Micah Sherr, Ph.D. - Publications

Affiliations: 
2009 University of Pennsylvania, Philadelphia, PA, United States 
Area:
Information Systems: Databases and Data Management

23/68 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Zhang Y, O'Neill A, Sherr M, Zhou W. Privacy-preserving network provenance Proceedings of the Vldb Endowment. 10: 1550-1561. DOI: 10.14778/3137628.3137661  0.367
2016 Tan H, Sherr M, Zhou W. Data-plane Defenses against Routing Attacks on Tor Proceedings On Privacy Enhancing Technologies. 2016: 276-293. DOI: 10.1515/popets-2016-0040  0.403
2016 Zhao M, Zhou W, Gurney AJT, Haeberlen A, Sherr M, Loo BT. Private and verifiable interdomain routing decisions Ieee/Acm Transactions On Networking. 24: 1011-1024. DOI: 10.1109/Tnet.2015.2409233  0.671
2015 Bates A, Butler KRB, Sherr M, Shields C, Traynor P, Wallach D. Accountable wiretapping-or-I know they can hear you now Journal of Computer Security. 23: 167-195. DOI: 10.3233/Jcs-140515  0.447
2015 Brad Moore W, Tan H, Sherr M, Maloof MA. Multi-class traffic morphing for encrypted VoIP communication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8975: 65-85. DOI: 10.1007/978-3-662-47854-7_5  0.332
2014 Sherr M, Gill H, Saeed TA, Mao A, Marczak WR, Soundararajan S, Zhou W, Loo BT, Blaze M. The design and implementation of the A3 application-aware anonymity platform Computer Networks. 58: 206-227. DOI: 10.1016/J.Comnet.2013.09.021  0.625
2014 Aviv AJ, Blaze M, Sherr M, Smith JM. Privacy-aware message exchanges for HumaNets Computer Communications. 48: 30-43. DOI: 10.1016/J.Comcom.2014.03.013  0.519
2014 Tan H, Wacek C, Newport C, Sherr M. A disruption-resistant MAC layer for multichannel wireless networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8878: 202-216.  0.415
2013 Johnson A, Wacek C, Jansen R, Sherr M, Syverson P. Users get routed: Traffic correlation on Tor by realistic adversaries Proceedings of the Acm Conference On Computer and Communications Security. 337-348. DOI: 10.1145/2508859.2516651  0.408
2012 Aviv AJ, Sherr M, Blaze M, Smith JM. Privacy-aware message exchanges for geographically routed human movement networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7459: 181-198. DOI: 10.1007/978-3-642-33167-1_11  0.443
2012 Loo BT, Gill H, Liu C, Mao Y, Marczak WR, Sherr M, Wang A, Zhou W. Recent advances in declarative networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7149: 1-16. DOI: 10.1007/978-3-642-27694-1_1  0.67
2012 Zhou W, Mapara S, Ren Y, Li Y, Haeberlen A, Ives Z, Loo BT, Sherr M. Distributed time-aware provenance Proceedings of the Vldb Endowment. 6: 49-60.  0.616
2011 Moore WB, Wacek C, Sherr M. Exploring the potential benefits of expanded rate limiting in Tor: Slow and steady wins the race with Tortoise Acm International Conference Proceeding Series. 207-216. DOI: 10.1145/2076732.2076762  0.317
2011 Gurney AJT, Haeberlen A, Zhou W, Sherr M, Loo BT. Having your cake and eating it too: Routing security with privacy protections Proceedings of the 10th Acm Workshop On Hot Topics in Networks, Hotnets-10. DOI: 10.1145/2070562.2070577  0.637
2011 Zhou W, Fei Q, Narayan A, Haeberlen A, Loo BT, Sherr M. Secure network provenance Sosp'11 - Proceedings of the 23rd Acm Symposium On Operating Systems Principles. 295-310. DOI: 10.1145/2043556.2043584  0.639
2011 Zhou W, Fei Q, Sun S, Tao T, Haeberlen A, Ives Z, Loo BT, Sherr M. NetTrails: A declarative platform for maintaining and querying provenance in distributed systems Proceedings of the Acm Sigmod International Conference On Management of Data. 1323-1325. DOI: 10.1145/1989323.1989488  0.671
2010 Zhou W, Sherr M, Marczak WR, Zhang Z, Tao T, Loo BT, Lee I. Towards a data-centric view of cloud security International Conference On Information and Knowledge Management, Proceedings. 25-32. DOI: 10.1145/1871929.1871934  0.612
2010 Marczak WR, Huang SS, Bravenboer M, Sherr M, Loo BT, Aref M. SecureBlox: Customizable secure distributed data processing Proceedings of the Acm Sigmod International Conference On Management of Data. 723-734. DOI: 10.1145/1807167.1807246  0.653
