Follow
Jin-Dong Dong
Jin-Dong Dong
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
Cube padding for weakly-supervised saliency prediction in 360 videos
HT Cheng, CH Chao, JD Dong, HK Wen, TL Liu, M Sun
Proceedings of the IEEE conference on computer vision and pattern …, 2018
2242018
Dpp-net: Device-aware progressive search for pareto-optimal neural architectures
JD Dong, AC Cheng, DC Juan, W Wei, M Sun
Proceedings of the European conference on computer vision (ECCV), 517-531, 2018
2162018
Ppp-net: Platform-aware progressive search for pareto-optimal neural architectures
JD Dong, AC Cheng, DC Juan, W Wei, M Sun
522018
Searching toward pareto-optimal device-aware neural architectures
AC Cheng, JD Dong, CH Hsu, SH Chang, M Sun, SC Chang, JY Pan, ...
Proceedings of the international conference on computer-aided design, 1-7, 2018
372018
Towards understanding cryptocurrency derivatives: A case study of BitMEX
K Soska, JD Dong, A Khodaverdian, A Zetlin-Jones, B Routledge, ...
Proceedings of the Web Conference 2021, 45-57, 2021
322021
Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum
D Lopes, JD Dong, P Medeiros, D Castro, D Barradas, B Portela, ...
Proceedings of the Network and Distributed System Security Symposium, San …, 2024
22024
Mobile security behavior observatory: Long-term monitoring of mobile user behavior
A Yamada, S Tanaka, Y Sawaya, A Kubota, S Matsuda, R Matsumura, ...
USENIX ATC 20, 2020
22020
On recruiting and retaining users for security-sensitive longitudinal measurement panels
A Yamada, K Crichton, Y Sawaya, JD Dong, S Pearman, A Kubota, ...
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 347-366, 2022
12022
Poster: User Sessions on Tor Onion Services: Can Colluding ISPs Deanonymize Them at Scale?
D Lopes, P Medeiros, JD Dong, D Barradas, B Portela, J Vinagre, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–9