Follow
Kevin Leach
Title
Cited by
Cited by
Year
An evaluation dataset for intent classification and out-of-scope prediction
S Larson, A Mahendran, JJ Peper, C Clarke, A Lee, P Hill, JK Kummerfeld, ...
arXiv preprint arXiv:1909.02027, 2019
5522019
Assessing social anxiety using GPS trajectories and point-of-interest data
Y Huang, H Xiong, K Leach, Y Zhang, P Chow, K Fua, BA Teachman, ...
Proceedings of the 2016 ACM international joint conference on pervasive and …, 2016
1072016
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
1042015
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
1012013
A human study of comprehension and code summarization
S Stapleton, Y Gambhir, A LeClair, Z Eberhart, W Weimer, K Leach, ...
Proceedings of the 28th International Conference on Program Comprehension, 2-13, 2020
902020
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
592016
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
582014
Neurological divide: An fMRI study of prose and code writing
R Krueger, Y Huang, X Liu, T Santander, W Weimer, K Leach
Proceedings of the acm/ieee 42nd international conference on software …, 2020
512020
Distilling neural representations of data structure manipulation using fMRI and fNIRS
Y Huang, X Liu, R Krueger, T Santander, X Hu, K Leach, W Weimer
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
432019
An uncrewed aerial vehicle attack scenario and trustworthy repair architecture
K Highnam, K Angstadt, K Leach, W Weimer, A Paulos, P Hurley
2016 46th annual IEEE/IFIP international conference on dependable systems …, 2016
422016
M-SEQ: Early detection of anxiety and depression via temporal orders of diagnoses in electronic health data
J Zhang, H Xiong, Y Huang, H Wu, K Leach, LE Barnes
2015 IEEE International Conference on Big Data (Big Data), 2569-2577, 2015
362015
Strongbox: A gpu tee on arm endpoints
Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach, J Li, S Yan, Z He, J Cao, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
352022
Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machines
Y Huang, K Leach, Z Sharafi, N McKay, T Santander, W Weimer
Proceedings of the 28th ACM joint meeting on European software engineering …, 2020
332020
Toward an objective measure of developers’ cognitive activities
Z Sharafi, Y Huang, K Leach, W Weimer
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-40, 2021
292021
Mimosa: Reducing malware analysis overhead with coverings
M Ahmadi, K Leach, R Dougherty, S Forrest, W Weimer
arXiv preprint arXiv:2101.07328, 2021
242021
Trustlogin: Securing password-login on commodity operating systems
F Zhang, K Leach, H Wang, A Stavrou
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
242015
KShot: Live kernel patching with SMM and SGX
L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
222020
A survey of intent classification and slot-filling datasets for task-oriented dialog
S Larson, K Leach
arXiv preprint arXiv:2207.13211, 2022
202022
Systems and methods for machine learning-based multi-intent segmentation and classification
J Peper, P Hill, K Leach, S Stapleton, JK Kummerfeld, J Hauswald, ...
US Patent 10,824,818, 2020
202020
Iterative feature mining for constraint-based data collection to increase data diversity and model robustness
S Larson, A Zheng, A Mahendran, R Tekriwal, A Cheung, E Guldan, ...
Proceedings of the 2020 Conference on Empirical Methods in Natural Language …, 2020
202020
The system can't perform the operation now. Try again later.
Articles 1–20