Year |
Citation |
Score |
2017 |
Zhang Y, O'Neill A, Sherr M, Zhou W. Privacy-preserving network provenance Proceedings of the Vldb Endowment. 10: 1550-1561. DOI: 10.14778/3137628.3137661 |
0.367 |
|
2016 |
Tan H, Sherr M, Zhou W. Data-plane Defenses against Routing Attacks on Tor Proceedings On Privacy Enhancing Technologies. 2016: 276-293. DOI: 10.1515/popets-2016-0040 |
0.403 |
|
2016 |
Zhao M, Zhou W, Gurney AJT, Haeberlen A, Sherr M, Loo BT. Private and verifiable interdomain routing decisions Ieee/Acm Transactions On Networking. 24: 1011-1024. DOI: 10.1109/Tnet.2015.2409233 |
0.671 |
|
2015 |
Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515 |
0.447 |
|
2015 |
Brad Moore W, Tan H, Sherr M, Maloof MA. Multi-class traffic morphing for encrypted VoIP communication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8975: 65-85. DOI: 10.1007/978-3-662-47854-7_5 |
0.332 |
|
2014 |
Sherr M, Gill H, Saeed TA, Mao A, Marczak WR, Soundararajan S, Zhou W, Loo BT, Blaze M. The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227. DOI: 10.1016/J.Comnet.2013.09.021 |
0.625 |
|
2014 |
Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013 |
0.519 |
|
2014 |
Tan H, Wacek C, Newport C, Sherr M. A disruption-resistant MAC layer for multichannel wireless networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8878: 202-216. |
0.415 |
|
2013 |
Johnson A, Wacek C, Jansen R, Sherr M, Syverson P. Users get routed: Traffic correlation on Tor by realistic adversaries Proceedings of the Acm Conference On Computer and Communications Security. 337-348. DOI: 10.1145/2508859.2516651 |
0.408 |
|
2012 |
Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11 |
0.443 |
|
2012 |
Loo BT, Gill H, Liu C, Mao Y, Marczak WR, Sherr M, Wang A, Zhou W. Recent advances in declarative networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7149: 1-16. DOI: 10.1007/978-3-642-27694-1_1 |
0.67 |
|
2012 |
Zhou W, Mapara S, Ren Y, Li Y, Haeberlen A, Ives Z, Loo BT, Sherr M. Distributed time-aware provenance Proceedings of the Vldb Endowment. 6: 49-60. |
0.616 |
|
2011 |
Moore WB, Wacek C, Sherr M. Exploring the potential benefits of expanded rate limiting in Tor: Slow and steady wins the race with Tortoise Acm International Conference Proceeding Series. 207-216. DOI: 10.1145/2076732.2076762 |
0.317 |
|
2011 |
Gurney AJT, Haeberlen A, Zhou W, Sherr M, Loo BT. Having your cake and eating it too: Routing security with privacy protections Proceedings of the 10th Acm Workshop On Hot Topics in Networks, Hotnets-10. DOI: 10.1145/2070562.2070577 |
0.637 |
|
2011 |
Zhou W, Fei Q, Narayan A, Haeberlen A, Loo BT, Sherr M. Secure network provenance Sosp'11 - Proceedings of the 23rd Acm Symposium On Operating Systems Principles. 295-310. DOI: 10.1145/2043556.2043584 |
0.639 |
|
2011 |
Zhou W, Fei Q, Sun S, Tao T, Haeberlen A, Ives Z, Loo BT, Sherr M. NetTrails: A declarative platform for maintaining and querying provenance in distributed systems Proceedings of the Acm Sigmod International Conference On Management of Data. 1323-1325. DOI: 10.1145/1989323.1989488 |
0.671 |
|
2010 |
