Follow
Dinei Florencio
Dinei Florencio
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
A large-scale study of web password habits
D Florencio, C Herley
Proceedings of the 16th international conference on World Wide Web, 657-666, 2007
14222007
Improved spread spectrum: A new modulation technique for robust watermarking
HS Malvar, DAF Florêncio
IEEE transactions on signal processing 51 (4), 898-905, 2003
6132003
Context-based routing in multi-hop networks
Y Wu, SM Das, R Chandra, D Florencio
US Patent 7,693,939, 2010
2642010
Speech dereverberation via maximum-kurtosis subband adaptive filtering
BW Gillespie, HS Malvar, DAF Florêncio
2001 IEEE International Conference on Acoustics, Speech, and Signal …, 2001
2522001
Noise reduction systems and methods for voice applications
A A. Varma, D Florencio
US Patent 20,040,213,419, 2009
2462009
Maximum likelihood sound source localization and beamforming for directional microphone arrays in distributed meetings
C Zhang, D Florêncio, DE Ba, Z Zhang
IEEE Transactions on Multimedia 10 (3), 538-548, 2008
2412008
Method and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence
DA Florencio, MA Isnardi
US Patent 6,208,745, 2001
2212001
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
C Herley, D Florêncio
Economics of Information Security and Privacy, 33-53, 2010
2192010
Crowdmos: An approach for crowdsourcing mean opinion score studies
F Ribeiro, D Florêncio, C Zhang, M Seltzer
2011 IEEE international conference on acoustics, speech and signal …, 2011
2142011
Do strong web passwords accomplish anything?
D Florêncio, C Herley, B Coskun
Proc. Usenix Hot Topics in Security, 2007
2062007
Decision-based median filter using local signal statistics
DAF Florencio, RW Schafer
Visual Communications and Image Processing'94 2308, 268-275, 1994
1991994
An {Administrator’s} Guide to Internet Password Research
D Florêncio, C Herley, PC Van Oorschot
28th Large Installation System Administration Conference (LISA14), 44-61, 2014
1932014
Where do security policies come from?
D Florêncio, C Herley
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-14, 2010
1922010
Point cloud attribute compression with graph transform
C Zhang, D Florencio, C Loop
2014 IEEE International Conference on Image Processing (ICIP), 2066-2070, 2014
1792014
Method and apparatus for resizing image information
S Li, K Hu, DAF Florencio
US Patent 6,704,358, 2004
1612004
System and method for detecting and analyzing a queue
J Huang, DAF Florencio
US Patent 5,953,055, 1999
1581999
Attack resistant phishing detection
DA Florencio, CE Herley
US Patent 7,925,883, 2011
1522011
Client side attack resistant phishing detection
DA Florencio, CE Herley
US Patent 8,640,231, 2014
1472014
Why does PHAT work well in lownoise, reverberative environments?
C Zhang, D Florêncio, Z Zhang
2008 IEEE International Conference on Acoustics, Speech and Signal …, 2008
1472008
Microfone Array Signal Enhancement
H Malvar, D Florencio, B Gillespie
US Patent 20,030,206,640, 2003
133*2003
The system can't perform the operation now. Try again later.
Articles 1–20