BibTeX records: Somesh Jha

download as .bib file

@inproceedings{DBLP:conf/wacv/HoodaMFFJ024,
  author       = {Ashish Hooda and
                  Neal Mangaokar and
                  Ryan Feng and
                  Kassem Fawaz and
                  Somesh Jha and
                  Atul Prakash},
  title        = {{D4:} Detection of Adversarial Diffusion Deepfakes Using Disjoint
                  Ensembles},
  booktitle    = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV}
                  2024, Waikoloa, HI, USA, January 3-8, 2024},
  pages        = {3800--3810},
  publisher    = {{IEEE}},
  year         = {2024},
  url          = {https://doi.org/10.1109/WACV57701.2024.00377},
  doi          = {10.1109/WACV57701.2024.00377},
  timestamp    = {Wed, 17 Apr 2024 07:41:22 +0200},
  biburl       = {https://dblp.org/rec/conf/wacv/HoodaMFFJ024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-05980,
  author       = {Ashish Hooda and
                  Mihai Christodorescu and
                  Miltiadis Allamanis and
                  Aaron Wilson and
                  Kassem Fawaz and
                  Somesh Jha},
  title        = {Do Large Code Models Understand Programming Concepts? {A} Black-box
                  Approach},
  journal      = {CoRR},
  volume       = {abs/2402.05980},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.05980},
  doi          = {10.48550/ARXIV.2402.05980},
  eprinttype    = {arXiv},
  eprint       = {2402.05980},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-05980.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-15911,
  author       = {Neal Mangaokar and
                  Ashish Hooda and
                  Jihye Choi and
                  Shreyas Chandrashekaran and
                  Kassem Fawaz and
                  Somesh Jha and
                  Atul Prakash},
  title        = {{PRP:} Propagating Universal Perturbations to Attack Large Language
                  Model Guard-Rails},
  journal      = {CoRR},
  volume       = {abs/2402.15911},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.15911},
  doi          = {10.48550/ARXIV.2402.15911},
  eprinttype    = {arXiv},
  eprint       = {2402.15911},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-15911.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-18649,
  author       = {Fangzhou Wu and
                  Ning Zhang and
                  Somesh Jha and
                  Patrick D. McDaniel and
                  Chaowei Xiao},
  title        = {A New Era in {LLM} Security: Exploring Security Concerns in Real-World
                  LLM-based Systems},
  journal      = {CoRR},
  volume       = {abs/2402.18649},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.18649},
  doi          = {10.48550/ARXIV.2402.18649},
  eprinttype    = {arXiv},
  eprint       = {2402.18649},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-18649.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Elie Bursztein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {6},
  number       = {1},
  pages        = {1--52},
  year         = {2023},
  url          = {https://doi.org/10.1561/3300000041},
  doi          = {10.1561/3300000041},
  timestamp    = {Sun, 24 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DziedzicCDSSKJPW23,
  author       = {Adam Dziedzic and
                  Christopher A. Choquette{-}Choo and
                  Natalie Dullerud and
                  Vinith M. Suriyakumar and
                  Ali Shahin Shamsabadi and
                  Muhammad Ahmad Kaleem and
                  Somesh Jha and
                  Nicolas Papernot and
                  Xiao Wang},
  title        = {Private Multi-Winner Voting for Machine Learning},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {1},
  pages        = {527--555},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0031},
  doi          = {10.56553/POPETS-2023-0031},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/DziedzicCDSSKJPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/ChakrabortyJSM23,
  author       = {Samarjit Chakraborty and
                  Somesh Jha and
                  Soheil Samii and
                  Philipp Mundhenk},
  title        = {Introduction to the Special Issue on Automotive {CPS} Safety {\&}
                  Security: Part 1},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {1:1--1:6},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579986},
  doi          = {10.1145/3579986},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/ChakrabortyJSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/AlhanahnahMGCYJZ23,
  author       = {Mohannad Alhanahnah and
                  Shiqing Ma and
                  Ashish Gehani and
                  Gabriela F. Ciocarlie and
                  Vinod Yegneswaran and
                  Somesh Jha and
                  Xiangyu Zhang},
  title        = {autoMPI: Automated Multiple Perspective Attack Investigation With
                  Semantics Aware Execution Partitioning},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {4},
  pages        = {2761--2775},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2022.3231242},
  doi          = {10.1109/TSE.2022.3231242},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/AlhanahnahMGCYJZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Chen00ZJL23,
  author       = {Joann Qiongna Chen and
                  Tianhao Wang and
                  Zhikun Zhang and
                  Yang Zhang and
                  Somesh Jha and
                  Zhou Li},
  title        = {Differentially Private Resource Allocation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} 2023, Austin,
                  TX, USA, December 4-8, 2023},
  pages        = {772--786},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3627106.3627181},
  doi          = {10.1145/3627106.3627181},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Chen00ZJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FengHMFJ023,
  author       = {Ryan Feng and
                  Ashish Hooda and
                  Neal Mangaokar and
                  Kassem Fawaz and
                  Somesh Jha and
                  Atul Prakash},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Stateful Defenses for Machine Learning Models Are Not Yet Secure Against
                  Black-box Attacks},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {786--800},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623116},
  doi          = {10.1145/3576915.3623116},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FengHMFJ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GargGJMMPW23,
  author       = {Sanjam Garg and
                  Aarushi Goel and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Guru{-}Vamsi Policharla and
                  Mingyuan Wang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Experimenting with Zero-Knowledge Proofs of Training},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1880--1894},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623202},
  doi          = {10.1145/3576915.3623202},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GargGJMMPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/0001YEAPJ23,
  author       = {Jiefeng Chen and
                  Jinsung Yoon and
                  Sayna Ebrahimi and
                  Sercan {\"{O}}. Arik and
                  Tomas Pfister and
                  Somesh Jha},
  editor       = {Houda Bouamor and
                  Juan Pino and
                  Kalika Bali},
  title        = {Adaptation with Self-Evaluation to Improve Selective Prediction in
                  LLMs},
  booktitle    = {Findings of the Association for Computational Linguistics: {EMNLP}
                  2023, Singapore, December 6-10, 2023},
  pages        = {5190--5213},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.findings-emnlp.345},
  doi          = {10.18653/V1/2023.FINDINGS-EMNLP.345},
  timestamp    = {Fri, 12 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/0001YEAPJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/RaghuramZ00JW023,
  author       = {Jayaram Raghuram and
                  Yijing Zeng and
                  Dolores Garc{\'{\i}}a and
                  Rafael Ruiz and
                  Somesh Jha and
                  Joerg Widmer and
                  Suman Banerjee},
  title        = {Few-Shot Domain Adaptation For End-to-End Communication},
  booktitle    = {The Eleventh International Conference on Learning Representations,
                  {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023},
  publisher    = {OpenReview.net},
  year         = {2023},
  url          = {https://openreview.net/pdf?id=4F1gvduDeL},
  timestamp    = {Fri, 30 Jun 2023 14:38:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/RaghuramZ00JW023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/Shi0LR0LJ23,
  author       = {Zhenmei Shi and
                  Jiefeng Chen and
                  Kunyang Li and
                  Jayaram Raghuram and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {The Trade-off between Universality and Label Efficiency of Representations
                  from Contrastive Learning},
  booktitle    = {The Eleventh International Conference on Learning Representations,
                  {ICLR} 2023, Kigali, Rwanda, May 1-5, 2023},
  publisher    = {OpenReview.net},
  year         = {2023},
  url          = {https://openreview.net/pdf?id=rvsbw2YthH\_},
  timestamp    = {Fri, 30 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/Shi0LR0LJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/0001RC0LJ23,
  author       = {Jiefeng Chen and
                  Jayaram Raghuram and
                  Jihye Choi and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Stratified Adversarial Robustness with Rejection},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {4867--4894},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/chen23w.html},
  timestamp    = {Mon, 28 Aug 2023 17:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/0001RC0LJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/ChoiRF0J023,
  author       = {Jihye Choi and
                  Jayaram Raghuram and
                  Ryan Feng and
                  Jiefeng Chen and
                  Somesh Jha and
                  Atul Prakash},
  editor       = {Andreas Krause and
                  Emma Brunskill and
                  Kyunghyun Cho and
                  Barbara Engelhardt and
                  Sivan Sabato and
                  Jonathan Scarlett},
  title        = {Concept-based Explanations for Out-of-Distribution Detectors},
  booktitle    = {International Conference on Machine Learning, {ICML} 2023, 23-29 July
                  2023, Honolulu, Hawaii, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {202},
  pages        = {5817--5837},
  publisher    = {{PMLR}},
  year         = {2023},
  url          = {https://proceedings.mlr.press/v202/choi23e.html},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/ChoiRF0J023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/FranzeseDCTKRFJ23,
  author       = {Nicholas Franzese and
                  Adam Dziedzic and
                  Christopher A. Choquette{-}Choo and
                  Mark R. Thomas and
                  Muhammad Ahmad Kaleem and
                  Stephan Rabanser and
                  Congyu Fang and
                  Somesh Jha and
                  Nicolas Papernot and
                  Xiao Wang},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {Robust and Actively Secure Serverless Collaborative Learning},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/7c5a4b7a31dffef8ce296deedb6214a9-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/FranzeseDCTKRFJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WangVLGJF23,
  author       = {Zifan Wang and
                  Saranya Vijayakumar and
                  Kaiji Lu and
                  Vijay Ganesh and
                  Somesh Jha and
                  Matt Fredrikson},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {Grounding Neural Inference with Satisfiability Modulo Theories},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/47167991e38c65a72914763c11cd8d23-Abstract-Conference.html},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/WangVLGJF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SunSLCLJ23,
  author       = {Zhichuang Sun and
                  Ruimin Sun and
                  Changming Liu and
                  Amrita Roy Chowdhury and
                  Long Lu and
                  Somesh Jha},
  title        = {ShadowNet: {A} Secure and Efficient On-device Model Inference System
                  for Convolutional Neural Networks},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1596--1612},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179382},
  doi          = {10.1109/SP46215.2023.10179382},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SunSLCLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RosenbergTFJ23,