Zhou W, Sherr M, Marczak WR, Zhang Z, Tao T, Loo BT, Lee I. Towards a data-centric view of cloud security International Conference On Information and Knowledge Management, Proceedings. 25-32. DOI: 10.1145/1871929.1871934 |
0.612 |
|
2010 |
Marczak WR, Huang SS, Bravenboer M, Sherr M, Loo BT, Aref M. SecureBlox: Customizable secure distributed data processing Proceedings of the Acm Sigmod International Conference On Management of Data. 723-734. DOI: 10.1145/1807167.1807246 |
0.653 |
|
2010 |
Zhou W, Sherr M, Tao T, Li X, Loo BT, Mao Y. Efficient querying and maintenance of network provenance at internet-scale Proceedings of the Acm Sigmod International Conference On Management of Data. 615-626. DOI: 10.1145/1807167.1807234 |
0.599 |
|
2009 |
Sherr M, Shah G, Cronin E, Clark S, Blaze M. Can they hear me now? A security analysis of law enforcement wiretaps Proceedings of the Acm Conference On Computer and Communications Security. 512-523. DOI: 10.1145/1653662.1653724 |
0.383 |
|
2009 |
Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 73-93. DOI: 10.1007/978-3-642-03168-7_5 |
0.564 |
|
2008 |
Cronin E, Sherr M, Blaze M. On the (un)reliability of eavesdropping International Journal of Security and Networks. 3: 103. DOI: 10.1504/Ijsn.2008.017223 |
0.315 |
|
2006 |
Cronin E, Sherr M, Blaze M. On the reliability of network eavesdropping tools Ifip International Federation For Information Processing. 222: 199-213. |
0.325 |
|
Low-probability matches (unlikely to be authored by this person) |
2010 |
Sherr M, Cronin E, Blaze M. Measurable security through isotropic channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5964: 3-12. DOI: 10.1007/978-3-642-17773-6_2 |
0.297 |
|
2009 |
Sherr M, Blaze M. Application containers without virtual machines Proceedings of the Acm Conference On Computer and Communications Security. 39-41. DOI: 10.1145/1655148.1655155 |
0.257 |
|
2016 |
Lin D, Sherr M, Loo BT. Scalable and Anonymous Group Communication with MTor Proceedings On Privacy Enhancing Technologies. 2016: 22-39. DOI: 10.1515/popets-2016-0003 |
0.232 |
|
2010 |
Sherr M. Measurable security through isotropic channels (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5964: 13-19. DOI: 10.1007/978-3-642-17773-6_3 |
0.228 |
|
2013 |
Moore WB, Wei Y, Orshefsky A, Sherr M, Singh L, Yang H. Understanding site-based inference potential for identifying hidden attributes Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 570-577. DOI: 10.1109/SocialCom.2013.86 |
0.222 |
|
2005 |
Sherr M, Greenwald M, Gunter CA, Khanna S, Venkatesh SS. Mitigating DoS attack through selective bin verification 2005 First Workshop On Secure Network Protocols, Npsec, Held in Conjunction With Icnp 2005: 13th Ieee International Conference On Network Protocols. 2005: 7-12. DOI: 10.1109/NPSEC.2005.1532046 |
0.217 |
|
2005 |
Sherr M, Cronin E, Clark S, Blaze M. Signaling vulnerabilities in wiretapping systems Ieee Security and Privacy. 3: 13-25. DOI: 10.1109/MSP.2005.160 |
0.202 |
|
2013 |
Ferro J, Singh L, Sherr M. Identifying individual vulnerability based on public data 2013 11th Annual Conference On Privacy, Security and Trust, Pst 2013. 119-126. DOI: 10.1109/PST.2013.6596045 |
0.202 |
|
2002 |
Weiner M, Sherr M, Cohen A. Metadata tables to enable dynamic data modeling and web interface design: the SEER example. International Journal of Medical Informatics. 65: 51-8. PMID 11904248 DOI: 10.1016/S1386-5056(02)00002-3 |
0.192 |
|
2015 |
Singh L, Yang GH, Sherr M, Hian-Cheong A, Tian K, Zhu J, Zhang S. Public information exposure detection: Helping users understand their web footprints Proceedings of the 2015 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2015. 153-161. DOI: 10.1145/2808797.2809280 |
0.162 |
|
2015 |
Singh L, Yang H, Sherr M, Wei Y, Hian-Cheong A, Tian K, Zhu J, Zhang S, Vaidya T, Asgarli E. Helping users understand their web footprints Www 2015 Companion - Proceedings of the 24th International Conference On World Wide Web. 117-118. DOI: 10.1145/2740908.2742763 |
0.157 |
|
2014 |
Jones JM, Sherr ME. Introduction to the special issue on implementation research. Journal of Evidence-Based Social Work. 11: 1. PMID 24405127 DOI: 10.1080/15433714.2013.837336 |
0.136 |
|
2012 |
Tan H, Goharian N, Sherr M. $100,000 prize jackpot. Call now!: Identifying the pertinent features of SMS spam Sigir'12 - Proceedings of the International Acm Sigir Conference On Research and Development in Information Retrieval. 1175-1176. DOI: 10.1145/2348283.2348526 |
0.121 |
|
2019 |
Jansen R, Traudt M, Geddes J, Wacek C, Sherr M, Syverson P. KIST Acm Transactions On Privacy and Security. 22: 1-37. DOI: 10.1145/3278121 |
0.12 |
|
2015 |
Vaidya T, Sherr M. Mind your (R,Φ)s: Location-based privacy controls for consumer drones (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9379: 91-104. DOI: 10.1007/978-3-319-26096-9_10 |
0.112 |
|
2009 |
Sherr ME, Singletary JE, Rogers RK. Innovative service or proselytizing: exploring when services delivery becomes a platform for unwanted religious persuasion. Social Work. 54: 157-65. PMID 19366164 DOI: 10.1093/Sw/54.2.157 |
0.112 |
|
2013 |
Wilberding J, Yates A, Sherr M, Zhou W. Validating web content with senser Acm International Conference Proceeding Series. 339-348. DOI: 10.1145/2523649.2523669 |
0.11 |
|
2013 |
Williams NJ, Sherr ME. Oh how I try to use evidence in my social work practice: efforts, successes, frustrations, and questions. Journal of Evidence-Based Social Work. 10: 100-10. PMID 23581804 DOI: 10.1080/15433714.2011.597299 |
0.108 |
|
2014 |
Fineman JT, Newport C, Sherr M, Wang T. Fair maximal independent sets Proceedings of the International Parallel and Distributed Processing Symposium, Ipdps. 712-721. DOI: 10.1109/IPDPS.2014.79 |
0.106 |
|
2003 |
Perfetto EM, Ellison R, Ackermann S, Sherr M, Zaugg AM. Evidence-Based Risk Management: How Can we Succeed?: Deliberations from a Risk Management Advisory Council Drug Information Journal. 37: 127-134. |
0.106 |
|
2006 |
Sherr ME. The Afrocentric paradigm a pragmatic discourse about social work practice with African Americans Journal of Human Behavior in the Social Environment. 13: 1-17. DOI: 10.1300/J137V13N03_01 |
0.101 |
|
2014 |
Jones JM, Sherr ME. The role of relationships in connecting social work research and evidence-based practice. Journal of Evidence-Based Social Work. 11: 139-47. PMID 24405138 DOI: 10.1080/15433714.2013.845028 |
0.094 |
|
2011 |
Stamey J, Sherr ME, Williams NJ. Bayesian analysis for evidence-based practice in social work Social Work Research. 35: 46-52. |
0.068 |
|
1997 |
Becher MW, Rubinsztein DC, Leggo J, Wagster MV, Stine OC, Ranen NG, Franz ML, Abbott MH, Sherr M, MacMillan JC, Barron L, Porteous M, Harper PS, Ross CA. Dentatorubral and pallidoluysian atrophy (DRPLA). Clinical and neuropathological findings in genetically confirmed North American and European pedigrees. Movement Disorders : Official Journal of the Movement Disorder Society. 12: 519-30. PMID 9251070 DOI: 10.1002/Mds.870120408 |
0.065 |
|
2015 |
Sherr M, Robertson W. Message from the program chairs Acm International Conference Proceeding Series. 7: xi. |
0.064 |
|
2013 |
Sherr ME, Pooler D, Stamey J, Jones J, Dyer P. A randomized effectiveness trial of a sex education program for minority youth in Miami, Florida. Journal of Evidence-Based Social Work. 10: 53-62. PMID 23581800 DOI: 10.1080/15433714.2011.581533 |
0.054 |
|
1998 |
Rosenblatt A, Ranen NG, Rubinsztein DC, Stine OC, Margolis RL, Wagster MV, Becher MW, Rosser AE, Leggo J, Hodges JR, ffrench-Constant CK, Sherr M, Franz ML, Abbott MH, Ross CA. Patients with features similar to Huntington's disease, without CAG expansion in huntingtin. Neurology. 51: 215-20. PMID 9674805 DOI: 10.1212/Wnl.51.1.215 |
0.054 |
|
2012 |
Sherr ME, Pooler D, Stamey J, Dyer P, Smith E, Summers A. The Influence of Religious Participation on Sexual Activity in a Randomized Effectiveness Trial for Minority Youth Journal of Social Service Research. 38: 156-164. DOI: 10.1080/01488376.2011.615270 |
0.051 |
|
1999 |
Margolis RL, Stine OC, Ward CM, Franz ML, Rosenblatt A, Callahan C, Sherr M, Ross CA, Potter NT. Unstable expansion of the CAG trinucleotide repeat in MAB21L1: report of a second pedigree and effect on protein expression. Journal of Medical Genetics. 36: 62-4. PMID 9950369 DOI: 10.1136/Jmg.36.1.62 |
0.051 |
|
1995 |
Ranen NG, Stine OC, Abbott MH, Sherr M, Codori AM, Franz ML, Chao NI, Chung AS, Pleasant N, Callahan C, Kasch LM, Ghaffari M, Chase GA, Kazazian HH, Brandt J, et al. Anticipation and instability of IT-15 (CAG)N repeats in parent-offspring pairs with Huntington disease American Journal of Human Genetics. 57: 593-602. PMID 7668287 |
0.049 |
|
1996 |
Ranen NG, Peyser CE, Coyle JT, Bylsma FW, Sherr M, Day L, Folstein MF, Brandt J, Ross CA, Folstein SE. A controlled trial of idebenone in Huntington's disease. Movement Disorders : Official Journal of the Movement Disorder Society. 11: 549-54. PMID 8866496 DOI: 10.1002/Mds.870110510 |
0.047 |
|
2015 |
Beise B, Sherr M. Making Human Behavior Theory Real Through the Unreal: Fiction in the HBSE Classroom Journal of Human Behavior in the Social Environment. 25: 236-245. DOI: 10.1080/10911359.2014.1003735 |
0.047 |
|
1999 |
Margolis RL, Stine OC, Callahan C, Rosenblatt A, Abbott MH, Sherr M, Ross CA. Two novel single-base-pair substitutions adjacent to the CAG repeat in the huntington disease gene (IT15): implications for diagnostic testing. American Journal of Human Genetics. 64: 323-6. PMID 9915978 DOI: 10.1086/302209 |
0.043 |
|
2001 |
Rosenblatt A, Brinkman RR, Liang KY, Almqvist EW, Margolis RL, Huang CY, Sherr M, Franz ML, Abbott MH, Hayden MR, Ross CA. Familial influence on age of onset among siblings with Huntington disease. American Journal of Medical Genetics. 105: 399-403. PMID 11449389 DOI: 10.1002/Ajmg.1400 |
0.042 |
|
1996 |
Rubinsztein DC, Leggo J, Coles R, Almqvist E, Biancalana V, Cassiman JJ, Chotai K, Connarty M, Crauford D, Curtis A, Curtis D, Davidson MJ, Differ AM, Dode C, Dodge A, ... ... Sherr M, et al. Phenotypic characterization of individuals with 30-40 CAG repeats in the Huntington disease (HD) gene reveals HD cases with 36 repeats and apparently normal elderly individuals with 36-39 repeats. American Journal of Human Genetics. 59: 16-22. PMID 8659522 |
0.042 |
|
2000 |
Aylward EH, Codori AM, Rosenblatt A, Sherr M, Brandt J, Stine OC, Barta PE, Pearlson GD, Ross CA. Rate of caudate atrophy in presymptomatic and symptomatic stages of Huntington's disease. Movement Disorders : Official Journal of the Movement Disorder Society. 15: 552-60. PMID 10830423 DOI: 10.1002/1531-8257(200005)15:3<552::Aid-Mds1020>3.0.Co;2-P |
0.037 |
|
1997 |
Sherr MA, Babovich WM. Broadening the scope of the Rehabilitation Act of 1973 Nursing Management. 28: 41-42. PMID 1997118513 |
0.037 |
|
1998 |
Aylward EH, Anderson NB, Bylsma FW, Wagster MV, Barta PE, Sherr M, Feeney J, Davis A, Rosenblatt A, Pearlson GD, Ross CA. Frontal lobe volume in patients with Huntington's disease. Neurology. 50: 252-8. PMID 9443488 DOI: 10.1212/Wnl.50.1.252 |
0.037 |
|
1999 |
Holmes SE, O'Hearn EE, McInnis MG, Gorelick-Feldman DA, Kleiderlein JJ, Callahan C, Kwak NG, Ingersoll-Ashworth RG, Sherr M, Sumner AJ, Sharp AH, Ananth U, Seltzer WK, Boss MA, Vieria-Saecker AM, et al. Expansion of a novel CAG trinucleotide repeat in the 5' region of PPP2R2B is associated with SCA12. Nature Genetics. 23: 391-2. PMID 10581021 DOI: 10.1038/70493 |
0.036 |
|
2012 |
Sherr ME, Crow J, Stamey J, Jones J, Dyer P. The Influence of Family Structure on Sexual Activity in a Randomized Effectiveness Trial for Minority Youth Journal of Family Social Work. 15: 288-302. DOI: 10.1080/10522158.2012.695322 |
0.035 |
|
2007 |
Cronin E, Sherr M, Blaze M. Listen too closely and you may be confused Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4631: 245-249. |
0.031 |
|
1997 |
Aylward EH, Li Q, Stine OC, Ranen N, Sherr M, Barta PE, Bylsma FW, Pearlson GD, Ross CA. Longitudinal change in basal ganglia volume in patients with Huntington's disease. Neurology. 48: 394-9. PMID 9040728 DOI: 10.1212/Wnl.48.2.394 |
0.021 |
|
2009 |
Williams NJ, Sherr ME. Children's psychosocial rehabilitation: Clinical outcomes for youth with serious emotional disturbance living in foster care Child and Adolescent Social Work Journal. 26: 225-234. DOI: 10.1007/S10560-008-0160-Y |
0.02 |
|
2014 |
Tan H, Sherr M. Censorship resistance as a side-effect: (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8809: 227-238. DOI: 10.1007/978-3-319-12400-1_22 |
0.02 |
|
1998 |
Rosenblatt A, Margolis RL, Becher MW, Aylward E, Franz ML, Sherr M, Abbott MH, Lian KY, Ross CA. Does CAG repeat number predict the rate of pathological changes in Huntington's disease? Annals of Neurology. 44: 708-9. PMID 9778276 DOI: 10.1002/Ana.410440424 |
0.017 |
|
Hide low-probability matches. |