Kevin Leach
Cited by
Cited by
An evaluation dataset for intent classification and out-of-scope prediction
S Larson, A Mahendran, JJ Peper, C Clarke, A Lee, P Hill, JK Kummerfeld, ...
arXiv preprint arXiv:1909.02027, 2019
Assessing social anxiety using GPS trajectories and point-of-interest data
Y Huang, H Xiong, K Leach, Y Zhang, P Chow, K Fua, BA Teachman, ...
Proceedings of the 2016 ACM international joint conference on pervasive and …, 2016
STING enhances cell death through regulation of reactive oxygen species and DNA damage
TJ Hayman, M Baro, T MacNeil, C Phoomak, TN Aung, W Cui, K Leach, ...
Nature Communications 12 (1), 2327, 2021
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
A human study of comprehension and code summarization
S Stapleton, Y Gambhir, A LeClair, Z Eberhart, W Weimer, K Leach, ...
Proceedings of the 28th International Conference on Program Comprehension, 2-13, 2020
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.
C Spensky, H Hu, K Leach
NDSS, 2016
Neurological divide: An fMRI study of prose and code writing
R Krueger, Y Huang, X Liu, T Santander, W Weimer, K Leach
Proceedings of the acm/ieee 42nd international conference on software …, 2020
An uncrewed aerial vehicle attack scenario and trustworthy repair architecture
K Highnam, K Angstadt, K Leach, W Weimer, A Paulos, P Hurley
2016 46th annual IEEE/IFIP international conference on dependable systems …, 2016
Distilling neural representations of data structure manipulation using fMRI and fNIRS
Y Huang, X Liu, R Krueger, T Santander, X Hu, K Leach, W Weimer
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
M-SEQ: Early detection of anxiety and depression via temporal orders of diagnoses in electronic health data
J Zhang, H Xiong, Y Huang, H Wu, K Leach, LE Barnes
2015 IEEE International Conference on Big Data (Big Data), 2569-2577, 2015
Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machines
Y Huang, K Leach, Z Sharafi, N McKay, T Santander, W Weimer
Proceedings of the 28th ACM joint meeting on European software engineering …, 2020
Mimosa: Reducing malware analysis overhead with coverings
M Ahmadi, K Leach, R Dougherty, S Forrest, W Weimer
arXiv preprint arXiv:2101.07328, 2021
Trustlogin: Securing password-login on commodity operating systems
F Zhang, K Leach, H Wang, A Stavrou
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Strongbox: A gpu tee on arm endpoints
Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach, J Li, S Yan, Z He, J Cao, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Toward an objective measure of developers’ cognitive activities
Z Sharafi, Y Huang, K Leach, W Weimer
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-40, 2021
Substituent effects of 2-pyridones on selective O-arylation with diaryliodonium salts: synthesis of 2-aryloxypyridines under transition-metal-free conditions
XH Li, AH Ye, C Liang, DL Mo
Synthesis 50 (08), 1699-1710, 2018
Scotch: Combining Software Guard Extensions and system management mode to monitor cloud resource usage
K Leach, F Zhang, W Weimer
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
A survey of intent classification and slot-filling datasets for task-oriented dialog
S Larson, K Leach
arXiv preprint arXiv:2207.13211, 2022
The system can't perform the operation now. Try again later.
Articles 1–20