  author       = {Harrison Rosenberg and
                  Brian Tang and
                  Kassem Fawaz and
                  Somesh Jha},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Fairness Properties of Face Recognition and Obfuscation Systems},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {7231--7248},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/rosenberg},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RosenbergTFJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-11435,
  author       = {Matt Fredrikson and
                  Kaiji Lu and
                  Saranya Vijayakumar and
                  Somesh Jha and
                  Vijay Ganesh and
                  Zifan Wang},
  title        = {Learning Modulo Theories},
  journal      = {CoRR},
  volume       = {abs/2301.11435},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.11435},
  doi          = {10.48550/ARXIV.2301.11435},
  eprinttype    = {arXiv},
  eprint       = {2301.11435},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-11435.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-00120,
  author       = {Xi Wu and
                  Joe Benassi and
                  Yaqi Zhang and
                  Uyeong Jang and
                  James Foster and
                  Stella Kim and
                  Yujing Sun and
                  Somesh Jha and
                  John Cieslewicz and
                  Jeffrey F. Naughton},
  title        = {Holistic Cube Analysis: {A} Query Framework for Data Insights},
  journal      = {CoRR},
  volume       = {abs/2302.00120},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.00120},
  doi          = {10.48550/ARXIV.2302.00120},
  eprinttype    = {arXiv},
  eprint       = {2302.00120},
  timestamp    = {Thu, 09 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-00120.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-13525,
  author       = {Somesh Jha and
                  Mihai Christodorescu and
                  Anh Pham},
  title        = {Formal Analysis of the {API} Proxy Problem},
  journal      = {CoRR},
  volume       = {abs/2302.13525},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.13525},
  doi          = {10.48550/ARXIV.2302.13525},
  eprinttype    = {arXiv},
  eprint       = {2302.13525},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-13525.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-00106,
  author       = {Zhenmei Shi and
                  Jiefeng Chen and
                  Kunyang Li and
                  Jayaram Raghuram and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {The Trade-off between Universality and Label Efficiency of Representations
                  from Contrastive Learning},
  journal      = {CoRR},
  volume       = {abs/2303.00106},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.00106},
  doi          = {10.48550/ARXIV.2303.00106},
  eprinttype    = {arXiv},
  eprint       = {2303.00106},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-00106.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-06280,
  author       = {Ryan Feng and
                  Ashish Hooda and
                  Neal Mangaokar and
                  Kassem Fawaz and
                  Somesh Jha and
                  Atul Prakash},
  title        = {Investigating Stateful Defenses Against Black-Box Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/2303.06280},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.06280},
  doi          = {10.48550/ARXIV.2303.06280},
  eprinttype    = {arXiv},
  eprint       = {2303.06280},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-06280.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-13588,
  author       = {Zi Wang and
                  Somesh Jha and
                  Krishnamurthy Dvijotham},
  title        = {Efficient Symbolic Reasoning for Neural-Network Verification},
  journal      = {CoRR},
  volume       = {abs/2303.13588},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.13588},
  doi          = {10.48550/ARXIV.2303.13588},
  eprinttype    = {arXiv},
  eprint       = {2303.13588},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-13588.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-03870,
  author       = {Jiefeng Chen and
                  Jinsung Yoon and
                  Sayna Ebrahimi and
                  Sercan {\"{O}}. Arik and
                  Somesh Jha and
                  Tomas Pfister},
  title        = {{ASPEST:} Bridging the Gap Between Active Learning and Selective Prediction},
  journal      = {CoRR},
  volume       = {abs/2304.03870},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.03870},
  doi          = {10.48550/ARXIV.2304.03870},
  eprinttype    = {arXiv},
  eprint       = {2304.03870},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-03870.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-01139,
  author       = {Jiefeng Chen and
                  Jayaram Raghuram and
                  Jihye Choi and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Stratified Adversarial Robustness with Rejection},
  journal      = {CoRR},
  volume       = {abs/2305.01139},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.01139},
  doi          = {10.48550/ARXIV.2305.01139},
  eprinttype    = {arXiv},
  eprint       = {2305.01139},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-01139.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-15698,
  author       = {Zi Wang and
                  Jihye Choi and
                  Somesh Jha},
  title        = {Rethink Diversity in Deep Learning Testing},
  journal      = {CoRR},
  volume       = {abs/2305.15698},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.15698},
  doi          = {10.48550/ARXIV.2305.15698},
  eprinttype    = {arXiv},
  eprint       = {2305.15698},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-15698.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-17528,
  author       = {Nils Palumbo and
                  Yang Guo and
                  Xi Wu and
                  Jiefeng Chen and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Two Heads are Better than One: Towards Better Adversarial Robustness
                  by Combining Transduction and Rejection},
  journal      = {CoRR},
  volume       = {abs/2305.17528},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.17528},
  doi          = {10.48550/ARXIV.2305.17528},
  eprinttype    = {arXiv},
  eprint       = {2305.17528},
  timestamp    = {Fri, 09 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-17528.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-01292,
  author       = {Debopam Sanyal and
                  Jui{-}Tse Hung and
                  Manav Agrawal and
                  Prahlad Jasti and
                  Shahab Nikkhoo and
                  Somesh Jha and
                  Tianhao Wang and
                  Sibin Mohan and
                  Alexey Tumanov},
  title        = {Pareto-Secure Machine Learning {(PSML):} Fingerprinting and Securing
                  Inference Serving Systems},
  journal      = {CoRR},
  volume       = {abs/2307.01292},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.01292},
  doi          = {10.48550/ARXIV.2307.01292},
  eprinttype    = {arXiv},
  eprint       = {2307.01292},
  timestamp    = {Mon, 10 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-01292.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-16331,
  author       = {Ashish Hooda and
                  Neal Mangaokar and
                  Ryan Feng and
                  Kassem Fawaz and
                  Somesh Jha and
                  Atul Prakash},
  title        = {Theoretically Principled Trade-off for Stateful Defenses against Query-Based
                  Black-Box Attacks},
  journal      = {CoRR},
  volume       = {abs/2307.16331},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.16331},
  doi          = {10.48550/ARXIV.2307.16331},
  eprinttype    = {arXiv},
  eprint       = {2307.16331},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-16331.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-14840,
  author       = {Clark W. Barrett and
                  Brad Boyd and
                  Ellie Burzstein and
                  Nicholas Carlini and
                  Brad Chen and
                  Jihye Choi and
                  Amrita Roy Chowdhury and
                  Mihai Christodorescu and
                  Anupam Datta and
                  Soheil Feizi and
                  Kathleen Fisher and
                  Tatsunori Hashimoto and
                  Dan Hendrycks and
                  Somesh Jha and
                  Daniel Kang and
                  Florian Kerschbaum and
                  Eric Mitchell and
                  John C. Mitchell and
                  Zulfikar Ramzan and
                  Khawaja Shams and
                  Dawn Song and
                  Ankur Taly and
                  Diyi Yang},
  title        = {Identifying and Mitigating the Security Risks of Generative {AI}},
  journal      = {CoRR},
  volume       = {abs/2308.14840},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.14840},
  doi          = {10.48550/ARXIV.2308.14840},
  eprinttype    = {arXiv},
  eprint       = {2308.14840},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-06758,
  author       = {Mohannad Alhanahnah and
                  Philipp Dominik Schubert and
                  Thomas W. Reps and
                  Somesh Jha and
                  Eric Bodden},
  title        = {slash: {A} Technique for Static Configuration-Logic Identification},
  journal      = {CoRR},
  volume       = {abs/2310.06758},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.06758},
  doi          = {10.48550/ARXIV.2310.06758},
  eprinttype    = {arXiv},
  eprint       = {2310.06758},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-06758.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-08015,
  author       = {Jihye Choi and
                  Shruti Tople and
                  Varun Chandrasekaran and
                  Somesh Jha},
  title        = {Why Train More? Effective and Efficient Membership Inference via Memorization},
  journal      = {CoRR},
  volume       = {abs/2310.08015},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.08015},
  doi          = {10.48550/ARXIV.2310.08015},
  eprinttype    = {arXiv},
  eprint       = {2310.08015},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-08015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-11689,
  author       = {Jiefeng Chen and
                  Jinsung Yoon and
                  Sayna Ebrahimi and
                  Sercan {\"{O}}. Arik and
                  Tomas Pfister and
                  Somesh Jha},
  title        = {Adaptation with Self-Evaluation to Improve Selective Prediction in
                  LLMs},
  journal      = {CoRR},
  volume       = {abs/2310.11689},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.11689},
  doi          = {10.48550/ARXIV.2310.11689},
  eprinttype    = {arXiv},
  eprint       = {2310.11689},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-11689.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-16678,
  author       = {Olive Franzese and
                  Adam Dziedzic and
                  Christopher A. Choquette{-}Choo and
                  Mark R. Thomas and
                  Muhammad Ahmad Kaleem and
                  Stephan Rabanser and
                  Congyu Fang and
                  Somesh Jha and
                  Nicolas Papernot and
                  Xiao Wang},
  title        = {Robust and Actively Secure Serverless Collaborative Learning},
  journal      = {CoRR},
  volume       = {abs/2310.16678},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.16678},
  doi          = {10.48550/ARXIV.2310.16678},
  eprinttype    = {arXiv},
  eprint       = {2310.16678},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-16678.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-18491,
  author       = {Jaiden Fairoze and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Mingyuan Wang},
  title        = {Publicly Detectable Watermarking for Language Models},
  journal      = {CoRR},
  volume       = {abs/2310.18491},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.18491},
  doi          = {10.48550/ARXIV.2310.18491},
  eprinttype    = {arXiv},
  eprint       = {2310.18491},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-18491.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-04824,
  author       = {Xi Wu and
                  Xiangyao Yu and
                  Shaleen Deep and
                  Ahmed Mahmood and
                  Uyeong Jang and
                  Stratis Viglas and
                  Somesh Jha and
                  John Cieslewicz and
                  Jeffrey F. Naughton},
  title        = {Bilevel Relations and Their Applications to Data Insights},
  journal      = {CoRR},
  volume       = {abs/2311.04824},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.04824},
