BibTeX records: Kevin Kane

download as .bib file

@inproceedings{DBLP:conf/milcom/StokesEK21,
  author       = {Jack W. Stokes and
                  Paul England and
                  Kevin Kane},
  title        = {Preventing Machine Learning Poisoning Attacks Using Authentication
                  and Provenance},
  booktitle    = {2021 {IEEE} Military Communications Conference, {MILCOM} 2021, San
                  Diego, CA, USA, November 29 - Dec. 2, 2021},
  pages        = {181--188},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MILCOM52596.2021.9653139},
  doi          = {10.1109/MILCOM52596.2021.9653139},
  timestamp    = {Wed, 12 Jan 2022 09:10:31 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/StokesEK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsys/EnglandMHSFBCCC21,
  author       = {Paul England and
                  Henrique S. Malvar and
                  Eric Horvitz and
                  Jack W. Stokes and
                  C{\'{e}}dric Fournet and
                  Rebecca Burke{-}Aguero and
                  Amaury Chamayou and
                  Sylvan Clebsch and
                  Manuel Costa and
                  John Deutscher and
                  Shabnam Erfani and
                  Matt Gaylor and
                  Andrew Jenks and
                  Kevin Kane and
                  Elissa M. Redmiles and
                  Alex Shamis and
                  Isha Sharma and
                  John C. Simmons and
                  Sam Wenker and
                  Anika Zaman},
  editor       = {{\"{O}}zg{\"{u}} Alay and
                  Cheng{-}Hsin Hsu and
                  Ali C. Begen},
  title        = {{AMP:} authentication of media via provenance},
  booktitle    = {MMSys '21: 12th {ACM} Multimedia Systems Conference, Istanbul, Turkey,
                  28 September 2021 - 1 October 2021},
  pages        = {108--121},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3458305.3459599},
  doi          = {10.1145/3458305.3459599},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmsys/EnglandMHSFBCCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-10051,
  author       = {Jack W. Stokes and
                  Paul England and
                  Kevin Kane},
  title        = {Preventing Machine Learning Poisoning Attacks Using Authentication
                  and Provenance},
  journal      = {CoRR},
  volume       = {abs/2105.10051},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.10051},
  eprinttype    = {arXiv},
  eprint       = {2105.10051},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-10051.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-07886,
  author       = {Paul England and
                  Henrique S. Malvar and
                  Eric Horvitz and
                  Jack W. Stokes and
                  C{\'{e}}dric Fournet and
                  Amaury Chamayou and
                  Sylvan Clebsch and
                  Manuel Costa and
                  Shabnam Erfani and
                  Kevin Kane and
                  Alex Shamis},
  title        = {{AMP:} Authentication of Media via Provenance},
  journal      = {CoRR},
  volume       = {abs/2001.07886},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.07886},
  eprinttype    = {arXiv},
  eprint       = {2001.07886},
  timestamp    = {Fri, 24 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-07886.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DongKC16,
  author       = {Zheng Dong and
                  Kevin Kane and
                  L. Jean Camp},
  title        = {Detection of Rogue Certificates from Trusted Certificate Authorities
                  Using Deep Neural Networks},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {19},
  number       = {2},
  pages        = {5:1--5:31},
  year         = {2016},
  url          = {https://doi.org/10.1145/2975591},
  doi          = {10.1145/2975591},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/DongKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/KaneD10,
  author       = {Kevin Kane and
                  Blair Dillaway},
  title        = {Cyclotron: a secure, isolated, virtual cycle-scavenging grid in the
                  enterprise},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {22},
  number       = {3},
  pages        = {241--260},
  year         = {2010},
  url          = {https://doi.org/10.1002/cpe.1475},
  doi          = {10.1002/CPE.1475},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/KaneD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/middleware/KaneD08,
  author       = {Kevin Kane and
                  Blair Dillaway},
  editor       = {Bruno Schulze and
                  Geoffrey C. Fox},
  title        = {Cyclotron: a secure, isolated, virtual cycle-scavenging grid in the
                  enterprise},
  booktitle    = {Proceedings of the 6th International Workshop on Middleware for Grid
                  Computing {(MGC} 2008), held at the {ACM/IFIP/USENIX} 9th International
                  Middleware Conference, December 1-5, Leuven, Belgium},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1462704.1462706},
  doi          = {10.1145/1462704.1462706},
  timestamp    = {Tue, 06 Nov 2018 16:57:13 +0100},
