Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Somesh Jha
@inproceedings{DBLP:conf/wacv/HoodaMFFJ024, author = {Ashish Hooda and Neal Mangaokar and Ryan Feng and Kassem Fawaz and Somesh Jha and Atul Prakash}, title = {{D4:} Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles}, booktitle = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV} 2024, Waikoloa, HI, USA, January 3-8, 2024}, pages = {3800--3810}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/WACV57701.2024.00377}, doi = {10.1109/WACV57701.2024.00377}, timestamp = {Wed, 17 Apr 2024 07:41:22 +0200}, biburl = {https://dblp.org/rec/conf/wacv/HoodaMFFJ024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-05980, author = {Ashish Hooda and Mihai Christodorescu and Miltiadis Allamanis and Aaron Wilson and Kassem Fawaz and Somesh Jha}, title = {Do Large Code Models Understand Programming Concepts? {A} Black-box Approach}, journal = {CoRR}, volume = {abs/2402.05980}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.05980}, doi = {10.48550/ARXIV.2402.05980}, eprinttype = {arXiv}, eprint = {2402.05980}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-05980.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-15911, author = {Neal Mangaokar and Ashish Hooda and Jihye Choi and Shreyas Chandrashekaran and Kassem Fawaz and Somesh Jha and Atul Prakash}, title = {{PRP:} Propagating Universal Perturbations to Attack Large Language Model Guard-Rails}, journal = {CoRR}, volume = {abs/2402.15911}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.15911}, doi = {10.48550/ARXIV.2402.15911}, eprinttype = {arXiv}, eprint = {2402.15911}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-15911.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-18649, author = {Fangzhou Wu and Ning Zhang and Somesh Jha and Patrick D. McDaniel and Chaowei Xiao}, title = {A New Era in {LLM} Security: Exploring Security Concerns in Real-World LLM-based Systems}, journal = {CoRR}, volume = {abs/2402.18649}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.18649}, doi = {10.48550/ARXIV.2402.18649}, eprinttype = {arXiv}, eprint = {2402.18649}, timestamp = {Wed, 27 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-18649.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23, author = {Clark W. Barrett and Brad Boyd and Elie Bursztein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {Found. Trends Priv. Secur.}, volume = {6}, number = {1}, pages = {1--52}, year = {2023}, url = {https://doi.org/10.1561/3300000041}, doi = {10.1561/3300000041}, timestamp = {Sun, 24 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DziedzicCDSSKJPW23, author = {Adam Dziedzic and Christopher A. Choquette{-}Choo and Natalie Dullerud and Vinith M. Suriyakumar and Ali Shahin Shamsabadi and Muhammad Ahmad Kaleem and Somesh Jha and Nicolas Papernot and Xiao Wang}, title = {Private Multi-Winner Voting for Machine Learning}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {1}, pages = {527--555}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0031}, doi = {10.56553/POPETS-2023-0031}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/DziedzicCDSSKJPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/ChakrabortyJSM23, author = {Samarjit Chakraborty and Somesh Jha and Soheil Samii and Philipp Mundhenk}, title = {Introduction to the Special Issue on Automotive {CPS} Safety {\&} Security: Part 1}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {7}, number = {1}, pages = {1:1--1:6}, year = {2023}, url = {https://doi.org/10.1145/3579986}, doi = {10.1145/3579986}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/ChakrabortyJSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/AlhanahnahMGCYJZ23, author = {Mohannad Alhanahnah and Shiqing Ma and Ashish Gehani and Gabriela F. Ciocarlie and Vinod Yegneswaran and Somesh Jha and Xiangyu Zhang}, title = {autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {4}, pages = {2761--2775}, year = {2023}, url = {https://doi.org/10.1109/TSE.2022.3231242}, doi = {10.1109/TSE.2022.3231242}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/AlhanahnahMGCYJZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Chen00ZJL23, author = {Joann Qiongna Chen and Tianhao Wang and Zhikun Zhang and Yang Zhang and Somesh Jha and Zhou Li}, title = {Differentially Private Resource Allocation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin, TX, USA, December 4-8, 2023}, pages = {772--786}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3627106.3627181}, doi = {10.1145/3627106.3627181}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Chen00ZJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FengHMFJ023, author = {Ryan Feng and Ashish Hooda and Neal Mangaokar and Kassem Fawaz and Somesh Jha and Atul Prakash}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {786--800}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623116}, doi = {10.1145/3576915.3623116}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FengHMFJ023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GargGJMMPW23, author = {Sanjam Garg and Aarushi Goel and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Guru{-}Vamsi Policharla and Mingyuan Wang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Experimenting with Zero-Knowledge Proofs of Training}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1880--1894}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623202}, doi = {10.1145/3576915.3623202}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GargGJMMPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/0001YEAPJ23, author = {Jiefeng Chen and Jinsung Yoon and Sayna Ebrahimi and Sercan {\"{O}}. Arik and Tomas Pfister and Somesh Jha}, editor = {Houda Bouamor and Juan Pino and Kalika Bali}, title = {Adaptation with Self-Evaluation to Improve Selective Prediction in LLMs}, booktitle = {Findings of the Association for Computational Linguistics: {EMNLP} 2023, Singapore, December 6-10, 2023}, pages = {5190--5213}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.findings-emnlp.345}, doi = {10.18653/V1/2023.FINDINGS-EMNLP.345}, timestamp = {Fri, 12 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/0001YEAPJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/RaghuramZ00JW023, author = {Jayaram Raghuram and Yijing Zeng and Dolores Garc{\'{\i}}a and Rafael Ruiz and Somesh Jha and Joerg Widmer and Suman Banerjee}, title = {Few-Shot Domain Adaptation For End-to-End Communication}, booktitle = {The Eleventh International Conference on Learning Representations, {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023}, publisher = {OpenReview.net}, year = {2023}, url = {https://openreview.net/pdf?id=4F1gvduDeL}, timestamp = {Fri, 30 Jun 2023 14:38:38 +0200}, biburl = {https://dblp.org/rec/conf/iclr/RaghuramZ00JW023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/Shi0LR0LJ23, author = {Zhenmei Shi and Jiefeng Chen and Kunyang Li and Jayaram Raghuram and Xi Wu and Yingyu Liang and Somesh Jha}, title = {The Trade-off between Universality and Label Efficiency of Representations from Contrastive Learning}, booktitle = {The Eleventh International Conference on Learning Representations, {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023}, publisher = {OpenReview.net}, year = {2023}, url = {https://openreview.net/pdf?id=rvsbw2YthH\_}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/Shi0LR0LJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/0001RC0LJ23, author = {Jiefeng Chen and Jayaram Raghuram and Jihye Choi and Xi Wu and Yingyu Liang and Somesh Jha}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Stratified Adversarial Robustness with Rejection}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {4867--4894}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/chen23w.html}, timestamp = {Mon, 28 Aug 2023 17:23:08 +0200}, biburl = {https://dblp.org/rec/conf/icml/0001RC0LJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/ChoiRF0J023, author = {Jihye Choi and Jayaram Raghuram and Ryan Feng and Jiefeng Chen and Somesh Jha and Atul Prakash}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Concept-based Explanations for Out-of-Distribution Detectors}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {5817--5837}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/choi23e.html}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/ChoiRF0J023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/FranzeseDCTKRFJ23, author = {Nicholas Franzese and Adam Dziedzic and Christopher A. Choquette{-}Choo and Mark R. Thomas and Muhammad Ahmad Kaleem and Stephan Rabanser and Congyu Fang and Somesh Jha and Nicolas Papernot and Xiao Wang}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {Robust and Actively Secure Serverless Collaborative Learning}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/7c5a4b7a31dffef8ce296deedb6214a9-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/FranzeseDCTKRFJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WangVLGJF23, author = {Zifan Wang and Saranya Vijayakumar and Kaiji Lu and Vijay Ganesh and Somesh Jha and Matt Fredrikson}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {Grounding Neural Inference with Satisfiability Modulo Theories}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/47167991e38c65a72914763c11cd8d23-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/WangVLGJF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SunSLCLJ23, author = {Zhichuang Sun and Ruimin Sun and Changming Liu and Amrita Roy Chowdhury and Long Lu and Somesh Jha}, title = {ShadowNet: {A} Secure and Efficient On-device Model Inference System for Convolutional Neural Networks}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1596--1612}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179382}, doi = {10.1109/SP46215.2023.10179382}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/SunSLCLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RosenbergTFJ23, author = {Harrison Rosenberg and Brian Tang and Kassem Fawaz and Somesh Jha}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Fairness Properties of Face Recognition and Obfuscation Systems}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7231--7248}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/rosenberg}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RosenbergTFJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-11435, author = {Matt Fredrikson and Kaiji Lu and Saranya Vijayakumar and Somesh Jha and Vijay Ganesh and Zifan Wang}, title = {Learning Modulo Theories}, journal = {CoRR}, volume = {abs/2301.11435}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.11435}, doi = {10.48550/ARXIV.2301.11435}, eprinttype = {arXiv}, eprint = {2301.11435}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-11435.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-00120, author = {Xi Wu and Joe Benassi and Yaqi Zhang and Uyeong Jang and James Foster and Stella Kim and Yujing Sun and Somesh Jha and John Cieslewicz and Jeffrey F. Naughton}, title = {Holistic Cube Analysis: {A} Query Framework for Data Insights}, journal = {CoRR}, volume = {abs/2302.00120}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.00120}, doi = {10.48550/ARXIV.2302.00120}, eprinttype = {arXiv}, eprint = {2302.00120}, timestamp = {Thu, 09 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-00120.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-13525, author = {Somesh Jha and Mihai Christodorescu and Anh Pham}, title = {Formal Analysis of the {API} Proxy Problem}, journal = {CoRR}, volume = {abs/2302.13525}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.13525}, doi = {10.48550/ARXIV.2302.13525}, eprinttype = {arXiv}, eprint = {2302.13525}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-13525.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-00106, author = {Zhenmei Shi and Jiefeng Chen and Kunyang Li and Jayaram Raghuram and Xi Wu and Yingyu Liang and Somesh Jha}, title = {The Trade-off between Universality and Label Efficiency of Representations from Contrastive Learning}, journal = {CoRR}, volume = {abs/2303.00106}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.00106}, doi = {10.48550/ARXIV.2303.00106}, eprinttype = {arXiv}, eprint = {2303.00106}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-00106.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-06280, author = {Ryan Feng and Ashish Hooda and Neal Mangaokar and Kassem Fawaz and Somesh Jha and Atul Prakash}, title = {Investigating Stateful Defenses Against Black-Box Adversarial Examples}, journal = {CoRR}, volume = {abs/2303.06280}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.06280}, doi = {10.48550/ARXIV.2303.06280}, eprinttype = {arXiv}, eprint = {2303.06280}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-06280.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-13588, author = {Zi Wang and Somesh Jha and Krishnamurthy Dvijotham}, title = {Efficient Symbolic Reasoning for Neural-Network Verification}, journal = {CoRR}, volume = {abs/2303.13588}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.13588}, doi = {10.48550/ARXIV.2303.13588}, eprinttype = {arXiv}, eprint = {2303.13588}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-13588.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-03870, author = {Jiefeng Chen and Jinsung Yoon and Sayna Ebrahimi and Sercan {\"{O}}. Arik and Somesh Jha and Tomas Pfister}, title = {{ASPEST:} Bridging the Gap Between Active Learning and Selective Prediction}, journal = {CoRR}, volume = {abs/2304.03870}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.03870}, doi = {10.48550/ARXIV.2304.03870}, eprinttype = {arXiv}, eprint = {2304.03870}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-03870.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-01139, author = {Jiefeng Chen and Jayaram Raghuram and Jihye Choi and Xi Wu and Yingyu Liang and Somesh Jha}, title = {Stratified Adversarial Robustness with Rejection}, journal = {CoRR}, volume = {abs/2305.01139}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.01139}, doi = {10.48550/ARXIV.2305.01139}, eprinttype = {arXiv}, eprint = {2305.01139}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-01139.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-15698, author = {Zi Wang and Jihye Choi and Somesh Jha}, title = {Rethink Diversity in Deep Learning Testing}, journal = {CoRR}, volume = {abs/2305.15698}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.15698}, doi = {10.48550/ARXIV.2305.15698}, eprinttype = {arXiv}, eprint = {2305.15698}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-15698.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-17528, author = {Nils Palumbo and Yang Guo and Xi Wu and Jiefeng Chen and Yingyu Liang and Somesh Jha}, title = {Two Heads are Better than One: Towards Better Adversarial Robustness by Combining Transduction and Rejection}, journal = {CoRR}, volume = {abs/2305.17528}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.17528}, doi = {10.48550/ARXIV.2305.17528}, eprinttype = {arXiv}, eprint = {2305.17528}, timestamp = {Fri, 09 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-17528.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-01292, author = {Debopam Sanyal and Jui{-}Tse Hung and Manav Agrawal and Prahlad Jasti and Shahab Nikkhoo and Somesh Jha and Tianhao Wang and Sibin Mohan and Alexey Tumanov}, title = {Pareto-Secure Machine Learning {(PSML):} Fingerprinting and Securing Inference Serving Systems}, journal = {CoRR}, volume = {abs/2307.01292}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.01292}, doi = {10.48550/ARXIV.2307.01292}, eprinttype = {arXiv}, eprint = {2307.01292}, timestamp = {Mon, 10 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-01292.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2307-16331, author = {Ashish Hooda and Neal Mangaokar and Ryan Feng and Kassem Fawaz and Somesh Jha and Atul Prakash}, title = {Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks}, journal = {CoRR}, volume = {abs/2307.16331}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2307.16331}, doi = {10.48550/ARXIV.2307.16331}, eprinttype = {arXiv}, eprint = {2307.16331}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2307-16331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14840, author = {Clark W. Barrett and Brad Boyd and Ellie Burzstein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {CoRR}, volume = {abs/2308.14840}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14840}, doi = {10.48550/ARXIV.2308.14840}, eprinttype = {arXiv}, eprint = {2308.14840}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-06758, author = {Mohannad Alhanahnah and Philipp Dominik Schubert and Thomas W. Reps and Somesh Jha and Eric Bodden}, title = {slash: {A} Technique for Static Configuration-Logic Identification}, journal = {CoRR}, volume = {abs/2310.06758}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.06758}, doi = {10.48550/ARXIV.2310.06758}, eprinttype = {arXiv}, eprint = {2310.06758}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-06758.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-08015, author = {Jihye Choi and Shruti Tople and Varun Chandrasekaran and Somesh Jha}, title = {Why Train More? Effective and Efficient Membership Inference via Memorization}, journal = {CoRR}, volume = {abs/2310.08015}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.08015}, doi = {10.48550/ARXIV.2310.08015}, eprinttype = {arXiv}, eprint = {2310.08015}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-08015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-11689, author = {Jiefeng Chen and Jinsung Yoon and Sayna Ebrahimi and Sercan {\"{O}}. Arik and Tomas Pfister and Somesh Jha}, title = {Adaptation with Self-Evaluation to Improve Selective Prediction in LLMs}, journal = {CoRR}, volume = {abs/2310.11689}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.11689}, doi = {10.48550/ARXIV.2310.11689}, eprinttype = {arXiv}, eprint = {2310.11689}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-11689.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-16678, author = {Olive Franzese and Adam Dziedzic and Christopher A. Choquette{-}Choo and Mark R. Thomas and Muhammad Ahmad Kaleem and Stephan Rabanser and Congyu Fang and Somesh Jha and Nicolas Papernot and Xiao Wang}, title = {Robust and Actively Secure Serverless Collaborative Learning}, journal = {CoRR}, volume = {abs/2310.16678}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.16678}, doi = {10.48550/ARXIV.2310.16678}, eprinttype = {arXiv}, eprint = {2310.16678}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-16678.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-18491, author = {Jaiden Fairoze and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Mingyuan Wang}, title = {Publicly Detectable Watermarking for Language Models}, journal = {CoRR}, volume = {abs/2310.18491}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.18491}, doi = {10.48550/ARXIV.2310.18491}, eprinttype = {arXiv}, eprint = {2310.18491}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-18491.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-04824, author = {Xi Wu and Xiangyao Yu and Shaleen Deep and Ahmed Mahmood and Uyeong Jang and Stratis Viglas and Somesh Jha and John Cieslewicz and Jeffrey F. Naughton}, title = {Bilevel Relations and Their Applications to Data Insights}, journal = {CoRR}, volume = {abs/2311.04824}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.04824}, doi = {10.48550/ARXIV.2311.04824}, eprinttype = {arXiv}, eprint = {2311.04824}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-04824.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-13713, author = {Mingtian Tan and Tianhao Wang and Somesh Jha}, title = {A Somewhat Robust Image Watermark against Diffusion-based Editing Models}, journal = {CoRR}, volume = {abs/2311.13713}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.13713}, doi = {10.48550/ARXIV.2311.13713}, eprinttype = {arXiv}, eprint = {2311.13713}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-13713.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGJMMPW23, author = {Sanjam Garg and Aarushi Goel and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Guru{-}Vamsi Policharla and Mingyuan Wang}, title = {Experimenting with Zero-Knowledge Proofs of Training}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1345}, year = {2023}, url = {https://eprint.iacr.org/2023/1345}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargGJMMPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FairozeGJMMW23, author = {Jaiden Fairoze and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Mingyuan Wang}, title = {Publicly Detectable Watermarking for Language Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1661}, year = {2023}, url = {https://eprint.iacr.org/2023/1661}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FairozeGJMMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/GaneshSJ22, author = {Vijay Ganesh and Sanjit A. Seshia and Somesh Jha}, title = {Machine learning and logic: a new frontier in artificial intelligence}, journal = {Formal Methods Syst. Des.}, volume = {60}, number = {3}, pages = {426--451}, year = {2022}, url = {https://doi.org/10.1007/s10703-023-00430-1}, doi = {10.1007/S10703-023-00430-1}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fmsd/GaneshSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/WangAPJ22, author = {Zi Wang and Aws Albarghouthi and Gautam Prakriya and Somesh Jha}, title = {Interval universal approximation for neural networks}, journal = {Proc. {ACM} Program. Lang.}, volume = {6}, number = {{POPL}}, pages = {1--29}, year = {2022}, url = {https://doi.org/10.1145/3498675}, doi = {10.1145/3498675}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/WangAPJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaddockC0MJ22, author = {Samuel Maddock and Graham Cormode and Tianhao Wang and Carsten Maple and Somesh Jha}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Federated Boosted Decision Trees with Differential Privacy}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2249--2263}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560687}, doi = {10.1145/3548606.3560687}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MaddockC0MJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001DJLZ22, author = {Amrita Roy Chowdhury and Bolin Ding and Somesh Jha and Weiran Liu and Jingren Zhou}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Strengthening Order Preserving Encryption with Differential Privacy}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2519--2533}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560610}, doi = {10.1145/3548606.3560610}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001DJLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001GJM22, author = {Amrita Roy Chowdhury and Chuan Guo and Somesh Jha and Laurens van der Maaten}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {EIFFeL: Ensuring Integrity for Federated Learning}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2535--2549}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560611}, doi = {10.1145/3548606.3560611}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001GJM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AlhanahnahJRJR22, author = {Mohannad Alhanahnah and Rithik Jain and Vaibhav Rastogi and Somesh Jha and Thomas W. Reps}, title = {Lightweight, Multi-Stage, Compiler-Assisted Application Specialization}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {251--269}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00024}, doi = {10.1109/EUROSP53844.2022.00024}, timestamp = {Wed, 29 Jun 2022 16:03:24 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/AlhanahnahJRJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/FengMCFJP22, author = {Ryan Feng and Neal Mangaokar and Jiefeng Chen and Earlence Fernandes and Somesh Jha and Atul Prakash}, title = {{GRAPHITE:} Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems}, booktitle = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2022, Genoa, Italy, June 6-10, 2022}, pages = {664--683}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/EuroSP53844.2022.00047}, doi = {10.1109/EUROSP53844.2022.00047}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/FengMCFJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/00010GLJ22, author = {Jiefeng Chen and Xi Wu and Yang Guo and Yingyu Liang and Somesh Jha}, title = {Towards Evaluating the Robustness of Neural Networks Learned by Transduction}, booktitle = {The Tenth International Conference on Learning Representations, {ICLR} 2022, Virtual Event, April 25-29, 2022}, publisher = {OpenReview.net}, year = {2022}, url = {https://openreview.net/forum?id=\_5js\_8uTrx1}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/00010GLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/Meehan0CJ22, author = {Casey Meehan and Amrita Roy Chowdhury and Kamalika Chaudhuri and Somesh Jha}, title = {Privacy Implications of Shuffling}, booktitle = {The Tenth International Conference on Learning Representations, {ICLR} 2022, Virtual Event, April 25-29, 2022}, publisher = {OpenReview.net}, year = {2022}, url = {https://openreview.net/forum?id=5i2f-aR6B8H}, timestamp = {Sat, 20 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iclr/Meehan0CJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/GargJMMW22, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Mingyuan Wang}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Overparameterization from Computational Constraints}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/57e48ac3aa4d107979bf5c6ebc9fe99d-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/GargJMMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WangAMWCJ22, author = {Yizhen Wang and Mohannad Alhanahnah and Xiaozhu Meng and Ke Wang and Mihai Christodorescu and Somesh Jha}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {Robust Learning against Relational Adversaries}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/6752ced903c3f0265108caa10933965f-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/WangAMWCJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/WangPJ22, author = {Zi Wang and Gautam Prakriya and Somesh Jha}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {A Quantitative Geometric Approach to Neural-Network Smoothness}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/dd1322ce23cbbdd9d7ebb0ad1223c27a-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/WangPJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/HenkelRWAJR22, author = {Jordan Henkel and Goutham Ramakrishnan and Zi Wang and Aws Albarghouthi and Somesh Jha and Thomas W. Reps}, title = {Semantic Robustness of Models of Source Code}, booktitle = {{IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022}, pages = {526--537}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SANER53432.2022.00070}, doi = {10.1109/SANER53432.2022.00070}, timestamp = {Tue, 26 Jul 2022 14:23:17 +0200}, biburl = {https://dblp.org/rec/conf/wcre/HenkelRWAJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-04530, author = {Harrison Rosenberg and Robi Bhattacharjee and Kassem Fawaz and Somesh Jha}, title = {An Exploration of Multicalibration Uniform Convergence Bounds}, journal = {CoRR}, volume = {abs/2202.04530}, year = {2022}, url = {https://arxiv.org/abs/2202.04530}, eprinttype = {arXiv}, eprint = {2202.04530}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-04530.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-05687, author = {Ashish Hooda and Neal Mangaokar and Ryan Feng and Kassem Fawaz and Somesh Jha and Atul Prakash}, title = {Towards Adversarially Robust Deepfake Detection: An Ensemble Approach}, journal = {CoRR}, volume = {abs/2202.05687}, year = {2022}, url = {https://arxiv.org/abs/2202.05687}, eprinttype = {arXiv}, eprint = {2202.05687}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-05687.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-10014, author = {Aiping Xiong and Chuhao Wu and Tianhao Wang and Robert W. Proctor and Jeremiah Blocki and Ninghui Li and Somesh Jha}, title = {Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision}, journal = {CoRR}, volume = {abs/2202.10014}, year = {2022}, url = {https://arxiv.org/abs/2202.10014}, eprinttype = {arXiv}, eprint = {2202.10014}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-10014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-01212, author = {Zi Wang and Gautam Prakriya and Somesh Jha}, title = {A Quantitative Geometric Approach to Neural Network Smoothness}, journal = {CoRR}, volume = {abs/2203.01212}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.01212}, doi = {10.48550/ARXIV.2203.01212}, eprinttype = {arXiv}, eprint = {2203.01212}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-01212.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-02586, author = {Jihye Choi and Jayaram Raghuram and Ryan Feng and Jiefeng Chen and Somesh Jha and Atul Prakash}, title = {Concept-based Explanations for Out-Of-Distribution Detectors}, journal = {CoRR}, volume = {abs/2203.02586}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.02586}, doi = {10.48550/ARXIV.2203.02586}, eprinttype = {arXiv}, eprint = {2203.02586}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-02586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-06106, author = {Saeed Mahloujifar and Alexandre Sablayrolles and Graham Cormode and Somesh Jha}, title = {Optimal Membership Inference Bounds for Adaptive Composition of Sampled Gaussian Mechanisms}, journal = {CoRR}, volume = {abs/2204.06106}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.06106}, doi = {10.48550/ARXIV.2204.06106}, eprinttype = {arXiv}, eprint = {2204.06106}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-06106.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-08989, author = {Ryan Feng and Somesh Jha and Atul Prakash}, title = {Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing}, journal = {CoRR}, volume = {abs/2205.08989}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.08989}, doi = {10.48550/ARXIV.2205.08989}, eprinttype = {arXiv}, eprint = {2205.08989}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-08989.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-12926, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Mingyuan Wang}, title = {Overparameterized (robust) models from computational constraints}, journal = {CoRR}, volume = {abs/2208.12926}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.12926}, doi = {10.48550/ARXIV.2208.12926}, eprinttype = {arXiv}, eprint = {2208.12926}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-12926.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-02910, author = {Samuel Maddock and Graham Cormode and Tianhao Wang and Carsten Maple and Somesh Jha}, title = {Federated Boosted Decision Trees with Differential Privacy}, journal = {CoRR}, volume = {abs/2210.02910}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.02910}, doi = {10.48550/ARXIV.2210.02910}, eprinttype = {arXiv}, eprint = {2210.02910}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-02910.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-15410, author = {Adam Dziedzic and Christopher A. Choquette{-}Choo and Natalie Dullerud and Vinith Menon Suriyakumar and Ali Shahin Shamsabadi and Muhammad Ahmad Kaleem and Somesh Jha and Nicolas Papernot and Xiao Wang}, title = {Private Multi-Winner Voting for Machine Learning}, journal = {CoRR}, volume = {abs/2211.15410}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.15410}, doi = {10.48550/ARXIV.2211.15410}, eprinttype = {arXiv}, eprint = {2211.15410}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-15410.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/BardinJG22, author = {S{\'{e}}bastien Bardin and Somesh Jha and Vijay Ganesh}, title = {Machine Learning and Logical Reasoning: The New Frontier (Dagstuhl Seminar 22291)}, journal = {Dagstuhl Reports}, volume = {12}, number = {7}, pages = {80--111}, year = {2022}, url = {https://doi.org/10.4230/DagRep.12.7.80}, doi = {10.4230/DAGREP.12.7.80}, timestamp = {Tue, 07 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/BardinJG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/LarsenSWJ21, author = {Kim G. Larsen and Natarajan Shankar and Pierre Wolper and Somesh Jha}, title = {2018 {CAV} award}, journal = {Formal Methods Syst. Des.}, volume = {57}, number = {1}, pages = {116--117}, year = {2021}, url = {https://doi.org/10.1007/s10703-021-00375-3}, doi = {10.1007/S10703-021-00375-3}, timestamp = {Tue, 27 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fmsd/LarsenSWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/ChandrasekaranG21, author = {Varun Chandrasekaran and Chuhan Gao and Brian Tang and Kassem Fawaz and Somesh Jha and Suman Banerjee}, title = {Face-Off: Adversarial Face Obfuscation}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {2}, pages = {369--390}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0032}, doi = {10.2478/POPETS-2021-0032}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/ChandrasekaranG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0001LJ21, author = {Tianhao Wang and Ninghui Li and Somesh Jha}, title = {Locally Differentially Private Heavy Hitter Identification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {982--993}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2927695}, doi = {10.1109/TDSC.2019.2927695}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0001LJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/IrshadCGYLPJKXZ21, author = {Hassaan Irshad and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran and Kyu Hyung Lee and Jignesh M. Patel and Somesh Jha and Yonghwi Kwon and Dongyan Xu and Xiangyu Zhang}, title = {{TRACE:} Enterprise-Wide Provenance Tracking for Real-Time {APT} Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4363--4376}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3098977}, doi = {10.1109/TIFS.2021.3098977}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/IrshadCGYLPJKXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/Jha21, author = {Somesh Jha}, editor = {Jiannong Cao and Man Ho Au and Zhiqiang Lin and Moti Yung}, title = {Trustworthy Machine Learning: Past, Present, and Future}, booktitle = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021}, pages = {1}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3433210.3460015}, doi = {10.1145/3433210.3460015}, timestamp = {Wed, 09 Jun 2021 15:14:39 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/Jha21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001C0SC0LJ21, author = {Tianhao Wang and Joann Qiongna Chen and Zhikun Zhang and Dong Su and Yueqiang Cheng and Zhou Li and Ninghui Li and Somesh Jha}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Continuous Release of Data Streams under both Centralized and Local Differential Privacy}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1237--1253}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484750}, doi = {10.1145/3460120.3484750}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001C0SC0LJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GarciaCCABJ21, author = {Washington Garcia and Animesh Chhotaray and Joseph I. Choi and Suman Kalyan Adari and Kevin R. B. Butler and Somesh Jha}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Brittle Features of Device Authentication}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {53--64}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3447842}, doi = {10.1145/3422337.3447842}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GarciaCCABJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/Choquette-ChooD21, author = {Christopher A. Choquette{-}Choo and Natalie Dullerud and Adam Dziedzic and Yunxiang Zhang and Somesh Jha and Nicolas Papernot and Xiao Wang}, title = {CaPC Learning: Confidential and Private Collaborative Learning}, booktitle = {9th International Conference on Learning Representations, {ICLR} 2021, Virtual Event, Austria, May 3-7, 2021}, publisher = {OpenReview.net}, year = {2021}, url = {https://openreview.net/forum?id=h2EbJ4\_wMVq}, timestamp = {Sat, 04 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iclr/Choquette-ChooD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/BhattacharjeeJC21, author = {Robi Bhattacharjee and Somesh Jha and Kamalika Chaudhuri}, editor = {Marina Meila and Tong Zhang}, title = {Sample Complexity of Robust Linear Classification on Separated Data}, booktitle = {Proceedings of the 38th International Conference on Machine Learning, {ICML} 2021, 18-24 July 2021, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {139}, pages = {884--893}, publisher = {{PMLR}}, year = {2021}, url = {http://proceedings.mlr.press/v139/bhattacharjee21a.html}, timestamp = {Wed, 25 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/BhattacharjeeJC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/RaghuramCJB21, author = {Jayaram Raghuram and Varun Chandrasekaran and Somesh Jha and Suman Banerjee}, editor = {Marina Meila and Tong Zhang}, title = {A General Framework For Detecting Anomalous Inputs to {DNN} Classifiers}, booktitle = {Proceedings of the 38th International Conference on Machine Learning, {ICML} 2021, 18-24 July 2021, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {139}, pages = {8764--8775}, publisher = {{PMLR}}, year = {2021}, url = {http://proceedings.mlr.press/v139/raghuram21a.html}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icml/RaghuramCJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/DengGJMMT21, author = {Samuel Deng and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Abhradeep Guha Thakurta}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {10862--10875}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/5a499f6e26313e19bd4049009bbed5bd-Abstract.html}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/DengGJMMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/ChenLAWLJ21, author = {Jiefeng Chen and Frederick Liu and Besim Avci and Xi Wu and Yingyu Liang and Somesh Jha}, editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan}, title = {Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training Ensembles}, booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual}, pages = {14980--14992}, year = {2021}, url = {https://proceedings.neurips.cc/paper/2021/hash/7dd3ed2e12d7967b656d156d50308263-Abstract.html}, timestamp = {Tue, 03 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nips/ChenLAWLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/ChenLWLJ21, author = {Jiefeng Chen and Yixuan Li and Xi Wu and Yingyu Liang and Somesh Jha}, editor = {Nuria Oliver and Fernando P{\'{e}}rez{-}Cruz and Stefan Kramer and Jesse Read and Jos{\'{e}} Antonio Lozano}, title = {{ATOM:} Robustifying Out-of-Distribution Detection Using Outlier Mining}, booktitle = {Machine Learning and Knowledge Discovery in Databases. Research Track - European Conference, {ECML} {PKDD} 2021, Bilbao, Spain, September 13-17, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12977}, pages = {430--445}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86523-8\_26}, doi = {10.1007/978-3-030-86523-8\_26}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkdd/ChenLWLJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CarliniDGJMMTT21, author = {Nicholas Carlini and Samuel Deng and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Abhradeep Thakurta and Florian Tram{\`{e}}r}, title = {Is Private Learning Possible with Instance Encoding?}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {410--427}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00099}, doi = {10.1109/SP40001.2021.00099}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/CarliniDGJMMTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-05188, author = {Christopher A. Choquette{-}Choo and Natalie Dullerud and Adam Dziedzic and Yunxiang Zhang and Somesh Jha and Nicolas Papernot and Xiao Wang}, title = {CaPC Learning: Confidential and Private Collaborative Learning}, journal = {CoRR}, volume = {abs/2102.05188}, year = {2021}, url = {https://arxiv.org/abs/2102.05188}, eprinttype = {arXiv}, eprint = {2102.05188}, timestamp = {Sat, 04 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-05188.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-07265, author = {Thomas Kobber Panum and Zi Wang and Pengyu Kan and Earlence Fernandes and Somesh Jha}, title = {Exploring Adversarial Robustness of Deep Metric Learning}, journal = {CoRR}, volume = {abs/2102.07265}, year = {2021}, url = {https://arxiv.org/abs/2102.07265}, eprinttype = {arXiv}, eprint = {2102.07265}, timestamp = {Thu, 18 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-07265.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-03325, author = {Washington Garcia and Pin{-}Yu Chen and Somesh Jha and Scott Clouse and Kevin R. B. Butler}, title = {Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples}, journal = {CoRR}, volume = {abs/2103.03325}, year = {2021}, url = {https://arxiv.org/abs/2103.03325}, eprinttype = {arXiv}, eprint = {2103.03325}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-03325.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-13144, author = {Varun Chandrasekaran and Darren Edge and Somesh Jha and Amit Sharma and Cheng Zhang and Shruti Tople}, title = {Causally Constrained Data Synthesis for Private Data Release}, journal = {CoRR}, volume = {abs/2105.13144}, year = {2021}, url = {https://arxiv.org/abs/2105.13144}, eprinttype = {arXiv}, eprint = {2105.13144}, timestamp = {Tue, 03 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-13144.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-06603, author = {Casey Meehan and Amrita Roy Chowdhury and Kamalika Chaudhuri and Somesh Jha}, title = {A Shuffling Framework for Local Differential Privacy}, journal = {CoRR}, volume = {abs/2106.06603}, year = {2021}, url = {https://arxiv.org/abs/2106.06603}, eprinttype = {arXiv}, eprint = {2106.06603}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-06603.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-08387, author = {Jiefeng Chen and Yang Guo and Xi Wu and Tianqi Li and Qicheng Lao and Yingyu Liang and Somesh Jha}, title = {Towards Adversarial Robustness via Transductive Learning}, journal = {CoRR}, volume = {abs/2106.08387}, year = {2021}, url = {https://arxiv.org/abs/2106.08387}, eprinttype = {arXiv}, eprint = {2106.08387}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-08387.