  doi          = {10.48550/ARXIV.2311.04824},
  eprinttype    = {arXiv},
  eprint       = {2311.04824},
  timestamp    = {Wed, 15 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-04824.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-13713,
  author       = {Mingtian Tan and
                  Tianhao Wang and
                  Somesh Jha},
  title        = {A Somewhat Robust Image Watermark against Diffusion-based Editing
                  Models},
  journal      = {CoRR},
  volume       = {abs/2311.13713},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.13713},
  doi          = {10.48550/ARXIV.2311.13713},
  eprinttype    = {arXiv},
  eprint       = {2311.13713},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-13713.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGJMMPW23,
  author       = {Sanjam Garg and
                  Aarushi Goel and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Guru{-}Vamsi Policharla and
                  Mingyuan Wang},
  title        = {Experimenting with Zero-Knowledge Proofs of Training},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1345},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1345},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGJMMPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FairozeGJMMW23,
  author       = {Jaiden Fairoze and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Mingyuan Wang},
  title        = {Publicly Detectable Watermarking for Language Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1661},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1661},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FairozeGJMMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/GaneshSJ22,
  author       = {Vijay Ganesh and
                  Sanjit A. Seshia and
                  Somesh Jha},
  title        = {Machine learning and logic: a new frontier in artificial intelligence},
  journal      = {Formal Methods Syst. Des.},
  volume       = {60},
  number       = {3},
  pages        = {426--451},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10703-023-00430-1},
  doi          = {10.1007/S10703-023-00430-1},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fmsd/GaneshSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/WangAPJ22,
  author       = {Zi Wang and
                  Aws Albarghouthi and
                  Gautam Prakriya and
                  Somesh Jha},
  title        = {Interval universal approximation for neural networks},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {6},
  number       = {{POPL}},
  pages        = {1--29},
  year         = {2022},
  url          = {https://doi.org/10.1145/3498675},
  doi          = {10.1145/3498675},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/WangAPJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaddockC0MJ22,
  author       = {Samuel Maddock and
                  Graham Cormode and
                  Tianhao Wang and
                  Carsten Maple and
                  Somesh Jha},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Federated Boosted Decision Trees with Differential Privacy},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2249--2263},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560687},
  doi          = {10.1145/3548606.3560687},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MaddockC0MJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001DJLZ22,
  author       = {Amrita Roy Chowdhury and
                  Bolin Ding and
                  Somesh Jha and
                  Weiran Liu and
                  Jingren Zhou},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Strengthening Order Preserving Encryption with Differential Privacy},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2519--2533},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560610},
  doi          = {10.1145/3548606.3560610},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001DJLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001GJM22,
  author       = {Amrita Roy Chowdhury and
                  Chuan Guo and
                  Somesh Jha and
                  Laurens van der Maaten},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {EIFFeL: Ensuring Integrity for Federated Learning},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2535--2549},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560611},
  doi          = {10.1145/3548606.3560611},
  timestamp    = {Tue, 08 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001GJM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AlhanahnahJRJR22,
  author       = {Mohannad Alhanahnah and
                  Rithik Jain and
                  Vaibhav Rastogi and
                  Somesh Jha and
                  Thomas W. Reps},
  title        = {Lightweight, Multi-Stage, Compiler-Assisted Application Specialization},
  booktitle    = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022, Genoa, Italy, June 6-10, 2022},
  pages        = {251--269},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSP53844.2022.00024},
  doi          = {10.1109/EUROSP53844.2022.00024},
  timestamp    = {Wed, 29 Jun 2022 16:03:24 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/AlhanahnahJRJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/FengMCFJP22,
  author       = {Ryan Feng and
                  Neal Mangaokar and
                  Jiefeng Chen and
                  Earlence Fernandes and
                  Somesh Jha and
                  Atul Prakash},
  title        = {{GRAPHITE:} Generating Automatic Physical Examples for Machine-Learning
                  Attacks on Computer Vision Systems},
  booktitle    = {7th {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2022, Genoa, Italy, June 6-10, 2022},
  pages        = {664--683},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/EuroSP53844.2022.00047},
  doi          = {10.1109/EUROSP53844.2022.00047},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/FengMCFJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/00010GLJ22,
  author       = {Jiefeng Chen and
                  Xi Wu and
                  Yang Guo and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Towards Evaluating the Robustness of Neural Networks Learned by Transduction},
  booktitle    = {The Tenth International Conference on Learning Representations, {ICLR}
                  2022, Virtual Event, April 25-29, 2022},
  publisher    = {OpenReview.net},
  year         = {2022},
  url          = {https://openreview.net/forum?id=\_5js\_8uTrx1},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/00010GLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/Meehan0CJ22,
  author       = {Casey Meehan and
                  Amrita Roy Chowdhury and
                  Kamalika Chaudhuri and
                  Somesh Jha},
  title        = {Privacy Implications of Shuffling},
  booktitle    = {The Tenth International Conference on Learning Representations, {ICLR}
                  2022, Virtual Event, April 25-29, 2022},
  publisher    = {OpenReview.net},
  year         = {2022},
  url          = {https://openreview.net/forum?id=5i2f-aR6B8H},
  timestamp    = {Sat, 20 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/Meehan0CJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/GargJMMW22,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Mingyuan Wang},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {Overparameterization from Computational Constraints},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/57e48ac3aa4d107979bf5c6ebc9fe99d-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/GargJMMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WangAMWCJ22,
  author       = {Yizhen Wang and
                  Mohannad Alhanahnah and
                  Xiaozhu Meng and
                  Ke Wang and
                  Mihai Christodorescu and
                  Somesh Jha},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {Robust Learning against Relational Adversaries},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/6752ced903c3f0265108caa10933965f-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/WangAMWCJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/WangPJ22,
  author       = {Zi Wang and
                  Gautam Prakriya and
                  Somesh Jha},
  editor       = {Sanmi Koyejo and
                  S. Mohamed and
                  A. Agarwal and
                  Danielle Belgrave and
                  K. Cho and
                  A. Oh},
  title        = {A Quantitative Geometric Approach to Neural-Network Smoothness},
  booktitle    = {Advances in Neural Information Processing Systems 35: Annual Conference
                  on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans,
                  LA, USA, November 28 - December 9, 2022},
  year         = {2022},
  url          = {http://papers.nips.cc/paper\_files/paper/2022/hash/dd1322ce23cbbdd9d7ebb0ad1223c27a-Abstract-Conference.html},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/WangPJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/HenkelRWAJR22,
  author       = {Jordan Henkel and
                  Goutham Ramakrishnan and
                  Zi Wang and
                  Aws Albarghouthi and
                  Somesh Jha and
                  Thomas W. Reps},
  title        = {Semantic Robustness of Models of Source Code},
  booktitle    = {{IEEE} International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022},
  pages        = {526--537},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SANER53432.2022.00070},
  doi          = {10.1109/SANER53432.2022.00070},
  timestamp    = {Tue, 26 Jul 2022 14:23:17 +0200},
  biburl       = {https://dblp.org/rec/conf/wcre/HenkelRWAJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-04530,
  author       = {Harrison Rosenberg and
                  Robi Bhattacharjee and
                  Kassem Fawaz and
                  Somesh Jha},
  title        = {An Exploration of Multicalibration Uniform Convergence Bounds},
  journal      = {CoRR},
  volume       = {abs/2202.04530},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.04530},
  eprinttype    = {arXiv},
  eprint       = {2202.04530},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-04530.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-05687,
  author       = {Ashish Hooda and
                  Neal Mangaokar and
                  Ryan Feng and
                  Kassem Fawaz and
                  Somesh Jha and
                  Atul Prakash},
  title        = {Towards Adversarially Robust Deepfake Detection: An Ensemble Approach},
  journal      = {CoRR},
  volume       = {abs/2202.05687},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.05687},
  eprinttype    = {arXiv},
  eprint       = {2202.05687},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-05687.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-10014,
  author       = {Aiping Xiong and
                  Chuhao Wu and
                  Tianhao Wang and
                  Robert W. Proctor and
                  Jeremiah Blocki and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Using Illustrations to Communicate Differential Privacy Trust Models:
                  An Investigation of Users' Comprehension, Perception, and Data Sharing
                  Decision},
  journal      = {CoRR},
  volume       = {abs/2202.10014},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.10014},
  eprinttype    = {arXiv},
  eprint       = {2202.10014},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-10014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-01212,
  author       = {Zi Wang and
                  Gautam Prakriya and
                  Somesh Jha},
  title        = {A Quantitative Geometric Approach to Neural Network Smoothness},
  journal      = {CoRR},
  volume       = {abs/2203.01212},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.01212},
  doi          = {10.48550/ARXIV.2203.01212},
  eprinttype    = {arXiv},
  eprint       = {2203.01212},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-01212.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-02586,
  author       = {Jihye Choi and
                  Jayaram Raghuram and
                  Ryan Feng and
                  Jiefeng Chen and
                  Somesh Jha and
                  Atul Prakash},
  title        = {Concept-based Explanations for Out-Of-Distribution Detectors},
  journal      = {CoRR},
  volume       = {abs/2203.02586},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.02586},
  doi          = {10.48550/ARXIV.2203.02586},
  eprinttype    = {arXiv},
  eprint       = {2203.02586},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-02586.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2204-06106,
  author       = {Saeed Mahloujifar and
                  Alexandre Sablayrolles and
                  Graham Cormode and
                  Somesh Jha},
  title        = {Optimal Membership Inference Bounds for Adaptive Composition of Sampled
                  Gaussian Mechanisms},
  journal      = {CoRR},
  volume       = {abs/2204.06106},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2204.06106},
  doi          = {10.48550/ARXIV.2204.06106},
  eprinttype    = {arXiv},
  eprint       = {2204.06106},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2204-06106.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-08989,
  author       = {Ryan Feng and
                  Somesh Jha and
                  Atul Prakash},
  title        = {Constraining the Attack Space of Machine Learning Models with Distribution
                  Clamping Preprocessing},
  journal      = {CoRR},
  volume       = {abs/2205.08989},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.08989},
  doi          = {10.48550/ARXIV.2205.08989},
  eprinttype    = {arXiv},
  eprint       = {2205.08989},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-08989.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-12926,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Mingyuan Wang},
  title        = {Overparameterized (robust) models from computational constraints},
  journal      = {CoRR},
  volume       = {abs/2208.12926},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.12926},
  doi          = {10.48550/ARXIV.2208.12926},
  eprinttype    = {arXiv},
  eprint       = {2208.12926},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-12926.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-02910,
  author       = {Samuel Maddock and
                  Graham Cormode and
                  Tianhao Wang and
                  Carsten Maple and
                  Somesh Jha},
  title        = {Federated Boosted Decision Trees with Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2210.02910},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.02910},
  doi          = {10.48550/ARXIV.2210.02910},
  eprinttype    = {arXiv},
  eprint       = {2210.02910},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-02910.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-15410,
  author       = {Adam Dziedzic and
                  Christopher A. Choquette{-}Choo and
                  Natalie Dullerud and
                  Vinith Menon Suriyakumar and
                  Ali Shahin Shamsabadi and
                  Muhammad Ahmad Kaleem and
                  Somesh Jha and
                  Nicolas Papernot and
                  Xiao Wang},
  title        = {Private Multi-Winner Voting for Machine Learning},
  journal      = {CoRR},
  volume       = {abs/2211.15410},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.15410},
  doi          = {10.48550/ARXIV.2211.15410},
  eprinttype    = {arXiv},
  eprint       = {2211.15410},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-15410.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/BardinJG22,
  author       = {S{\'{e}}bastien Bardin and
                  Somesh Jha and
                  Vijay Ganesh},
  title        = {Machine Learning and Logical Reasoning: The New Frontier (Dagstuhl
                  Seminar 22291)},
  journal      = {Dagstuhl Reports},
  volume       = {12},
  number       = {7},
  pages        = {80--111},
  year         = {2022},
  url          = {https://doi.org/10.4230/DagRep.12.7.80},
  doi          = {10.4230/DAGREP.12.7.80},
  timestamp    = {Tue, 07 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/BardinJG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/LarsenSWJ21,
  author       = {Kim G. Larsen and
                  Natarajan Shankar and
                  Pierre Wolper and
                  Somesh Jha},
  title        = {2018 {CAV} award},
  journal      = {Formal Methods Syst. Des.},
  volume       = {57},
  number       = {1},
  pages        = {116--117},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10703-021-00375-3},
  doi          = {10.1007/S10703-021-00375-3},
  timestamp    = {Tue, 27 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fmsd/LarsenSWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChandrasekaranG21,
  author       = {Varun Chandrasekaran and
                  Chuhan Gao and
                  Brian Tang and
                  Kassem Fawaz and
                  Somesh Jha and
                  Suman Banerjee},
  title        = {Face-Off: Adversarial Face Obfuscation},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {2},
  pages        = {369--390},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0032},
  doi          = {10.2478/POPETS-2021-0032},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/ChandrasekaranG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0001LJ21,
  author       = {Tianhao Wang and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Locally Differentially Private Heavy Hitter Identification},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {982--993},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2927695},
  doi          = {10.1109/TDSC.2019.2927695},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/0001LJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/IrshadCGYLPJKXZ21,
  author       = {Hassaan Irshad and
                  Gabriela F. Ciocarlie and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Kyu Hyung Lee and
                  Jignesh M. Patel and
                  Somesh Jha and
                  Yonghwi Kwon and
                  Dongyan Xu and
                  Xiangyu Zhang},
  title        = {{TRACE:} Enterprise-Wide Provenance Tracking for Real-Time {APT} Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4363--4376},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3098977},
  doi          = {10.1109/TIFS.2021.3098977},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/IrshadCGYLPJKXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/Jha21,
  author       = {Somesh Jha},
  editor       = {Jiannong Cao and
                  Man Ho Au and
                  Zhiqiang Lin and
                  Moti Yung},
  title        = {Trustworthy Machine Learning: Past, Present, and Future},
  booktitle    = {{ASIA} {CCS} '21: {ACM} Asia Conference on Computer and Communications
                  Security, Virtual Event, Hong Kong, June 7-11, 2021},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3433210.3460015},
  doi          = {10.1145/3433210.3460015},
  timestamp    = {Wed, 09 Jun 2021 15:14:39 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/Jha21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001C0SC0LJ21,
  author       = {Tianhao Wang and
                  Joann Qiongna Chen and
                  Zhikun Zhang and
                  Dong Su and
                  Yueqiang Cheng and
                  Zhou Li and
                  Ninghui Li and
                  Somesh Jha},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Continuous Release of Data Streams under both Centralized and Local
                  Differential Privacy},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1237--1253},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484750},
  doi          = {10.1145/3460120.3484750},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001C0SC0LJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GarciaCCABJ21,
  author       = {Washington Garcia and
                  Animesh Chhotaray and
                  Joseph I. Choi and
                  Suman Kalyan Adari and
                  Kevin R. B. Butler and
                  Somesh Jha},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Brittle Features of Device Authentication},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {53--64},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3447842},
  doi          = {10.1145/3422337.3447842},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GarciaCCABJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/Choquette-ChooD21,
  author       = {Christopher A. Choquette{-}Choo and
                  Natalie Dullerud and
                  Adam Dziedzic and
                  Yunxiang Zhang and
                  Somesh Jha and
                  Nicolas Papernot and
                  Xiao Wang},
  title        = {CaPC Learning: Confidential and Private Collaborative Learning},
  booktitle    = {9th International Conference on Learning Representations, {ICLR} 2021,
                  Virtual Event, Austria, May 3-7, 2021},
  publisher    = {OpenReview.net},
  year         = {2021},
  url          = {https://openreview.net/forum?id=h2EbJ4\_wMVq},
  timestamp    = {Sat, 04 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iclr/Choquette-ChooD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/BhattacharjeeJC21,
  author       = {Robi Bhattacharjee and
                  Somesh Jha and
                  Kamalika Chaudhuri},
  editor       = {Marina Meila and
                  Tong Zhang},
  title        = {Sample Complexity of Robust Linear Classification on Separated Data},
  booktitle    = {Proceedings of the 38th International Conference on Machine Learning,
                  {ICML} 2021, 18-24 July 2021, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {139},
  pages        = {884--893},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {http://proceedings.mlr.press/v139/bhattacharjee21a.html},
  timestamp    = {Wed, 25 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/BhattacharjeeJC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/RaghuramCJB21,
  author       = {Jayaram Raghuram and
                  Varun Chandrasekaran and
                  Somesh Jha and
                  Suman Banerjee},
  editor       = {Marina Meila and
                  Tong Zhang},
  title        = {A General Framework For Detecting Anomalous Inputs to {DNN} Classifiers},
  booktitle    = {Proceedings of the 38th International Conference on Machine Learning,
                  {ICML} 2021, 18-24 July 2021, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {139},
  pages        = {8764--8775},
  publisher    = {{PMLR}},
  year         = {2021},
  url          = {http://proceedings.mlr.press/v139/raghuram21a.html},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/RaghuramCJB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/DengGJMMT21,
  author       = {Samuel Deng and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Abhradeep Guha Thakurta},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {A Separation Result Between Data-oblivious and Data-aware Poisoning
                  Attacks},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {10862--10875},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/5a499f6e26313e19bd4049009bbed5bd-Abstract.html},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/DengGJMMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/ChenLAWLJ21,
  author       = {Jiefeng Chen and
                  Frederick Liu and
                  Besim Avci and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  editor       = {Marc'Aurelio Ranzato and
                  Alina Beygelzimer and
                  Yann N. Dauphin and
                  Percy Liang and
                  Jennifer Wortman Vaughan},
  title        = {Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training
                  Ensembles},
  booktitle    = {Advances in Neural Information Processing Systems 34: Annual Conference
                  on Neural Information Processing Systems 2021, NeurIPS 2021, December
                  6-14, 2021, virtual},
  pages        = {14980--14992},
  year         = {2021},
  url          = {https://proceedings.neurips.cc/paper/2021/hash/7dd3ed2e12d7967b656d156d50308263-Abstract.html},
  timestamp    = {Tue, 03 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/ChenLAWLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/ChenLWLJ21,
  author       = {Jiefeng Chen and
                  Yixuan Li and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  editor       = {Nuria Oliver and
                  Fernando P{\'{e}}rez{-}Cruz and
                  Stefan Kramer and
                  Jesse Read and
                  Jos{\'{e}} Antonio Lozano},
  title        = {{ATOM:} Robustifying Out-of-Distribution Detection Using Outlier Mining},
  booktitle    = {Machine Learning and Knowledge Discovery in Databases. Research Track
                  - European Conference, {ECML} {PKDD} 2021, Bilbao, Spain, September
                  13-17, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12977},
  pages        = {430--445},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86523-8\_26},
  doi          = {10.1007/978-3-030-86523-8\_26},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkdd/ChenLWLJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CarliniDGJMMTT21,
  author       = {Nicholas Carlini and
                  Samuel Deng and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Abhradeep Thakurta and
                  Florian Tram{\`{e}}r},
  title        = {Is Private Learning Possible with Instance Encoding?},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {410--427},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00099},
  doi          = {10.1109/SP40001.2021.00099},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/CarliniDGJMMTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-05188,
  author       = {Christopher A. Choquette{-}Choo and
                  Natalie Dullerud and
                  Adam Dziedzic and
                  Yunxiang Zhang and
                  Somesh Jha and
                  Nicolas Papernot and
                  Xiao Wang},
  title        = {CaPC Learning: Confidential and Private Collaborative Learning},
  journal      = {CoRR},
  volume       = {abs/2102.05188},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.05188},
  eprinttype    = {arXiv},
  eprint       = {2102.05188},
  timestamp    = {Sat, 04 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-05188.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-07265,
  author       = {Thomas Kobber Panum and
                  Zi Wang and
                  Pengyu Kan and
                  Earlence Fernandes and
                  Somesh Jha},
  title        = {Exploring Adversarial Robustness of Deep Metric Learning},
  journal      = {CoRR},
  volume       = {abs/2102.07265},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.07265},
  eprinttype    = {arXiv},
  eprint       = {2102.07265},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-07265.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-03325,
  author       = {Washington Garcia and
                  Pin{-}Yu Chen and
                  Somesh Jha and
                  Scott Clouse and
                  Kevin R. B. Butler},
  title        = {Hard-label Manifolds: Unexpected Advantages of Query Efficiency for
                  Finding On-manifold Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/2103.03325},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.03325},
  eprinttype    = {arXiv},
  eprint       = {2103.03325},
  timestamp    = {Mon, 15 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-03325.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-13144,
  author       = {Varun Chandrasekaran and
                  Darren Edge and
                  Somesh Jha and
                  Amit Sharma and
                  Cheng Zhang and
                  Shruti Tople},
  title        = {Causally Constrained Data Synthesis for Private Data Release},
  journal      = {CoRR},
  volume       = {abs/2105.13144},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.13144},
  eprinttype    = {arXiv},
  eprint       = {2105.13144},
  timestamp    = {Tue, 03 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-13144.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-06603,
  author       = {Casey Meehan and
                  Amrita Roy Chowdhury and
                  Kamalika Chaudhuri and
                  Somesh Jha},
  title        = {A Shuffling Framework for Local Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2106.06603},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.06603},
  eprinttype    = {arXiv},
  eprint       = {2106.06603},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-06603.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-08387,
  author       = {Jiefeng Chen and
                  Yang Guo and
                  Xi Wu and
                  Tianqi Li and
                  Qicheng Lao and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Towards Adversarial Robustness via Transductive Learning},
  journal      = {CoRR},
  volume       = {abs/2106.08387},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.08387},
  eprinttype    = {arXiv},
  eprint       = {2106.08387},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-08387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-15728,
  author       = {Jiefeng Chen and
                  Frederick Liu and
                  Besim Avci and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training
                  Ensembles},
  journal      = {CoRR},
  volume       = {abs/2106.15728},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.15728},
  eprinttype    = {arXiv},
  eprint       = {2106.15728},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-15728.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-00874,
  author       = {Jayaram Raghuram and
                  Yijing Zeng and
                  Dolores Garc{\'{\i}}a Mart{\'{\i}} and
                  Somesh Jha and
                  Suman Banerjee and
                  Joerg Widmer and
                  Rafael Ruiz Ortiz},
  title        = {Domain Adaptation for Autoencoder-Based End-to-End Communication Over
                  Wireless Channels},
  journal      = {CoRR},
  volume       = {abs/2108.00874},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.00874},
  eprinttype    = {arXiv},
  eprint       = {2108.00874},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-00874.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-02707,
  author       = {Harrison Rosenberg and
                  Brian Tang and
                  Kassem Fawaz and
                  Somesh Jha},
  title        = {Fairness Properties of Face Recognition and Obfuscation Systems},
  journal      = {CoRR},
  volume       = {abs/2108.02707},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.02707},
  eprinttype    = {arXiv},
  eprint       = {2108.02707},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-02707.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-07256,
  author       = {Nicholas Carlini and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Florian Tram{\`{e}}r},
  title        = {NeuraCrypt is not private},
  journal      = {CoRR},
  volume       = {abs/2108.07256},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.07256},
  eprinttype    = {arXiv},
  eprint       = {2108.07256},
  timestamp    = {Fri, 20 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-07256.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-02775,
  author       = {Mohannad Alhanahnah and
                  Rithik Jain and
                  Vaibhav Rastogi and
                  Somesh Jha and
                  Thomas W. Reps},
  title        = {Lightweight, Multi-Stage, Compiler-Assisted Application Specialization},
  journal      = {CoRR},
  volume       = {abs/2109.02775},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.02775},
  eprinttype    = {arXiv},
  eprint       = {2109.02775},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-02775.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-14735,
  author       = {Jiefeng Chen and
                  Xi Wu and
                  Yang Guo and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Towards Evaluating the Robustness of Neural Networks Learned by Transduction},
  journal      = {CoRR},
  volume       = {abs/2110.14735},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.14735},
  eprinttype    = {arXiv},
  eprint       = {2110.14735},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-14735.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-12727,
  author       = {Amrita Roy Chowdhury and
                  Chuan Guo and
                  Somesh Jha and
                  Laurens van der Maaten},
  title        = {EIFFeL: Ensuring Integrity for Federated Learning},
  journal      = {CoRR},
  volume       = {abs/2112.12727},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.12727},
  eprinttype    = {arXiv},
  eprint       = {2112.12727},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-12727.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dt/SeshiaJD20,
  author       = {Sanjit A. Seshia and
                  Somesh Jha and
                  Tommaso Dreossi},
  title        = {Semantic Adversarial Deep Learning},
  journal      = {{IEEE} Des. Test},
  volume       = {37},
  number       = {2},
  pages        = {8--18},
  year         = {2020},
  url          = {https://doi.org/10.1109/MDAT.2020.2968274},
  doi          = {10.1109/MDAT.2020.2968274},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dt/SeshiaJD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/YeomGMFJ20,
  author       = {Samuel Yeom and
                  Irene Giacomelli and
                  Alan Menaged and
                  Matt Fredrikson and
                  Somesh Jha},
  title        = {Overfitting, robustness, and malicious algorithms: {A} study of potential
                  causes of privacy risk in machine learning},
  journal      = {J. Comput. Secur.},
  volume       = {28},
  number       = {1},
  pages        = {35--70},
  year         = {2020},
  url          = {https://doi.org/10.3233/JCS-191362},
  doi          = {10.3233/JCS-191362},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/YeomGMFJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/WangXDZHHLJ20,
  author       = {Tianhao Wang and
                  Min Xu and
                  Bolin Ding and
                  Jingren Zhou and
                  Cheng Hong and
                  Zhicong Huang and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Improving Utility and Security of the Shuffler-based Differential
                  Privacy},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {13},
  number       = {13},
  pages        = {3545--3558},
  year         = {2020},
  url          = {http://www.vldb.org/pvldb/vol13/p3545-wang.pdf},
  doi          = {10.14778/3424573.3424576},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pvldb/WangXDZHHLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/alt/GargJMM20,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  editor       = {Aryeh Kontorovich and
                  Gergely Neu},
  title        = {Adversarially Robust Learning Could Leverage Computational Hardness},
  booktitle    = {Algorithmic Learning Theory, {ALT} 2020, 8-11 February 2020, San Diego,
                  CA, {USA}},
  series       = {Proceedings of Machine Learning Research},
  volume       = {117},
  pages        = {364--385},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v117/garg20a.html},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/alt/GargJMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iclr/JangJJ20,
  author       = {Uyeong Jang and
                  Susmit Jha and
                  Somesh Jha},
  title        = {On the Need for Topology-Aware Generative Models for Manifold-Based
                  Defenses},
  booktitle    = {8th International Conference on Learning Representations, {ICLR} 2020,
                  Addis Ababa, Ethiopia, April 26-30, 2020},
  publisher    = {OpenReview.net},
  year         = {2020},
  url          = {https://openreview.net/forum?id=r1lF\_CEYwS},
  timestamp    = {Thu, 07 May 2020 17:11:47 +0200},
  biburl       = {https://dblp.org/rec/conf/iclr/JangJJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/ChalasaniC00J20,
  author       = {Prasad Chalasani and
                  Jiefeng Chen and
                  Amrita Roy Chowdhury and
                  Xi Wu and
                  Somesh Jha},
  title        = {Concise Explanations of Neural Networks using Adversarial Training},
  booktitle    = {Proceedings of the 37th International Conference on Machine Learning,
                  {ICML} 2020, 13-18 July 2020, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {119},
  pages        = {1383--1391},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v119/chalasani20a.html},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/ChalasaniC00J20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/0001RJ20,
  author       = {Amrita Roy Chowdhury and
                  Theodoros Rekatsinas and
                  Somesh Jha},
  title        = {Data-Dependent Differentially Private Parameter Learning for Directed
                  Graphical Models},
  booktitle    = {Proceedings of the 37th International Conference on Machine Learning,
                  {ICML} 2020, 13-18 July 2020, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {119},
  pages        = {1939--1951},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v119/chowdhury20a.html},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/0001RJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/0058PJCP20,
  author       = {Wei Zhang and
                  Thomas Kobber Panum and
                  Somesh Jha and
                  Prasad Chalasani and
                  David Page},
  title        = {{CAUSE:} Learning Granger Causality from Event Sequences using Attribution
                  Methods},
  booktitle    = {Proceedings of the 37th International Conference on Machine Learning,
                  {ICML} 2020, 13-18 July 2020, Virtual Event},
  series       = {Proceedings of Machine Learning Research},
  volume       = {119},
  pages        = {11235--11245},
  publisher    = {{PMLR}},
  year         = {2020},
  url          = {http://proceedings.mlr.press/v119/zhang20v.html},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/0058PJCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/ChowdhuryW0MJ20,
  author       = {Amrita Roy Chowdhury and
                  Chenghong Wang and
                  Xi He and
                  Ashwin Machanavajjhala and
                  Somesh Jha},
  editor       = {David Maier and
                  Rachel Pottinger and
                  AnHai Doan and
                  Wang{-}Chiew Tan and
                  Abdussalam Alawini and
                  Hung Q. Ngo},
  title        = {Crypt?: Crypto-Assisted Differential Privacy on Untrusted Servers},
  booktitle    = {Proceedings of the 2020 International Conference on Management of
                  Data, {SIGMOD} Conference 2020, online conference [Portland, OR, USA],
                  June 14-19, 2020},
  pages        = {603--619},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3318464.3380596},
  doi          = {10.1145/3318464.3380596},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/ChowdhuryW0MJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Xiong0LJ20,
  author       = {Aiping Xiong and
                  Tianhao Wang and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Towards Effective Differential Privacy Communication for Users' Data
                  Sharing Decision and Comprehension},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {392--410},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00088},
  doi          = {10.1109/SP40000.2020.00088},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Xiong0LJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SunFLJ20,
  author       = {Zhichuang Sun and
                  Bo Feng and
                  Long Lu and
                  Somesh Jha},
  title        = {{OAT:} Attesting Operation Integrity of Embedded Devices},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {1433--1449},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00042},
  doi          = {10.1109/SP40000.2020.00042},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/SunFLJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChandrasekaranC20,
  author       = {Varun Chandrasekaran and
                  Kamalika Chaudhuri and
                  Irene Giacomelli and
                  Somesh Jha and
                  Songbai Yan},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Exploring Connections Between Active Learning and Model Extraction},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1309--1326},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/chandrasekaran},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChandrasekaranC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-03043,
  author       = {Goutham Ramakrishnan and
                  Jordan Henkel and
                  Zi Wang and
                  Aws Albarghouthi and
                  Somesh Jha and
                  Thomas W. Reps},
  title        = {Semantic Robustness of Models of Source Code},
  journal      = {CoRR},
  volume       = {abs/2002.03043},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.03043},
  eprinttype    = {arXiv},
  eprint       = {2002.03043},
  timestamp    = {Wed, 12 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-03043.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-07088,
  author       = {Ryan Feng and
                  Jiefeng Chen and
                  Nelson R. Manohar and
                  Earlence Fernandes and
                  Somesh Jha and
                  Atul Prakash},
  title        = {Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual
                  Classification},
  journal      = {CoRR},
  volume       = {abs/2002.07088},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.07088},
  eprinttype    = {arXiv},
  eprint       = {2002.07088},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-07088.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-07906,
  author       = {Wei Zhang and
                  Thomas Kobber Panum and
                  Somesh Jha and
                  Prasad Chalasani and
                  David Page},
  title        = {{CAUSE:} Learning Granger Causality from Event Sequences using Attribution
                  Methods},
  journal      = {CoRR},
  volume       = {abs/2002.07906},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.07906},
  eprinttype    = {arXiv},
  eprint       = {2002.07906},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-07906.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-01595,
  author       = {Yue Gao and
                  Harrison Rosenberg and
                  Kassem Fawaz and
                  Somesh Jha and
                  Justin Hsu},
  title        = {Analyzing Accuracy Loss in Randomized Smoothing Defenses},
  journal      = {CoRR},
  volume       = {abs/2003.01595},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.01595},
  eprinttype    = {arXiv},
  eprint       = {2003.01595},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-01595.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-08861,
  author       = {Chuhan Gao and
                  Varun Chandrasekaran and
                  Kassem Fawaz and
                  Somesh Jha},
  title        = {Face-Off: Adversarial Face Obfuscation},
  journal      = {CoRR},
  volume       = {abs/2003.08861},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.08861},
  eprinttype    = {arXiv},
  eprint       = {2003.08861},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-08861.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-09711,
  author       = {Jiefeng Chen and
                  Yixuan Li and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Robust Out-of-distribution Detection in Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2003.09711},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.09711},
  eprinttype    = {arXiv},
  eprint       = {2003.09711},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-09711.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-12020,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Abhradeep Thakurta},
  title        = {Obliviousness Makes Poisoning Adversaries Weaker},
  journal      = {CoRR},
  volume       = {abs/2003.12020},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.12020},
  eprinttype    = {arXiv},
  eprint       = {2003.12020},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-12020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-13922,
  author       = {Aiping Xiong and
                  Tianhao Wang and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Towards Effective Differential Privacy Communication for Users' Data
                  Sharing Decision and Comprehension},
  journal      = {CoRR},
  volume       = {abs/2003.13922},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.13922},
  eprinttype    = {arXiv},
  eprint       = {2003.13922},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-13922.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-10390,
  author       = {Xi Wu and
                  Yang Guo and
                  Jiefeng Chen and
                  Yingyu Liang and
                  Somesh Jha and
                  Prasad Chalasani},
  title        = {Representation Bayesian Risk Decompositions and Multi-Source Domain
                  Adaptation},
  journal      = {CoRR},
  volume       = {abs/2004.10390},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.10390},
  eprinttype    = {arXiv},
  eprint       = {2004.10390},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-10390.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-11753,
  author       = {Tianhao Wang and
                  Joann Qiongna Chen and
                  Zhikun Zhang and
                  Dong Su and
                  Yueqiang Cheng and
                  Zhou Li and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Continuous Release of Data Streams under both Centralized and Local
                  Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2005.11753},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.11753},
  eprinttype    = {arXiv},
  eprint       = {2005.11753},
  timestamp    = {Fri, 23 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-11753.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-15207,
  author       = {Jiefeng Chen and
                  Yixuan Li and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Robust Out-of-distribution Detection via Informative Outlier Mining},
  journal      = {CoRR},
  volume       = {abs/2006.15207},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.15207},
  eprinttype    = {arXiv},
  eprint       = {2006.15207},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-15207.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-00772,
  author       = {Yizhen Wang and
                  Xiaozhu Meng and
                  Mihai Christodorescu and
                  Somesh Jha},
  title        = {Robust Learning against Logical Adversaries},
  journal      = {CoRR},
  volume       = {abs/2007.00772},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.00772},
  eprinttype    = {arXiv},
  eprint       = {2007.00772},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-00772.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-06093,
  author       = {Zi Wang and
                  Aws Albarghouthi and
                  Somesh Jha},
  title        = {Abstract Universal Approximation for Neural Networks},
  journal      = {CoRR},
  volume       = {abs/2007.06093},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.06093},
  eprinttype    = {arXiv},
  eprint       = {2007.06093},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-06093.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-15147,
  author       = {Jayaram Raghuram and
                  Varun Chandrasekaran and
                  Somesh Jha and
                  Suman Banerjee},
  title        = {Detecting Anomalous Inputs to {DNN} Classifiers By Joint Statistical
                  Testing at the Layers},
  journal      = {CoRR},
  volume       = {abs/2007.15147},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.15147},
  eprinttype    = {arXiv},
  eprint       = {2007.15147},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-15147.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-05679,
  author       = {Amrita Roy Chowdhury and
                  Bolin Ding and
                  Somesh Jha and
                  Weiran Liu and
                  Jingren Zhou},
  title        = {Intertwining Order Preserving Encryption and Differential Privacy},
  journal      = {CoRR},
  volume       = {abs/2009.05679},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.05679},
  eprinttype    = {arXiv},
  eprint       = {2009.05679},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-05679.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-05315,
  author       = {Nicholas Carlini and
                  Samuel Deng and
                  Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody and
                  Shuang Song and
                  Abhradeep Thakurta and
                  Florian Tram{\`{e}}r},
  title        = {An Attack on InstaHide: Is Private Learning Possible with Instance
                  Encoding?},
  journal      = {CoRR},
  volume       = {abs/2011.05315},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.05315},
  eprinttype    = {arXiv},
  eprint       = {2011.05315},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-05315.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-05905,
  author       = {Zhichuang Sun and
                  Ruimin Sun and
                  Long Lu and
                  Somesh Jha},
  title        = {ShadowNet: {A} Secure and Efficient System for On-device Model Inference},
  journal      = {CoRR},
  volume       = {abs/2011.05905},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.05905},
  eprinttype    = {arXiv},
  eprint       = {2011.05905},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-05905.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-10794,
  author       = {Robi Bhattacharjee and
                  Somesh Jha and
                  Kamalika Chaudhuri},
  title        = {Sample Complexity of Adversarially Robust Linear Classification on
                  Separated Data},
  journal      = {CoRR},
  volume       = {abs/2012.10794},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.10794},
  eprinttype    = {arXiv},
  eprint       = {2012.10794},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-10794.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/Chen0RLJ19,
  author       = {Jiefeng Chen and
                  Xi Wu and
                  Vaibhav Rastogi and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Towards Understanding Limitations of Pixel Discretization Against
                  Adversarial Attacks},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {480--495},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00042},
  doi          = {10.1109/EUROSP.2019.00042},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/Chen0RLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/JhaRFJJJVS19,
  author       = {Susmit Jha and
                  Sunny Raj and
                  Steven Lawrence Fernandes and
                  Sumit Kumar Jha and
                  Somesh Jha and
                  Brian Jalaian and
                  Gunjan Verma and
                  Ananthram Swami},
  editor       = {Hanna M. Wallach and
                  Hugo Larochelle and
                  Alina Beygelzimer and
                  Florence d'Alch{\'{e}}{-}Buc and
                  Emily B. Fox and
                  Roman Garnett},
  title        = {Attribution-Based Confidence Metric For Deep Neural Networks},
  booktitle    = {Advances in Neural Information Processing Systems 32: Annual Conference
                  on Neural Information Processing Systems 2019, NeurIPS 2019, December
                  8-14, 2019, Vancouver, BC, Canada},
  pages        = {11826--11837},
  year         = {2019},
  url          = {https://proceedings.neurips.cc/paper/2019/hash/bc1ad6e8f86c42a371aff945535baebb-Abstract.html},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/JhaRFJJJVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/Chen0RLJ19,
  author       = {Jiefeng Chen and
                  Xi Wu and
                  Vaibhav Rastogi and
                  Yingyu Liang and
                  Somesh Jha},
  editor       = {Hanna M. Wallach and
                  Hugo Larochelle and
                  Alina Beygelzimer and
                  Florence d'Alch{\'{e}}{-}Buc and
                  Emily B. Fox and
                  Roman Garnett},
  title        = {Robust Attribution Regularization},
  booktitle    = {Advances in Neural Information Processing Systems 32: Annual Conference
                  on Neural Information Processing Systems 2019, NeurIPS 2019, December
                  8-14, 2019, Vancouver, BC, Canada},
  pages        = {14300--14310},
  year         = {2019},
  url          = {https://proceedings.neurips.cc/paper/2019/hash/172ef5a94b4dd0aa120c6878fc29f70c-Abstract.html},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/Chen0RLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/WangDZHHLJ19,
  author       = {Tianhao Wang and
                  Bolin Ding and
                  Jingren Zhou and
                  Cheng Hong and
                  Zhicong Huang and
                  Ninghui Li and
                  Somesh Jha},
  editor       = {Peter A. Boncz and
                  Stefan Manegold and
                  Anastasia Ailamaki and
                  Amol Deshpande and
                  Tim Kraska},
  title        = {Answering Multi-Dimensional Analytical Queries under Local Differential
                  Privacy},
  booktitle    = {Proceedings of the 2019 International Conference on Management of
                  Data, {SIGMOD} Conference 2019, Amsterdam, The Netherlands, June 30
                  - July 5, 2019},
  pages        = {159--176},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3299869.3319891},
  doi          = {10.1145/3299869.3319891},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/WangDZHHLJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-07756,
  author       = {Amrita Roy Chowdhury and
                  Chenghong Wang and
                  Xi He and
                  Ashwin Machanavajjhala and
                  Somesh Jha},
  title        = {Outis: Crypto-Assisted Differential Privacy on Untrusted Servers},
  journal      = {CoRR},
  volume       = {abs/1902.07756},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.07756},
  eprinttype    = {arXiv},
  eprint       = {1902.07756},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-07756.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-05821,
  author       = {Susmit Jha and
                  Sunny Raj and
                  Steven Lawrence Fernandes and
                  Sumit Kumar Jha and
                  Somesh Jha and
                  Gunjan Verma and
                  Brian Jalaian and
                  Ananthram Swami},
  title        = {Attribution-driven Causal Analysis for Detection of Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1903.05821},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.05821},
  eprinttype    = {arXiv},
  eprint       = {1903.05821},
  timestamp    = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-05821.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-09957,
  author       = {Jiefeng Chen and
                  Xi Wu and
                  Vaibhav Rastogi and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Robust Attribution Regularization},
  journal      = {CoRR},
  volume       = {abs/1905.09957},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.09957},
  eprinttype    = {arXiv},
  eprint       = {1905.09957},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-09957.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-10900,
  author       = {Varun Chandrasekaran and
                  Brian Tang and
                  Varsha Pendyala and
                  Kassem Fawaz and
                  Somesh Jha and
                  Xi Wu},
  title        = {Enhancing {ML} Robustness Using Physical-World Constraints},
  journal      = {CoRR},
  volume       = {abs/1905.10900},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.10900},
  eprinttype    = {arXiv},
  eprint       = {1905.10900},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-10900.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-11564,
  author       = {Sanjam Garg and
                  Somesh Jha and
                  Saeed Mahloujifar and
                  Mohammad Mahmoody},
  title        = {Adversarially Robust Learning Could Leverage Computational Hardness},
  journal      = {CoRR},
  volume       = {abs/1905.11564},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.11564},
  eprinttype    = {arXiv},
  eprint       = {1905.11564},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-11564.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-12813,
  author       = {Amrita Roy Chowdhury and
                  Theodoros Rekatsinas and
                  Somesh Jha},
  title        = {Data-Dependent Differentially Private Parameter Learning for Directed
                  Graphical Models},
  journal      = {CoRR},
  volume       = {abs/1905.12813},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.12813},
  eprinttype    = {arXiv},
  eprint       = {1905.12813},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-12813.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-11515,
  author       = {Tianhao Wang and
                  Min Xu and
                  Bolin Ding and
                  Jingren Zhou and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Practical and Robust Privacy Amplification with Multi-Party Differential
                  Privacy},
  journal      = {CoRR},
  volume       = {abs/1908.11515},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.11515},
  eprinttype    = {arXiv},
  eprint       = {1908.11515},
  timestamp    = {Wed, 04 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-11515.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-03334,
  author       = {Uyeong Jang and
                  Susmit Jha and
                  Somesh Jha},
  title        = {On Need for Topology Awareness of Generative Models},
  journal      = {CoRR},
  volume       = {abs/1909.03334},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.03334},
  eprinttype    = {arXiv},
  eprint       = {1909.03334},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-03334.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-00727,
  author       = {Lakshya Jain and
                  Wilson Wu and
                  Steven Chen and
                  Uyeong Jang and
                  Varun Chandrasekaran and
                  Sanjit A. Seshia and
                  Somesh Jha},
  title        = {Generating Semantic Adversarial Examples with Differentiable Rendering},
  journal      = {CoRR},
  volume       = {abs/1910.00727},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.00727},
  eprinttype    = {arXiv},
  eprint       = {1910.00727},
  timestamp    = {Fri, 04 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-00727.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HaqCCJ18,
  author       = {Irfan Ul Haq and
                  Sergio Chica and
                  Juan Caballero and
                  Somesh Jha},
  title        = {Malware lineage in the wild},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {347--363},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.012},
  doi          = {10.1016/J.COSE.2018.07.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HaqCCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GiacomelliJJPY18,
  author       = {Irene Giacomelli and
                  Somesh Jha and
                  Marc Joye and
                  C. David Page and
                  Kyonghwan Yoon},
  editor       = {Bart Preneel and
                  Frederik Vercauteren},
  title        = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic
                  Encryption},
  booktitle    = {Applied Cryptography and Network Security - 16th International Conference,
                  {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10892},
  pages        = {243--261},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93387-0\_13},
  doi          = {10.1007/978-3-319-93387-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GiacomelliJJPY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/DreossiJS18,
  author       = {Tommaso Dreossi and
                  Somesh Jha and
                  Sanjit A. Seshia},
  editor       = {Hana Chockler and
                  Georg Weissenbacher},
  title        = {Semantic Adversarial Deep Learning},
  booktitle    = {Computer Aided Verification - 30th International Conference, {CAV}
                  2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford,
                  UK, July 14-17, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10981},
  pages        = {3--26},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96145-3\_1},
  doi          = {10.1007/978-3-319-96145-3\_1},
  timestamp    = {Fri, 09 Apr 2021 18:35:27 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/DreossiJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/YeomGFJ18,
  author       = {Samuel Yeom and
                  Irene Giacomelli and
                  Matt Fredrikson and
                  Somesh Jha},
  title        = {Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting},
  booktitle    = {31st {IEEE} Computer Security Foundations Symposium, {CSF} 2018, Oxford,
                  United Kingdom, July 9-12, 2018},
  pages        = {268--282},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CSF.2018.00027},
  doi          = {10.1109/CSF.2018.00027},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/YeomGFJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/WangJC18,
  author       = {Yizhen Wang and
                  Somesh Jha and
                  Kamalika Chaudhuri},
  editor       = {Jennifer G. Dy and
                  Andreas Krause},
  title        = {Analyzing the Robustness of Nearest Neighbors to Adversarial Examples},
  booktitle    = {Proceedings of the 35th International Conference on Machine Learning,
                  {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
                  10-15, 2018},
  series       = {Proceedings of Machine Learning Research},
  volume       = {80},
  pages        = {5120--5129},
  publisher    = {{PMLR}},
  year         = {2018},
  url          = {http://proceedings.mlr.press/v80/wang18c.html},
  timestamp    = {Wed, 03 Apr 2019 18:17:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icml/WangJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icml/0001JCCJ18,
  author       = {Xi Wu and
                  Uyeong Jang and
                  Jiefeng Chen and
                  Lingjiao Chen and
                  Somesh Jha},
  editor       = {Jennifer G. Dy and
                  Andreas Krause},
  title        = {Reinforcing Adversarial Robustness using Model Confidence Induced
                  by Adversarial Training},
  booktitle    = {Proceedings of the 35th International Conference on Machine Learning,
                  {ICML} 2018, Stockholmsm{\"{a}}ssan, Stockholm, Sweden, July
                  10-15, 2018},
  series       = {Proceedings of Machine Learning Research},
  volume       = {80},
  pages        = {5330--5338},
  publisher    = {{PMLR}},
  year         = {2018},
  url          = {http://proceedings.mlr.press/v80/wu18e.html},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icml/0001JCCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isola/MillerCJ18,
  author       = {Andrew Miller and
                  Zhicheng Cai and
                  Somesh Jha},
  editor       = {Tiziana Margaria and
                  Bernhard Steffen},
  title        = {Smart Contracts and Opportunities for Formal Methods},
  booktitle    = {Leveraging Applications of Formal Methods, Verification and Validation.