  biburl       = {https://dblp.org/rec/conf/middleware/KaneD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/BrowneLKCT06,
  author       = {James C. Browne and
                  Calvin Lin and
                  Kevin Kane and
                  Yoonsik Cheon and
                  Patricia J. Teller},
  title        = {Unification of verification and validation methods for software systems:
                  progress report and initial case study formulation},
  booktitle    = {20th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IPDPS.2006.1639582},
  doi          = {10.1109/IPDPS.2006.1639582},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/BrowneLKCT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KaneB06,
  author       = {Kevin Kane and
                  James C. Browne},
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {On classifying access control implementations for distributed systems},
  booktitle    = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages        = {29--38},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058.1133064},
  doi          = {10.1145/1133058.1133064},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/KaneB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/KaneB06,
  author       = {Kevin Kane and
                  James C. Browne},
  editor       = {Radha Poovendran and
                  Ari Juels},
  title        = {Using uncertainty in reputation methods to enforce cooperation in
                  ad-hoc networks},
  booktitle    = {Proceedings of the 2006 {ACM} Workshop on Wireless Security, Los Angeles,
                  California, USA, September 29, 2006},
  pages        = {105--113},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1161289.1161308},
  doi          = {10.1145/1161289.1161308},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/KaneB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/VolbergGPRHTSZKCO05,
  author       = {Ovsei Volberg and
                  Tamas I. Gombosi and
                  Kenneth G. Powell and
                  Aaron J. Ridley and
                  Kenneth C. Hansen and
                  G{\'{a}}bor T{\'{o}}th and
                  Quentin F. Stout and
                  Darren De Zeeuw and
                  Kevin Kane and
                  David R. Chesney and
                  Robert H. Oehmke},
  title        = {A High-Performance Framework for Sun-to-Earth Space Weather Modeling},
  booktitle    = {19th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2005), {CD-ROM} / Abstracts Proceedings, 4-8 April 2005, Denver, CO,
                  {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IPDPS.2005.31},
  doi          = {10.1109/IPDPS.2005.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/VolbergGPRHTSZKCO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coordination/KaneB04,
  author       = {Kevin Kane and
                  James C. Browne},
  editor       = {Rocco De Nicola and
                  Gian{-}Luigi Ferrari and
                  Greg Meredith},
  title        = {CoorSet: {A} Development Environment for Associatively Coordinated
                  Components},
  booktitle    = {Coordination Models and Languages, 6th International Conference, {COORDINATION}
                  2004, Pisa, Italy, February 24-27, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2949},
  pages        = {216--231},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24634-3\_17},
  doi          = {10.1007/978-3-540-24634-3\_17},
  timestamp    = {Fri, 23 Jun 2023 22:30:54 +0200},
  biburl       = {https://dblp.org/rec/conf/coordination/KaneB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcr/BrowneYKS04,
  author       = {James C. Browne and
                  Madhulika Yalamanchi and
                  Kevin Kane and
                  Karthikeyan Sankaralingam},
  editor       = {Alan Cox and
                  Jaspal Subhlok},
  title        = {General parallel computations on desktop grid and {P2P} systems},
  booktitle    = {Proceedings of the 7th Workshop on languages, compilers, and run-time
                  support for scalable systems, {LCR} '04, Houston, Texas, USA, October
                  22-23, 2004},
  pages        = {6:1--6:8},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1066650.1066654},
  doi          = {10.1145/1066650.1066654},
  timestamp    = {Sat, 23 Sep 2023 12:19:36 +0200},
  biburl       = {https://dblp.org/rec/conf/lcr/BrowneYKS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coordination/BrowneKT02,
  author       = {James C. Browne and
                  Kevin Kane and
                  Hongxia Tian},
  editor       = {Farhad Arbab and
                  Carolyn L. Talcott},
  title        = {An Associative Broadcast Based Coordination Model for Distributed
                  Processes},
  booktitle    = {Coordination Models and Languages, 5th International Conference, {COORDINATION}
                  2002, YORK, UK, April 8-11, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2315},
  pages        = {96--110},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46000-4\_11},
  doi          = {10.1007/3-540-46000-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/coordination/BrowneKT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics