Automated computer system security compromise MG Caceres, GG Richarte, AA Friedman, R Quesada, L Notarfrancesco, ... US Patent 7,228,566, 2007 | 230 | 2007 |
The global landscape of cognition: hierarchical aggregation as an organizational principle of human cortical networks and functions P Taylor, JN Hobbs, J Burroni, HT Siegelmann Scientific Reports 5, 18112, 2015 | 147 | 2015 |
Automated computer system security compromise MG Caceres, GG Richarte, AA Friedman, R Quesada, L Notarfrancesco, ... US Patent 7,757,293, 2010 | 93 | 2010 |
A study of age and gender seen through mobile phone usage patterns in mexico C Sarraute, P Blanc, J Burroni 2014 IEEE/ACM international conference on advances in social networks …, 2014 | 70 | 2014 |
System and method for automatic calculation of cyber-risk in business-critical applications EJ Fausto, ED Gutesman, J Burroni, P Müller US Patent 9,923,917, 2018 | 64 | 2018 |
Harnessing mobile phone social network topology to infer users demographic attributes J Brea, J Burroni, M Minnoni, C Sarraute Proceedings of the 8th Workshop on Social Network Mining and Analysis, 1-9, 2014 | 38 | 2014 |
Using neural networks to improve classical operating system fingerprinting techniques C Sarraute, J Burroni arXiv preprint arXiv:1006.1918, 2010 | 32 | 2010 |
Inference of demographic attributes based on mobile phone usage patterns and social network topology C Sarraute, J Brea, J Burroni, P Blanc Social Network Analysis and Mining 5, 1-18, 2015 | 18 | 2015 |
Energetic constraints produce self-sustained oscillatory dynamics in neuronal networks J Burroni, P Taylor, C Corey, T Vachnadze, HT Siegelmann Frontiers in neuroscience 11, 80, 2017 | 17 | 2017 |
Compiling Stan to generative probabilistic languages and extension to deep probabilistic programming G Baudart, J Burroni, M Hirzel, L Mandel, A Shinnar Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021 | 15 | 2021 |
Distributed computing using syscall proxying MG Caceres, J Burroni, G Ajzenman, R Quesada, GG Richarte, ... US Patent 7,277,937, 2007 | 10 | 2007 |
Using neural networks for remote OS identification J Burroni, C Sarraute Proc. Pacific Security Conf.(PacSec ‘05),(Tokyo, Japan, 2005), 2005 | 10 | 2005 |
A study of age and gender seen through mobile phone usage patterns in Mexico. In 2014 IEEE C Sarraute, P Blanc, J Burroni ACM International Conference on Advances in Social Networks Analysis and …, 2014 | 8 | 2014 |
Min/max stability and box distributions M Boratko, J Burroni, SS Dasgupta, A McCallum Uncertainty in Artificial Intelligence, 2146-2155, 2021 | 7 | 2021 |
Object conditioning for causal inference D Jensen, J Burroni, M Rattigan Uncertainty in Artificial Intelligence, 1072-1082, 2020 | 7 | 2020 |
Social events in a time-varying mobile phone graph C Sarraute, J Brea, J Burroni, K Wehmuth, A Ziviani, JI Alvarez-Hamelin arXiv preprint arXiv:1706.06253, 2017 | 7 | 2017 |
Sample average approximation for Black-Box VI J Burroni, J Domke, D Sheldon arXiv preprint arXiv:2304.06803, 2023 | 6 | 2023 |
Design and implementation of Bee Smalltalk runtime J Pimás, J Burroni, G Richarte International Workshop on Smalltalk Technologies, IWST 14, 24, 2014 | 6 | 2014 |
Extending Stan for Deep Probabilistic Programming J Burroni, G Baudart, L Mandel, M Hirzel, A Shinnar arXiv preprint arXiv:1810.00873, 1810 | 6* | 1810 |
Predicate exchange: Inference with declarative knowledge Z Tavares, J Burroni, E Minasyan, A Solar-Lezama, R Ranganath International Conference on Machine Learning, 6186-6195, 2019 | 5 | 2019 |