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-15728, author = {Jiefeng Chen and Frederick Liu and Besim Avci and Xi Wu and Yingyu Liang and Somesh Jha}, title = {Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training Ensembles}, journal = {CoRR}, volume = {abs/2106.15728}, year = {2021}, url = {https://arxiv.org/abs/2106.15728}, eprinttype = {arXiv}, eprint = {2106.15728}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-15728.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-00874, author = {Jayaram Raghuram and Yijing Zeng and Dolores Garc{\'{\i}}a Mart{\'{\i}} and Somesh Jha and Suman Banerjee and Joerg Widmer and Rafael Ruiz Ortiz}, title = {Domain Adaptation for Autoencoder-Based End-to-End Communication Over Wireless Channels}, journal = {CoRR}, volume = {abs/2108.00874}, year = {2021}, url = {https://arxiv.org/abs/2108.00874}, eprinttype = {arXiv}, eprint = {2108.00874}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-00874.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-02707, author = {Harrison Rosenberg and Brian Tang and Kassem Fawaz and Somesh Jha}, title = {Fairness Properties of Face Recognition and Obfuscation Systems}, journal = {CoRR}, volume = {abs/2108.02707}, year = {2021}, url = {https://arxiv.org/abs/2108.02707}, eprinttype = {arXiv}, eprint = {2108.02707}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-02707.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-07256, author = {Nicholas Carlini and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Florian Tram{\`{e}}r}, title = {NeuraCrypt is not private}, journal = {CoRR}, volume = {abs/2108.07256}, year = {2021}, url = {https://arxiv.org/abs/2108.07256}, eprinttype = {arXiv}, eprint = {2108.07256}, timestamp = {Fri, 20 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-07256.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-02775, author = {Mohannad Alhanahnah and Rithik Jain and Vaibhav Rastogi and Somesh Jha and Thomas W. Reps}, title = {Lightweight, Multi-Stage, Compiler-Assisted Application Specialization}, journal = {CoRR}, volume = {abs/2109.02775}, year = {2021}, url = {https://arxiv.org/abs/2109.02775}, eprinttype = {arXiv}, eprint = {2109.02775}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-02775.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-14735, author = {Jiefeng Chen and Xi Wu and Yang Guo and Yingyu Liang and Somesh Jha}, title = {Towards Evaluating the Robustness of Neural Networks Learned by Transduction}, journal = {CoRR}, volume = {abs/2110.14735}, year = {2021}, url = {https://arxiv.org/abs/2110.14735}, eprinttype = {arXiv}, eprint = {2110.14735}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-14735.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-12727, author = {Amrita Roy Chowdhury and Chuan Guo and Somesh Jha and Laurens van der Maaten}, title = {EIFFeL: Ensuring Integrity for Federated Learning}, journal = {CoRR}, volume = {abs/2112.12727}, year = {2021}, url = {https://arxiv.org/abs/2112.12727}, eprinttype = {arXiv}, eprint = {2112.12727}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-12727.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dt/SeshiaJD20, author = {Sanjit A. Seshia and Somesh Jha and Tommaso Dreossi}, title = {Semantic Adversarial Deep Learning}, journal = {{IEEE} Des. Test}, volume = {37}, number = {2}, pages = {8--18}, year = {2020}, url = {https://doi.org/10.1109/MDAT.2020.2968274}, doi = {10.1109/MDAT.2020.2968274}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dt/SeshiaJD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/YeomGMFJ20, author = {Samuel Yeom and Irene Giacomelli and Alan Menaged and Matt Fredrikson and Somesh Jha}, title = {Overfitting, robustness, and malicious algorithms: {A} study of potential causes of privacy risk in machine learning}, journal = {J. Comput. Secur.}, volume = {28}, number = {1}, pages = {35--70}, year = {2020}, url = {https://doi.org/10.3233/JCS-191362}, doi = {10.3233/JCS-191362}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/YeomGMFJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/WangXDZHHLJ20, author = {Tianhao Wang and Min Xu and Bolin Ding and Jingren Zhou and Cheng Hong and Zhicong Huang and Ninghui Li and Somesh Jha}, title = {Improving Utility and Security of the Shuffler-based Differential Privacy}, journal = {Proc. {VLDB} Endow.}, volume = {13}, number = {13}, pages = {3545--3558}, year = {2020}, url = {http://www.vldb.org/pvldb/vol13/p3545-wang.pdf}, doi = {10.14778/3424573.3424576}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pvldb/WangXDZHHLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/alt/GargJMM20, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody}, editor = {Aryeh Kontorovich and Gergely Neu}, title = {Adversarially Robust Learning Could Leverage Computational Hardness}, booktitle = {Algorithmic Learning Theory, {ALT} 2020, 8-11 February 2020, San Diego, CA, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {117}, pages = {364--385}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v117/garg20a.html}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/alt/GargJMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclr/JangJJ20, author = {Uyeong Jang and Susmit Jha and Somesh Jha}, title = {On the Need for Topology-Aware Generative Models for Manifold-Based Defenses}, booktitle = {8th International Conference on Learning Representations, {ICLR} 2020, Addis Ababa, Ethiopia, April 26-30, 2020}, publisher = {OpenReview.net}, year = {2020}, url = {https://openreview.net/forum?id=r1lF\_CEYwS}, timestamp = {Thu, 07 May 2020 17:11:47 +0200}, biburl = {https://dblp.org/rec/conf/iclr/JangJJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/ChalasaniC00J20, author = {Prasad Chalasani and Jiefeng Chen and Amrita Roy Chowdhury and Xi Wu and Somesh Jha}, title = {Concise Explanations of Neural Networks using Adversarial Training}, booktitle = {Proceedings of the 37th International Conference on Machine Learning, {ICML} 2020, 13-18 July 2020, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {119}, pages = {1383--1391}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v119/chalasani20a.html}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/ChalasaniC00J20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/0001RJ20, author = {Amrita Roy Chowdhury and Theodoros Rekatsinas and Somesh Jha}, title = {Data-Dependent Differentially Private Parameter Learning for Directed Graphical Models}, booktitle = {Proceedings of the 37th International Conference on Machine Learning, {ICML} 2020, 13-18 July 2020, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {119}, pages = {1939--1951}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v119/chowdhury20a.html}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/0001RJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/0058PJCP20, author = {Wei Zhang and Thomas Kobber Panum and Somesh Jha and Prasad Chalasani and David Page}, title = {{CAUSE:} Learning Granger Causality from Event Sequences using Attribution Methods}, booktitle = {Proceedings of the 37th International Conference on Machine Learning, {ICML} 2020, 13-18 July 2020, Virtual Event}, series = {Proceedings of Machine Learning Research}, volume = {119}, pages = {11235--11245}, publisher = {{PMLR}}, year = {2020}, url = {http://proceedings.mlr.press/v119/zhang20v.html}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/0058PJCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/ChowdhuryW0MJ20, author = {Amrita Roy Chowdhury and Chenghong Wang and Xi He and Ashwin Machanavajjhala and Somesh Jha}, editor = {David Maier and Rachel Pottinger and AnHai Doan and Wang{-}Chiew Tan and Abdussalam Alawini and Hung Q. Ngo}, title = {Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers}, booktitle = {Proceedings of the 2020 International Conference on Management of Data, {SIGMOD} Conference 2020, online conference [Portland, OR, USA], June 14-19, 2020}, pages = {603--619}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3318464.3380596}, doi = {10.1145/3318464.3380596}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/ChowdhuryW0MJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Xiong0LJ20, author = {Aiping Xiong and Tianhao Wang and Ninghui Li and Somesh Jha}, title = {Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {392--410}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00088}, doi = {10.1109/SP40000.2020.00088}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/Xiong0LJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SunFLJ20, author = {Zhichuang Sun and Bo Feng and Long Lu and Somesh Jha}, title = {{OAT:} Attesting Operation Integrity of Embedded Devices}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1433--1449}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00042}, doi = {10.1109/SP40000.2020.00042}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/SunFLJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChandrasekaranC20, author = {Varun Chandrasekaran and Kamalika Chaudhuri and Irene Giacomelli and Somesh Jha and Songbai Yan}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Exploring Connections Between Active Learning and Model Extraction}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1309--1326}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/chandrasekaran}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChandrasekaranC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-03043, author = {Goutham Ramakrishnan and Jordan Henkel and Zi Wang and Aws Albarghouthi and Somesh Jha and Thomas W. Reps}, title = {Semantic Robustness of Models of Source Code}, journal = {CoRR}, volume = {abs/2002.03043}, year = {2020}, url = {https://arxiv.org/abs/2002.03043}, eprinttype = {arXiv}, eprint = {2002.03043}, timestamp = {Wed, 12 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-03043.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-07088, author = {Ryan Feng and Jiefeng Chen and Nelson R. Manohar and Earlence Fernandes and Somesh Jha and Atul Prakash}, title = {Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification}, journal = {CoRR}, volume = {abs/2002.07088}, year = {2020}, url = {https://arxiv.org/abs/2002.07088}, eprinttype = {arXiv}, eprint = {2002.07088}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-07088.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-07906, author = {Wei Zhang and Thomas Kobber Panum and Somesh Jha and Prasad Chalasani and David Page}, title = {{CAUSE:} Learning Granger Causality from Event Sequences using Attribution Methods}, journal = {CoRR}, volume = {abs/2002.07906}, year = {2020}, url = {https://arxiv.org/abs/2002.07906}, eprinttype = {arXiv}, eprint = {2002.07906}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-07906.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-01595, author = {Yue Gao and Harrison Rosenberg and Kassem Fawaz and Somesh Jha and Justin Hsu}, title = {Analyzing Accuracy Loss in Randomized Smoothing Defenses}, journal = {CoRR}, volume = {abs/2003.01595}, year = {2020}, url = {https://arxiv.org/abs/2003.01595}, eprinttype = {arXiv}, eprint = {2003.01595}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-01595.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-08861, author = {Chuhan Gao and Varun Chandrasekaran and Kassem Fawaz and Somesh Jha}, title = {Face-Off: Adversarial Face Obfuscation}, journal = {CoRR}, volume = {abs/2003.08861}, year = {2020}, url = {https://arxiv.org/abs/2003.08861}, eprinttype = {arXiv}, eprint = {2003.08861}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-08861.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-09711, author = {Jiefeng Chen and Yixuan Li and Xi Wu and Yingyu Liang and Somesh Jha}, title = {Robust Out-of-distribution Detection in Neural Networks}, journal = {CoRR}, volume = {abs/2003.09711}, year = {2020}, url = {https://arxiv.org/abs/2003.09711}, eprinttype = {arXiv}, eprint = {2003.09711}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-09711.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-12020, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Abhradeep Thakurta}, title = {Obliviousness Makes Poisoning Adversaries Weaker}, journal = {CoRR}, volume = {abs/2003.12020}, year = {2020}, url = {https://arxiv.org/abs/2003.12020}, eprinttype = {arXiv}, eprint = {2003.12020}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-12020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-13922, author = {Aiping Xiong and Tianhao Wang and Ninghui Li and Somesh Jha}, title = {Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension}, journal = {CoRR}, volume = {abs/2003.13922}, year = {2020}, url = {https://arxiv.org/abs/2003.13922}, eprinttype = {arXiv}, eprint = {2003.13922}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-13922.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-10390, author = {Xi Wu and Yang Guo and Jiefeng Chen and Yingyu Liang and Somesh Jha and Prasad Chalasani}, title = {Representation Bayesian Risk Decompositions and Multi-Source Domain Adaptation}, journal = {CoRR}, volume = {abs/2004.10390}, year = {2020}, url = {https://arxiv.org/abs/2004.10390}, eprinttype = {arXiv}, eprint = {2004.10390}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-10390.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-11753, author = {Tianhao Wang and Joann Qiongna Chen and Zhikun Zhang and Dong Su and Yueqiang Cheng and Zhou Li and Ninghui Li and Somesh Jha}, title = {Continuous Release of Data Streams under both Centralized and Local Differential Privacy}, journal = {CoRR}, volume = {abs/2005.11753}, year = {2020}, url = {https://arxiv.org/abs/2005.11753}, eprinttype = {arXiv}, eprint = {2005.11753}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-11753.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-15207, author = {Jiefeng Chen and Yixuan Li and Xi Wu and Yingyu Liang and Somesh Jha}, title = {Robust Out-of-distribution Detection via Informative Outlier Mining}, journal = {CoRR}, volume = {abs/2006.15207}, year = {2020}, url = {https://arxiv.org/abs/2006.15207}, eprinttype = {arXiv}, eprint = {2006.15207}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-15207.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-00772, author = {Yizhen Wang and Xiaozhu Meng and Mihai Christodorescu and Somesh Jha}, title = {Robust Learning against Logical Adversaries}, journal = {CoRR}, volume = {abs/2007.00772}, year = {2020}, url = {https://arxiv.org/abs/2007.00772}, eprinttype = {arXiv}, eprint = {2007.00772}, timestamp = {Mon, 06 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-00772.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-06093, author = {Zi Wang and Aws Albarghouthi and Somesh Jha}, title = {Abstract Universal Approximation for Neural Networks}, journal = {CoRR}, volume = {abs/2007.06093}, year = {2020}, url = {https://arxiv.org/abs/2007.06093}, eprinttype = {arXiv}, eprint = {2007.06093}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-06093.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-15147, author = {Jayaram Raghuram and Varun Chandrasekaran and Somesh Jha and Suman Banerjee}, title = {Detecting Anomalous Inputs to {DNN} Classifiers By Joint Statistical Testing at the Layers}, journal = {CoRR}, volume = {abs/2007.15147}, year = {2020}, url = {https://arxiv.org/abs/2007.15147}, eprinttype = {arXiv}, eprint = {2007.15147}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-15147.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-05679, author = {Amrita Roy Chowdhury and Bolin Ding and Somesh Jha and Weiran Liu and Jingren Zhou}, title = {Intertwining Order Preserving Encryption and Differential Privacy}, journal = {CoRR}, volume = {abs/2009.05679}, year = {2020}, url = {https://arxiv.org/abs/2009.05679}, eprinttype = {arXiv}, eprint = {2009.05679}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-05679.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-05315, author = {Nicholas Carlini and Samuel Deng and Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody and Shuang Song and Abhradeep Thakurta and Florian Tram{\`{e}}r}, title = {An Attack on InstaHide: Is Private Learning Possible with Instance Encoding?}, journal = {CoRR}, volume = {abs/2011.05315}, year = {2020}, url = {https://arxiv.org/abs/2011.05315}, eprinttype = {arXiv}, eprint = {2011.05315}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-05315.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-05905, author = {Zhichuang Sun and Ruimin Sun and Long Lu and Somesh Jha}, title = {ShadowNet: {A} Secure and Efficient System for On-device Model Inference}, journal = {CoRR}, volume = {abs/2011.05905}, year = {2020}, url = {https://arxiv.org/abs/2011.05905}, eprinttype = {arXiv}, eprint = {2011.05905}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-05905.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-10794, author = {Robi Bhattacharjee and Somesh Jha and Kamalika Chaudhuri}, title = {Sample Complexity of Adversarially Robust Linear Classification on Separated Data}, journal = {CoRR}, volume = {abs/2012.10794}, year = {2020}, url = {https://arxiv.org/abs/2012.10794}, eprinttype = {arXiv}, eprint = {2012.10794}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-10794.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/Chen0RLJ19, author = {Jiefeng Chen and Xi Wu and Vaibhav Rastogi and Yingyu Liang and Somesh Jha}, title = {Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {480--495}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00042}, doi = {10.1109/EUROSP.2019.00042}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/Chen0RLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/JhaRFJJJVS19, author = {Susmit Jha and Sunny Raj and Steven Lawrence Fernandes and Sumit Kumar Jha and Somesh Jha and Brian Jalaian and Gunjan Verma and Ananthram Swami}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {Attribution-Based Confidence Metric For Deep Neural Networks}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {11826--11837}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/bc1ad6e8f86c42a371aff945535baebb-Abstract.html}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/JhaRFJJJVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/Chen0RLJ19, author = {Jiefeng Chen and Xi Wu and Vaibhav Rastogi and Yingyu Liang and Somesh Jha}, editor = {Hanna M. Wallach and Hugo Larochelle and Alina Beygelzimer and Florence d'Alch{\'{e}}{-}Buc and Emily B. Fox and Roman Garnett}, title = {Robust Attribution Regularization}, booktitle = {Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, NeurIPS 2019, December 8-14, 2019, Vancouver, BC, Canada}, pages = {14300--14310}, year = {2019}, url = {https://proceedings.neurips.cc/paper/2019/hash/172ef5a94b4dd0aa120c6878fc29f70c-Abstract.html}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/Chen0RLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/WangDZHHLJ19, author = {Tianhao Wang and Bolin Ding and Jingren Zhou and Cheng Hong and Zhicong Huang and Ninghui Li and Somesh Jha}, editor = {Peter A. Boncz and Stefan Manegold and Anastasia Ailamaki and Amol Deshpande and Tim Kraska}, title = {Answering Multi-Dimensional Analytical Queries under Local Differential Privacy}, booktitle = {Proceedings of the 2019 International Conference on Management of Data, {SIGMOD} Conference 2019, Amsterdam, The Netherlands, June 30 - July 5, 2019}, pages = {159--176}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3299869.3319891}, doi = {10.1145/3299869.3319891}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/WangDZHHLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-07756, author = {Amrita Roy Chowdhury and Chenghong Wang and Xi He and Ashwin Machanavajjhala and Somesh Jha}, title = {Outis: Crypto-Assisted Differential Privacy on Untrusted Servers}, journal = {CoRR}, volume = {abs/1902.07756}, year = {2019}, url = {http://arxiv.org/abs/1902.07756}, eprinttype = {arXiv}, eprint = {1902.07756}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-07756.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1903-05821, author = {Susmit Jha and Sunny Raj and Steven Lawrence Fernandes and Sumit Kumar Jha and Somesh Jha and Gunjan Verma and Brian Jalaian and Ananthram Swami}, title = {Attribution-driven Causal Analysis for Detection of Adversarial Examples}, journal = {CoRR}, volume = {abs/1903.05821}, year = {2019}, url = {http://arxiv.org/abs/1903.05821}, eprinttype = {arXiv}, eprint = {1903.05821}, timestamp = {Sun, 31 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1903-05821.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-09957, author = {Jiefeng Chen and Xi Wu and Vaibhav Rastogi and Yingyu Liang and Somesh Jha}, title = {Robust Attribution Regularization}, journal = {CoRR}, volume = {abs/1905.09957}, year = {2019}, url = {http://arxiv.org/abs/1905.09957}, eprinttype = {arXiv}, eprint = {1905.09957}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-09957.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-10900, author = {Varun Chandrasekaran and Brian Tang and Varsha Pendyala and Kassem Fawaz and Somesh Jha and Xi Wu}, title = {Enhancing {ML} Robustness Using Physical-World Constraints}, journal = {CoRR}, volume = {abs/1905.10900}, year = {2019}, url = {http://arxiv.org/abs/1905.10900}, eprinttype = {arXiv}, eprint = {1905.10900}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-10900.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-11564, author = {Sanjam Garg and Somesh Jha and Saeed Mahloujifar and Mohammad Mahmoody}, title = {Adversarially Robust Learning Could Leverage Computational Hardness}, journal = {CoRR}, volume = {abs/1905.11564}, year = {2019}, url = {http://arxiv.org/abs/1905.11564}, eprinttype = {arXiv}, eprint = {1905.11564}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-11564.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-12813, author = {Amrita Roy Chowdhury and Theodoros Rekatsinas and Somesh Jha}, title = {Data-Dependent Differentially Private Parameter Learning for Directed Graphical Models}, journal = {CoRR}, volume = {abs/1905.12813}, year = {2019}, url = {http://arxiv.org/abs/1905.12813}, eprinttype = {arXiv}, eprint = {1905.12813}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-12813.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-11515, author = {Tianhao Wang and Min Xu and Bolin Ding and Jingren Zhou and Ninghui Li and Somesh Jha}, title = {Practical and Robust Privacy Amplification with Multi-Party Differential Privacy}, journal = {CoRR}, volume = {abs/1908.11515}, year = {2019}, url = {http://arxiv.org/abs/1908.11515}, eprinttype = {arXiv}, eprint = {1908.11515}, timestamp = {Wed, 04 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-11515.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-03334, author = {Uyeong Jang and Susmit Jha and Somesh Jha}, title = {On Need for Topology Awareness of Generative Models}, journal = {CoRR}, volume = {abs/1909.03334}, year = {2019}, url = {http://arxiv.org/abs/1909.03334}, eprinttype = {arXiv}, eprint = {1909.03334}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-03334.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-00727, author = {Lakshya Jain and Wilson Wu and Steven Chen and Uyeong Jang and Varun Chandrasekaran and Sanjit A. Seshia and Somesh Jha}, title = {Generating Semantic Adversarial Examples with Differentiable Rendering}, journal = {CoRR}, volume = {abs/1910.00727}, year = {2019}, url = {http://arxiv.org/abs/1910.00727}, eprinttype = {arXiv}, eprint = {1910.00727}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-00727.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HaqCCJ18, author = {Irfan Ul Haq and Sergio Chica and Juan Caballero and Somesh Jha}, title = {Malware lineage in the wild}, journal = {Comput. Secur.}, volume = {78}, pages = {347--363}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.012}, doi = {10.1016/J.COSE.2018.07.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HaqCCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GiacomelliJJPY18, author = {Irene Giacomelli and Somesh Jha and Marc Joye and C. David Page and Kyonghwan Yoon}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {243--261}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_13}, doi = {10.1007/978-3-319-93387-0\_13}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/GiacomelliJJPY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/DreossiJS18, author = {Tommaso Dreossi and Somesh Jha and Sanjit A. Seshia}, editor = {Hana Chockler and Georg Weissenbacher}, title = {Semantic Adversarial Deep Learning}, booktitle = {Computer Aided Verification - 30th International Conference, {CAV} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10981}, pages = {3--26}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96145-3\_1}, doi = {10.1007/978-3-319-96145-3\_1}, timestamp = {Fri, 09 Apr 2021 18:35:27 +0200}, biburl = {https://dblp.org/rec/conf/cav/DreossiJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/YeomGFJ18, author = {Samuel Yeom and Irene Giacomelli and Matt Fredrikson and Somesh Jha}, title = {Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting}, booktitle = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford, United Kingdom, July 9-12, 2018}, pages = {268--282}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CSF.2018.00027}, doi = {10.1109/CSF.2018.00027}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/YeomGFJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/WangJC18, author = {Yizhen Wang and Somesh Jha and Kamalika Chaudhuri}, editor = {Jennifer G. Dy and Andreas Krause}, title = {Analyzing the Robustness of Nearest Neighbors to Adversarial Examples}, booktitle = {Proceedings of the 35th International Conference on Machine Learning, {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July 10-15, 2018}, series = {Proceedings of Machine Learning Research}, volume = {80}, pages = {5120--5129}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v80/wang18c.html}, timestamp = {Wed, 03 Apr 2019 18:17:30 +0200}, biburl = {https://dblp.org/rec/conf/icml/WangJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/0001JCCJ18, author = {Xi Wu and Uyeong Jang and Jiefeng Chen and Lingjiao Chen and Somesh Jha}, editor = {Jennifer G. Dy and Andreas Krause}, title = {Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training}, booktitle = {Proceedings of the 35th International Conference on Machine Learning, {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July 10-15, 2018}, series = {Proceedings of Machine Learning Research}, volume = {80}, pages = {5330--5338}, publisher = {{PMLR}}, year = {2018}, url = {http://proceedings.mlr.press/v80/wu18e.html}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icml/0001JCCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isola/MillerCJ18, author = {Andrew Miller and Zhicheng Cai and Somesh Jha}, editor = {Tiziana Margaria and Bernhard Steffen}, title = {Smart Contracts and Opportunities for Formal Methods}, booktitle = {Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice - 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11247}, pages = {280--299}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03427-6\_22}, doi = {10.1007/978-3-030-03427-6\_22}, timestamp = {Mon, 08 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isola/MillerCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/JhaJJJ18, author = {Susmit Jha and Uyeong Jang and Somesh Jha and Brian Jalaian}, title = {Detecting Adversarial Examples Using Data Manifolds}, booktitle = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los Angeles, CA, USA, October 29-31, 2018}, pages = {547--552}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MILCOM.2018.8599691}, doi = {10.1109/MILCOM.2018.8599691}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/JhaJJJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Kwon0WLLM0XJCGY18, author = {Yonghwi Kwon and Fei Wang and Weihang Wang and Kyu Hyung Lee and Wen{-}Chuan Lee and Shiqing Ma and Xiangyu Zhang and Dongyan Xu and Somesh Jha and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran}, title = {{MCI} : Modeling-based Causality Inference in Audit Logging for Attack Investigation}, booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} 2018, San Diego, California, USA, February 18-21, 2018}, publisher = {The Internet Society}, year = {2018}, url = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07B-2\_Kwon\_paper.pdf}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Kwon0WLLM0XJCGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/CormodeJKLSW18, author = {Graham Cormode and Somesh Jha and Tejas Kulkarni and Ninghui Li and Divesh Srivastava and Tianhao Wang}, editor = {Gautam Das and Christopher M. Jermaine and Philip A. Bernstein}, title = {Privacy at Scale: Local Differential Privacy in Practice}, booktitle = {Proceedings of the 2018 International Conference on Management of Data, {SIGMOD} Conference 2018, Houston, TX, USA, June 10-15, 2018}, pages = {1655--1658}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3183713.3197390}, doi = {10.1145/3183713.3197390}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/CormodeJKLSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ZhaoARJO18, author = {Jinman Zhao and Aws Albarghouthi and Vaibhav Rastogi and Somesh Jha and Damien Octeau}, editor = {Gary T. Leavens and Alessandro Garcia and Corina S. Pasareanu}, title = {Neural-augmented static analysis of Android communication}, booktitle = {Proceedings of the 2018 {ACM} Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/SIGSOFT} {FSE} 2018, Lake Buena Vista, FL, USA, November 04-09, 2018}, pages = {342--353}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3236024.3236066}, doi = {10.1145/3236024.3236066}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/ZhaoARJO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangLJ18, author = {Tianhao Wang and Ninghui Li and Somesh Jha}, title = {Locally Differentially Private Frequent Itemset Mining}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {127--143}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00035}, doi = {10.1109/SP.2018.00035}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WangLJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/MaZKL0CGYXJ18, author = {Shiqing Ma and Juan Zhai and Yonghwi Kwon and Kyu Hyung Lee and Xiangyu Zhang and Gabriela F. Ciocarlie and Ashish Gehani and Vinod Yegneswaran and Dongyan Xu and Somesh Jha}, editor = {Haryadi S. Gunawi and Benjamin C. Reed}, title = {Kernel-Supported Cost-Effective Audit Logging for Causality Tracking}, booktitle = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston, MA, USA, July 11-13, 2018}, pages = {241--254}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/atc18/presentation/ma-shiqing}, timestamp = {Sat, 25 Feb 2023 23:39:37 +0100}, biburl = {https://dblp.org/rec/conf/usenix/MaZKL0CGYXJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1802-03462, author = {Zhichuang Sun and Bo Feng and Long Lu and Somesh Jha}, title = {{OEI:} Operation Execution Integrity for Embedded Devices}, journal = {CoRR}, volume = {abs/1802.03462}, year = {2018}, url = {http://arxiv.org/abs/1802.03462}, eprinttype = {arXiv}, eprint = {1802.03462}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1802-03462.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-07045, author = {Tommaso Dreossi and Somesh Jha and Sanjit A. Seshia}, title = {Semantic Adversarial Deep Learning}, journal = {CoRR}, volume = {abs/1804.07045}, year = {2018}, url = {http://arxiv.org/abs/1804.07045}, eprinttype = {arXiv}, eprint = {1804.07045}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-07045.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-07816, author = {Jiefeng Chen and Xi Wu and Yingyu Liang and Somesh Jha}, title = {Improving Adversarial Robustness by Data-Specific Discretization}, journal = {CoRR}, volume = {abs/1805.07816}, year = {2018}, url = {http://arxiv.org/abs/1805.07816}, eprinttype = {arXiv}, eprint = {1805.07816}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-07816.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-04059, author = {Jinman Zhao and Aws Albarghouthi and Vaibhav Rastogi and Somesh Jha and Damien Octeau}, title = {Neural-Augmented Static Analysis of Android Communication}, journal = {CoRR}, volume = {abs/1809.04059}, year = {2018}, url = {http://arxiv.org/abs/1809.04059}, eprinttype = {arXiv}, eprint = {1809.04059}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-04059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-08316, author = {Xiaozhu Meng and Barton P. Miller and Somesh Jha}, title = {Adversarial Binaries for Authorship Identification}, journal = {CoRR}, volume = {abs/1809.08316}, year = {2018}, url = {http://arxiv.org/abs/1809.08316}, eprinttype = {arXiv}, eprint = {1809.08316}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-08316.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00024, author = {Washington Garcia and Joseph I. Choi and Suman Kalyan Adari and Somesh Jha and Kevin R. B. Butler}, title = {Explainable Black-Box Attacks Against Model-based Authentication}, journal = {CoRR}, volume = {abs/1810.00024}, year = {2018}, url = {http://arxiv.org/abs/1810.00024}, eprinttype = {arXiv}, eprint = {1810.00024}, timestamp = {Tue, 27 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-06583, author = {Prasad Chalasani and Jiefeng Chen and Amrita Roy Chowdhury and Somesh Jha and Xi Wu}, title = {Concise Explanations of Neural Networks using Adversarial Training}, journal = {CoRR}, volume = {abs/1810.06583}, year = {2018}, url = {http://arxiv.org/abs/1810.06583}, eprinttype = {arXiv}, eprint = {1810.06583}, timestamp = {Sun, 16 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-06583.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-02054, author = {Varun Chandrasekaran and Kamalika Chaudhuri and Irene Giacomelli and Somesh Jha and Songbai Yan}, title = {Model Extraction and Active Learning}, journal = {CoRR}, volume = {abs/1811.02054}, year = {2018}, url = {http://arxiv.org/abs/1811.02054}, eprinttype = {arXiv}, eprint = {1811.02054}, timestamp = {Thu, 22 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-02054.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-08695, author = {Irene Giacomelli and Somesh Jha and Ross Kleiman and David Page and Kyonghwan Yoon}, title = {Privacy-Preserving Collaborative Prediction using Random Forests}, journal = {CoRR}, volume = {abs/1811.08695}, year = {2018}, url = {http://arxiv.org/abs/1811.08695}, eprinttype = {arXiv}, eprint = {1811.08695}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-08695.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/HarrisJRS17, author = {William R. Harris and Somesh Jha and Thomas W. Reps and Sanjit A. Seshia}, title = {Program synthesis for interactive-security systems}, journal = {Formal Methods Syst. Des.}, volume = {51}, number = {2}, pages = {362--394}, year = {2017}, url = {https://doi.org/10.1007/s10703-017-0296-5}, doi = {10.1007/S10703-017-0296-5}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/HarrisJRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Jang0J17, author = {Uyeong Jang and Xi Wu and Somesh Jha}, title = {Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning}, booktitle = {Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017}, pages = {262--277}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3134600.3134635}, doi = {10.1145/3134600.3134635}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Jang0J17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RastogiNMJ17, author = {Vaibhav Rastogi and Chaitra Niddodi and Sibin Mohan and Somesh Jha}, editor = {Taesoo Kim and Cliff Wang and Dinghao Wu}, title = {New Directions for Container Debloating}, booktitle = {Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017}, pages = {51--56}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3141235.3141241}, doi = {10.1145/3141235.3141241}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RastogiNMJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PapernotMGJCS17, author = {Nicolas Papernot and Patrick D. McDaniel and Ian J. Goodfellow and Somesh Jha and Z. Berkay Celik and Ananthram Swami}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Practical Black-Box Attacks against Machine Learning}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {506--519}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053009}, doi = {10.1145/3052973.3053009}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PapernotMGJCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DavidsonCGLJ17, author = {Drew Davidson and Yaohui Chen and Franklin George and Long Lu and Somesh Jha}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {652--665}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3052998}, doi = {10.1145/3052973.3052998}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DavidsonCGLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CarliTMTJ17, author = {Lorenzo De Carli and Ruben Torres and Gaspar Modelo{-}Howard and Alok Tongaonkar and Somesh Jha}, title = {Botnet protocol inference in the presence of encrypted traffic}, booktitle = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017, Atlanta, GA, USA, May 1-4, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFOCOM.2017.8057064}, doi = {10.1109/INFOCOM.2017.8057064}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CarliTMTJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/CarliTMTJ17, author = {Lorenzo De Carli and Ruben Torres and Gaspar Modelo{-}Howard and Alok Tongaonkar and Somesh Jha}, title = {Kali: Scalable encryption fingerprinting in dynamic malware traces}, booktitle = {12th International Conference on Malicious and Unwanted Software, {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017}, pages = {3--10}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/MALWARE.2017.8323951}, doi = {10.1109/MALWARE.2017.8323951}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/CarliTMTJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/DavidsonRCJ17, author = {Drew Davidson and Vaibhav Rastogi and Mihai Christodorescu and Somesh Jha}, editor = {Xiaodong Lin and Ali A. Ghorbani and Kui Ren and Sencun Zhu and Aiqing Zhang}, title = {Enhancing Android Security Through App Splitting}, booktitle = {Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {238}, pages = {24--44}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78813-5\_2}, doi = {10.1007/978-3-319-78813-5\_2}, timestamp = {Wed, 22 Dec 2021 13:40:59 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/DavidsonRCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/0001LKCJN17, author = {Xi Wu and Fengan Li and Arun Kumar and Kamalika Chaudhuri and Somesh Jha and Jeffrey F. Naughton}, editor = {Semih Salihoglu and Wenchao Zhou and Rada Chirkova and Jun Yang and Dan Suciu}, title = {Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics}, booktitle = {Proceedings of the 2017 {ACM} International Conference on Management of Data, {SIGMOD} Conference 2017, Chicago, IL, USA, May 14-19, 2017}, pages = {1307--1322}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3035918.3064047}, doi = {10.1145/3035918.3064047}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/0001LKCJN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/RastogiDCJM17, author = {Vaibhav Rastogi and Drew Davidson and Lorenzo De Carli and Somesh Jha and Patrick D. McDaniel}, editor = {Eric Bodden and Wilhelm Sch{\"{a}}fer and Arie van Deursen and Andrea Zisman}, title = {Cimplifier: automatically debloating containers}, booktitle = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017}, pages = {476--486}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3106237.3106271}, doi = {10.1145/3106237.3106271}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/RastogiDCJM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/WangBLJ17, author = {Tianhao Wang and Jeremiah Blocki and Ninghui Li and Somesh Jha}, editor = {Engin Kirda and Thomas Ristenpart}, title = {Locally Differentially Private Protocols for Frequency Estimation}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {729--745}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/wang-tianhao}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/WangBLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SenZPJ17, author = {Rathijit Sen and Jianqiao Zhu and Jignesh M. Patel and Somesh Jha}, title = {{ROSA:} {R} Optimizations with Static Analysis}, journal = {CoRR}, volume = {abs/1704.02996}, year = {2017}, url = {http://arxiv.org/abs/1704.02996}, eprinttype = {arXiv}, eprint = {1704.02996}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SenZPJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangBLJ17, author = {Tianhao Wang and Jeremiah Blocki and Ninghui Li and Somesh Jha}, title = {Optimizing Locally Differentially Private Protocols}, journal = {CoRR}, volume = {abs/1705.04421}, year = {2017}, url = {http://arxiv.org/abs/1705.04421}, eprinttype = {arXiv}, eprint = {1705.04421}, timestamp = {Sat, 08 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/WangBLJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WangJC17, author = {Yizhen Wang and Somesh Jha and Kamalika Chaudhuri}, title = {Analyzing the Robustness of Nearest Neighbors to Adversarial Examples}, journal = {CoRR}, volume = {abs/1706.03922}, year = {2017}, url = {http://arxiv.org/abs/1706.03922}, eprinttype = {arXiv}, eprint = {1706.03922}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WangJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NadkarniEJS17, author = {Adwait Nadkarni and William Enck and Somesh Jha and Jessica Staddon}, title = {Policy by Example: An Approach for Security Policy Specification}, journal = {CoRR}, volume = {abs/1707.03967}, year = {2017}, url = {http://arxiv.org/abs/1707.03967}, eprinttype = {arXiv}, eprint = {1707.03967}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NadkarniEJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-06674, author = {Tianhao Wang and Ninghui Li and Somesh Jha}, title = {Locally Differentially Private Heavy Hitter Identification}, journal = {CoRR}, volume = {abs/1708.06674}, year = {2017}, url = {http://arxiv.org/abs/1708.06674}, eprinttype = {arXiv}, eprint = {1708.06674}, timestamp = {Sat, 08 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-06674.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-01604, author = {Samuel Yeom and Matt Fredrikson and Somesh Jha}, title = {The Unintended Consequences of Overfitting: Training Data Inference Attacks}, journal = {CoRR}, volume = {abs/1709.01604}, year = {2017}, url = {http://arxiv.org/abs/1709.01604}, eprinttype = {arXiv}, eprint = {1709.01604}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-01604.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-05202, author = {Irfan Ul Haq and Sergio Chica and Juan Caballero and Somesh Jha}, title = {Malware Lineage in the Wild}, journal = {CoRR}, volume = {abs/1710.05202}, year = {2017}, url = {http://arxiv.org/abs/1710.05202}, eprinttype = {arXiv}, eprint = {1710.05202}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-05202.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1711-08001, author = {Xi Wu and Uyeong Jang and Lingjiao Chen and Somesh Jha}, title = {Manifold Assumption and Defenses Against Adversarial Perturbations}, journal = {CoRR}, volume = {abs/1711.08001}, year = {2017}, url = {http://arxiv.org/abs/1711.08001}, eprinttype = {arXiv}, eprint = {1711.08001}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1711-08001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiacomelliJPY17, author = {Irene Giacomelli and Somesh Jha and C. David Page and Kyonghwan Yoon}, title = {Privacy-Preserving Ridge Regression on Distributed Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {707}, year = {2017}, url = {http://eprint.iacr.org/2017/707}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiacomelliJPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GiacomelliJJPY17, author = {Irene Giacomelli and Somesh Jha and Marc Joye and C. David Page and Kyonghwan Yoon}, title = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2017}, url = {http://eprint.iacr.org/2017/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GiacomelliJJPY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/OcteauLJM16, author = {Damien Octeau and Daniel Luchaup and Somesh Jha and Patrick D. McDaniel}, title = {Composite Constant Propagation and its Application to Android Program Analysis}, journal = {{IEEE} Trans. Software Eng.}, volume = {42}, number = {11}, pages = {999--1014}, year = {2016}, url = {https://doi.org/10.1109/TSE.2016.2550446}, doi = {10.1109/TSE.2016.2550446}, timestamp = {Thu, 27 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/OcteauLJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/0001FJN16, author = {Xi Wu and Matthew Fredrikson and Somesh Jha and Jeffrey F. Naughton}, title = {A Methodology for Formalizing Model-Inversion Attacks}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {355--370}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.32}, doi = {10.1109/CSF.2016.32}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/0001FJN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/PapernotMJFCS16, author = {Nicolas Papernot and Patrick D. McDaniel and Somesh Jha and Matt Fredrikson and Z. Berkay Celik and Ananthram Swami}, title = {The Limitations of Deep Learning in Adversarial Settings}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016}, pages = {372--387}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/EuroSP.2016.36}, doi = {10.1109/EUROSP.2016.36}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/PapernotMJFCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/OcteauJDMB0KT16, author = {Damien Octeau and Somesh Jha and Matthew L. Dering and Patrick D. McDaniel and Alexandre Bartel and Li Li and Jacques Klein and Yves Le Traon}, editor = {Rastislav Bod{\'{\i}}k and Rupak Majumdar}, title = {Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis}, booktitle = {Proceedings of the 43rd Annual {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, {POPL} 2016, St. Petersburg, FL, USA, January 20 - 22, 2016}, pages = {469--484}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2837614.2837661}, doi = {10.1145/2837614.2837661}, timestamp = {Fri, 16 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/OcteauJDMB0KT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PapernotM0JS16, author = {Nicolas Papernot and Patrick D. McDaniel and Xi Wu and Somesh Jha and Ananthram Swami}, title = {Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {582--597}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.41}, doi = {10.1109/SP.2016.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/PapernotM0JS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NadkarniAEJ16, author = {Adwait Nadkarni and Benjamin Andow and William Enck and Somesh Jha}, editor = {Thorsten Holz and Stefan Savage}, title = {Practical {DIFC} Enforcement on Android}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {1119--1136}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nadkarni}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/NadkarniAEJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PapernotMGJCS16, author = {Nicolas Papernot and Patrick D. McDaniel and Ian J. Goodfellow and Somesh Jha and Z. Berkay Celik and Ananthram Swami}, title = {Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples}, journal = {CoRR}, volume = {abs/1602.02697}, year = {2016}, url = {http://arxiv.org/abs/1602.02697}, eprinttype = {arXiv}, eprint = {1602.02697}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PapernotMGJCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/RastogiDCJM16, author = {Vaibhav Rastogi and Drew Davidson and Lorenzo De Carli and Somesh Jha and Patrick D. McDaniel}, title = {Towards Least Privilege Containers with Cimplifier}, journal = {CoRR}, volume = {abs/1602.08410}, year = {2016}, url = {http://arxiv.org/abs/1602.08410}, eprinttype = {arXiv}, eprint = {1602.08410}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/RastogiDCJM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0001KCJN16, author = {Xi Wu and Arun Kumar and Kamalika Chaudhuri and Somesh Jha and Jeffrey F. Naughton}, title = {Differentially Private Stochastic Gradient Descent for in-RDBMS Analytics}, journal = {CoRR}, volume = {abs/1606.04722}, year = {2016}, url = {http://arxiv.org/abs/1606.04722}, eprinttype = {arXiv}, eprint = {1606.04722}, timestamp = {Thu, 01 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/0001KCJN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FredriksonJR15, author = {Matt Fredrikson and Somesh Jha and Thomas Ristenpart}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1322--1333}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813677}, doi = {10.1145/2810103.2813677}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FredriksonJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/OcteauLDJM15, author = {Damien Octeau and Daniel Luchaup and Matthew L. Dering and Somesh Jha and Patrick D. McDaniel}, editor = {Antonia Bertolino and Gerardo Canfora and Sebastian G. Elbaum}, title = {Composite Constant Propagation: Application to Android Inter-Component Communication Analysis}, booktitle = {37th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1}, pages = {77--88}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSE.2015.30}, doi = {10.1109/ICSE.2015.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/OcteauLDJM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PapernotMWJS15, author = {Nicolas Papernot and Patrick D. McDaniel and Xi Wu and Somesh Jha and Ananthram Swami}, title = {Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks}, journal = {CoRR}, volume = {abs/1511.04508}, year = {2015}, url = {http://arxiv.org/abs/1511.04508}, eprinttype = {arXiv}, eprint = {1511.04508}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PapernotMWJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PapernotMJFCS15, author = {Nicolas Papernot and Patrick D. McDaniel and Somesh Jha and Matt Fredrikson and Z. Berkay Celik and Ananthram Swami}, title = {The Limitations of Deep Learning in Adversarial Settings}, journal = {CoRR}, volume = {abs/1511.07528}, year = {2015}, url = {http://arxiv.org/abs/1511.07528}, eprinttype = {arXiv}, eprint = {1511.07528}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PapernotMJFCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/0001FWJN15, author = {Xi Wu and Matthew Fredrikson and Wentao Wu and Somesh Jha and Jeffrey F. Naughton}, title = {Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences}, journal = {CoRR}, volume = {abs/1512.06388}, year = {2015}, url = {http://arxiv.org/abs/1512.06388}, eprinttype = {arXiv}, eprint = {1512.06388}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/0001FWJN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LuchaupSRJ14, author = {Daniel Luchaup and Thomas Shrimpton and Thomas Ristenpart and Somesh Jha}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Formatted Encryption Beyond Regular Languages}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1292--1303}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660351}, doi = {10.1145/2660267.2660351}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LuchaupSRJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CarliSJ14, author = {Lorenzo De Carli and Robin Sommer and Somesh Jha}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Beyond Pattern Matching: {A} Concurrency Model for Stateful Deep Packet Inspection}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1378--1390}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660361}, doi = {10.1145/2660267.2660361}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CarliSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/FredriksonJ14, author = {Matthew Fredrikson and Somesh Jha}, editor = {Thomas A. Henzinger and Dale Miller}, title = {Satisfiability modulo counting: a new approach for analyzing privacy properties}, booktitle = {Joint Meeting of the Twenty-Third {EACSL} Annual Conference on Computer Science Logic {(CSL)} and the Twenty-Ninth Annual {ACM/IEEE} Symposium on Logic in Computer Science (LICS), {CSL-LICS} '14, Vienna, Austria, July 14 - 18, 2014}, pages = {42:1--42:10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2603088.2603097}, doi = {10.1145/2603088.2603097}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csl/FredriksonJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/LuchaupCJB14, author = {Daniel Luchaup and Lorenzo De Carli and Somesh Jha and Eric Bach}, title = {Deep packet inspection with DFA-trees and parametrized language overapproximation}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {531--539}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6847977}, doi = {10.1109/INFOCOM.2014.6847977}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/LuchaupCJB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/JoinerRJDG14, author = {Richard Joiner and Thomas W. Reps and Somesh Jha and Mohan Dhawan and Vinod Ganapathy}, editor = {Shing{-}Chi Cheung and Alessandro Orso and Margaret{-}Anne D. Storey}, title = {Efficient runtime-enforcement techniques for policy weaving}, booktitle = {Proceedings of the 22nd {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16 - 22, 2014}, pages = {224--234}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2635868.2635907}, doi = {10.1145/2635868.2635907}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/JoinerRJDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FredriksonLJLPR14, author = {Matthew Fredrikson and Eric Lantz and Somesh Jha and Simon M. Lin and David Page and Thomas Ristenpart}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {17--32}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/fredrikson\_matthew}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/FredriksonLJLPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/LuchaupDJRS14, author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton}, editor = {Kevin Fu and Jaeyeon Jung}, title = {LibFTE: {A} Toolkit for Constructing Practical, Format-Abiding Encryption Schemes}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {877--891}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/luchaup}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/LuchaupDJRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FranzDHJKS13, author = {Martin Franz and Bj{\"{o}}rn Deiseroth and Kay Hamacher and Somesh Jha and Stefan Katzenbeisser and Heike Schr{\"{o}}der}, title = {Secure computations on non-integer values with applications to privacy-preserving sequence analysis}, journal = {Inf. Secur. Tech. Rep.}, volume = {17}, number = {3}, pages = {117--128}, year = {2013}, url = {https://doi.org/10.1016/j.istr.2012.10.001}, doi = {10.1016/J.ISTR.2012.10.001}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/FranzDHJKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/HarrisJLJ13, author = {William R. Harris and Guoliang Jin and Shan Lu and Somesh Jha}, editor = {Natasha Sharygina and Helmut Veith}, title = {Validating Library Usage Interactively}, booktitle = {Computer Aided Verification - 25th International Conference, {CAV} 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8044}, pages = {796--812}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39799-8\_56}, doi = {10.1007/978-3-642-39799-8\_56}, timestamp = {Wed, 07 Dec 2022 23:12:58 +0100}, biburl = {https://dblp.org/rec/conf/cav/HarrisJLJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/SagstetterLSWBHJPPC13, author = {Florian Sagstetter and Martin Lukasiewycz and Sebastian Steinhorst and Marko Wolf and Alexandre Bouard and William R. Harris and Somesh Jha and Thomas Peyrin and Axel Poschmann and Samarjit Chakraborty}, editor = {Enrico Macii}, title = {Security challenges in automotive hardware/software architecture design}, booktitle = {Design, Automation and Test in Europe, {DATE} 13, Grenoble, France, March 18-22, 2013}, pages = {458--463}, publisher = {{EDA} Consortium San Jose, CA, {USA} / {ACM} {DL}}, year = {2013}, url = {https://doi.org/10.7873/DATE.2013.102}, doi = {10.7873/DATE.2013.102}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/SagstetterLSWBHJPPC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmcad/JhaRH13, author = {Somesh Jha and Thomas W. Reps and William R. Harris}, title = {Secure programs via game-based synthesis}, booktitle = {Formal Methods in Computer-Aided Design, {FMCAD} 2013, Portland, OR, USA, October 20-23, 2013}, pages = {12--13}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/FMCAD.2013.7035519}, doi = {10.1109/FMCAD.2013.7035519}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/fmcad/JhaRH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/JhaFCSY13, author = {Somesh Jha and Matthew Fredrikson and Mihai Christodorescu and Reiner Sailer and Xifeng Yan}, title = {Synthesizing near-optimal malware specifications from suspicious behaviors}, booktitle = {8th International Conference on Malicious and Unwanted Software: "The Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013}, pages = {41--50}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MALWARE.2013.6703684}, doi = {10.1109/MALWARE.2013.6703684}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/malware/JhaFCSY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HarrisJRAW13, author = {William R. Harris and Somesh Jha and Thomas W. Reps and Jonathan Anderson and Robert N. M. Watson}, title = {Declarative, Temporal, and Practical Programming with Capabilities}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {18--32}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.11}, doi = {10.1109/SP.2013.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HarrisJRAW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DavidsonMRJ13, author = {Drew Davidson and Benjamin Moench and Thomas Ristenpart and Somesh Jha}, editor = {Samuel T. King}, title = {{FIE} on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {463--478}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/davidson}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/DavidsonMRJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/OcteauMJBBKT13, author = {Damien Octeau and Patrick D. McDaniel and Somesh Jha and Alexandre Bartel and Eric Bodden and Jacques Klein and Yves Le Traon}, editor = {Samuel T. King}, title = {Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {543--558}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/octeau}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/OcteauMJBBKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SyversonJ12, author = {Paul F. Syverson and Somesh Jha}, title = {Guest Editorial: Special Issue on Computer and Communications Security}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {15}, number = {1}, pages = {1:1--1:2}, year = {2012}, url = {https://doi.org/10.1145/2133375.2133376}, doi = {10.1145/2133375.2133376}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SyversonJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/FredriksonJJRPSY12, author = {Matthew Fredrikson and Richard Joiner and Somesh Jha and Thomas W. Reps and Phillip A. Porras and Hassen Sa{\"{\i}}di and Vinod Yegneswaran}, editor = {P. Madhusudan and Sanjit A. Seshia}, title = {Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement}, booktitle = {Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7358}, pages = {548--563}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31424-7\_39}, doi = {10.1007/978-3-642-31424-7\_39}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/FredriksonJJRPSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/HarrisJR12, author = {William R. Harris and Somesh Jha and Thomas W. Reps}, editor = {P. Madhusudan and Sanjit A. Seshia}, title = {Secure Programming via Visibly Pushdown Safety Games}, booktitle = {Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7358}, pages = {581--598}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31424-7\_41}, doi = {10.1007/978-3-642-31424-7\_41}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/HarrisJR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/LiSJ12, author = {Wenchao Li and Sanjit A. Seshia and Somesh Jha}, editor = {Patrick Groeneveld and Donatella Sciuto and Soha Hassoun}, title = {CrowdMine: towards crowdsourced human-assisted verification}, booktitle = {The 49th Annual Design Automation Conference 2012, {DAC} '12, San Francisco, CA, USA, June 3-7, 2012}, pages = {1254--1255}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2228360.2228590}, doi = {10.1145/2228360.2228590}, timestamp = {Mon, 05 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/LiSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/KruijfSJ12, author = {Marc de Kruijf and Karthikeyan Sankaralingam and Somesh Jha}, editor = {Jan Vitek and Haibo Lin and Frank Tip}, title = {Static analysis and compiler design for idempotent processing}, booktitle = {{ACM} {SIGPLAN} Conference on Programming Language Design and Implementation, {PLDI} '12, Beijing, China - June 11 - 16, 2012}, pages = {475--486}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2254064.2254120}, doi = {10.1145/2254064.2254120}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pldi/KruijfSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/OcteauJM12, author = {Damien Octeau and Somesh Jha and Patrick D. McDaniel}, editor = {Will Tracz and Martin P. Robillard and Tevfik Bultan}, title = {Retargeting Android applications to Java bytecode}, booktitle = {20th {ACM} {SIGSOFT} Symposium on the Foundations of Software Engineering (FSE-20), SIGSOFT/FSE'12, Cary, NC, {USA} - November 11 - 16, 2012}, pages = {6}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2393596.2393600}, doi = {10.1145/2393596.2393600}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/OcteauJM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LuchaupSEJ11, author = {Daniel Luchaup and Randy Smith and Cristian Estan and Somesh Jha}, title = {Speculative Parallel Pattern Matching}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {6}, number = {2}, pages = {438--451}, year = {2011}, url = {https://doi.org/10.1109/TIFS.2011.2112647}, doi = {10.1109/TIFS.2011.2112647}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LuchaupSEJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/FredriksonCJ11, author = {Matthew Fredrikson and Mihai Christodorescu and Somesh Jha}, editor = {Nikolaj S. Bj{\o}rner and Viorica Sofronie{-}Stokkermans}, title = {Dynamic Behavior Matching: {A} Complexity Analysis and New Approximation Algorithms}, booktitle = {Automated Deduction - {CADE-23} - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31 - August 5, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6803}, pages = {252--267}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22438-6\_20}, doi = {10.1007/978-3-642-22438-6\_20}, timestamp = {Mon, 28 Aug 2023 21:17:45 +0200}, biburl = {https://dblp.org/rec/conf/cade/FredriksonCJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FranzDHJKS11, author = {Martin Franz and Bj{\"{o}}rn Deiseroth and Kay Hamacher and Somesh Jha and Stefan Katzenbeisser and Heike Schr{\"{o}}der}, editor = {George Danezis}, title = {Towards Secure Bioinformatics Services (Short Paper)}, booktitle = {Financial Cryptography and Data Security - 15th International Conference, {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7035}, pages = {276--283}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27576-0\_23}, doi = {10.1007/978-3-642-27576-0\_23}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FranzDHJKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ChristodorescuFJG11, author = {Mihai Christodorescu and Matthew Fredrikson and Somesh Jha and Jonathon T. Giffin}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {End-to-End Software Diversification of Internet Services}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {117--130}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_7}, doi = {10.1007/978-1-4614-0977-9\_7}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/ChristodorescuFJG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/synthesis/2010Datta, author = {Anupam Datta and Somesh Jha and Ninghui Li and David Melski and Thomas W. Reps}, title = {Analysis Techniques for Information Security}, series = {Synthesis Lectures on Information Security, Privacy, and Trust}, publisher = {Morgan {\&} Claypool Publishers}, year = {2010}, url = {https://doi.org/10.2200/S00260ED1V01Y201003SPT002}, doi = {10.2200/S00260ED1V01Y201003SPT002}, isbn = {978-3-031-01206-8}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/synthesis/2010Datta.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/JhaKSVC10, author = {Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney}, title = {Semantic integrity in large-scale online simulations}, journal = {{ACM} Trans. Internet Techn.}, volume = {10}, number = {1}, pages = {2:1--2:24}, year = {2010}, url = {https://doi.org/10.1145/1667067.1667069}, doi = {10.1145/1667067.1667069}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/JhaKSVC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEpact/KumarCKKSEJ10, author = {Amit Kumar and Lorenzo De Carli and Sung Jin Kim and Marc de Kruijf and Karthikeyan Sankaralingam and Cristian Estan and Somesh Jha}, editor = {Valentina Salapura and Michael Gschwind and Jens Knoop}, title = {Design and implementation of the {PLUG} architecture for programmable and efficient network lookups}, booktitle = {19th International Conference on Parallel Architectures and Compilation Techniques, {PACT} 2010, Vienna, Austria, September 11-15, 2010}, pages = {331--342}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854273.1854316}, doi = {10.1145/1854273.1854316}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEpact/KumarCKKSEJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/Jha10, author = {Somesh Jha}, editor = {Tayssir Touili and Byron Cook and Paul B. Jackson}, title = {Retrofitting Legacy Code for Security}, booktitle = {Computer Aided Verification, 22nd International Conference, {CAV} 2010, Edinburgh, UK, July 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6174}, pages = {19}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14295-6\_2}, doi = {10.1007/978-3-642-14295-6\_2}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/Jha10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HarrisJR10, author = {William R. Harris and Somesh Jha and Thomas W. Reps}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {{DIFC} programs by automatic instrumentation}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {284--296}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866340}, doi = {10.1145/1866307.1866340}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HarrisJR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/KingJMJJS10, author = {Dave King and Susmit Jha and Divya Muthukumaran and Trent Jaeger and Somesh Jha and Sanjit A. Seshia}, editor = {Andrew D. Gordon}, title = {Automating Security Mediation Placement}, booktitle = {Programming Languages and Systems, 19th European Symposium on Programming, {ESOP} 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6012}, pages = {327--344}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11957-6\_18}, doi = {10.1007/978-3-642-11957-6\_18}, timestamp = {Mon, 14 Feb 2022 09:20:30 +0100}, biburl = {https://dblp.org/rec/conf/esop/KingJMJJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FredriksonJCSY10, author = {Matt Fredrikson and Somesh Jha and Mihai Christodorescu and Reiner Sailer and Xifeng Yan}, title = {Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {45--60}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.11}, doi = {10.1109/SP.2010.11}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/FredriksonJCSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PaleariMPDFGJ10, author = {Roberto Paleari and Lorenzo Martignoni and Emanuele Passerini and Drew Davidson and Matt Fredrikson and Jonathon T. Giffin and Somesh Jha}, title = {Automatic Generation of Remediation Procedures for Malware Infections}, booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13, 2010, Proceedings}, pages = {419--434}, publisher = {{USENIX} Association}, year = {2010}, url = {http://www.usenix.org/events/sec10/tech/full\_papers/Paleari.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/PaleariMPDFGJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wifs/FranzDHJ0S10, author = {Martin Franz and Bj{\"{o}}rn Deiseroth and Kay Hamacher and Somesh Jha and Stefan Katzenbeisser and Heike Schr{\"{o}}der}, title = {Secure computations on non-integer values}, booktitle = {2010 {IEEE} International Workshop on Information Forensics and Security, {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WIFS.2010.5711458}, doi = {10.1109/WIFS.2010.5711458}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wifs/FranzDHJ0S10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10, author = {Paul Barford and Marc Dacier and Thomas G. Dietterich and Matt Fredrikson and Jonathon T. Giffin and Sushil Jajodia and Somesh Jha and Jason H. Li and Peng Liu and Peng Ning and Xinming Ou and Dawn Song and Laura Strater and Vipin Swarup and George P. Tadda and C. Wang and John Yen}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cyber {SA:} Situational Awareness for Cyber Defense}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {3--13}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_1}, doi = {10.1007/978-1-4419-0140-8\_1}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FredriksonCGJ10, author = {Matt Fredrikson and Mihai Christodorescu and Jonathon T. Giffin and Somesh Jha}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {A Declarative Framework for Intrusion Analysis}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {179--200}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_9}, doi = {10.1007/978-1-4419-0140-8\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FredriksonCGJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2010, editor = {Somesh Jha and Anish Mathuria}, title = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9}, doi = {10.1007/978-3-642-17714-9}, isbn = {978-3-642-17713-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2010, editor = {Somesh Jha and Robin Sommer and Christian Kreibich}, title = {Recent Advances in Intrusion Detection, 13th International Symposium, {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6307}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15512-3}, doi = {10.1007/978-3-642-15512-3}, isbn = {978-3-642-15511-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranzDHJKS10, author = {Martin Franz and Bj{\"{o}}rn Deiseroth and Kay Hamacher and Somesh Jha and Stefan Katzenbeisser and Heike Schr{\"{o}}der}, title = {Secure Computations on Non-Integer Values}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {499}, year = {2010}, url = {http://eprint.iacr.org/2010/499}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranzDHJKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DavidsonSDJ09, author = {Drew Davidson and Randy Smith and Nic Doyle and Somesh Jha}, editor = {Michael Backes and Peng Ning}, title = {Protocol Normalization Using Attribute Grammars}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {216--231}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_14}, doi = {10.1007/978-3-642-04444-1\_14}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DavidsonSDJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/HarrisKCJR09, author = {William R. Harris and Nicholas Kidd and Sagar Chaki and Somesh Jha and Thomas W. Reps}, editor = {Ana Cavalcanti and Dennis Dams}, title = {Verifying Information Flow Control over Unbounded Processes}, booktitle = {{FM} 2009: Formal Methods, Second World Congress, Eindhoven, The Netherlands, November 2-6, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5850}, pages = {773--789}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05089-3\_49}, doi = {10.1007/978-3-642-05089-3\_49}, timestamp = {Mon, 21 Feb 2022 14:40:51 +0100}, biburl = {https://dblp.org/rec/conf/fm/HarrisKCJR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/LuchaupSEJ09, author = {Daniel Luchaup and Randy Smith and Cristian Estan and Somesh Jha}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Multi-byte Regular Expression Matching with Speculation}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {284--303}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_15}, doi = {10.1007/978-3-642-04342-0\_15}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/LuchaupSEJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2009, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, publisher = {{ACM}}, year = {2009}, isbn = {978-1-60558-894-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2009, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0}, doi = {10.1007/978-3-642-04342-0}, isbn = {978-3-642-04341-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BrumleyNSWJ08, author = {David Brumley and James Newsome and Dawn Song and Hao Wang and Somesh Jha}, title = {Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {224--241}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2008.55}, doi = {10.1109/TDSC.2008.55}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JhaLTWW08, author = {Somesh Jha and Ninghui Li and Mahesh V. Tripunitara and Qihua Wang and William H. Winsborough}, title = {Towards Formal Verification of Role-Based Access Control Policies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {5}, number = {4}, pages = {242--255}, year = {2008}, url = {https://doi.org/10.1109/TDSC.2007.70225}, doi = {10.1109/TDSC.2007.70225}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JhaLTWW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/PredaCJD08, author = {Mila Dalla Preda and Mihai Christodorescu and Somesh Jha and Saumya K. Debray}, title = {A semantics-based approach to malware detection}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {30}, number = {5}, pages = {25:1--25:54}, year = {2008}, url = {https://doi.org/10.1145/1387673.1387674}, doi = {10.1145/1387673.1387674}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/PredaCJD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/GanapathyRBSJ08, author = {Vinod Ganapathy and Matthew J. Renzelmann and Arini Balakrishnan and Michael M. Swift and Somesh Jha}, editor = {Susan J. Eggers and James R. Larus}, title = {The design and implementation of microdrivers}, booktitle = {Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2008, Seattle, WA, USA, March 1-5, 2008}, pages = {168--178}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1346281.1346303}, doi = {10.1145/1346281.1346303}, timestamp = {Wed, 07 Jul 2021 13:23:08 +0200}, biburl = {https://dblp.org/rec/conf/asplos/GanapathyRBSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SmithEJS08, author = {Randy Smith and Cristian Estan and Somesh Jha and Ida Sri Rejeki Siahaan}, editor = {R. Sekar and Arun K. Pujari}, title = {Fast Signature Matching Using Extended Finite Automaton {(XFA)}}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {158--172}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_15}, doi = {10.1007/978-3-540-89862-7\_15}, timestamp = {Thu, 18 Nov 2021 17:21:37 +0100}, biburl = {https://dblp.org/rec/conf/iciss/SmithEJS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indiaSE/ChristodorescuJK08, author = {Mihai Christodorescu and Somesh Jha and Christopher Kruegel}, editor = {Gautam Shroff and Pankaj Jalote and Sriram K. Rajamani}, title = {Mining specifications of malicious behavior}, booktitle = {Proceeding of the 1st Annual India Software Engineering Conference, {ISEC} 2008, Hyderabad, India, February 19-22, 2008}, pages = {5--14}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1342211.1342215}, doi = {10.1145/1342211.1342215}, timestamp = {Thu, 10 Dec 2020 11:39:56 +0100}, biburl = {https://dblp.org/rec/conf/indiaSE/ChristodorescuJK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MartignoniSFJM08, author = {Lorenzo Martignoni and Elizabeth Stinson and Matt Fredrikson and Somesh Jha and John C. Mitchell}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {A Layered Architecture for Detecting Malicious Behaviors}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {78--97}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_5}, doi = {10.1007/978-3-540-87403-4\_5}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MartignoniSFJM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/SmithEJK08, author = {Randy Smith and Cristian Estan and Somesh Jha and Shijin Kong}, editor = {Victor Bahl and David Wetherall and Stefan Savage and Ion Stoica}, title = {Deflating the big bang: fast and scalable deep packet inspection with extended finite automata}, booktitle = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Seattle, WA, USA, August 17-22, 2008}, pages = {207--218}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1402958.1402983}, doi = {10.1145/1402958.1402983}, timestamp = {Wed, 21 Jul 2021 16:09:54 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/SmithEJK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/KingJJS08, author = {Dave King and Trent Jaeger and Somesh Jha and Sanjit A. Seshia}, editor = {Mary Jean Harrold and Gail C. Murphy}, title = {Effective blame for information-flow violations}, booktitle = {Proceedings of the 16th {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, 2008, Atlanta, Georgia, USA, November 9-14, 2008}, pages = {250--260}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1453101.1453135}, doi = {10.1145/1453101.1453135}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/KingJJS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SmithEJ08, author = {Randy Smith and Cristian Estan and Somesh Jha}, title = {{XFA:} Faster Signature Matching with Extended Automata}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {187--201}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.14}, doi = {10.1109/SP.2008.14}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/SmithEJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JhaKS08, author = {Somesh Jha and Louis Kruger and Vitaly Shmatikov}, title = {Towards Practical Privacy for Genomic Computation}, booktitle = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May 2008, Oakland, California, {USA}}, pages = {216--230}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SP.2008.34}, doi = {10.1109/SP.2008.34}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JhaKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2008, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-59593-810-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/ChristodorescuJKKV07, author = {Mihai Christodorescu and Somesh Jha and Johannes Kinder and Stefan Katzenbeisser and Helmut Veith}, title = {Software transformations to improve malware detection}, journal = {J. Comput. Virol.}, volume = {3}, number = {4}, pages = {253--265}, year = {2007}, url = {https://doi.org/10.1007/s11416-007-0059-8}, doi = {10.1007/S11416-007-0059-8}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/virology/ChristodorescuJKKV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MartignoniCJ07, author = {Lorenzo Martignoni and Mihai Christodorescu and Somesh Jha}, title = {OmniUnpack: Fast, Generic, and Safe Unpacking of Malware}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {431--441}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.15}, doi = {10.1109/ACSAC.2007.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MartignoniCJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BrumleyWJS07, author = {David Brumley and Hao Wang and Somesh Jha and Dawn Xiaodong Song}, title = {Creating Vulnerability Signatures Using Weakest Preconditions}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {311--325}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.17}, doi = {10.1109/CSF.2007.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BrumleyWJS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/GanapathyBSJ07, author = {Vinod Ganapathy and Arini Balakrishnan and Michael M. Swift and Somesh Jha}, editor = {Galen C. Hunt}, title = {Microdrivers: {A} New Architecture for Device Drivers}, booktitle = {Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, May 7-9, 2005, San Diego, California, {USA}}, publisher = {{USENIX} Association}, year = {2007}, url = {http://www.usenix.org/events/hotos07/tech/full\_papers/ganapathy/ganapathy.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotos/GanapathyBSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/GanapathyKJJ07, author = {Vinod Ganapathy and Dave King and Trent Jaeger and Somesh Jha}, title = {Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis}, booktitle = {29th International Conference on Software Engineering {(ICSE} 2007), Minneapolis, MN, USA, May 20-26, 2007}, pages = {458--467}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICSE.2007.54}, doi = {10.1109/ICSE.2007.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/GanapathyKJJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/PredaCJD07, author = {Mila Dalla Preda and Mihai Christodorescu and Somesh Jha and Saumya K. Debray}, editor = {Martin Hofmann and Matthias Felleisen}, title = {A semantics-based approach to malware detection}, booktitle = {Proceedings of the 34th {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, {POPL} 2007, Nice, France, January 17-19, 2007}, pages = {377--388}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1190216.1190270}, doi = {10.1145/1190216.1190270}, timestamp = {Fri, 25 Jun 2021 14:48:54 +0200}, biburl = {https://dblp.org/rec/conf/popl/PredaCJD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ChristodorescuJK07, author = {Mihai Christodorescu and Somesh Jha and Christopher Kruegel}, editor = {Ivica Crnkovic and Antonia Bertolino}, title = {Mining specifications of malicious behavior}, booktitle = {Proceedings of the 6th joint meeting of the European Software Engineering Conference and the {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007}, pages = {5--14}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1287624.1287628}, doi = {10.1145/1287624.1287628}, timestamp = {Tue, 01 Feb 2022 10:45:16 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/ChristodorescuJK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JhaKV07, author = {Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney}, title = {Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {179--186}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.16}, doi = {10.1109/SP.2007.16}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/JhaKV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/27, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1}, doi = {10.1007/978-0-387-44599-1}, isbn = {978-0-387-32720-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/27.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhaKSVC07, author = {Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney}, title = {Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2007}, url = {http://eprint.iacr.org/2007/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JhaKSVC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SmithEJ06, author = {Randy Smith and Cristian Estan and Somesh Jha}, title = {Backtracking Algorithmic Complexity Attacks against a {NIDS}}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {89--98}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.17}, doi = {10.1109/ACSAC.2006.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SmithEJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WangJG06, author = {Hao Wang and Somesh Jha and Vinod Ganapathy}, title = {NetSpy: Automatic Generation of Spyware Signatures for {NIDS}}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {99--108}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.34}, doi = {10.1109/ACSAC.2006.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WangJG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RubinJM06, author = {Shai Rubin and Somesh Jha and Barton P. Miller}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Protomatching network traffic for high throughputnetwork intrusion detection}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {47--58}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180413}, doi = {10.1145/1180405.1180413}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RubinJM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrugerJGB06, author = {Louis Kruger and Somesh Jha and Eu{-}Jin Goh and Dan Boneh}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Secure function evaluation with ordered binary decision diagrams}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {410--420}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180455}, doi = {10.1145/1180405.1180455}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrugerJGB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/RubinJM06, author = {Shai Rubin and Somesh Jha and Barton P. Miller}, title = {On the Completeness of Attack Mutation Algorithms}, booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006), 5-7 July 2006, Venice, Italy}, pages = {43--56}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CSFW.2006.21}, doi = {10.1109/CSFW.2006.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/RubinJM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangJRSS06, author = {Hao Wang and Somesh Jha and Thomas W. Reps and Stefan Schwoon and Stuart G. Stubblebine}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Reducing the Dependence of {SPKI/SDSI} on {PKI}}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {156--173}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_11}, doi = {10.1007/11863908\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangJRSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GiffinJM06, author = {Jonathon T. Giffin and Somesh Jha and Barton P. Miller}, editor = {Diego Zamboni and Christopher Kr{\"{u}}gel}, title = {Automated Discovery of Mimicry Attacks}, booktitle = {Recent Advances in Intrusion Detection, 9th International Symposium, {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4219}, pages = {41--60}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11856214\_3}, doi = {10.1007/11856214\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GiffinJM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06, author = {David Brumley and James Newsome and Dawn Xiaodong Song and Hao Wang and Somesh Jha}, title = {Towards Automatic Generation of Vulnerability-Based Signatures}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {2--16}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.41}, doi = {10.1109/SP.2006.41}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BrumleyNSWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GanapathyJJ06, author = {Vinod Ganapathy and Trent Jaeger and Somesh Jha}, title = {Retrofitting Legacy Code for Authorization Policy Enforcement}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {214--229}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.34}, doi = {10.1109/SP.2006.34}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GanapathyJJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/JhaSWR06, author = {Somesh Jha and Stefan Schwoon and Hao Wang and Thomas W. Reps}, editor = {Holger Hermanns and Jens Palsberg}, title = {Weighted Pushdown Systems and Trust-Management Systems}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 12th International Conference, {TACAS} 2006 Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2006, Vienna, Austria, March 25 - April 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3920}, pages = {1--26}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11691372\_1}, doi = {10.1007/11691372\_1}, timestamp = {Sat, 30 Sep 2023 09:57:43 +0200}, biburl = {https://dblp.org/rec/conf/tacas/JhaSWR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/ChakiCJV05, author = {Sagar Chaki and Edmund M. Clarke and Somesh Jha and Helmut Veith}, title = {An Iterative Framework for Simulation Conformance}, journal = {J. Log. Comput.}, volume = {15}, number = {4}, pages = {465--488}, year = {2005}, url = {https://doi.org/10.1093/logcom/exi028}, doi = {10.1093/LOGCOM/EXI028}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/ChakiCJV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/RepsSJM05, author = {Thomas W. Reps and Stefan Schwoon and Somesh Jha and David Melski}, title = {Weighted pushdown systems and their application to interprocedural dataflow analysis}, journal = {Sci. Comput. Program.}, volume = {58}, number = {1-2}, pages = {206--263}, year = {2005}, url = {https://doi.org/10.1016/j.scico.2005.02.009}, doi = {10.1016/J.SCICO.2005.02.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/RepsSJM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GanapathyJJ05, author = {Vinod Ganapathy and Trent Jaeger and Somesh Jha}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Automatic placement of authorization hooks in the linux security modules framework}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {330--339}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102164}, doi = {10.1145/1102120.1102164}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GanapathyJJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JhaKM05, author = {Somesh Jha and Louis Kruger and Patrick D. McDaniel}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Privacy Preserving Clustering}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {397--417}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_23}, doi = {10.1007/11555827\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JhaKM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/SivathanuAAJ05, author = {Muthian Sivathanu and Andrea C. Arpaci{-}Dusseau and Remzi H. Arpaci{-}Dusseau and Somesh Jha}, editor = {Garth Gibson}, title = {A Logic of File Systems}, booktitle = {Proceedings of the {FAST} '05 Conference on File and Storage Technologies, December 13-16, 2005, San Francisco, California, {USA}}, publisher = {{USENIX}}, year = {2005}, url = {http://www.usenix.org/events/fast05/tech/sivathanu\_logic.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/SivathanuAAJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/GanapathySJRB05, author = {Vinod Ganapathy and Sanjit A. Seshia and Somesh Jha and Thomas W. Reps and Randal E. Bryant}, editor = {Gruia{-}Catalin Roman and William G. Griswold and Bashar Nuseibeh}, title = {Automatic discovery of API-level exploits}, booktitle = {27th International Conference on Software Engineering {(ICSE} 2005), 15-21 May 2005, St. Louis, Missouri, {USA}}, pages = {312--321}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1062455.1062518}, doi = {10.1145/1062455.1062518}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/GanapathySJRB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GiffinDJLM05, author = {Jonathon T. Giffin and David Dagon and Somesh Jha and Wenke Lee and Barton P. Miller}, editor = {Alfonso Valdes and Diego Zamboni}, title = {Environment-Sensitive Intrusion Detection}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, pages = {185--206}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11663812\_10}, doi = {10.1007/11663812\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GiffinDJLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RubinJM05, author = {Shai Rubin and Somesh Jha and Barton P. Miller}, title = {Language-Based Generation and Evaluation of {NIDS} Signatures}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {3--17}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.10}, doi = {10.1109/SP.2005.10}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/RubinJM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChristodorescuJSSB05, author = {Mihai Christodorescu and Somesh Jha and Sanjit A. Seshia and Dawn Xiaodong Song and Randal E. Bryant}, title = {Semantics-Aware Malware Detection}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {32--46}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SP.2005.20}, doi = {10.1109/SP.2005.20}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ChristodorescuJSSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/YegneswaranGBJ05, author = {Vinod Yegneswaran and Jonathon T. Giffin and Paul Barford and Somesh Jha}, editor = {Patrick D. McDaniel}, title = {An Architecture for Generating Semantic Aware Signatures}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/architecture-generating-semantic-aware-signatures}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/YegneswaranGBJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JhaR04, author = {Somesh Jha and Thomas W. Reps}, title = {Model checking {SPKI/SDSI}}, journal = {J. Comput. Secur.}, volume = {12}, number = {3-4}, pages = {317--353}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-123-402}, doi = {10.3233/JCS-2004-123-402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/JhaR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/ChakiCGJV04, author = {Sagar Chaki and Edmund M. Clarke and Alex Groce and Somesh Jha and Helmut Veith}, title = {Modular Verification of Software Components in {C}}, journal = {{IEEE} Trans. Software Eng.}, volume = {30}, number = {6}, pages = {388--402}, year = {2004}, url = {https://doi.org/10.1109/TSE.2004.22}, doi = {10.1109/TSE.2004.22}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/ChakiCGJV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RubinJM04, author = {Shai Rubin and Somesh Jha and Barton P. Miller}, title = {Automatic Generation and Analysis of {NIDS} Attacks}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {28--38}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.9}, doi = {10.1109/CSAC.2004.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RubinJM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/ChristodorescuJ04, author = {Mihai Christodorescu and Somesh Jha}, editor = {George S. Avrunin and Gregg Rothermel}, title = {Testing malware detectors}, booktitle = {Proceedings of the {ACM/SIGSOFT} International Symposium on Software Testing and Analysis, {ISSTA} 2004, Boston, Massachusetts, USA, July 11-14, 2004}, pages = {34--44}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1007512.1007518}, doi = {10.1145/1007512.1007518}, timestamp = {Tue, 06 Nov 2018 16:57:30 +0100}, biburl = {https://dblp.org/rec/conf/issta/ChristodorescuJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/GiffinJM04, author = {Jonathon T. Giffin and Somesh Jha and Barton P. Miller}, title = {Efficient Context-Sensitive Intrusion Detection}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2004, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2004}, url = {https://www.ndss-symposium.org/ndss2004/efficient-context-sensitive-intrusion-detection/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/GiffinJM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/YegneswaranBJ04, author = {Vinod Yegneswaran and Paul Barford and Somesh Jha}, title = {Global Intrusion Detection in the {DOMINO} Overlay System}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2004, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2004}, url = {https://www.ndss-symposium.org/ndss2004/global-intrusion-detection-domino-overlay-system/}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/YegneswaranBJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/WangJLM04, author = {Hao Wang and Somesh Jha and Miron Livny and Patrick D. McDaniel}, title = {Security Policy Reconciliation in Distributed Computing Environments}, booktitle = {5th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY, {USA}}, pages = {137}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/POLICY.2004.1309160}, doi = {10.1109/POLICY.2004.1309160}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/WangJLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FengGHJLM04, author = {Henry Hanping Feng and Jonathon T. Giffin and Yong Huang and Somesh Jha and Wenke Lee and Barton P. Miller}, title = {Formalizing Sensitivity in Static Analysis for Intrusion Detection}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {194}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301324}, doi = {10.1109/SECPRI.2004.1301324}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/FengGHJLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/ClarkeGJLV03, author = {Edmund M. Clarke and Orna Grumberg and Somesh Jha and Yuan Lu and Helmut Veith}, title = {Counterexample-guided abstraction refinement for symbolic model checking}, journal = {J. {ACM}}, volume = {50}, number = {5}, pages = {752--794}, year = {2003}, url = {https://doi.org/10.1145/876638.876643}, doi = {10.1145/876638.876643}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/ClarkeGJLV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/ClarkeJM03, author = {Edmund M. Clarke and Somesh Jha and Wilfredo R. Marrero}, title = {Efficient verification of security protocols using partial-order reductions}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {4}, number = {2}, pages = {173--188}, year = {2003}, url = {https://doi.org/10.1007/s10009-002-0103-4}, doi = {10.1007/S10009-002-0103-4}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/ClarkeJM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GanapathyJCMV03, author = {Vinod Ganapathy and Somesh Jha and David Chandler and David Melski and David Vitek}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Buffer overrun detection using linear programming and static analysis}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {345--354}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948155}, doi = {10.1145/948109.948155}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GanapathyJCMV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SchwoonJRS03, author = {Stefan Schwoon and Somesh Jha and Thomas W. Reps and Stuart G. Stubblebine}, title = {On Generalized Authorization Problems}, booktitle = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003), 30 June - 2 July 2003, Pacific Grove, CA, {USA}}, pages = {202}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSFW.2003.1212714}, doi = {10.1109/CSFW.2003.1212714}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/SchwoonJRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ChakiCGJV03, author = {Sagar Chaki and Edmund M. Clarke and Alex Groce and Somesh Jha and Helmut Veith}, editor = {Lori A. Clarke and Laurie Dillon and Walter F. Tichy}, title = {Modular Verification of Software Components in {C}}, booktitle = {Proceedings of the 25th International Conference on Software Engineering, May 3-10, 2003, Portland, Oregon, {USA}}, pages = {385--395}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICSE.2003.1201217}, doi = {10.1109/ICSE.2003.1201217}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/ChakiCGJV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/RepsSJ03, author = {Thomas W. Reps and Stefan Schwoon and Somesh Jha}, editor = {Radhia Cousot}, title = {Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis}, booktitle = {Static Analysis, 10th International Symposium, {SAS} 2003, San Diego, CA, USA, June 11-13, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2694}, pages = {189--213}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44898-5\_11}, doi = {10.1007/3-540-44898-5\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sas/RepsSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/ChakiFGJKV03, author = {Sagar Chaki and Pascal Fenkam and Harald C. Gall and Somesh Jha and Engin Kirda and Helmut Veith}, title = {Integrating Publish/Subscribe into a Mobile Teamwork Support Platform}, booktitle = {Proceedings of the Fifteenth International Conference on Software Engineering {\&} Knowledge Engineering (SEKE'2003), Hotel Sofitel, San Francisco Bay, CA, USA, July 1-3, 2003}, pages = {510--517}, year = {2003}, timestamp = {Wed, 01 Apr 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seke/ChakiFGJKV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ChristodorescuJ03, author = {Mihai Christodorescu and Somesh Jha}, title = {Static Analysis of Executables to Detect Malicious Patterns}, booktitle = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C., USA, August 4-8, 2003}, publisher = {{USENIX} Association}, year = {2003}, url = {https://www.usenix.org/conference/12th-usenix-security-symposium/static-analysis-executables-detect-malicious-patterns}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/ChristodorescuJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JhaSW02, author = {Somesh Jha and Oleg Sheyner and Jeannette M. Wing}, title = {Two Formal Analys s of Attack Graphs}, booktitle = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, pages = {49--63}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSFW.2002.1021806}, doi = {10.1109/CSFW.2002.1021806}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/JhaSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JhaR02, author = {Somesh Jha and Thomas W. Reps}, title = {Analysis of {SPKI/SDSI} Certificates Using Model Checking}, booktitle = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, pages = {129}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSFW.2002.1021812}, doi = {10.1109/CSFW.2002.1021812}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/JhaR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/JhaPZ02, author = {Somesh Jha and Jens Palsberg and Tian Zhao}, editor = {Mogens Nielsen and Uffe Engberg}, title = {Efficient Type Matching}, booktitle = {Foundations of Software Science and Computation Structures, 5th International Conference, {FOSSACS} 2002. Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2002 Grenoble, France, April 8-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2303}, pages = {187--204}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45931-6\_14}, doi = {10.1007/3-540-45931-6\_14}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/JhaPZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lics/ClarkeJLV02, author = {Edmund M. Clarke and Somesh Jha and Yuan Lu and Helmut Veith}, title = {Tree-Like Counterexamples in Model Checking}, booktitle = {17th {IEEE} Symposium on Logic in Computer Science {(LICS} 2002), 22-25 July 2002, Copenhagen, Denmark, Proceedings}, pages = {19--29}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/LICS.2002.1029814}, doi = {10.1109/LICS.2002.1029814}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lics/ClarkeJLV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SheynerHJLW02, author = {Oleg Sheyner and Joshua W. Haines and Somesh Jha and Richard Lippmann and Jeannette M. Wing}, title = {Automated Generation and Analysis of Attack Graphs}, booktitle = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002}, pages = {273--284}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SECPRI.2002.1004377}, doi = {10.1109/SECPRI.2002.1004377}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/SheynerHJLW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GiffinJM02, author = {Jonathon T. Giffin and Somesh Jha and Barton P. Miller}, editor = {Dan Boneh}, title = {Detecting Manipulated Remote Call Streams}, booktitle = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco, CA, USA, August 5-9, 2002}, pages = {61--79}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/sec02/giffin.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GiffinJM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/charme/ChauhanCJKVW01, author = {Pankaj Chauhan and Edmund M. Clarke and Somesh Jha and James H. Kukula and Helmut Veith and Dong Wang}, editor = {Tiziana Margaria and Thomas F. Melham}, title = {Using Combinatorial Optimization Methods for Quantification Scheduling}, booktitle = {Correct Hardware Design and Verification Methods, 11th {IFIP} {WG} 10.5 Advanced Research Working Conference, {CHARME} 2001, Livingston, Scotland, UK, September 4-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2144}, pages = {293--309}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44798-9\_24}, doi = {10.1007/3-540-44798-9\_24}, timestamp = {Sun, 02 Jun 2019 21:23:48 +0200}, biburl = {https://dblp.org/rec/conf/charme/ChauhanCJKVW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JhaTM01, author = {Somesh Jha and Kymie M. C. Tan and Roy A. Maxion}, title = {Markov Chains, Classifiers, and Intrusion Detection}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {206--219}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930147}, doi = {10.1109/CSFW.2001.930147}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/JhaTM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/ClarkeGJLV01, author = {Edmund M. Clarke and Orna Grumberg and Somesh Jha and Yuan Lu and Helmut Veith}, editor = {Reinhard Wilhelm}, title = {Progress on the State Explosion Problem in Model Checking}, booktitle = {Informatics - 10 Years Back. 10 Years Ahead}, series = {Lecture Notes in Computer Science}, volume = {2000}, pages = {176--194}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44577-3\_12}, doi = {10.1007/3-540-44577-3\_12}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/ClarkeGJLV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccad/ChauhanCJKSVW01, author = {Pankaj Chauhan and Edmund M. Clarke and Somesh Jha and James H. Kukula and Thomas R. Shiple and Helmut Veith and Dong Wang}, editor = {Rolf Ernst}, title = {Non-linear Quantification Scheduling in Image Computation}, booktitle = {Proceedings of the 2001 {IEEE/ACM} International Conference on Computer-Aided Design, {ICCAD} 2001, San Jose, CA, USA, November 4-8, 2001}, pages = {293}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICCAD.2001.968636}, doi = {10.1109/ICCAD.2001.968636}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccad/ChauhanCJKSVW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/JhaW01, author = {Somesh Jha and Jeannette M. Wing}, editor = {Hausi A. M{\"{u}}ller and Mary Jean Harrold and Wilhelm Sch{\"{a}}fer}, title = {Survivability Analysis of Network Systems}, booktitle = {Proceedings of the 23rd International Conference on Software Engineering, {ICSE} 2001, 12-19 May 2001, Toronto, Ontario, Canada}, pages = {307--317}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICSE.2001.919104}, doi = {10.1109/ICSE.2001.919104}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/JhaW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CampaillaCCJV01, author = {Alexis Campailla and Sagar Chaki and Edmund M. Clarke and Somesh Jha and Helmut Veith}, editor = {Hausi A. M{\"{u}}ller and Mary Jean Harrold and Wilhelm Sch{\"{a}}fer}, title = {Efficient Filtering in Publish-Subscribe Systems Using Binary Decision}, booktitle = {Proceedings of the 23rd International Conference on Software Engineering, {ICSE} 2001, 12-19 May 2001, Toronto, Ontario, Canada}, pages = {443--452}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/ICSE.2001.919117}, doi = {10.1109/ICSE.2001.919117}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/CampaillaCCJV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosem/ClarkeJM00, author = {Edmund M. Clarke and Somesh Jha and Wilfredo R. Marrero}, title = {Verifying security protocols with Brutus}, journal = {{ACM} Trans. Softw. Eng. Methodol.}, volume = {9}, number = {4}, pages = {443--487}, year = {2000}, url = {https://doi.org/10.1145/363516.363528}, doi = {10.1145/363516.363528}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosem/ClarkeJM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BerezinCJM00, author = {Sergey Berezin and Edmund M. Clarke and Somesh Jha and Will Marrero}, editor = {Gordon D. Plotkin and Colin Stirling and Mads Tofte}, title = {Model checking algorithms for the {\(\mathrm{\mu}\)}-calculus}, booktitle = {Proof, Language, and Interaction, Essays in Honour of Robin Milner}, pages = {309--338}, publisher = {The {MIT} Press}, year = {2000}, timestamp = {Mon, 23 Jun 2008 08:50:50 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BerezinCJM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ClarkeGJLV00, author = {Edmund M. Clarke and Orna Grumberg and Somesh Jha and Yuan Lu and Helmut Veith}, editor = {E. Allen Emerson and A. Prasad Sistla}, title = {Counterexample-Guided Abstraction Refinement}, booktitle = {Computer Aided Verification, 12th International Conference, {CAV} 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1855}, pages = {154--169}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722167\_15}, doi = {10.1007/10722167\_15}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cav/ClarkeGJLV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/JhaWLL00, author = {Somesh Jha and Jeannette M. Wing and Richard C. Linger and Thomas A. Longstaff}, title = {Survivability Analysis of Network Specifications}, booktitle = {2000 International Conference on Dependable Systems and Networks {(DSN} 2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York, NY, {USA}}, pages = {613--622}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICDSN.2000.857597}, doi = {10.1109/ICDSN.2000.857597}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/JhaWLL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/ClarkeJM00, author = {Edmund M. Clarke and Somesh Jha and Wilfredo R. Marrero}, editor = {Susanne Graf and Michael I. Schwartzbach}, title = {Partial Order Reductions for Security Protocol Verification}, booktitle = {Tools and Algorithms for Construction and Analysis of Systems, 6th International Conference, {TACAS} 2000, Held as Part of the European Joint Conferences on the Theory and Practice of Software, {ETAPS} 2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1785}, pages = {503--518}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-46419-0\_34}, doi = {10.1007/3-540-46419-0\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/ClarkeJM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/ChalasaniJS99, author = {Prasad Chalasani and Somesh Jha and Isaac Saias}, title = {Approximate Option Pricing}, journal = {Algorithmica}, volume = {25}, number = {1}, pages = {2--21}, year = {1999}, url = {https://doi.org/10.1007/PL00009280}, doi = {10.1007/PL00009280}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/ChalasaniJS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/charme/ClarkeJLW99, author = {Edmund M. Clarke and Somesh Jha and Yuan Lu and Dong Wang}, editor = {Laurence Pierre and Thomas Kropf}, title = {Abstract BDDs: {A} Technique for Using Abstraction in Model Checking}, booktitle = {Correct Hardware Design and Verification Methods, 10th {IFIP} {WG} 10.5 Advanced Research Working Conference, {CHARME} '99, Bad Herrenalb, Germany, September 27-29, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1703}, pages = {172--186}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48153-2\_14}, doi = {10.1007/3-540-48153-2\_14}, timestamp = {Tue, 19 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/charme/ClarkeJLW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdpta/JhaP99, author = {Somesh Jha and Doron A. Peled}, editor = {Hamid R. Arabnia}, title = {Generalized Stuttering Equivalence}, booktitle = {Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly 1, 1999, Las Vegas, Nevada, {USA}}, pages = {1054--1060}, publisher = {{CSREA} Press}, year = {1999}, timestamp = {Fri, 12 Feb 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pdpta/JhaP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ShehorySCJ98, author = {Onn Shehory and Katia P. Sycara and Prasad Chalasani and Somesh Jha}, title = {Agent cloning: an approach to agent mobility and resource allocation}, journal = {{IEEE} Commun. Mag.}, volume = {36}, number = {7}, pages = {58}, year = {1998}, url = {https://doi.org/10.1109/35.689632}, doi = {10.1109/35.689632}, timestamp = {Tue, 06 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ShehorySCJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/DingelGJN98, author = {J{\"{u}}rgen Dingel and David Garlan and Somesh Jha and David Notkin}, title = {Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning}, journal = {Formal Aspects Comput.}, volume = {10}, number = {3}, pages = {193--213}, year = {1998}, url = {https://doi.org/10.1007/s001650050011}, doi = {10.1007/S001650050011}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/DingelGJN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/JacksonJD98, author = {Daniel Jackson and Somesh Jha and Craig Damon}, title = {Isomorph-Free Model Enumeration: {A} New Method for Checking Relational Specifications}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {20}, number = {2}, pages = {302--343}, year = {1998}, url = {https://doi.org/10.1145/276393.276396}, doi = {10.1145/276393.276396}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/JacksonJD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agents/ChalasaniJSS98, author = {Prasad Chalasani and Somesh Jha and Onn Shehory and Katia P. Sycara}, editor = {Katia P. Sycara and Michael J. Wooldridge}, title = {Query Restart Strategies for Web Agent}, booktitle = {Proceedings of the Second International Conference on Autonomous Agents, {AGENTS} 1998, St. Paul, Minnepolis, USA, May 9-13, 1998}, pages = {124--131}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/280765.280787}, doi = {10.1145/280765.280787}, timestamp = {Fri, 26 Apr 2019 14:26:42 +0200}, biburl = {https://dblp.org/rec/conf/agents/ChalasaniJSS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agents/JhaCSS98, author = {Somesh Jha and Prasad Chalasani and Onn Shehory and Katia P. Sycara}, editor = {Katia P. Sycara and Michael J. Wooldridge}, title = {A Formal Treatment of Distributed Matchmaking}, booktitle = {Proceedings of the Second International Conference on Autonomous Agents, {AGENTS} 1998, St. Paul, Minnepolis, USA, May 9-13, 1998}, pages = {457--458}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/280765.280897}, doi = {10.1145/280765.280897}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/agents/JhaCSS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/ShehorySCJ98, author = {Onn Shehory and Katia P. Sycara and Prasad Chalasani and Somesh Jha}, editor = {J{\"{o}}rg P. M{\"{u}}ller and Munindar P. Singh and Anand S. Rao}, title = {Increasing Resource Utilization and Task Performance by Agent Cloning}, booktitle = {Intelligent Agents V, Agent Theories, Architectures, and Languages, 5th International Workshop, {ATAL} '98, Paris, France, July 4-7, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1555}, pages = {413--426}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49057-4\_27}, doi = {10.1007/3-540-49057-4\_27}, timestamp = {Tue, 29 Dec 2020 18:27:45 +0100}, biburl = {https://dblp.org/rec/conf/atal/ShehorySCJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ClarkeEJS98, author = {Edmund M. Clarke and E. Allen Emerson and Somesh Jha and A. Prasad Sistla}, editor = {Alan J. Hu and Moshe Y. Vardi}, title = {Symmetry Reductions in Model Checking}, booktitle = {Computer Aided Verification, 10th International Conference, {CAV} '98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1427}, pages = {147--158}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0028741}, doi = {10.1007/BFB0028741}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cav/ClarkeEJS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cia/ChalasaniJSS98, author = {Prasad Chalasani and Somesh Jha and Onn Shehory and Katia P. Sycara}, editor = {Matthias Klusch and Gerhard Wei{\ss}}, title = {Strategies for Querying Information Agents}, booktitle = {Cooperative Information Agents II, Learning, Mobility and Electronic Commerce for Information Discovery on the Internet, Second International Workshop, CIA' 98, Paris, France, July 4-7, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1435}, pages = {94--107}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053677}, doi = {10.1007/BFB0053677}, timestamp = {Tue, 08 Mar 2022 10:12:49 +0100}, biburl = {https://dblp.org/rec/conf/cia/ChalasaniJSS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmas/ShehorySCJ98, author = {Onn Shehory and Katia P. Sycara and Prasad Chalasani and Somesh Jha}, editor = {Yves Demazeau}, title = {Agent Cloning}, booktitle = {Proceedings of the Third International Conference on Multiagent Systems, {ICMAS} 1998, Paris, France, July 3-7, 1998}, pages = {463--464}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/ICMAS.1998.699287}, doi = {10.1109/ICMAS.1998.699287}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmas/ShehorySCJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/procomet/ClarkeJM98, author = {Edmund M. Clarke and Somesh Jha and Wilfredo R. Marrero}, editor = {David Gries and Willem P. de Roever}, title = {Using state space exploration and a natural deduction style message derivation engine to verify security protocols}, booktitle = {Programming Concepts and Methods, {IFIP} TC2/WG2.2,2.3 International Conference on Programming Concepts and Methods {(PROCOMET} '98) 8-12 June 1998, Shelter Island, New York, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {125}, pages = {87--106}, publisher = {Chapman {\&} Hall}, year = {1998}, timestamp = {Thu, 21 Nov 2002 11:12:21 +0100}, biburl = {https://dblp.org/rec/conf/procomet/ClarkeJM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/GarlanJN98, author = {David Garlan and Somesh Jha and David Notkin}, editor = {Leon J. Osterweil and William L. Scherlis}, title = {Reasoning about Implicit Invocation}, booktitle = {Proceedings of the {ACM} {SIGSOFT} International Symposium on Foundations of Software Engineering, {SIGSOFT} 1998, Lake Buena Vista, Florida, USA, November 3-5, 1998}, pages = {209--221}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288195.288312}, doi = {10.1145/288195.288312}, timestamp = {Tue, 27 Jul 2021 17:16:40 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/GarlanJN98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BrowneCJLM97, author = {Anca Browne and Edmund M. Clarke and Somesh Jha and David E. Long and Wilfredo R. Marrero}, title = {An Improved Algorithm for the Evaluation of Fixpoint Expressions}, journal = {Theor. Comput. Sci.}, volume = {178}, number = {1-2}, pages = {237--255}, year = {1997}, url = {https://doi.org/10.1016/S0304-3975(96)00228-9}, doi = {10.1016/S0304-3975(96)00228-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BrowneCJLM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toplas/ClarkeGJ97, author = {Edmund M. Clarke and Orna Grumberg and Somesh Jha}, title = {Verifying Parameterized Networks}, journal = {{ACM} Trans. Program. Lang. Syst.}, volume = {19}, number = {5}, pages = {726--750}, year = {1997}, url = {https://doi.org/10.1145/265943.265960}, doi = {10.1145/265943.265960}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toplas/ClarkeGJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/ShehorySJ97, author = {Onn Shehory and Katia P. Sycara and Somesh Jha}, editor = {Munindar P. Singh and Anand S. Rao and Michael J. Wooldridge}, title = {Multi-Agent Coordination through Coalition Formation}, booktitle = {Intelligent Agents IV, Agent Theories, Architectures, and Languages, 4th International Workshop, {ATAL} '97, Providence, Rhode Island, USA, July 24-26, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1365}, pages = {143--154}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0026756}, doi = {10.1007/BFB0026756}, timestamp = {Tue, 29 Dec 2020 18:27:45 +0100}, biburl = {https://dblp.org/rec/conf/atal/ShehorySJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccd/JhaLMC97, author = {Somesh Jha and Yuan Lu and Marius Minea and Edmund M. Clarke}, title = {Equivalence Checking Using Abstract BDDs}, booktitle = {Proceedings 1997 International Conference on Computer Design: {VLSI} in Computers {\&} Processors, {ICCD} '97, Austin, Texas, USA, October 12-15, 1997}, pages = {332--337}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/ICCD.1997.628891}, doi = {10.1109/ICCD.1997.628891}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccd/JhaLMC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/EmersonJP97, author = {E. Allen Emerson and Somesh Jha and Doron A. Peled}, editor = {Ed Brinksma}, title = {Combining Partial Order and Symmetry Reductions}, booktitle = {Tools and Algorithms for Construction and Analysis of Systems, Third International Workshop, {TACAS} '97, Enschede, The Netherlands, April 2-4, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1217}, pages = {19--34}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0035378}, doi = {10.1007/BFB0035378}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/EmersonJP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/ClarkeJEF96, author = {Edmund M. Clarke and Somesh Jha and Reinhard Enders and Thomas Filkorn}, title = {Exploiting Symmetry in Temporal Logic Model Checking}, journal = {Formal Methods Syst. Des.}, volume = {9}, number = {1/2}, pages = {77--104}, year = {1996}, url = {https://doi.org/10.1007/BF00625969}, doi = {10.1007/BF00625969}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/ClarkeJEF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/ChalasaniJS96, author = {Prasad Chalasani and Somesh Jha and Isaac Saias}, title = {Approximate Option Pricing}, booktitle = {37th Annual Symposium on Foundations of Computer Science, {FOCS} '96, Burlington, Vermont, USA, 14-16 October, 1996}, pages = {244--253}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SFCS.1996.548483}, doi = {10.1109/SFCS.1996.548483}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/ChalasaniJS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/popl/JacksonJD96, author = {Daniel Jackson and Somesh Jha and Craig Damon}, editor = {Hans{-}Juergen Boehm and Guy L. Steele Jr.}, title = {Faster Checking of Software Specifications by Eliminating Isomorphs}, booktitle = {Conference Record of POPL'96: The 23rd {ACM} {SIGPLAN-SIGACT} Symposium on Principles of Programming Languages, Papers Presented at the Symposium, St. Petersburg Beach, Florida, USA, January 21-24, 1996}, pages = {79--90}, publisher = {{ACM} Press}, year = {1996}, url = {https://doi.org/10.1145/237721.237733}, doi = {10.1145/237721.237733}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/popl/JacksonJD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/DamonJJ96, author = {Craig Damon and Daniel Jackson and Somesh Jha}, editor = {David Garlan}, title = {Checking Relational Specifications With Binary Decision Diagrams}, booktitle = {Proceedings of the Fourth {ACM} {SIGSOFT} Symposium on Foundations of Software Engineering, SIGSOFT1996, San Francisco, California, USA, October 16-18, 1996}, pages = {70--80}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/239098.239110}, doi = {10.1145/239098.239110}, timestamp = {Tue, 27 Jul 2021 17:16:40 +0200}, biburl = {https://dblp.org/rec/conf/sigsoft/DamonJJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/ClarkeGHJLMN95, author = {Edmund M. Clarke and Orna Grumberg and Hiromi Hiraishi and Somesh Jha and David E. Long and Kenneth L. McMillan and Linda A. Ness}, title = {Verification of the Futurebus+ Cache Coherence Protocol}, journal = {Formal Methods Syst. Des.}, volume = {6}, number = {2}, pages = {217--232}, year = {1995}, url = {https://doi.org/10.1007/BF01383968}, doi = {10.1007/BF01383968}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/ClarkeGHJLMN95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/concur/ClarkeGJ95, author = {Edmund M. Clarke and Orna Grumberg and Somesh Jha}, editor = {Insup Lee and Scott A. Smolka}, title = {Veryfying Parameterized Networks using Abstraction and Regular Languages}, booktitle = {{CONCUR} '95: Concurrency Theory, 6th International Conference, Philadelphia, PA, USA, August 21-24, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {962}, pages = {395--407}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60218-6\_30}, doi = {10.1007/3-540-60218-6\_30}, timestamp = {Thu, 26 Jan 2023 14:05:52 +0100}, biburl = {https://dblp.org/rec/conf/concur/ClarkeGJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/cstoday95/ClarkeJ95, author = {Edmund M. Clarke and Somesh Jha}, editor = {Jan van Leeuwen}, title = {Symmetry and Induction in Model Checking}, booktitle = {Computer Science Today: Recent Trends and Developments}, series = {Lecture Notes in Computer Science}, volume = {1000}, pages = {455--470}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0015260}, doi = {10.1007/BFB0015260}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/books/sp/cstoday95/ClarkeJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/LongBCJM94, author = {David E. Long and Anca Browne and Edmund M. Clarke and Somesh Jha and Wilfredo R. Marrero}, editor = {David L. Dill}, title = {An Improved Algorithm for the Evaluation of Fixpoint Expressions}, booktitle = {Computer Aided Verification, 6th International Conference, {CAV} '94, Stanford, California, USA, June 21-23, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {818}, pages = {338--350}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58179-0\_66}, doi = {10.1007/3-540-58179-0\_66}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/LongBCJM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ClarkeFJ93, author = {Edmund M. Clarke and Thomas Filkorn and Somesh Jha}, editor = {Costas Courcoubetis}, title = {Exploiting Symmetry In Temporal Logic Model Checking}, booktitle = {Computer Aided Verification, 5th International Conference, {CAV} '93, Elounda, Greece, June 28 - July 1, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {697}, pages = {450--462}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-56922-7\_37}, doi = {10.1007/3-540-56922-7\_37}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/cav/ClarkeFJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chdl/ClarkeGHJLMN93, author = {Edmund M. Clarke and Orna Grumberg and Hiromi Hiraishi and Somesh Jha and David E. Long and Kenneth L. McMillan and Linda A. Ness}, editor = {David Agnew and Luc J. M. Claesen and Raul Camposano}, title = {Verification of the Futurebus+ Cache Coherence Protocol}, booktitle = {Computer Hardware Description Languages and their Applications, Proceedings of the 11th {IFIP} {WG10.2} International Conference on Computer Hardware Description Languages and their Applications - {CHDL} '93, sponsored by {IFIP} {WG10.2} and in cooperation with {IEEE} COMPSOC, Ottawa, Ontario, Canada, 26-28 April, 1993}, series = {{IFIP} Transactions}, volume = {{A-32}}, pages = {15--30}, publisher = {North-Holland}, year = {1993}, timestamp = {Thu, 03 Jan 2002 11:54:34 +0100}, biburl = {https://dblp.org/rec/conf/chdl/ClarkeGHJLMN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/orl/PardalosJ92, author = {Panos M. Pardalos and Somesh Jha}, title = {Complexity of uniqueness and local search in quadratic 0-1 programming}, journal = {Oper. Res. Lett.}, volume = {11}, number = {2}, pages = {119--123}, year = {1992}, url = {https://doi.org/10.1016/0167-6377(92)90043-3}, doi = {10.1016/0167-6377(92)90043-3}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/orl/PardalosJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.