Follow
Dinei Florencio
Dinei Florencio
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
A large-scale study of web password habits
D Florencio, C Herley
Proceedings of the 16th international conference on World Wide Web, 657-666, 2007
15532007
Improved spread spectrum: A new modulation technique for robust watermarking
HS Malvar, DAF Florêncio
IEEE transactions on signal processing 51 (4), 898-905, 2003
6482003
Layoutlmv2: Multi-modal pre-training for visually-rich document understanding
Y Xu, Y Xu, T Lv, L Cui, F Wei, G Wang, Y Lu, D Florencio, C Zhang, ...
arXiv preprint arXiv:2012.14740, 2020
3772020
Do strong web passwords accomplish anything?
D Florêncio, C Herley, B Coskun
Proc. Usenix Hot Topics in Security, 2007
347*2007
Context-based routing in multi-hop networks
Y Wu, SM Das, R Chandra, D Florencio
US Patent 7,693,939, 2010
2692010
Crowdmos: An approach for crowdsourcing mean opinion score studies
F Ribeiro, D Florêncio, C Zhang, M Seltzer
2011 IEEE international conference on acoustics, speech and signal …, 2011
2682011
Maximum likelihood sound source localization and beamforming for directional microphone arrays in distributed meetings
C Zhang, D Florêncio, DE Ba, Z Zhang
IEEE Transactions on Multimedia 10 (3), 538-548, 2008
2622008
Speech dereverberation via maximum-kurtosis subband adaptive filtering
BW Gillespie, HS Malvar, DAF Florêncio
2001 IEEE International Conference on Acoustics, Speech, and Signal …, 2001
2622001
Noise reduction systems and methods for voice applications
A A. Varma, D Florencio
US Patent 20,040,213,419, 2009
2602009
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
C Herley, D Florêncio
Economics of Information Security and Privacy, 33-53, 2010
2472010
Point cloud attribute compression with graph transform
C Zhang, D Florencio, C Loop
2014 IEEE International Conference on Image Processing (ICIP), 2066-2070, 2014
2402014
An {Administrator’s} Guide to Internet Password Research
D Florêncio, C Herley, PC Van Oorschot
28th large installation system administration conference (LISA14), 44-61, 2014
2262014
Method and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence
DA Florencio, MA Isnardi
US Patent 6,208,745, 2001
2252001
Where do security policies come from?
D Florêncio, C Herley
Proceedings of the Sixth Symposium on Usable Privacy and Security, 1-14, 2010
2062010
Decision-based median filter using local signal statistics
DAF Florencio, RW Schafer
Visual Communications and Image Processing'94 2308, 268-275, 1994
2051994
Why does PHAT work well in lownoise, reverberative environments?
C Zhang, D Florêncio, Z Zhang
2008 IEEE International Conference on Acoustics, Speech and Signal …, 2008
1872008
System and method for detecting and analyzing a queue
J Huang, DAF Florencio
US Patent 5,953,055, 1999
1821999
Attack resistant phishing detection
DA Florencio, CE Herley
US Patent 7,925,883, 2011
1782011
Trocr: Transformer-based optical character recognition with pre-trained models
M Li, T Lv, J Chen, L Cui, Y Lu, D Florencio, C Zhang, Z Li, F Wei
Proceedings of the AAAI Conference on Artificial Intelligence 37 (11), 13094 …, 2023
1752023
Client side attack resistant phishing detection
DA Florencio, CE Herley
US Patent 8,640,231, 2014
1692014
The system can't perform the operation now. Try again later.
Articles 1–20