authored at least 21 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
"Do Users Fall for Real Adversarial Phishing?" Investigating the Human Response to Evasive Webpages.
Proceedings of the APWG Symposium on Electronic Crime Research, 2023

Scamdog Millionaire: Detecting E-commerce Scams in the Wild.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice.
CoRR, 2022

Trauma-Informed Computing: Towards Safer Technology Experiences for All.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence.
Proceedings of the 30th USENIX Security Symposium, 2021

Towards Stalkerware Detection with Precise Warnings.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
The Many Kinds of Creepware Used for Interpersonal Attacks.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices.
Proceedings of the CHI '20: CHI Conference on Human Factors in Computing Systems, 2020

2019
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2019

A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Making Machine Learning Forget.
Proceedings of the Privacy Technologies and Policy - 7th Annual Privacy Forum, 2019

2018
VIGOR: Interactive Visual Exploration of Graph Query Results.
IEEE Trans. Vis. Comput. Graph., 2018

2017
Automatic Application Identification from Billions of Files.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Large-Scale Identification of Malicious Singleton Files.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Predicting Cyber Threats with Virtual Security Products.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Generating Graph Snapshots from Streaming Edge Data.
Proceedings of the 25th International Conference on World Wide Web, 2016

2014
Guilt by association: large scale malware detection by mining file-relation graphs.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

2013
Binary-code obfuscations in prevalent packer tools.
ACM Comput. Surv., 2013

2011
Efficient, sensitivity resistant binary instrumentation.
Proceedings of the 20th International Symposium on Software Testing and Analysis, 2011

2010
Hybrid Analysis and Control of Malware.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010


  Loading...