Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Anupam Datta
@article{DBLP:journals/corr/abs-2402-04489, author = {Sanjari Srivastava and Piotr Mardziel and Zhikhun Zhang and Archana Ahlawat and Anupam Datta and John C. Mitchell}, title = {De-amplifying Bias from Differential Privacy in Language Model Fine-tuning}, journal = {CoRR}, volume = {abs/2402.04489}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.04489}, doi = {10.48550/ARXIV.2402.04489}, eprinttype = {arXiv}, eprint = {2402.04489}, timestamp = {Wed, 14 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-04489.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23, author = {Clark W. Barrett and Brad Boyd and Elie Bursztein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {Found. Trends Priv. Secur.}, volume = {6}, number = {1}, pages = {1--52}, year = {2023}, url = {https://doi.org/10.1561/3300000041}, doi = {10.1561/3300000041}, timestamp = {Sun, 24 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14840, author = {Clark W. Barrett and Brad Boyd and Ellie Burzstein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {CoRR}, volume = {abs/2308.14840}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14840}, doi = {10.48550/ARXIV.2308.14840}, eprinttype = {arXiv}, eprint = {2308.14840}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-09361, author = {Ravi Mangal and Klas Leino and Zifan Wang and Kai Hu and Weicheng Yu and Corina S. Pasareanu and Anupam Datta and Matt Fredrikson}, title = {Is Certifying {\unicode{120001}}\({}_{\mbox{p}}\) Robustness Still Worthwhile?}, journal = {CoRR}, volume = {abs/2310.09361}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.09361}, doi = {10.48550/ARXIV.2310.09361}, eprinttype = {arXiv}, eprint = {2310.09361}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-09361.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/WangFD22, author = {Zifan Wang and Matt Fredrikson and Anupam Datta}, editor = {Kamalika Chaudhuri and Stefanie Jegelka and Le Song and Csaba Szepesv{\'{a}}ri and Gang Niu and Sivan Sabato}, title = {Robust Models Are More Interpretable Because Attributions Look Normal}, booktitle = {International Conference on Machine Learning, {ICML} 2022, 17-23 July 2022, Baltimore, Maryland, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {162}, pages = {22625--22651}, publisher = {{PMLR}}, year = {2022}, url = {https://proceedings.mlr.press/v162/wang22e.html}, timestamp = {Tue, 12 Jul 2022 17:36:52 +0200}, biburl = {https://dblp.org/rec/conf/icml/WangFD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-11850, author = {Zifan Wang and Yuhang Yao and Chaoran Zhang and Han Zhang and Youjie Kang and Carlee Joe{-}Wong and Matt Fredrikson and Anupam Datta}, title = {Faithful Explanations for Deep Graph Models}, journal = {CoRR}, volume = {abs/2205.11850}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.11850}, doi = {10.48550/ARXIV.2205.11850}, eprinttype = {arXiv}, eprint = {2205.11850}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-11850.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-00192, author = {Kaiji Lu and Anupam Datta}, title = {Order-sensitive Shapley Values for Evaluating Conceptual Soundness of {NLP} Models}, journal = {CoRR}, volume = {abs/2206.00192}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.00192}, doi = {10.48550/ARXIV.2206.00192}, eprinttype = {arXiv}, eprint = {2206.00192}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-00192.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DuttaVMDG21, author = {Sanghamitra Dutta and Praveen Venkatesh and Piotr Mardziel and Anupam Datta and Pulkit Grover}, title = {Fairness Under Feature Exemptions: Counterfactual and Observational Measures}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {10}, pages = {6675--6710}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3103206}, doi = {10.1109/TIT.2021.3103206}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/DuttaVMDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/DattaFLLSW21, author = {Anupam Datta and Matt Fredrikson and Klas Leino and Kaiji Lu and Shayak Sen and Zifan Wang}, editor = {Feida Zhu and Beng Chin Ooi and Chunyan Miao}, title = {Machine Learning Explainability and Robustness: Connected at the Hip}, booktitle = {{KDD} '21: The 27th {ACM} {SIGKDD} Conference on Knowledge Discovery and Data Mining, Virtual Event, Singapore, August 14-18, 2021}, pages = {4035--4036}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3447548.3470806}, doi = {10.1145/3447548.3470806}, timestamp = {Mon, 16 Aug 2021 16:18:31 +0200}, biburl = {https://dblp.org/rec/conf/kdd/DattaFLLSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/DattaFLLSSW21, author = {Anupam Datta and Matt Fredrikson and Klas Leino and Kaiji Lu and Shayak Sen and Ricardo Shih and Zifan Wang}, editor = {Douwe Kiela and Marco Ciccone and Barbara Caputo}, title = {Exploring Conceptual Soundness with TruLens}, booktitle = {NeurIPS 2021 Competitions and Demonstrations Track, 6-14 December 2021, Online}, series = {Proceedings of Machine Learning Research}, volume = {176}, pages = {302--307}, publisher = {{PMLR}}, year = {2021}, url = {https://proceedings.mlr.press/v176/datta22a.html}, timestamp = {Thu, 11 Aug 2022 12:07:10 +0200}, biburl = {https://dblp.org/rec/conf/nips/DattaFLLSSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/LuWMD21, author = {Kaiji Lu and Zifan Wang and Piotr Mardziel and Anupam Datta}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Influence Patterns for Explaining Information Flow in {BERT}}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {4461--4474}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/239f914f30ea3c948fce2ea07a9efb33-Abstract.html}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/LuWMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-11257, author = {Zifan Wang and Matt Fredrikson and Anupam Datta}, title = {Boundary Attributions Provide Normal (Vector) Explanations}, journal = {CoRR}, volume = {abs/2103.11257}, year = {2021}, url = {https://arxiv.org/abs/2103.11257}, eprinttype = {arXiv}, eprint = {2103.11257}, timestamp = {Tue, 06 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-11257.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-03109, author = {Emily Black and Zifan Wang and Matt Fredrikson and Anupam Datta}, title = {Consistent Counterfactuals for Deep Models}, journal = {CoRR}, volume = {abs/2110.03109}, year = {2021}, url = {https://arxiv.org/abs/2110.03109}, eprinttype = {arXiv}, eprint = {2110.03109}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-03109.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/DuttaVMDG20, author = {Sanghamitra Dutta and Praveen Venkatesh and Piotr Mardziel and Anupam Datta and Pulkit Grover}, title = {An Information-Theoretic Quantification of Discrimination with Exempt Features}, booktitle = {The Thirty-Fourth {AAAI} Conference on Artificial Intelligence, {AAAI} 2020, The Thirty-Second Innovative Applications of Artificial Intelligence Conference, {IAAI} 2020, The Tenth {AAAI} Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2020, New York, NY, USA, February 7-12, 2020}, pages = {3825--3833}, publisher = {{AAAI} Press}, year = {2020}, url = {https://doi.org/10.1609/aaai.v34i04.5794}, doi = {10.1609/AAAI.V34I04.5794}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/DuttaVMDG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/LuMLFD20, author = {Kaiji Lu and Piotr Mardziel and Klas Leino and Matt Fredrikson and Anupam Datta}, editor = {Dan Jurafsky and Joyce Chai and Natalie Schluter and Joel R. Tetreault}, title = {Influence Paths for Characterizing Subject-Verb Number Agreement in {LSTM} Language Models}, booktitle = {Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, {ACL} 2020, Online, July 5-10, 2020}, pages = {4748--4757}, publisher = {Association for Computational Linguistics}, year = {2020}, url = {https://doi.org/10.18653/v1/2020.acl-main.430}, doi = {10.18653/V1/2020.ACL-MAIN.430}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/LuMLFD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/LuMWAD20, author = {Kaiji Lu and Piotr Mardziel and Fangjing Wu and Preetam Amancharla and Anupam Datta}, editor = {Vivek Nigam and Tajana Ban Kirigin and Carolyn L. Talcott and Joshua D. Guttman and Stepan L. Kuznetsov and Boon Thau Loo and Mitsuhiro Okada}, title = {Gender Bias in Neural Natural Language Processing}, booktitle = {Logic, Language, and Security - Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {12300}, pages = {189--202}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62077-6\_14}, doi = {10.1007/978-3-030-62077-6\_14}, timestamp = {Sun, 12 Feb 2023 18:48:21 +0100}, biburl = {https://dblp.org/rec/conf/birthday/LuMWAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/WangMDF20, author = {Zifan Wang and Piotr Mardziel and Anupam Datta and Matt Fredrikson}, title = {Interpreting Interpretations: Organizing Attribution Methods by Criteria}, booktitle = {2020 {IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} Workshops 2020, Seattle, WA, USA, June 14-19, 2020}, pages = {48--55}, publisher = {Computer Vision Foundation / {IEEE}}, year = {2020}, url = {https://openaccess.thecvf.com/content\_CVPRW\_2020/html/w1/Wang\_Interpreting\_Interpretations\_Organizing\_Attribution\_Methods\_by\_Criteria\_CVPRW\_2020\_paper.html}, doi = {10.1109/CVPRW50498.2020.00013}, timestamp = {Tue, 31 Aug 2021 14:00:09 +0200}, biburl = {https://dblp.org/rec/conf/cvpr/WangMDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WangWRMFD20, author = {Zifan Wang and Haofan Wang and Shakul Ramkumar and Piotr Mardziel and Matt Fredrikson and Anupam Datta}, editor = {Hugo Larochelle and Marc'Aurelio Ranzato and Raia Hadsell and Maria{-}Florina Balcan and Hsuan{-}Tien Lin}, title = {Smoothed Geometry for Robust Attribution}, booktitle = {Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, NeurIPS 2020, December 6-12, 2020, virtual}, year = {2020}, url = {https://proceedings.neurips.cc/paper/2020/hash/9d94c8981a48d12adfeecfe1ae6e0ec1-Abstract.html}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/WangWRMFD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TschantzSD20, author = {Michael Carl Tschantz and Shayak Sen and Anupam Datta}, title = {SoK: Differential Privacy as a Causal Property}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {354--371}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00012}, doi = {10.1109/SP40000.2020.00012}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/TschantzSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-07985, author = {Zifan Wang and Piotr Mardziel and Anupam Datta and Matt Fredrikson}, title = {Interpreting Interpretations: Organizing Attribution Methods by Criteria}, journal = {CoRR}, volume = {abs/2002.07985}, year = {2020}, url = {https://arxiv.org/abs/2002.07985}, eprinttype = {arXiv}, eprint = {2002.07985}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-07985.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-01190, author = {Kaiji Lu and Piotr Mardziel and Klas Leino and Matt Fredrikson and Anupam Datta}, title = {Influence Paths for Characterizing Subject-Verb Number Agreement in {LSTM} Language Models}, journal = {CoRR}, volume = {abs/2005.01190}, year = {2020}, url = {https://arxiv.org/abs/2005.01190}, eprinttype = {arXiv}, eprint = {2005.01190}, timestamp = {Fri, 08 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-01190.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-06643, author = {Zifan Wang and Haofan Wang and Shakul Ramkumar and Matt Fredrikson and Piotr Mardziel and Anupam Datta}, title = {Smoothed Geometry for Robust Attribution}, journal = {CoRR}, volume = {abs/2006.06643}, year = {2020}, url = {https://arxiv.org/abs/2006.06643}, eprinttype = {arXiv}, eprint = {2006.06643}, timestamp = {Sat, 13 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-06643.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-07986, author = {Sanghamitra Dutta and Praveen Venkatesh and Piotr Mardziel and Anupam Datta and Pulkit Grover}, title = {Fairness Under Feature Exemptions: Counterfactual and Observational Measures}, journal = {CoRR}, volume = {abs/2006.07986}, year = {2020}, url = {https://arxiv.org/abs/2006.07986}, eprinttype = {arXiv}, eprint = {2006.07986}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-07986.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-08507, author = {Xuan Chen and Zifan Wang and Yucai Fan and Bonan Jin and Piotr Mardziel and Carlee Joe{-}Wong and Anupam Datta}, title = {Towards Behavior-Level Explanation for Deep Reinforcement Learning}, journal = {CoRR}, volume = {abs/2009.08507}, year = {2020}, url = {https://arxiv.org/abs/2009.08507}, eprinttype = {arXiv}, eprint = {2009.08507}, timestamp = {Wed, 23 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-08507.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-00740, author = {Kaiji Lu and Zifan Wang and Piotr Mardziel and Anupam Datta}, title = {Abstracting Influence Paths for Explaining (Contextualization of) {BERT} Models}, journal = {CoRR}, volume = {abs/2011.00740}, year = {2020}, url = {https://arxiv.org/abs/2011.00740}, eprinttype = {arXiv}, eprint = {2011.00740}, timestamp = {Fri, 06 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-00740.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/LeinoBFSD19, author = {Klas Leino and Emily Black and Matt Fredrikson and Shayak Sen and Anupam Datta}, title = {Feature-Wise Bias Amplification}, booktitle = {7th International Conference on Learning Representations, {ICLR} 2019, New Orleans, LA, USA, May 6-9, 2019}, publisher = {OpenReview.net}, year = {2019}, url = {https://openreview.net/forum?id=S1ecm2C9K7}, timestamp = {Thu, 25 Jul 2019 13:03:15 +0200}, biburl = {https://dblp.org/rec/conf/iclr/LeinoBFSD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigbed/ChattopadhyaySD18, author = {Dhiman Chattopadhyay and Abinash Samantaray and Anupam Datta}, title = {Device microagent for IoT home gateway: a lightweight plug-n-play architecture}, journal = {{SIGBED} Rev.}, volume = {15}, number = {2}, pages = {16--23}, year = {2018}, url = {https://doi.org/10.1145/3231535.3231537}, doi = {10.1145/3231535.3231537}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigbed/ChattopadhyaySD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fat/DattaDMMT18, author = {Amit Datta and Anupam Datta and Jael Makagon and Deirdre K. Mulligan and Michael Carl Tschantz}, editor = {Sorelle A. Friedler and Christo Wilson}, title = {Discrimination in Online Personalization: {A} Multidisciplinary Inquiry}, booktitle = {Conference on Fairness, Accountability and Transparency, {FAT} 2018, 23-24 February 2018, New York, NY, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {81}, pages = {20--34}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v81/datta18a.html}, timestamp = {Wed, 03 Apr 2019 18:17:20 +0200}, biburl = {https://dblp.org/rec/conf/fat/DattaDMMT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itc/LeinoSDFL18, author = {Klas Leino and Shayak Sen and Anupam Datta and Matt Fredrikson and Linyi Li}, title = {Influence-Directed Explanations for Deep Convolutional Networks}, booktitle = {{IEEE} International Test Conference, {ITC} 2018, Phoenix, AZ, USA, October 29 - Nov. 1, 2018}, pages = {1--8}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TEST.2018.8624792}, doi = {10.1109/TEST.2018.8624792}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/itc/LeinoSDFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/YeomDF18, author = {Samuel Yeom and Anupam Datta and Matt Fredrikson}, editor = {Samy Bengio and Hanna M. Wallach and Hugo Larochelle and Kristen Grauman and Nicol{\`{o}} Cesa{-}Bianchi and Roman Garnett}, title = {Hunting for Discriminatory Proxies in Linear Regression Models}, booktitle = {Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, NeurIPS 2018, December 3-8, 2018, Montr{\'{e}}al, Canada}, pages = {4573--4583}, year = {2018}, url = {https://proceedings.neurips.cc/paper/2018/hash/6cd9313ed34ef58bad3fdd504355e72c-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/YeomDF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/Datta18b, author = {Anupam Datta}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Privacy Through Accountability}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_80601}, doi = {10.1007/978-1-4614-8265-9\_80601}, timestamp = {Thu, 14 Feb 2019 09:43:36 +0100}, biburl = {https://dblp.org/rec/reference/db/Datta18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-03788, author = {Klas Leino and Linyi Li and Shayak Sen and Anupam Datta and Matt Fredrikson}, title = {Influence-Directed Explanations for Deep Convolutional Networks}, journal = {CoRR}, volume = {abs/1802.03788}, year = {2018}, url = {http://arxiv.org/abs/1802.03788}, eprinttype = {arXiv}, eprint = {1802.03788}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-03788.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-10815, author = {Shayak Sen and Piotr Mardziel and Anupam Datta and Matthew Fredrikson}, title = {Supervising Feature Influence}, journal = {CoRR}, volume = {abs/1803.10815}, year = {2018}, url = {http://arxiv.org/abs/1803.10815}, eprinttype = {arXiv}, eprint = {1803.10815}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-10815.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1807-11714, author = {Kaiji Lu and Piotr Mardziel and Fangjing Wu and Preetam Amancharla and Anupam Datta}, title = {Gender Bias in Neural Natural Language Processing}, journal = {CoRR}, volume = {abs/1807.11714}, year = {2018}, url = {http://arxiv.org/abs/1807.11714}, eprinttype = {arXiv}, eprint = {1807.11714}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1807-11714.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-01735, author = {Anupam Datta and Shayak Sen and Michael Carl Tschantz}, title = {Correspondences between Privacy and Nondiscrimination: Why They Should Be Studied Together}, journal = {CoRR}, volume = {abs/1808.01735}, year = {2018}, url = {http://arxiv.org/abs/1808.01735}, eprinttype = {arXiv}, eprint = {1808.01735}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-01735.