Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Biyi Fang, Nicholas D. Lane, Mi Zhang, Aidan Boran, Fahim Kawsar |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Regulating ARM TrustZone Devices in Restricted Spaces Franz Ferdinand Brasser, Daeyoung Kim, Christopher Liebchen, Vinod Ganapathy, Liviu Iftode, Ahmad-Reza Sadeghi |
Regulating ARM TrustZone Devices in Restricted Spaces Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Beetle: Flexible Communication for Bluetooth Low Energy Amit A. Levy, James Hong, Laurynas Riliskis, Philip Levis, Keith Winstein |
Beetle: Flexible Communication for Bluetooth Low Energy Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Viola: Trustworthy Sensor Notifications for Enhanced Privacy on Mobile Systems Saeed Mirzamohammadi, Ardalan Amiri Sani |
Viola: Trustworthy Sensor Notifications for Enhanced Privacy on Mobile Systems Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Seungyeop Han, Haichen Shen, Matthai Philipose, Sharad Agarwal, Alec Wolman, Arvind Krishnamurthy |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
I am a Smartwatch and I can Track my User's Arm Sheng Shen, He Wang, Romit Roy Choudhury |
I am a Smartwatch and I can Track my User's Arm Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior Peng Huang, Tianyin Xu, Xinxin Jin, Yuanyuan Zhou |
DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Practical Bluetooth Traffic Sniffing: Systems and Privacy Implications Wahhab Albazrqaoe, Jun Huang, Guoliang Xing |
Practical Bluetooth Traffic Sniffing: Systems and Privacy Implications Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic Jingjing Ren, Ashwin Rao, Martina Lindorfer, Arnaud Legout, David R. Choffnes |
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Expansion of Human-Phone Interface By Sensing Structure-Borne Sound Propagation Yu-Chih Tung, Kang G. Shin |
Expansion of Human-Phone Interface By Sensing Structure-Borne Sound Propagation Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Tobias Grosse-Puppendahl, Xavier Dellangnol, Christian Hatzfeld, Biying Fu, Mario Kupnik, Arjan Kuijper, Matthias R. Hastall, James Scott, Marco Gruteser |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
I-Pic: A Platform for Privacy-Compliant Image Capture Paarijaat Aditya, Rijurekha Sen, Peter Druschel, Seong Joon Oh, Rodrigo Benenson, Mario Fritz, Bernt Schiele, Bobby Bhattacharjee, Tong Tong Wu |
I-Pic: A Platform for Privacy-Compliant Image Capture Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
TransitLabel: A Crowd-Sensing System for Automatic Labeling of Transit Stations Semantics Moustafa Elhamshary, Moustafa Youssef, Akira Uchiyama, Hirozumi Yamaguchi, Teruo Higashino |
TransitLabel: A Crowd-Sensing System for Automatic Labeling of Transit Stations Semantics Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices Suwen Zhu, Long Lu, Kapil Singh |
CASE: Comprehensive Application Security Enforcement on COTS Mobile Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
FlashBack: Immersive Virtual Reality on Mobile Devices via Rendering Memoization Kevin Boos, David Chu, Eduardo Cuervo |
FlashBack: Immersive Virtual Reality on Mobile Devices via Rendering Memoization Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
TaskFolder: Dynamic and Fine-Grained Workload Consolidation for Mobile Devices Yuyang Du, Sebastien Haezebrouck, Jin Cui, Rajeev Muralidhar, Harinarayanan Seshadri, Vishwesh Rudramuni, Nicole Chalhoub, YongTong Chua, Richard Quinzio |
TaskFolder: Dynamic and Fine-Grained Workload Consolidation for Mobile Devices Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Understanding the Characteristics of Android Wear OS Renju Liu, Felix Xiaozhu Lin |
Understanding the Characteristics of Android Wear OS Details |
Author Comments:
Discussion Comments:
0
Sharing:
Research produced artifacts
Verification:
Authors have
verified
information
|
|
Defending against Sybil Devices in Crowdsourced Mapping Services Gang Wang, Bolun Wang, Tianyi Wang, Ana Nika, Haitao Zheng, Ben Y. Zhao |
Defending against Sybil Devices in Crowdsourced Mapping Services Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
The Design and Implementation of a Mobile RFID Tag Sorting Robot Longfei Shangguan, Kyle Jamieson |
The Design and Implementation of a Mobile RFID Tag Sorting Robot Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
What You Mark is What Apps See Nisarg Raval, Animesh Srivastava, Ali Razeen, Kiron Lebeck, Ashwin Machanavajjhala, Landon P. Cox |
What You Mark is What Apps See Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Privacy Capsules: Preventing Information Leaks by Mobile Apps Raul Herbster, Scott DellaTorre, Peter Druschel, Bobby Bhattacharjee |
Privacy Capsules: Preventing Information Leaks by Mobile Apps Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Practical Human Sensing in the Light Tianxing Li, Qiang Liu, Xia Zhou |
Practical Human Sensing in the Light Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Idea: A System for Efficient Failure Management in Smart IoT Environments Palanivel A. Kodeswaran, Ravi Kokku, Sayandeep Sen, Mudhakar Srivatsa |
Idea: A System for Efficient Failure Management in Smart IoT Environments Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes Hassan Khan, Urs Hengartner, Daniel Vogel |
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Characterizing and Improving WiFi Latency in Large-Scale Operational Networks Kaixin Sui, Mengyu Zhou, Dapeng Liu, Minghua Ma, Dan Pei, Youjian Zhao, Zimu Li, Thomas Moscibroda |
Characterizing and Improving WiFi Latency in Large-Scale Operational Networks Details |
|
Author Comments:
Discussion Comments:
0
Sharing:
Not able to share produced artifacts
Verification:
Authors have
verified
information
|
FOCUS: Robust Visual Codes for Everyone Frederik Hermans, Liam McNamara, Gábor Sörös, Christian Rohner, Thiemo Voigt, Edith C. H. Ngai |
FOCUS: Robust Visual Codes for Everyone Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
LiveLabs: Building In-Situ Mobile Sensing & Behavioural Experimentation TestBeds Kasthuri Jayarajah, Rajesh Krishna Balan, Meera Radhakrishnan, Archan Misra, Youngki Lee |
LiveLabs: Building In-Situ Mobile Sensing & Behavioural Experimentation TestBeds Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Listening through a Vibration Motor Nirupam Roy, Romit Roy Choudhury |
Listening through a Vibration Motor Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Reactive Control of Autonomous Drones Endri Bregu, Nicola Casamassima, Daniel Cantoni, Luca Mottola, Kamin Whitehouse |
Reactive Control of Autonomous Drones Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Mobility Modeling and Prediction in Bike-Sharing Systems Zidong Yang, Ji Hu, Yuanchao Shu, Peng Cheng, Jiming Chen, Thomas Moscibroda |
Mobility Modeling and Prediction in Bike-Sharing Systems Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
uLink: Enabling User-Defined Deep Linking to App Content Tanzirul Azim, Oriana Riva, Suman Nath |
uLink: Enabling User-Defined Deep Linking to App Content Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|