The morning paper

Feed since 12 Jun 2019

a random walk through Computer Science research, by Adrian Colyer

Bookmarks (55)

  • screenshot

    Vega-Lite: a grammar of interactive graphics

    Vega-lite: a grammar of interactive graphics Satyanarayan et al., IEEE transactions on visualization and computer graphics,...

  • screenshot

    HackPPL: a universal probabilistic programming language

    HackPPL: a universal probabilistic programming language Ai et al., MAPL’19 The Hack programming language, as the...

  • screenshot

    Invisible mask: practical attacks on face recognition with infrared

    Invisible mask: practical attacks on face recognition with infrared Zhou et al., arXiv’18 You might have...

  • screenshot

    Learning a unified embedding for visual search at Pinterest

    Learning a unified embedding for visual search at Pinterest Zhai et al., KDD’19 Last time out...

  • screenshot

    Applying deep learning to Airbnb search

    Applying deep learning to Airbnb search Haldar et al., KDD’19 Last time out we looked at...

  • screenshot

    150 successful machine learning models: 6 lessons learned at Booking.com

    150 successful machine learning models: 6 lessons learned at Booking.com Bernadi et al., KDD’19 Here’s a...

  • screenshot

    Detecting and characterizing lateral phishing at scale

    Detecting and characterizing lateral phishing at scale Ho et al., USENIX Security Symposium 2019 This is...

  • screenshot

    In-toto: providing farm-to-table guarantees for bits and bytes

    in-toto: providing farm-to-table guarantees for bits and bytes Torres-Arias et al., USENIX Security Symposium 2019 Small...

  • screenshot

    Small world with high risks: a study of security threats in the npm ecosystem

    Small world with high risks: a study of security threats in the npm ecosystem Zimmermann et...

  • screenshot

    Wireless attacks on aircraft instrument landing systems

    Wireless attacks on aircraft instrument landing systems Sathaye et al., USENIX Security Symposium 2019 It’s been...

  • screenshot

    50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system

    50 ways to leak your data: an exploration of apps’ circumvention of the Android permissions system...

  • screenshot

    The secret-sharer: evaluating and testing unintended memorization in neural networks

    The secret sharer: evaluating and testing unintended memorization in neural networks Carlini et al., USENIX Security...

  • screenshot

    Even more amazing papers at VLDB 2019 (that I didn’t have space to cover yet)

    We’ve been covering papers from VLDB 2019 for the last three weeks, and next week it...

  • screenshot

    Updating graph databases with Cypher

    Updating graph databases with Cypher Green et al., VLDB’19 This is the story of a great...

  • screenshot

    Fine-grained, secure and efficient data provenance on blockchain systems

    Fine-grained, secure and efficient data provenance on blockchain systems Ruan et al., VLDB’19 We haven’t covered...

  • screenshot

    Declarative recursive computation on an RDBMS

    Declarative recursive computation on an RDBMS… or, why you should use a database for distributed machine...

  • screenshot

    Procella: unifying serving and analytical data at YouTube

    Procella: unifying serving and analytical data at YouTube Chattopadhyay et al., VLDB’19 Academic papers aren’t usually...