An efficient user verification system via mouse movements N Zheng, A Paloski, H Wang Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 322 | 2011 |
Blog or block: Detecting blog bots through behavioral biometrics Z Chu, S Gianvecchio, A Koehl, H Wang, S Jajodia Computer Networks 57 (3), 634-646, 2013 | 77 | 2013 |
Click fraud detection on the advertiser side H Xu, D Liu, A Koehl, H Wang, A Stavrou Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 45 | 2014 |
Evasive bots masquerading as human beings on the web J Jin, J Offutt, N Zheng, F Mao, A Koehl, H Wang 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 19 | 2013 |
Surviving a search engine overload A Koehl, H Wang Proceedings of the 21st international conference on World Wide Web, 171-180, 2012 | 14 | 2012 |
M. site: Efficient content adaptation for mobile devices A Koehl, H Wang Middleware 2012: ACM/IFIP/USENIX 13th International Middleware Conference …, 2012 | 11 | 2012 |
Serf: Optimization of socially sourced images using psychovisual enhancements A Koehl, H Wang Proceedings of the 7th International Conference on Multimedia Systems, 1-12, 2016 | 3 | 2016 |
Perfect harmony: Team teaching computing & music R Weiss, J Caristi, JM Heines, A Koehl, K Rossum Proceedings of the 49th ACM Technical Symposium on Computer Science …, 2018 | 1 | 2018 |
Autoblog Forensics and Attribution A Koehl 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | | 2018 |
Scalability and Performance Implications of Middleware for Nontraditional Web Clients AM Koehl The College of William and Mary, 2015 | | 2015 |