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-07155, author = {Samuel Yeom and Anupam Datta and Matt Fredrikson}, title = {Hunting for Discriminatory Proxies in Linear Regression Models}, journal = {CoRR}, volume = {abs/1810.07155}, year = {2018}, url = {http://arxiv.org/abs/1810.07155}, eprinttype = {arXiv}, eprint = {1810.07155}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-07155.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-08999, author = {Klas Leino and Matt Fredrikson and Emily Black and Shayak Sen and Anupam Datta}, title = {Feature-Wise Bias Amplification}, journal = {CoRR}, volume = {abs/1812.08999}, year = {2018}, url = {http://arxiv.org/abs/1812.08999}, eprinttype = {arXiv}, eprint = {1812.08999}, timestamp = {Wed, 02 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-08999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DattaFKMS17, author = {Anupam Datta and Matthew Fredrikson and Gihyuk Ko and Piotr Mardziel and Shayak Sen}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1193--1210}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134097}, doi = {10.1145/3133956.3134097}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DattaFKMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/Blocki0DV17, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta and Santosh S. Vempala}, editor = {Christos H. Papadimitriou}, title = {Towards Human Computable Passwords}, booktitle = {8th Innovations in Theoretical Computer Science Conference, {ITCS} 2017, January 9-11, 2017, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {67}, pages = {10:1--10:47}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2017.10}, doi = {10.4230/LIPICS.ITCS.2017.10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/Blocki0DV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2017iwpe, editor = {Jos{\'{e}} M. del {\'{A}}lamo and Seda F. G{\"{u}}rses and Anupam Datta}, title = {Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th {IEEE} Symposium on Security and Privacy, IWPE@SP 2017, San Jose, CA, USA, May 25, 2017}, series = {{CEUR} Workshop Proceedings}, volume = {1873}, publisher = {CEUR-WS.org}, year = {2017}, url = {https://ceur-ws.org/Vol-1873}, urn = {urn:nbn:de:0074-1873-1}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/2017iwpe.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DattaFKMS17, author = {Anupam Datta and Matthew Fredrikson and Gihyuk Ko and Piotr Mardziel and Shayak Sen}, title = {Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs}, journal = {CoRR}, volume = {abs/1705.07807}, year = {2017}, url = {http://arxiv.org/abs/1705.07807}, eprinttype = {arXiv}, eprint = {1705.07807}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DattaFKMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DattaFKMS17aa, author = {Anupam Datta and Matt Fredrikson and Gihyuk Ko and Piotr Mardziel and Shayak Sen}, title = {Proxy Non-Discrimination in Data-Driven Systems}, journal = {CoRR}, volume = {abs/1707.08120}, year = {2017}, url = {http://arxiv.org/abs/1707.08120}, eprinttype = {arXiv}, eprint = {1707.08120}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DattaFKMS17aa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-05899, author = {Michael Carl Tschantz and Shayak Sen and Anupam Datta}, title = {Differential Privacy as a Causal Property}, journal = {CoRR}, volume = {abs/1710.05899}, year = {2017}, url = {http://arxiv.org/abs/1710.05899}, eprinttype = {arXiv}, eprint = {1710.05899}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-05899.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-10816, author = {Anupam Datta and Sophia Kovaleva and Piotr Mardziel and Shayak Sen}, title = {Latent Factor Interpretations for Collaborative Filtering}, journal = {CoRR}, volume = {abs/1711.10816}, year = {2017}, url = {http://arxiv.org/abs/1711.10816}, eprinttype = {arXiv}, eprint = {1711.10816}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-10816.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/WeerakkodySKD16, author = {Sean Weerakkody and Bruno Sinopoli and Soummya Kar and Anupam Datta}, title = {Information flow for security in control systems}, booktitle = {55th {IEEE} Conference on Decision and Control, {CDC} 2016, Las Vegas, NV, USA, December 12-14, 2016}, pages = {5065--5072}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CDC.2016.7799044}, doi = {10.1109/CDC.2016.7799044}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cdc/WeerakkodySKD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpsweek/DattaKSW16, author = {Anupam Datta and Soummya Kar and Bruno Sinopoli and Sean Weerakkody}, title = {Accountability in cyber-physical systems}, booktitle = {2016 Science of Security for Cyber-Physical Systems Workshop, SOSCYPS@CPSWeek 2016, Vienna, Austria, April 11, 2016}, pages = {1--3}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SOSCYPS.2016.7579998}, doi = {10.1109/SOSCYPS.2016.7579998}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cpsweek/DattaKSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BlockiD16, author = {Jeremiah Blocki and Anupam Datta}, title = {{CASH:} {A} Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {371--386}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.33}, doi = {10.1109/CSF.2016.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BlockiD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BlockiDB16, author = {Jeremiah Blocki and Anupam Datta and Joseph Bonneau}, title = {Differentially Private Password Frequency Lists}, booktitle = {23rd Annual Network and Distributed System Security Symposium, {NDSS} 2016, San Diego, California, USA, February 21-24, 2016}, publisher = {The Internet Society}, year = {2016}, url = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/differentially-private-password-frequency-lists.pdf}, timestamp = {Thu, 17 Jun 2021 16:04:48 +0200}, biburl = {https://dblp.org/rec/conf/ndss/BlockiDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DattaSZ16, author = {Anupam Datta and Shayak Sen and Yair Zick}, title = {Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {598--617}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.42}, doi = {10.1109/SP.2016.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/DattaSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/VasudevanCMJD16, author = {Amit Vasudevan and Sagar Chaki and Petros Maniatis and Limin Jia and Anupam Datta}, editor = {Thorsten Holz and Stefan Savage}, title = {{\"{u}}berSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {87--104}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/vasudevan}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/VasudevanCMJD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WeerakkodySKD16, author = {Sean Weerakkody and Bruno Sinopoli and Soummya Kar and Anupam Datta}, title = {Information Flow for Security in Control Systems}, journal = {CoRR}, volume = {abs/1603.05710}, year = {2016}, url = {http://arxiv.org/abs/1603.05710}, eprinttype = {arXiv}, eprint = {1603.05710}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WeerakkodySKD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChongGDMPSSZ16, author = {Stephen Chong and Joshua D. Guttman and Anupam Datta and Andrew C. Myers and Benjamin C. Pierce and Patrick Schaumont and Tim Sherwood and Nickolai Zeldovich}, title = {Report on the {NSF} Workshop on Formal Methods for Security}, journal = {CoRR}, volume = {abs/1608.00678}, year = {2016}, url = {http://arxiv.org/abs/1608.00678}, eprinttype = {arXiv}, eprint = {1608.00678}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/ChongGDMPSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockiDB16, author = {Jeremiah Blocki and Anupam Datta and Joseph Bonneau}, title = {Differentially Private Password Frequency Lists}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2016}, url = {http://eprint.iacr.org/2016/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockiDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DattaTD15, author = {Amit Datta and Michael Carl Tschantz and Anupam Datta}, title = {Automated Experiments on Ad Privacy Settings}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2015}, number = {1}, pages = {92--112}, year = {2015}, url = {https://doi.org/10.1515/popets-2015-0007}, doi = {10.1515/POPETS-2015-0007}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DattaTD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/BlockiCDPS15, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Ariel D. Procaccia and Arunesh Sinha}, editor = {Blai Bonet and Sven Koenig}, title = {Audit Games with Multiple Defender Resources}, booktitle = {Proceedings of the Twenty-Ninth {AAAI} Conference on Artificial Intelligence, January 25-30, 2015, Austin, Texas, {USA}}, pages = {791--797}, publisher = {{AAAI} Press}, year = {2015}, url = {https://doi.org/10.1609/aaai.v29i1.9317}, doi = {10.1609/AAAI.V29I1.9317}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/BlockiCDPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15, author = {Omar Chowdhury and Deepak Garg and Limin Jia and Anupam Datta}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1130--1143}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813638}, doi = {10.1145/2810103.2813638}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Chowdhury0JD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Datta0KSS15, author = {Anupam Datta and Deepak Garg and Dilsun Kirli Kaynar and Divya Sharma and Arunesh Sinha}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {Program Actions as Actual Causes: {A} Building Block for Accountability}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {261--275}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.25}, doi = {10.1109/CSF.2015.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Datta0KSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JiaS0D15, author = {Limin Jia and Shayak Sen and Deepak Garg and Anupam Datta}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {A Logic of Programs with Interface-Confined Code}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {512--525}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.38}, doi = {10.1109/CSF.2015.38}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/JiaS0D15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/TschantzDDW15, author = {Michael Carl Tschantz and Amit Datta and Anupam Datta and Jeannette M. Wing}, editor = {C{\'{e}}dric Fournet and Michael W. Hicks and Luca Vigan{\`{o}}}, title = {A Methodology for Information Flow Experiments}, booktitle = {{IEEE} 28th Computer Security Foundations Symposium, {CSF} 2015, Verona, Italy, 13-17 July, 2015}, pages = {554--568}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSF.2015.40}, doi = {10.1109/CSF.2015.40}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/TschantzDDW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/CarbonaraDSZ15, author = {Alejandro Uriel Carbonara and Anupam Datta and Arunesh Sinha and Yair Zick}, editor = {Qiang Yang and Michael J. Wooldridge}, title = {Incentivizing Peer Grading in {MOOCS:} An Audit Game Approach}, booktitle = {Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July 25-31, 2015}, pages = {497--503}, publisher = {{AAAI} Press}, year = {2015}, url = {http://ijcai.org/Abstract/15/076}, timestamp = {Tue, 20 Aug 2019 16:16:43 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/CarbonaraDSZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/DattaDPZ15, author = {Amit Datta and Anupam Datta and Ariel D. Procaccia and Yair Zick}, editor = {Qiang Yang and Michael J. Wooldridge}, title = {Influence in Classification via Cooperative Game Theory}, booktitle = {Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, {IJCAI} 2015, Buenos Aires, Argentina, July 25-31, 2015}, pages = {511--517}, publisher = {{AAAI} Press}, year = {2015}, url = {http://ijcai.org/Abstract/15/078}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcai/DattaDPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BlockiKCD15, author = {Jeremiah Blocki and Saranga Komanduri and Lorrie Faith Cranor and Anupam Datta}, title = {Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords}, booktitle = {22nd Annual Network and Distributed System Security Symposium, {NDSS} 2015, San Diego, California, USA, February 8-11, 2015}, publisher = {The Internet Society}, year = {2015}, url = {https://www.ndss-symposium.org/ndss2015/spaced-repetition-and-mnemonics-enable-recall-multiple-strong-passwords}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BlockiKCD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rv/KaneCDK15, author = {Aaron Kane and Omar Chowdhury and Anupam Datta and Philip Koopman}, editor = {Ezio Bartocci and Rupak Majumdar}, title = {A Case Study on Runtime Monitoring of an Autonomous Research Vehicle {(ARV)} System}, booktitle = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna, Austria, September 22-25, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9333}, pages = {102--117}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23820-3\_7}, doi = {10.1007/978-3-319-23820-3\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/rv/KaneCDK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JiaS0D15, author = {Limin Jia and Shayak Sen and Deepak Garg and Anupam Datta}, title = {System {M:} {A} Program Logic for Code Sandboxing and Identification}, journal = {CoRR}, volume = {abs/1501.05673}, year = {2015}, url = {http://arxiv.org/abs/1501.05673}, eprinttype = {arXiv}, eprint = {1501.05673}, timestamp = {Sun, 16 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JiaS0D15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DattaDPZ15, author = {Amit Datta and Anupam Datta and Ariel D. Procaccia and Yair Zick}, title = {Influence in Classification via Cooperative Game Theory}, journal = {CoRR}, volume = {abs/1505.00036}, year = {2015}, url = {http://arxiv.org/abs/1505.00036}, eprinttype = {arXiv}, eprint = {1505.00036}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DattaDPZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Datta0KSS15a, author = {Anupam Datta and Deepak Garg and Dilsun Kirli Kaynar and Divya Sharma and Arunesh Sinha}, title = {Program Actions as Actual Causes: {A} Building Block for Accountability}, journal = {CoRR}, volume = {abs/1505.01131}, year = {2015}, url = {http://arxiv.org/abs/1505.01131}, eprinttype = {arXiv}, eprint = {1505.01131}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Datta0KSS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Chowdhury0JD15, author = {Omar Chowdhury and Deepak Garg and Limin Jia and Anupam Datta}, title = {Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits}, journal = {CoRR}, volume = {abs/1508.02448}, year = {2015}, url = {http://arxiv.org/abs/1508.02448}, eprinttype = {arXiv}, eprint = {1508.02448}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Chowdhury0JD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlockiD15, author = {Jeremiah Blocki and Anupam Datta}, title = {{CASH:} {A} Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection}, journal = {CoRR}, volume = {abs/1509.00239}, year = {2015}, url = {http://arxiv.org/abs/1509.00239}, eprinttype = {arXiv}, eprint = {1509.00239}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlockiD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DattaHM0S15, author = {Anupam Datta and Joseph Y. Halpern and John C. Mitchell and Arnab Roy and Shayak Sen}, title = {A Symbolic Logic with Concrete Bounds for Cryptographic Protocols}, journal = {CoRR}, volume = {abs/1511.07536}, year = {2015}, url = {http://arxiv.org/abs/1511.07536}, eprinttype = {arXiv}, eprint = {1511.07536}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DattaHM0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockiBD15, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta}, title = {Naturally Rehearsing Passwords}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2015}, url = {http://eprint.iacr.org/2015/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockiBD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ChowdhuryJGD14, author = {Omar Chowdhury and Limin Jia and Deepak Garg and Anupam Datta}, editor = {Armin Biere and Roderick Bloem}, title = {Temporal Mode-Checking for Runtime Monitoring of Privacy Policies}, booktitle = {Computer Aided Verification - 26th International Conference, {CAV} 2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna, Austria, July 18-22, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8559}, pages = {131--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08867-9\_9}, doi = {10.1007/978-3-319-08867-9\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ChowdhuryJGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AhnD14, author = {Gail{-}Joon Ahn and Anupam Datta}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{WPES} 2014: 13th Workshop on Privacy in the Electronic Society}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1546--1547}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660383}, doi = {10.1145/2660267.2660383}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AhnD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/OhCJGGD14, author = {Se Eun Oh and Ji Young Chun and Limin Jia and Deepak Garg and Carl A. Gunter and Anupam Datta}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {Privacy-preserving audit for broker-based health information exchange}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {313--320}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557576}, doi = {10.1145/2557547.2557576}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/OhCJGGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/Datta14, author = {Anupam Datta}, editor = {Raja Natarajan}, title = {Privacy through Accountability: {A} Computer Science Perspective}, booktitle = {Distributed Computing and Internet Technology - 10th International Conference, {ICDCIT} 2014, Bhubaneswar, India, February 6-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8337}, pages = {43--49}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04483-5\_5}, doi = {10.1007/978-3-319-04483-5\_5}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/Datta14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SenGDRTW14, author = {Shayak Sen and Saikat Guha and Anupam Datta and Sriram K. Rajamani and Janice Y. Tsai and Jeannette M. Wing}, title = {Bootstrapping Privacy Compliance in Big Data Systems}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {327--342}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.28}, doi = {10.1109/SP.2014.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SenGDRTW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/DeBruhlKDST14, author = {Bruce DeBruhl and Christian Kroer and Anupam Datta and Tuomas Sandholm and Patrick Tague}, editor = {Gergely {\'{A}}cs and Andrew P. Martin and Ivan Martinovic and Claude Castelluccia and Patrick Traynor}, title = {Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming}, booktitle = {7th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014}, pages = {117--128}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2627393.2627406}, doi = {10.1145/2627393.2627406}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/DeBruhlKDST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2014, editor = {Gail{-}Joon Ahn and Anupam Datta}, title = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2665943}, isbn = {978-1-4503-3148-7}, timestamp = {Fri, 20 Mar 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlockiBD14, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta}, title = {Human Computable Passwords}, journal = {CoRR}, volume = {abs/1404.0024}, year = {2014}, url = {http://arxiv.org/abs/1404.0024}, eprinttype = {arXiv}, eprint = {1404.0024}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlockiBD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TschantzDDW14, author = {Michael Carl Tschantz and Amit Datta and Anupam Datta and Jeannette M. Wing}, title = {A Methodology for Information Flow Experiments}, journal = {CoRR}, volume = {abs/1405.2376}, year = {2014}, url = {http://arxiv.org/abs/1405.2376}, eprinttype = {arXiv}, eprint = {1405.2376}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TschantzDDW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/DattaTD14, author = {Amit Datta and Michael Carl Tschantz and Anupam Datta}, title = {Automated Experiments on Ad Privacy Settings: {A} Tale of Opacity, Choice, and Discrimination}, journal = {CoRR}, volume = {abs/1408.6491}, year = {2014}, url = {http://arxiv.org/abs/1408.6491}, eprinttype = {arXiv}, eprint = {1408.6491}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/DattaTD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlockiCDPS14, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Ariel D. Procaccia and Arunesh Sinha}, title = {Audit Games with Multiple Defender Resources}, journal = {CoRR}, volume = {abs/1409.4503}, year = {2014}, url = {http://arxiv.org/abs/1409.4503}, eprinttype = {arXiv}, eprint = {1409.4503}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlockiCDPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlockiKCD14, author = {Jeremiah Blocki and Saranga Komanduri and Lorrie Faith Cranor and Anupam Datta}, title = {Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords}, journal = {CoRR}, volume = {abs/1410.1490}, year = {2014}, url = {http://arxiv.org/abs/1410.1490}, eprinttype = {arXiv}, eprint = {1410.1490}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlockiKCD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BlockiBD13, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta}, editor = {Kazue Sako and Palash Sarkar}, title = {Naturally Rehearsing Passwords}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {361--380}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_19}, doi = {10.1007/978-3-642-42045-0\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BlockiBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BlockiBD13, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {{GOTCHA} password hackers!}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {25--34}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517319}, doi = {10.1145/2517312.2517319}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BlockiBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/TschantzDW13, author = {Michael Carl Tschantz and Anupam Datta and Jeannette M. Wing}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Purpose Restrictions on Information Use}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {610--627}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_34}, doi = {10.1007/978-3-642-40203-6\_34}, timestamp = {Wed, 25 Sep 2019 18:03:15 +0200}, biburl = {https://dblp.org/rec/conf/esorics/TschantzDW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BlockiCDS13, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, editor = {Sajal K. Das and Cristina Nita{-}Rotaru and Murat Kantarcioglu}, title = {Adaptive Regret Minimization in Bounded-Memory Games}, booktitle = {Decision and Game Theory for Security - 4th International Conference, GameSec 2013, Fort Worth, TX, USA, November 11-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8252}, pages = {65--84}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02786-9\_5}, doi = {10.1007/978-3-319-02786-9\_5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BlockiCDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/BlockiCDPS13, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Ariel D. Procaccia and Arunesh Sinha}, editor = {Francesca Rossi}, title = {Audit Games}, booktitle = {{IJCAI} 2013, Proceedings of the 23rd International Joint Conference on Artificial Intelligence, Beijing, China, August 3-9, 2013}, pages = {41--47}, publisher = {{IJCAI/AAAI}}, year = {2013}, url = {http://www.aaai.org/ocs/index.php/IJCAI/IJCAI13/paper/view/6951}, timestamp = {Tue, 23 Jan 2024 13:25:46 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/BlockiCDPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BlockiBDS13, author = {Jeremiah Blocki and Avrim Blum and Anupam Datta and Or Sheffet}, editor = {Robert D. Kleinberg}, title = {Differentially private data analysis of social networks via restricted sensitivity}, booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley, CA, USA, January 9-12, 2013}, pages = {87--96}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2422436.2422449}, doi = {10.1145/2422436.2422449}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BlockiBDS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ChowdhuryGNRBDJW13, author = {Omar Chowdhury and Andreas Gampe and Jianwei Niu and Jeffery von Ronne and Jared Bennatt and Anupam Datta and Limin Jia and William H. Winsborough}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Privacy promises that can be kept: a policy analysis method with application to the {HIPAA} privacy rule}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {3--14}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462423}, doi = {10.1145/2462410.2462423}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ChowdhuryGNRBDJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/VasudevanCJMND13, author = {Amit Vasudevan and Sagar Chaki and Limin Jia and Jonathan M. McCune and James Newsome and Anupam Datta}, title = {Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {430--444}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.36}, doi = {10.1109/SP.2013.36}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/VasudevanCJMND13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1302-5122, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta}, title = {Naturally Rehearsing Passwords}, journal = {CoRR}, volume = {abs/1302.5122}, year = {2013}, url = {http://arxiv.org/abs/1302.5122}, eprinttype = {arXiv}, eprint = {1302.5122}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1302-5122.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1303-0356, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Ariel D. Procaccia and Arunesh Sinha}, title = {Audit Games}, journal = {CoRR}, volume = {abs/1303.0356}, year = {2013}, url = {http://arxiv.org/abs/1303.0356}, eprinttype = {arXiv}, eprint = {1303.0356}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1303-0356.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlockiBD13, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta}, title = {{GOTCHA} Password Hackers!}, journal = {CoRR}, volume = {abs/1310.1137}, year = {2013}, url = {http://arxiv.org/abs/1310.1137}, eprinttype = {arXiv}, eprint = {1310.1137}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlockiBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BlockiBDS12, author = {Jeremiah Blocki and Avrim Blum and Anupam Datta and Or Sheffet}, title = {The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy}, booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2012, New Brunswick, NJ, USA, October 20-23, 2012}, pages = {410--419}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FOCS.2012.67}, doi = {10.1109/FOCS.2012.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BlockiBDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BlockiCDS12, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Audit Mechanisms for Provable Risk Management and Accountable Data Governance}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {38--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_3}, doi = {10.1007/978-3-642-34266-0\_3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gamesec/BlockiCDS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/FranklinCDMV12, author = {Jason Franklin and Sagar Chaki and Anupam Datta and Jonathan M. McCune and Amit Vasudevan}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Parametric Verification of Address Space Separation}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {51--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_4}, doi = {10.1007/978-3-642-28641-4\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/FranklinCDMV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/DattaSS12, author = {Anupam Datta and Divya Sharma and Arunesh Sinha}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Provable De-anonymization of Large Datasets with Sparse Dimensions}, booktitle = {Principles of Security and Trust - First International Conference, {POST} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7215}, pages = {229--248}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28641-4\_13}, doi = {10.1007/978-3-642-28641-4\_13}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/post/DattaSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TschantzDW12, author = {Michael Carl Tschantz and Anupam Datta and Jeannette M. Wing}, title = {Formalizing and Enforcing Purpose Restrictions in Privacy Policies}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {176--190}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.21}, doi = {10.1109/SP.2012.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/TschantzDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2011, editor = {Gilles Barthe and Anupam Datta and Sandro Etalle}, title = {Formal Aspects of Security and Trust - 8th International Workshop, {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7140}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29420-4}, doi = {10.1007/978-3-642-29420-4}, isbn = {978-3-642-29419-8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1204-2136, author = {Jeremiah Blocki and Avrim Blum and Anupam Datta and Or Sheffet}, title = {The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy}, journal = {CoRR}, volume = {abs/1204.2136}, year = {2012}, url = {http://arxiv.org/abs/1204.2136}, eprinttype = {arXiv}, eprint = {1204.2136}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1204-2136.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1208-4586, author = {Jeremiah Blocki and Avrim Blum and Anupam Datta and Or Sheffet}, title = {Differentially Private Data Analysis of Social Networks via Restricted Sensitivity}, journal = {CoRR}, volume = {abs/1208.4586}, year = {2012}, url = {http://arxiv.org/abs/1208.4586}, eprinttype = {arXiv}, eprint = {1208.4586}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1208-4586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/DattaFGJK11, author = {Anupam Datta and Jason Franklin and Deepak Garg and Limin Jia and Dilsun Kirli Kaynar}, title = {On Adversary Models and Compositional Security}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {3}, pages = {26--32}, year = {2011}, url = {https://doi.org/10.1109/MSP.2010.203}, doi = {10.1109/MSP.2010.203}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/DattaFGJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GargJD11, author = {Deepak Garg and Limin Jia and Anupam Datta}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {Policy auditing over incomplete logs: theory, implementation and applications}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {151--162}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046726}, doi = {10.1145/2046707.2046726}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GargJD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BlockiCDS11, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, title = {Regret Minimizing Audits: {A} Learning-Theoretic Basis for Privacy Protection}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {312--327}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.28}, doi = {10.1109/CSF.2011.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BlockiCDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DattaBCDGJKS11, author = {Anupam Datta and Jeremiah Blocki and Nicolas Christin and Henry DeYoung and Deepak Garg and Limin Jia and Dilsun Kirli Kaynar and Arunesh Sinha}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {1--27}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_1}, doi = {10.1007/978-3-642-25560-1\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/DattaBCDGJKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BlockiCDS11, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, editor = {Ben Adida and Umesh Shankar}, title = {Audit Mechanisms for Privacy Protection in Healthcare Environments}, booktitle = {2nd {USENIX} Workshop on Health Security and Privacy, HealthSec'11, San Francisco, CA, USA, August 9, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/healthsec11/audit-mechanisms-privacy-protection-healthcare-environments}, timestamp = {Mon, 01 Feb 2021 17:03:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/BlockiCDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/TschantzKD11, author = {Michael Carl Tschantz and Dilsun Kirli Kaynar and Anupam Datta}, editor = {Michael W. Mislove and Jo{\"{e}}l Ouaknine}, title = {Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract)}, booktitle = {Twenty-seventh Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2011, Pittsburgh, PA, USA, May 25-28, 2011}, series = {Electronic Notes in Theoretical Computer Science}, volume = {276}, pages = {61--79}, publisher = {Elsevier}, year = {2011}, url = {https://doi.org/10.1016/j.entcs.2011.09.015}, doi = {10.1016/J.ENTCS.2011.09.015}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/TschantzKD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/DattaM0S11, author = {Anupam Datta and John C. Mitchell and Arnab Roy and Stephan Hyeonjun Stiller}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Protocol Composition Logic}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {182--221}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-182}, doi = {10.3233/978-1-60750-714-7-182}, timestamp = {Fri, 15 May 2020 12:11:04 +0200}, biburl = {https://dblp.org/rec/books/ios/11/DattaM0S11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1101-2819, author = {Michael Carl Tschantz and Dilsun Kirli Kaynar and Anupam Datta}, title = {Formal Verification of Differential Privacy for Interactive Systems}, journal = {CoRR}, volume = {abs/1101.2819}, year = {2011}, url = {http://arxiv.org/abs/1101.2819}, eprinttype = {arXiv}, eprint = {1101.2819}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1101-2819.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-2521, author = {Deepak Garg and Limin Jia and Anupam Datta}, title = {A Logical Method for Policy Enforcement over Evolving Audit Logs}, journal = {CoRR}, volume = {abs/1102.2521}, year = {2011}, url = {http://arxiv.org/abs/1102.2521}, eprinttype = {arXiv}, eprint = {1102.2521}, timestamp = {Sun, 16 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-2521.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1102-4326, author = {Michael Carl Tschantz and Anupam Datta and Jeannette M. Wing}, title = {On the Semantics of Purpose Requirements in Privacy Policies}, journal = {CoRR}, volume = {abs/1102.4326}, year = {2011}, url = {http://arxiv.org/abs/1102.4326}, eprinttype = {arXiv}, eprint = {1102.4326}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1102-4326.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1111-2888, author = {Jeremiah Blocki and Nicolas Christin and Anupam Datta and Arunesh Sinha}, title = {Adaptive Regret Minimization in Bounded-Memory Games}, journal = {CoRR}, volume = {abs/1111.2888}, year = {2011}, url = {http://arxiv.org/abs/1111.2888}, eprinttype = {arXiv}, eprint = {1111.2888}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1111-2888.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/synthesis/2010Datta, author = {Anupam Datta and Somesh Jha and Ninghui Li and David Melski and Thomas W. Reps}, title = {Analysis Techniques for Information Security}, series = {Synthesis Lectures on Information Security, Privacy, and Trust}, publisher = {Morgan {\&} Claypool Publishers}, year = {2010}, url = {https://doi.org/10.2200/S00260ED1V01Y201003SPT002}, doi = {10.2200/S00260ED1V01Y201003SPT002}, isbn = {978-3-031-01206-8}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/synthesis/2010Datta.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Datta10, author = {Anupam Datta}, title = {Logical Methods in Security and Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {6}, pages = {86--89}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.180}, doi = {10.1109/MSP.2010.180}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Datta10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RoyDDM10, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, title = {Inductive trace properties for computational security}, journal = {J. Comput. Secur.}, volume = {18}, number = {6}, pages = {1035--1073}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-389}, doi = {10.3233/JCS-2009-389}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RoyDDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/McCuneLQZDGP10, author = {Jonathan M. McCune and Yanlin Li and Ning Qu and Zongwei Zhou and Anupam Datta and Virgil D. Gligor and Adrian Perrig}, title = {TrustVisor: Efficient {TCB} Reduction and Attestation}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {143--158}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.17}, doi = {10.1109/SP.2010.17}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/McCuneLQZDGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FranklinCDS10, author = {Jason Franklin and Sagar Chaki and Anupam Datta and Arvind Seshadri}, title = {Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {365--379}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.29}, doi = {10.1109/SP.2010.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/FranklinCDS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tldi/AvijitDH10, author = {Kumar Avijit and Anupam Datta and Robert Harper}, editor = {Andrew Kennedy and Nick Benton}, title = {Distributed programming with distributed authorization}, booktitle = {Proceedings of {TLDI} 2010: 2010 {ACM} {SIGPLAN} International Workshop on Types in Languages Design and Implementation, Madrid, Spain, January 23, 2010}, pages = {27--38}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1708016.1708021}, doi = {10.1145/1708016.1708021}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tldi/AvijitDH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DattaDMNS10, author = {Anupam Datta and Nipun Dave and John C. Mitchell and Helen Nissenbaum and Divya Sharma}, editor = {Kevin Fu and Tadayoshi Kohno and Aviel D. Rubin}, title = {Privacy Challenges in Patient-centric Health Information Systems}, booktitle = {1st {USENIX} Workshop on Health Security and Privacy, HealthSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/healthsec10/privacy-challenges-patient-centric-health-information-systems}, timestamp = {Mon, 01 Feb 2021 08:43:06 +0100}, biburl = {https://dblp.org/rec/conf/uss/DattaDMNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/DeYoungGJKD10, author = {Henry DeYoung and Deepak Garg and Limin Jia and Dilsun Kirli Kaynar and Anupam Datta}, editor = {Ehab Al{-}Shaer and Keith B. Frikken}, title = {Experiences in the logical specification of the {HIPAA} and {GLBA} privacy laws}, booktitle = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010}, pages = {73--82}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866919.1866930}, doi = {10.1145/1866919.1866930}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/DeYoungGJKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GargFKD10, author = {Deepak Garg and Jason Franklin and Dilsun Kirli Kaynar and Anupam Datta}, editor = {Michael W. Mislove and Peter Selinger}, title = {Compositional System Security with Interface-Confined Adversaries}, booktitle = {Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2010, Ottawa, Ontario, Canada, May 6-10, 2010}, series = {Electronic Notes in Theoretical Computer Science}, volume = {265}, pages = {49--71}, publisher = {Elsevier}, year = {2010}, url = {https://doi.org/10.1016/j.entcs.2010.08.005}, doi = {10.1016/J.ENTCS.2010.08.005}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/GargFKD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ChakiD09, author = {Sagar Chaki and Anupam Datta}, title = {{ASPIER:} An Automated Framework for Verifying Security Protocol Implementations}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {172--185}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.20}, doi = {10.1109/CSF.2009.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ChakiD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DattaFGK09, author = {Anupam Datta and Jason Franklin and Deepak Garg and Dilsun Kirli Kaynar}, title = {A Logic of Secure Systems and its Application to Trusted Computing}, booktitle = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May 2009, Oakland, California, {USA}}, pages = {221--236}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SP.2009.16}, doi = {10.1109/SP.2009.16}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/DattaFGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asian/2009, editor = {Anupam Datta}, title = {Advances in Computer Science - {ASIAN} 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5913}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10622-4}, doi = {10.1007/978-3-642-10622-4}, isbn = {978-3-642-10621-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asian/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KustersDMR08, author = {Ralf K{\"{u}}sters and Anupam Datta and John C. Mitchell and Ajith Ramanathan}, title = {On the Relationships between Notions of Simulation-Based Security}, journal = {J. Cryptol.}, volume = {21}, number = {4}, pages = {492--546}, year = {2008}, url = {https://doi.org/10.1007/s00145-008-9019-9}, doi = {10.1007/S00145-008-9019-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KustersDMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BarthMDS07, author = {Adam Barth and John C. Mitchell and Anupam Datta and Sharada Sundaram}, title = {Privacy and Utility in Business Processes}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {279--294}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.26}, doi = {10.1109/CSF.2007.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BarthMDS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RoyDDM07, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Inductive Proofs of Computational Secrecy}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {219--234}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_15}, doi = {10.1007/978-3-540-74835-9\_15}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RoyDDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/RoyDM07, author = {Arnab Roy and Anupam Datta and John C. Mitchell}, editor = {Gilles Barthe and C{\'{e}}dric Fournet}, title = {Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols}, booktitle = {Trustworthy Global Computing, Third Symposium, {TGC} 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4912}, pages = {312--329}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-78663-4\_21}, doi = {10.1007/978-3-540-78663-4\_21}, timestamp = {Sat, 19 Oct 2019 20:09:31 +0200}, biburl = {https://dblp.org/rec/conf/tgc/RoyDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DattaDMR07, author = {Anupam Datta and Ante Derek and John C. Mitchell and Arnab Roy}, editor = {Luca Cardelli and Marcelo Fiore and Glynn Winskel}, title = {Protocol Composition Logic {(PCL)}}, booktitle = {Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin}, series = {Electronic Notes in Theoretical Computer Science}, volume = {172}, pages = {311--358}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.02.012}, doi = {10.1016/J.ENTCS.2007.02.012}, timestamp = {Tue, 24 Jan 2023 11:36:28 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DattaDMR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyDDM07, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, title = {Inductive Proof Method for Computational Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2007}, url = {http://eprint.iacr.org/2007/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyDDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BackesDDMT06, author = {Michael Backes and Anupam Datta and Ante Derek and John C. Mitchell and Mathieu Turuani}, title = {Compositional analysis of contract-signing protocols}, journal = {Theor. Comput. Sci.}, volume = {367}, number = {1-2}, pages = {33--56}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.039}, doi = {10.1016/J.TCS.2006.08.039}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BackesDDMT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/RoyDDMS06, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell and Jean{-}Pierre Seifert}, editor = {Mitsu Okada and Ichiro Satoh}, title = {Secrecy Analysis in Protocol Composition Logic}, booktitle = {Advances in Computer Science - {ASIAN} 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4435}, pages = {197--213}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-77505-8\_15}, doi = {10.1007/978-3-540-77505-8\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/asian/RoyDDMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DattaDMW06, author = {Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi}, title = {Computationally Sound Compositional Logic for Key Exchange Protocols}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {321--334}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.9}, doi = {10.1109/CSFW.2006.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DattaDMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BarthDMN06, author = {Adam Barth and Anupam Datta and John C. Mitchell and Helen Nissenbaum}, title = {Privacy and Contextual Integrity: Framework and Applications}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {184--198}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.32}, doi = {10.1109/SP.2006.32}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BarthDMN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DattaDMRS06, author = {Anupam Datta and Ante Derek and John C. Mitchell and Ajith Ramanathan and Andre Scedrov}, editor = {Shai Halevi and Tal Rabin}, title = {Games and the Impossibility of Realizable Ideal Functionality}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {360--379}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_19}, doi = {10.1007/11681878\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DattaDMRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDMW06, author = {Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi}, title = {Key Exchange Protocols: Security Definition, Proof Method and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2006}, url = {http://eprint.iacr.org/2006/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaKMR06, author = {Anupam Datta and Ralf K{\"{u}}sters and John C. Mitchell and Ajith Ramanathan}, title = {On the Relationships Between Notions of Simulation-Based Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2006}, url = {http://eprint.iacr.org/2006/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaKMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyDDM06, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, title = {Inductive Trace Properties for Computational Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2006}, url = {http://eprint.iacr.org/2006/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyDDM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Datta05, author = {Anupam Datta}, title = {Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations}, school = {Stanford University, {USA}}, year = {2005}, url = {https://searchworks.stanford.edu/view/6261591}, timestamp = {Wed, 31 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Datta05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DattaDMP05, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, title = {A derivation system and compositional logic for security protocols}, journal = {J. Comput. Secur.}, volume = {13}, number = {3}, pages = {423--482}, year = {2005}, url = {https://doi.org/10.3233/jcs-2005-13304}, doi = {10.3233/JCS-2005-13304}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/DattaDMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeSDDM05, author = {Changhua He and Mukund Sundararajan and Anupam Datta and Ante Derek and John C. Mitchell}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {A modular correctness proof of {IEEE} 802.11i and {TLS}}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {2--15}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102124}, doi = {10.1145/1102120.1102124}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HeSDDM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BackesDDMT05, author = {Michael Backes and Anupam Datta and Ante Derek and John C. Mitchell and Mathieu Turuani}, title = {Compositional Analysis of Contract Signing Protocols}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {94--110}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSFW.2005.12}, doi = {10.1109/CSFW.2005.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BackesDDMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/DattaDMST05, author = {Anupam Datta and Ante Derek and John C. Mitchell and Vitaly Shmatikov and Mathieu Turuani}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Probabilistic Polynomial-Time Semantics for a Protocol Security Logic}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {16--29}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_2}, doi = {10.1007/11523468\_2}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/DattaDMST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/DattaKMR05, author = {Anupam Datta and Ralf K{\"{u}}sters and John C. Mitchell and Ajith Ramanathan}, editor = {Joe Kilian}, title = {On the Relationships Between Notions of Simulation-Based Security}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {476--494}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_26}, doi = {10.1007/978-3-540-30576-7\_26}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/DattaKMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDMRS05, author = {Anupam Datta and Ante Derek and John C. Mitchell and Ajith Ramanathan and Andre Scedrov}, title = {Games and the Impossibility of Realizable Ideal Functionality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2005}, url = {http://eprint.iacr.org/2005/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDMRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DattaDMP04, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, title = {Abstraction and Refinement in Protocol Derivation}, booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, pages = {30}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.4}, doi = {10.1109/CSFW.2004.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DattaDMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DattaDMP03, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, editor = {Michael Backes and David A. Basin}, title = {Secure protocol composition}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {11--23}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035431}, doi = {10.1145/1035429.1035431}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DattaDMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DattaDMP03, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, title = {A Derivation System for Security Protocols and its Logical Formalization}, booktitle = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003), 30 June - 2 July 2003, Pacific Grove, CA, {USA}}, pages = {109--125}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSFW.2003.1212708}, doi = {10.1109/CSFW.2003.1212708}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DattaDMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfps/DattaDMP03, author = {Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic}, editor = {Stephen D. Brookes and Prakash Panangaden}, title = {Secure Protocol Composition}, booktitle = {Proceedings of 19th Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2003, Universit{\'{e}} de Montr{\'{e}}al, QC, Canada, March 19-22, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {83}, pages = {201--226}, publisher = {Elsevier}, year = {2003}, url = {https://doi.org/10.1016/S1571-0661(03)50011-1}, doi = {10.1016/S1571-0661(03)50011-1}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mfps/DattaDMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/DattaCB02, author = {Anupam Datta and Sidharth Choudhury and Anupam Basu}, title = {Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks}, booktitle = {Proceedings of the 7th Asia and South Pacific Design Automation Conference {(ASP-DAC} 2002), and the 15th International Conference on {VLSI} Design {(VLSI} Design 2002), Bangalore, India, January 7-11, 2002}, pages = {705--710}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ASPDAC.2002.995017}, doi = {10.1109/ASPDAC.2002.995017}, timestamp = {Mon, 14 Nov 2022 15:28:09 +0100}, biburl = {https://dblp.org/rec/conf/vlsid/DattaCB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amia/FaganBCCDSS01, author = {Lawrence M. Fagan and Daniel C. Berrios and Albert Chan and Russell J. Cucina and Anupam Datta and Maulik K. Shah and Sujith Surendran}, title = {Information Retrieval Using UMLS-based Structured Queries}, booktitle = {{AMIA} 2001, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 3-7, 2001}, publisher = {{AMIA}}, year = {2001}, url = {https://knowledge.amia.org/amia-55142-a2001a-1.597057/t-002-1.598852/f-001-1.598853/a-259-1.599359/a-260-1.599356}, timestamp = {Wed, 04 Aug 2021 11:13:07 +0200}, biburl = {https://dblp.org/rec/conf/amia/FaganBCCDSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vlsid/DattaCBTD01, author = {Anupam Datta and Sidharth Choudhury and Anupam Basu and Hiroyuki Tomiyama and Nikil D. Dutt}, title = {Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique}, booktitle = {14th International Conference on {VLSI} Design {(VLSI} Design 2001), 3-7 January 2001, Bangalore, India}, pages = {97--102}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICVD.2001.902646}, doi = {10.1109/ICVD.2001.902646}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vlsid/DattaCBTD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.