2010 Zhou W, Sherr M, Tao T, Li X, Loo BT, Mao Y. Efficient querying and maintenance of network provenance at internet-scale Proceedings of the Acm Sigmod International Conference On Management of Data. 615-626. DOI: 10.1145/1807167.1807234  0.599
2009 Sherr M, Shah G, Cronin E, Clark S, Blaze M. Can they hear me now? A security analysis of law enforcement wiretaps Proceedings of the Acm Conference On Computer and Communications Security. 512-523. DOI: 10.1145/1653662.1653724  0.383
2009 Sherr M, Blaze M, Loo BT. Scalable link-based relay selection for anonymous routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 73-93. DOI: 10.1007/978-3-642-03168-7_5  0.564
2008 Cronin E, Sherr M, Blaze M. On the (un)reliability of eavesdropping International Journal of Security and Networks. 3: 103. DOI: 10.1504/Ijsn.2008.017223  0.315
2006 Cronin E, Sherr M, Blaze M. On the reliability of network eavesdropping tools Ifip International Federation For Information Processing. 222: 199-213.  0.325
Low-probability matches (unlikely to be authored by this person)
2010 Sherr M, Cronin E, Blaze M. Measurable security through isotropic channels Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5964: 3-12. DOI: 10.1007/978-3-642-17773-6_2  0.297
2009 Sherr M, Blaze M. Application containers without virtual machines Proceedings of the Acm Conference On Computer and Communications Security. 39-41. DOI: 10.1145/1655148.1655155  0.257
2016 Lin D, Sherr M, Loo BT. Scalable and Anonymous Group Communication with MTor Proceedings On Privacy Enhancing Technologies. 2016: 22-39. DOI: 10.1515/popets-2016-0003  0.232
2010 Sherr M. Measurable security through isotropic channels (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5964: 13-19. DOI: 10.1007/978-3-642-17773-6_3  0.228
2013 Moore WB, Wei Y, Orshefsky A, Sherr M, Singh L, Yang H. Understanding site-based inference potential for identifying hidden attributes Proceedings - Socialcom/Passat/Bigdata/Econcom/Biomedcom 2013. 570-577. DOI: 10.1109/SocialCom.2013.86  0.222
2005 Sherr M, Greenwald M, Gunter CA, Khanna S, Venkatesh SS. Mitigating DoS attack through selective bin verification 2005 First Workshop On Secure Network Protocols, Npsec, Held in Conjunction With Icnp 2005: 13th Ieee International Conference On Network Protocols. 2005: 7-12. DOI: 10.1109/NPSEC.2005.1532046  0.217
2005 Sherr M, Cronin E, Clark S, Blaze M. Signaling vulnerabilities in wiretapping systems Ieee Security and Privacy. 3: 13-25. DOI: 10.1109/MSP.2005.160  0.202
2013 Ferro J, Singh L, Sherr M. Identifying individual vulnerability based on public data 2013 11th Annual Conference On Privacy, Security and Trust, Pst 2013. 119-126. DOI: 10.1109/PST.2013.6596045  0.202
2002 Weiner M, Sherr M, Cohen A. Metadata tables to enable dynamic data modeling and web interface design: the SEER example. International Journal of Medical Informatics. 65: 51-8. PMID 11904248 DOI: 10.1016/S1386-5056(02)00002-3  0.192
2015 Singh L, Yang GH, Sherr M, Hian-Cheong A, Tian K, Zhu J, Zhang S. Public information exposure detection: Helping users understand their web footprints Proceedings of the 2015 Ieee/Acm International Conference On Advances in Social Networks Analysis and Mining, Asonam 2015. 153-161. DOI: 10.1145/2808797.2809280  0.162
2015 Singh L, Yang H, Sherr M, Wei Y, Hian-Cheong A, Tian K, Zhu J, Zhang S, Vaidya T, Asgarli E. Helping users understand their web footprints Www 2015 Companion - Proceedings of the 24th International Conference On World Wide Web. 117-118. DOI: 10.1145/2740908.2742763  0.157
2014 Jones JM, Sherr ME. Introduction to the special issue on implementation research. Journal of Evidence-Based Social Work. 11: 1. PMID 24405127 DOI: 10.1080/15433714.2013.837336  0.136
2012 Tan H, Goharian N, Sherr M. $100,000 prize jackpot. Call now!: Identifying the pertinent features of SMS spam Sigir'12 - Proceedings of the International Acm Sigir Conference On Research and Development in Information Retrieval. 1175-1176. DOI: 10.1145/2348283.2348526  0.121
2019 Jansen R, Traudt M, Geddes J, Wacek C, Sherr M, Syverson P. KIST Acm Transactions On Privacy and Security. 22: 1-37. DOI: 10.1145/3278121  0.12
2015 Vaidya T, Sherr M. Mind your (R,Φ)s: Location-based privacy controls for consumer drones (transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9379: 91-104. DOI: 10.1007/978-3-319-26096-9_10  0.112
2009 Sherr ME, Singletary JE, Rogers RK. Innovative service or proselytizing: exploring when services delivery becomes a platform for unwanted religious persuasion. Social Work. 54: 157-65. PMID 19366164 DOI: 10.1093/Sw/54.2.157  0.112
2013 Wilberding J, Yates A, Sherr M, Zhou W. Validating web content with senser Acm International Conference Proceeding Series. 339-348. DOI: 10.1145/2523649.2523669  0.11
2013 Williams NJ, Sherr ME. Oh how I try to use evidence in my social work practice: efforts, successes, frustrations, and questions. Journal of Evidence-Based Social Work. 10: 100-10. PMID 23581804 DOI: 10.1080/15433714.2011.597299  0.108
2014 Fineman JT, Newport C, Sherr M, Wang T. Fair maximal independent sets Proceedings of the International Parallel and Distributed Processing Symposium, Ipdps. 712-721. DOI: 10.1109/IPDPS.2014.79  0.106
2003 Perfetto EM, Ellison R, Ackermann S, Sherr M, Zaugg AM. Evidence-Based Risk Management: How Can we Succeed?: Deliberations from a Risk Management Advisory Council Drug Information Journal. 37: 127-134.  0.106
2006 Sherr ME. The Afrocentric paradigm a pragmatic discourse about social work practice with African Americans Journal of Human Behavior in the Social Environment. 13: 1-17. DOI: 10.1300/J137V13N03_01  0.101
2014 Jones JM, Sherr ME. The role of relationships in connecting social work research and evidence-based practice. Journal of Evidence-Based Social Work. 11: 139-47. PMID 24405138 DOI: 10.1080/15433714.2013.845028  0.094
2011 Stamey J, Sherr ME, Williams NJ. Bayesian analysis for evidence-based practice in social work Social Work Research. 35: 46-52.  0.068
1997 Becher MW, Rubinsztein DC, Leggo J, Wagster MV, Stine OC, Ranen NG, Franz ML, Abbott MH, Sherr M, MacMillan JC, Barron L, Porteous M, Harper PS, Ross CA. Dentatorubral and pallidoluysian atrophy (DRPLA). Clinical and neuropathological findings in genetically confirmed North American and European pedigrees. Movement Disorders : Official Journal of the Movement Disorder Society. 12: 519-30. PMID 9251070 DOI: 10.1002/Mds.870120408  0.065
2015 Sherr M, Robertson W. Message from the program chairs Acm International Conference Proceeding Series. 7: xi.  0.064
2013 Sherr ME, Pooler D, Stamey J, Jones J, Dyer P. A randomized effectiveness trial of a sex education program for minority youth in Miami, Florida. Journal of Evidence-Based Social Work. 10: 53-62. PMID 23581800 DOI: 10.1080/15433714.2011.581533  0.054
1998 Rosenblatt A, Ranen NG, Rubinsztein DC, Stine OC, Margolis RL, Wagster MV, Becher MW, Rosser AE, Leggo J, Hodges JR, ffrench-Constant CK, Sherr M, Franz ML, Abbott MH, Ross CA. Patients with features similar to Huntington's disease, without CAG expansion in huntingtin. Neurology. 51: 215-20. PMID 9674805 DOI: 10.1212/Wnl.51.1.215  0.054
2012 Sherr ME, Pooler D, Stamey J, Dyer P, Smith E, Summers A. The Influence of Religious Participation on Sexual Activity in a Randomized Effectiveness Trial for Minority Youth Journal of Social Service Research. 38: 156-164. DOI: 10.1080/01488376.2011.615270  0.051
1999 Margolis RL, Stine OC, Ward CM, Franz ML, Rosenblatt A, Callahan C, Sherr M, Ross CA, Potter NT. Unstable expansion of the CAG trinucleotide repeat in MAB21L1: report of a second pedigree and effect on protein expression. Journal of Medical Genetics. 36: 62-4. PMID 9950369 DOI: 10.1136/Jmg.36.1.62  0.051
1995 Ranen NG, Stine OC, Abbott MH, Sherr M, Codori AM, Franz ML, Chao NI, Chung AS, Pleasant N, Callahan C, Kasch LM, Ghaffari M, Chase GA, Kazazian HH, Brandt J, et al. Anticipation and instability of IT-15 (CAG)N repeats in parent-offspring pairs with Huntington disease American Journal of Human Genetics. 57: 593-602. PMID 7668287  0.049
1996 Ranen NG, Peyser CE, Coyle JT, Bylsma FW, Sherr M, Day L, Folstein MF, Brandt J, Ross CA, Folstein SE. A controlled trial of idebenone in Huntington's disease. Movement Disorders : Official Journal of the Movement Disorder Society. 11: 549-54. PMID 8866496 DOI: 10.1002/Mds.870110510  0.047
2015 Beise B, Sherr M. Making Human Behavior Theory Real Through the Unreal: Fiction in the HBSE Classroom Journal of Human Behavior in the Social Environment. 25: 236-245. DOI: 10.1080/10911359.2014.1003735  0.047
1999 Margolis RL, Stine OC, Callahan C, Rosenblatt A, Abbott MH, Sherr M, Ross CA. Two novel single-base-pair substitutions adjacent to the CAG repeat in the huntington disease gene (IT15): implications for diagnostic testing. American Journal of Human Genetics. 64: 323-6. PMID 9915978 DOI: 10.1086/302209  0.043
2001 Rosenblatt A, Brinkman RR, Liang KY, Almqvist EW, Margolis RL, Huang CY, Sherr M, Franz ML, Abbott MH, Hayden MR, Ross CA. Familial influence on age of onset among siblings with Huntington disease. American Journal of Medical Genetics. 105: 399-403. PMID 11449389 DOI: 10.1002/Ajmg.1400  0.042
1996 Rubinsztein DC, Leggo J, Coles R, Almqvist E, Biancalana V, Cassiman JJ, Chotai K, Connarty M, Crauford D, Curtis A, Curtis D, Davidson MJ, Differ AM, Dode C, Dodge A, ... ... Sherr M, et al. Phenotypic characterization of individuals with 30-40 CAG repeats in the Huntington disease (HD) gene reveals HD cases with 36 repeats and apparently normal elderly individuals with 36-39 repeats. American Journal of Human Genetics. 59: 16-22. PMID 8659522  0.042
2000 Aylward EH, Codori AM, Rosenblatt A, Sherr M, Brandt J, Stine OC, Barta PE, Pearlson GD, Ross CA. Rate of caudate atrophy in presymptomatic and symptomatic stages of Huntington's disease. Movement Disorders : Official Journal of the Movement Disorder Society. 15: 552-60. PMID 10830423 DOI: 10.1002/1531-8257(200005)15:3<552::Aid-Mds1020>3.0.Co;2-P  0.037
1997 Sherr MA, Babovich WM. Broadening the scope of the Rehabilitation Act of 1973 Nursing Management. 28: 41-42. PMID 1997118513  0.037
1998 Aylward EH, Anderson NB, Bylsma FW, Wagster MV, Barta PE, Sherr M, Feeney J, Davis A, Rosenblatt A, Pearlson GD, Ross CA. Frontal lobe volume in patients with Huntington's disease. Neurology. 50: 252-8. PMID 9443488 DOI: 10.1212/Wnl.50.1.252  0.037
1999 Holmes SE, O'Hearn EE, McInnis MG, Gorelick-Feldman DA, Kleiderlein JJ, Callahan C, Kwak NG, Ingersoll-Ashworth RG, Sherr M, Sumner AJ, Sharp AH, Ananth U, Seltzer WK, Boss MA, Vieria-Saecker AM, et al. Expansion of a novel CAG trinucleotide repeat in the 5' region of PPP2R2B is associated with SCA12. Nature Genetics. 23: 391-2. PMID 10581021 DOI: 10.1038/70493  0.036
2012 Sherr ME, Crow J, Stamey J, Jones J, Dyer P. The Influence of Family Structure on Sexual Activity in a Randomized Effectiveness Trial for Minority Youth Journal of Family Social Work. 15: 288-302. DOI: 10.1080/10522158.2012.695322  0.035
2007 Cronin E, Sherr M, Blaze M. Listen too closely and you may be confused Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4631: 245-249.  0.031
1997 Aylward EH, Li Q, Stine OC, Ranen N, Sherr M, Barta PE, Bylsma FW, Pearlson GD, Ross CA. Longitudinal change in basal ganglia volume in patients with Huntington's disease. Neurology. 48: 394-9. PMID 9040728 DOI: 10.1212/Wnl.48.2.394  0.021
2009 Williams NJ, Sherr ME. Children's psychosocial rehabilitation: Clinical outcomes for youth with serious emotional disturbance living in foster care Child and Adolescent Social Work Journal. 26: 225-234. DOI: 10.1007/S10560-008-0160-Y  0.02
2014 Tan H, Sherr M. Censorship resistance as a side-effect: (Transcript of discussion) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8809: 227-238. DOI: 10.1007/978-3-319-12400-1_22  0.02
1998 Rosenblatt A, Margolis RL, Becher MW, Aylward E, Franz ML, Sherr M, Abbott MH, Lian KY, Ross CA. Does CAG repeat number predict the rate of pathological changes in Huntington's disease? Annals of Neurology. 44: 708-9. PMID 9778276 DOI: 10.1002/Ana.410440424  0.017
Hide low-probability matches.