Search

Your search keyword '"Butler, Kevin"' showing total 697 results

Search Constraints

Start Over You searched for: Author "Butler, Kevin" Remove constraint Author: "Butler, Kevin"
697 results on '"Butler, Kevin"'

Search Results

1. Every Breath You Don't Take: Deepfake Speech Detection Using Breath

2. AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

3. Privacy-Preserving Gaze Data Streaming in Immersive Interactive Virtual Reality: Robustness and User Experience

4. Eye-tracked Virtual Reality: A Comprehensive Survey on Methods and Privacy Challenges

5. DR-VIDAL -- Doubly Robust Variational Information-theoretic Deep Adversarial Learning for Counterfactual Prediction and Treatment Effect Estimation on Real World Data

6. Side Eye: Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras with Rolling Shutters and Movable Lenses

7. A Hypothesis of Reading Instruction as a Cause of Dyslexia

8. Self-reported Antiretroviral Adherence: Association With Maternal Viral Load Suppression in Postpartum Women Living With HIV-1 From Promoting Maternal and Infant Survival Everywhere, a Randomized Controlled Trial in Sub-Saharan Africa and India

9. A Practical Methodology for ML-Based EM Side Channel Disassemblers

10. SAUSAGE: Security Analysis of Unix domain Socket Usage in Android

11. Brief Report: Impact of Antiretroviral Regimen on Pregnancy and Infant Outcomes in Women With HIV/ HBV Coinfection

14. Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples

15. The Role of Dopamine D3 Receptors in Tobacco Use Disorder: A Synthesis of the Preclinical and Clinical Literature

16. A privacy-preserving approach to streaming eye-tracking data

17. Biophysical studies of ligand selectivity for the hATG8 family of autophagy proteins

18. Pharmacokinetics and safety of maraviroc in neonates.

20. Student Attitudes toward Research in an Undergraduate Social Science Research Methods Course

21. One-Time Programs made Practical

22. A Hybrid Approach to Secure Function Evaluation Using SGX

23. Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

24. Explainable Black-Box Attacks Against Model-based Authentication

31. Abnormalities of Neurotransmission in Drug Addiction

32. FirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution

34. Adolescents' perceptions of Student and Teacher/Staff Defending Against Stigma-Based Peer Victimization.

35. Retrofitting Applications with Provenance-Based Security Monitoring

39. Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values

42. Abnormalities of Neurotransmission in Drug Addiction

44. Comparison of Antiretroviral Therapies in Pregnant Women Living With Human Immunodeficiency Virus and Hepatitis B Virus

46. Adapting a Telephone-Based, Dyadic Self-management Program to Be Delivered Over the Web: Methodology and Usability Testing

47. World Terrestrial Ecosystems

48. Effects of smoking status on punishment sensitivity and cognitive control

Catalog

Books, media, physical & digital resources