default search action
Kevin A. Roundy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c19]Platon Kotzias, Kevin A. Roundy, Michalis Pachilakis, Iskander Sánchez-Rola, Leyla Bilge:
Scamdog Millionaire: Detecting E-commerce Scams in the Wild. ACSAC 2023: 29-43 - [c18]Ajka Draganovic, Savino Dambra, Javier Aldana-Iuit, Kevin Alejandro Roundy, Giovanni Apruzzese:
"Do Users Fall for Real Adversarial Phishing?" Investigating the Human Response to Evasive Webpages. eCrime 2023: 1-14 - [c17]Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, Kevin A. Roundy:
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice. SaTML 2023: 339-364 - [i3]Ajka Draganovic, Savino Dambra, Javier Aldana-Iuit, Kevin A. Roundy, Giovanni Apruzzese:
"Do Users fall for Real Adversarial Phishing?" Investigating the Human response to Evasive Webpages. CoRR abs/2311.16383 (2023) - 2022
- [c16]Janet X. Chen, Allison McDonald, Yixin Zou, Emily Tseng, Kevin A. Roundy, Acar Tamersoy, Florian Schaub, Thomas Ristenpart, Nicola Dell:
Trauma-Informed Computing: Towards Safer Technology Experiences for All. CHI 2022: 544:1-544:20 - [i2]Giovanni Apruzzese, Hyrum S. Anderson, Savino Dambra, David Freeman, Fabio Pierazzi, Kevin A. Roundy:
"Real Attackers Don't Compute Gradients": Bridging the Gap Between Adversarial ML Research and Practice. CoRR abs/2212.14315 (2022) - 2021
- [c15]Yufei Han, Kevin Alejandro Roundy, Acar Tamersoy:
Towards Stalkerware Detection with Precise Warnings. ACSAC 2021: 957-969 - [c14]Yixin Zou, Allison McDonald, Julia Narakornpichit, Nicola Dell, Thomas Ristenpart, Kevin A. Roundy, Florian Schaub, Acar Tamersoy:
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence. USENIX Security Symposium 2021: 429-446 - 2020
- [c13]Yixin Zou, Kevin A. Roundy, Acar Tamersoy, Saurabh Shintre, Johann Roturier, Florian Schaub:
Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices. CHI 2020: 1-15 - [c12]Kevin A. Roundy, Paula Barmaimon Mendelberg, Nicola Dell, Damon McCoy, Daniel Nissani, Thomas Ristenpart, Acar Tamersoy:
The Many Kinds of Creepware Used for Interpersonal Attacks. SP 2020: 626-643
2010 – 2019
- 2019
- [c11]Saurabh Shintre, Kevin A. Roundy, Jasjeet Dhaliwal:
Making Machine Learning Forget. APF 2019: 72-83 - [c10]Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Lujo Bauer, Nicolas Christin:
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats. CHI 2019: 78 - [c9]Yufei Han, Yuzhe Ma, Christopher Gates, Kevin A. Roundy, Yun Shen:
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization. IJCNN 2019: 1-8 - [i1]Yufei Han, Yuzhe Ma, Christopher Gates, Kevin A. Roundy, Yun Shen:
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization. CoRR abs/1905.02796 (2019) - 2018
- [j2]Robert S. Pienta, Fred Hohman, Alex Endert, Acar Tamersoy, Kevin A. Roundy, Christopher S. Gates, Shamkant B. Navathe, Duen Horng Chau:
VIGOR: Interactive Visual Exploration of Graph Query Results. IEEE Trans. Vis. Comput. Graph. 24(1): 215-225 (2018) - 2017
- [c8]Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy:
Predicting Cyber Threats with Virtual Security Products. ACSAC 2017: 189-199 - [c7]Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico, Robert Scott:
Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. ACSAC 2017: 200-211 - [c6]Bo Li, Kevin A. Roundy, Christopher S. Gates, Yevgeniy Vorobeychik:
Large-Scale Identification of Malicious Singleton Files. CODASPY 2017: 227-238 - [c5]Kyle Soska, Christopher S. Gates, Kevin A. Roundy, Nicolas Christin:
Automatic Application Identification from Billions of Files. KDD 2017: 2021-2030 - 2016
- [c4]Sucheta Soundarajan, Acar Tamersoy, Elias B. Khalil, Tina Eliassi-Rad, Duen Horng Chau, Brian Gallagher, Kevin A. Roundy:
Generating Graph Snapshots from Streaming Edge Data. WWW (Companion Volume) 2016: 109-110 - 2014
- [c3]Acar Tamersoy, Kevin A. Roundy, Duen Horng Chau:
Guilt by association: large scale malware detection by mining file-relation graphs. KDD 2014: 1524-1533 - 2013
- [j1]Kevin A. Roundy, Barton P. Miller:
Binary-code obfuscations in prevalent packer tools. ACM Comput. Surv. 46(1): 4:1-4:32 (2013) - 2011
- [c2]Andrew R. Bernat, Kevin A. Roundy, Barton P. Miller:
Efficient, sensitivity resistant binary instrumentation. ISSTA 2011: 89-99 - 2010
- [c1]Kevin A. Roundy, Barton P. Miller:
Hybrid Analysis and Control of Malware. RAID 2010: 317-338
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint