default search action
Christopher Gates 0002
Person information
- affiliation: Symantec Research Labs
- affiliation (former): Purdue University, West Lafayette, IN, USA
Other persons with the same name
- Christopher Gates 0001 — Penn State University, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c15]Mahmood Sharif, Kevin A. Roundy, Matteo Dell'Amico, Christopher Gates, Daniel Kats, Lujo Bauer, Nicolas Christin:
A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats. CHI 2019: 78 - [c14]Yufei Han, Yuzhe Ma, Christopher Gates, Kevin A. Roundy, Yun Shen:
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization. IJCNN 2019: 1-8 - [c13]Camelia Simoiu, Joseph Bonneau, Christopher Gates, Sharad Goel:
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware. SOUPS @ USENIX Security Symposium 2019 - [i2]Yufei Han, Yuzhe Ma, Christopher Gates, Kevin A. Roundy, Yun Shen:
Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization. CoRR abs/1905.02796 (2019) - 2018
- [j4]Robert S. Pienta, Fred Hohman, Alex Endert, Acar Tamersoy, Kevin A. Roundy, Christopher S. Gates, Shamkant B. Navathe, Duen Horng Chau:
VIGOR: Interactive Visual Exploration of Graph Query Results. IEEE Trans. Vis. Comput. Graph. 24(1): 215-225 (2018) - [c12]Doowon Kim, Bum Jun Kwon, Kristián Kozák, Christopher Gates, Tudor Dumitras:
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI. USENIX Security Symposium 2018: 851-868 - [i1]Kristián Kozák, Bum Jun Kwon, Doowon Kim, Christopher Gates, Tudor Dumitras:
Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate. CoRR abs/1803.02931 (2018) - 2017
- [c11]Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy:
Predicting Cyber Threats with Virtual Security Products. ACSAC 2017: 189-199 - [c10]Bo Li, Kevin A. Roundy, Christopher S. Gates, Yevgeniy Vorobeychik:
Large-Scale Identification of Malicious Singleton Files. CODASPY 2017: 227-238 - [c9]Kyle Soska, Christopher S. Gates, Kevin A. Roundy, Nicolas Christin:
Automatic Application Identification from Billions of Files. KDD 2017: 2021-2030 - 2015
- [j3]Lei Cen, Christopher S. Gates, Luo Si, Ninghui Li:
A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code. IEEE Trans. Dependable Secur. Comput. 12(4): 400-412 (2015) - [c8]Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu:
Dimensions of Risk in Mobile Applications: A User Study. CODASPY 2015: 49-60 - [c7]Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li:
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users. ESORICS (2) 2015: 396-414 - 2014
- [j2]Christopher S. Gates, Ninghui Li, Hao Peng, Bhaskar Pratim Sarma, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Generating Summary Risk Scores for Mobile Applications. IEEE Trans. Dependable Secur. Comput. 11(3): 238-251 (2014) - [j1]Christopher S. Gates, Jing Chen, Ninghui Li, Robert W. Proctor:
Effective Risk Communication for Android Apps. IEEE Trans. Dependable Secur. Comput. 11(3): 252-265 (2014) - [c6]Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian M. Molloy, Youngja Park:
Detecting Insider Information Theft Using Features from File Access Logs. ESORICS (2) 2014: 383-400 - 2013
- [c5]Youngja Park, Christopher S. Gates, Stephen C. Gates:
Estimating Asset Sensitivity by Profiling Users. ESORICS 2013: 94-110 - 2012
- [c4]Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor:
CodeShield: towards personalized application whitelisting. ACSAC 2012: 279-288 - [c3]Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Using probabilistic generative models for ranking risks of Android apps. CCS 2012: 241-252 - [c2]Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Android permissions: a perspective combining risks and benefits. SACMAT 2012: 13-22 - 2010
- [c1]Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao:
Towards analyzing complex operating system access control configurations. SACMAT 2010: 13-22
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint