Prati
Acar Tamersoy
Acar Tamersoy
Principal Applied Scientist at Microsoft
Potvrđena adresa e-pošte na gatech.edu - Početna stranica
Naslov
Citirano
Citirano
Godina
Guilt by Association: Large Scale Malware Detection by Mining File-relation Graphs
A Tamersoy, K Roundy, DH Chau
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
2142014
Trauma-informed computing: Towards safer technology experiences for all
JX Chen, A McDonald, Y Zou, E Tseng, KA Roundy, A Tamersoy, ...
Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems …, 2022
1182022
Click traffic analysis of short url spam on twitter
D Wang, SB Navathe, L Liu, D Irani, A Tamersoy, C Pu
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
1062013
Characterizing Smoking and Drinking Abstinence from Social Media
A Tamersoy, M De Choudhury, DH Chau
Proceedings of the 26th ACM Conference on Hypertext & Social Media, 139-148, 2015
1052015
Secure and utility-aware data collection with condensed local differential privacy
ME Gursoy, A Tamersoy, S Truex, W Wei, L Liu
IEEE Transactions on Dependable and Secure Computing 18 (5), 2365-2378, 2019
1032019
Systems and methods for using event-correlation graphs to detect attacks on computing systems
K Roundy, F Guo, S Bhatkar, T Cheng, J Fu, ZK Li, D Shou, S Sawhney, ...
US Patent 9,141,790, 2015
992015
Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices
Y Zou, K Roundy, A Tamersoy, S Shintre, J Roturier, F Schaub
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
942020
Anonymization of longitudinal electronic medical records
A Tamersoy, G Loukides, ME Nergiz, Y Saygin, B Malin
IEEE Transactions on Information Technology in Biomedicine 16 (3), 413-423, 2012
822012
Vigor: Interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
752017
Understanding variations in pediatric asthma care processes in the emergency department using visual analytics
RC Basole, ML Braunstein, V Kumar, H Park, M Kahng, DHP Chau, ...
Journal of the American Medical Informatics Association 22 (2), 318-323, 2015
692015
Mage: Matching approximate patterns in richly-attributed graphs
R Pienta, A Tamersoy, H Tong, DH Chau
2014 IEEE International Conference on Big Data (Big Data), 585-590, 2014
582014
Systems and methods for preventing malicious network connections using correlation-based anomaly detection
A Tamersoy, K Roundy
US Patent 10,142,357, 2018
552018
The many kinds of creepware used for interpersonal attacks
KA Roundy, PB Mendelberg, N Dell, D McCoy, D Nissani, T Ristenpart, ...
2020 IEEE Symposium on Security and Privacy (SP), 626-643, 2020
542020
Generating Graph Snapshots from Streaming Edge Data
S Soundarajan, A Tamersoy, EB Khalil, T Eliassi-Rad, DH Chau, ...
Proceedings of the 25th International Conference Companion on World Wide Web …, 2016
542016
Systems and methods for adjusting suspiciousness scores in event-correlation graphs
A Tamersoy, K Roundy, S Bhatkar, E Khalil
US Patent 9,148,441, 2015
462015
VISAGE: Interactive Visual Graph Querying
R Pienta, A Tamersoy, A Endert, S Navathe, H Tong, DH Chau
Proceedings of the International Working Conference on Advanced Visual …, 2016
452016
The role of computer security customer support in helping survivors of intimate partner violence
Y Zou, A McDonald, J Narakornpichit, N Dell, T Ristenpart, K Roundy, ...
30th USENIX security symposium (USENIX Security 21), 429-446, 2021
322021
Visual Graph Query Construction and Refinement
R Pienta, F Hohman, A Tamersoy, A Endert, S Navathe, H Tong, DH Chau
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
292017
Identifying and protecting against computer security threats while preserving privacy of individual client devices using condensed local differential privacy (CLDP)
ME Gursoy, A Tamersoy
US Patent 10,789,363, 2020
272020
Large-scale insider trading analysis: patterns and discoveries
A Tamersoy, E Khalil, B Xie, SL Lenkey, BR Routledge, DH Chau, ...
Social Network Analysis and Mining 4, 1-17, 2014
272014
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20