                  Industrial Practice - 8th International Symposium, ISoLA 2018, Limassol,
                  Cyprus, November 5-9, 2018, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11247},
  pages        = {280--299},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03427-6\_22},
  doi          = {10.1007/978-3-030-03427-6\_22},
  timestamp    = {Mon, 08 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isola/MillerCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/JhaJJJ18,
  author       = {Susmit Jha and
                  Uyeong Jang and
                  Somesh Jha and
                  Brian Jalaian},
  title        = {Detecting Adversarial Examples Using Data Manifolds},
  booktitle    = {2018 {IEEE} Military Communications Conference, {MILCOM} 2018, Los
                  Angeles, CA, USA, October 29-31, 2018},
  pages        = {547--552},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/MILCOM.2018.8599691},
  doi          = {10.1109/MILCOM.2018.8599691},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/JhaJJJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Kwon0WLLM0XJCGY18,
  author       = {Yonghwi Kwon and
                  Fei Wang and
                  Weihang Wang and
                  Kyu Hyung Lee and
                  Wen{-}Chuan Lee and
                  Shiqing Ma and
                  Xiangyu Zhang and
                  Dongyan Xu and
                  Somesh Jha and
                  Gabriela F. Ciocarlie and
                  Ashish Gehani and
                  Vinod Yegneswaran},
  title        = {{MCI} : Modeling-based Causality Inference in Audit Logging for Attack
                  Investigation},
  booktitle    = {25th Annual Network and Distributed System Security Symposium, {NDSS}
                  2018, San Diego, California, USA, February 18-21, 2018},
  publisher    = {The Internet Society},
  year         = {2018},
  url          = {https://www.ndss-symposium.org/wp-content/uploads/2018/02/ndss2018\_07B-2\_Kwon\_paper.pdf},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Kwon0WLLM0XJCGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/CormodeJKLSW18,
  author       = {Graham Cormode and
                  Somesh Jha and
                  Tejas Kulkarni and
                  Ninghui Li and
                  Divesh Srivastava and
                  Tianhao Wang},
  editor       = {Gautam Das and
                  Christopher M. Jermaine and
                  Philip A. Bernstein},
  title        = {Privacy at Scale: Local Differential Privacy in Practice},
  booktitle    = {Proceedings of the 2018 International Conference on Management of
                  Data, {SIGMOD} Conference 2018, Houston, TX, USA, June 10-15, 2018},
  pages        = {1655--1658},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3183713.3197390},
  doi          = {10.1145/3183713.3197390},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/CormodeJKLSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ZhaoARJO18,
  author       = {Jinman Zhao and
                  Aws Albarghouthi and
                  Vaibhav Rastogi and
                  Somesh Jha and
                  Damien Octeau},
  editor       = {Gary T. Leavens and
                  Alessandro Garcia and
                  Corina S. Pasareanu},
  title        = {Neural-augmented static analysis of Android communication},
  booktitle    = {Proceedings of the 2018 {ACM} Joint Meeting on European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/SIGSOFT} {FSE} 2018, Lake Buena Vista, FL, USA, November 04-09,
                  2018},
  pages        = {342--353},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3236024.3236066},
  doi          = {10.1145/3236024.3236066},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ZhaoARJO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangLJ18,
  author       = {Tianhao Wang and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Locally Differentially Private Frequent Itemset Mining},
  booktitle    = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings,
                  21-23 May 2018, San Francisco, California, {USA}},
  pages        = {127--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SP.2018.00035},
  doi          = {10.1109/SP.2018.00035},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WangLJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/usenix/MaZKL0CGYXJ18,
  author       = {Shiqing Ma and
                  Juan Zhai and
                  Yonghwi Kwon and
                  Kyu Hyung Lee and
                  Xiangyu Zhang and
                  Gabriela F. Ciocarlie and
                  Ashish Gehani and
                  Vinod Yegneswaran and
                  Dongyan Xu and
                  Somesh Jha},
  editor       = {Haryadi S. Gunawi and
                  Benjamin C. Reed},
  title        = {Kernel-Supported Cost-Effective Audit Logging for Causality Tracking},
  booktitle    = {2018 {USENIX} Annual Technical Conference, {USENIX} {ATC} 2018, Boston,
                  MA, USA, July 11-13, 2018},
  pages        = {241--254},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/atc18/presentation/ma-shiqing},
  timestamp    = {Sat, 25 Feb 2023 23:39:37 +0100},
  biburl       = {https://dblp.org/rec/conf/usenix/MaZKL0CGYXJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1802-03462,
  author       = {Zhichuang Sun and
                  Bo Feng and
                  Long Lu and
                  Somesh Jha},
  title        = {{OEI:} Operation Execution Integrity for Embedded Devices},
  journal      = {CoRR},
  volume       = {abs/1802.03462},
  year         = {2018},
  url          = {http://arxiv.org/abs/1802.03462},
  eprinttype    = {arXiv},
  eprint       = {1802.03462},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1802-03462.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-07045,
  author       = {Tommaso Dreossi and
                  Somesh Jha and
                  Sanjit A. Seshia},
  title        = {Semantic Adversarial Deep Learning},
  journal      = {CoRR},
  volume       = {abs/1804.07045},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.07045},
  eprinttype    = {arXiv},
  eprint       = {1804.07045},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-07045.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-07816,
  author       = {Jiefeng Chen and
                  Xi Wu and
                  Yingyu Liang and
                  Somesh Jha},
  title        = {Improving Adversarial Robustness by Data-Specific Discretization},
  journal      = {CoRR},
  volume       = {abs/1805.07816},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.07816},
  eprinttype    = {arXiv},
  eprint       = {1805.07816},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-07816.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-04059,
  author       = {Jinman Zhao and
                  Aws Albarghouthi and
                  Vaibhav Rastogi and
                  Somesh Jha and
                  Damien Octeau},
  title        = {Neural-Augmented Static Analysis of Android Communication},
  journal      = {CoRR},
  volume       = {abs/1809.04059},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.04059},
  eprinttype    = {arXiv},
  eprint       = {1809.04059},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-04059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1809-08316,
  author       = {Xiaozhu Meng and
                  Barton P. Miller and
                  Somesh Jha},
  title        = {Adversarial Binaries for Authorship Identification},
  journal      = {CoRR},
  volume       = {abs/1809.08316},
  year         = {2018},
  url          = {http://arxiv.org/abs/1809.08316},
  eprinttype    = {arXiv},
  eprint       = {1809.08316},
  timestamp    = {Fri, 05 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1809-08316.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-00024,
  author       = {Washington Garcia and
                  Joseph I. Choi and
                  Suman Kalyan Adari and
                  Somesh Jha and
                  Kevin R. B. Butler},
  title        = {Explainable Black-Box Attacks Against Model-based Authentication},
  journal      = {CoRR},
  volume       = {abs/1810.00024},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.00024},
  eprinttype    = {arXiv},
  eprint       = {1810.00024},
  timestamp    = {Tue, 27 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-00024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-06583,
  author       = {Prasad Chalasani and
                  Jiefeng Chen and
                  Amrita Roy Chowdhury and
                  Somesh Jha and
                  Xi Wu},
  title        = {Concise Explanations of Neural Networks using Adversarial Training},
  journal      = {CoRR},
  volume       = {abs/1810.06583},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.06583},
  eprinttype    = {arXiv},
  eprint       = {1810.06583},
  timestamp    = {Sun, 16 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-06583.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-02054,
  author       = {Varun Chandrasekaran and
                  Kamalika Chaudhuri and
                  Irene Giacomelli and
                  Somesh Jha and
                  Songbai Yan},
  title        = {Model Extraction and Active Learning},
  journal      = {CoRR},
  volume       = {abs/1811.02054},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.02054},
  eprinttype    = {arXiv},
  eprint       = {1811.02054},
  timestamp    = {Thu, 22 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-02054.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-08695,
  author       = {Irene Giacomelli and
                  Somesh Jha and
                  Ross Kleiman and
                  David Page and
                  Kyonghwan Yoon},
  title        = {Privacy-Preserving Collaborative Prediction using Random Forests},
  journal      = {CoRR},
  volume       = {abs/1811.08695},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.08695},
  eprinttype    = {arXiv},
  eprint       = {1811.08695},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-08695.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/HarrisJRS17,
  author       = {William R. Harris and
                  Somesh Jha and
                  Thomas W. Reps and
                  Sanjit A. Seshia},
  title        = {Program synthesis for interactive-security systems},
  journal      = {Formal Methods Syst. Des.},
  volume       = {51},
  number       = {2},
  pages        = {362--394},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10703-017-0296-5},
  doi          = {10.1007/S10703-017-0296-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/HarrisJRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Jang0J17,
  author       = {Uyeong Jang and
                  Xi Wu and
                  Somesh Jha},
  title        = {Objective Metrics and Gradient Descent Algorithms for Adversarial
                  Examples in Machine Learning},
  booktitle    = {Proceedings of the 33rd Annual Computer Security Applications Conference,
                  Orlando, FL, USA, December 4-8, 2017},
  pages        = {262--277},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3134600.3134635},
  doi          = {10.1145/3134600.3134635},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Jang0J17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RastogiNMJ17,
  author       = {Vaibhav Rastogi and
                  Chaitra Niddodi and
                  Sibin Mohan and
                  Somesh Jha},
  editor       = {Taesoo Kim and
                  Cliff Wang and
                  Dinghao Wu},
  title        = {New Directions for Container Debloating},
  booktitle    = {Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software
                  Transformation, FEAST@CCS 2017, Dallas, TX, USA, November 3, 2017},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3141235.3141241},
  doi          = {10.1145/3141235.3141241},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RastogiNMJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PapernotMGJCS17,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Ian J. Goodfellow and
                  Somesh Jha and
                  Z. Berkay Celik and
                  Ananthram Swami},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Practical Black-Box Attacks against Machine Learning},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {506--519},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053009},
  doi          = {10.1145/3052973.3053009},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PapernotMGJCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DavidsonCGLJ17,
  author       = {Drew Davidson and
                  Yaohui Chen and
                  Franklin George and
                  Long Lu and
                  Somesh Jha},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Secure Integration of Web Content and Applications on Commodity Mobile
                  Operating Systems},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {652--665},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3052998},
  doi          = {10.1145/3052973.3052998},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DavidsonCGLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/CarliTMTJ17,
  author       = {Lorenzo De Carli and
                  Ruben Torres and
                  Gaspar Modelo{-}Howard and
                  Alok Tongaonkar and
                  Somesh Jha},
  title        = {Botnet protocol inference in the presence of encrypted traffic},
  booktitle    = {2017 {IEEE} Conference on Computer Communications, {INFOCOM} 2017,
                  Atlanta, GA, USA, May 1-4, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/INFOCOM.2017.8057064},
  doi          = {10.1109/INFOCOM.2017.8057064},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/CarliTMTJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/CarliTMTJ17,
  author       = {Lorenzo De Carli and
                  Ruben Torres and
                  Gaspar Modelo{-}Howard and
                  Alok Tongaonkar and
                  Somesh Jha},
  title        = {Kali: Scalable encryption fingerprinting in dynamic malware traces},
  booktitle    = {12th International Conference on Malicious and Unwanted Software,
                  {MALWARE} 2017, Fajardo, PR, USA, October 11-14, 2017},
  pages        = {3--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/MALWARE.2017.8323951},
  doi          = {10.1109/MALWARE.2017.8323951},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/CarliTMTJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/DavidsonRCJ17,
  author       = {Drew Davidson and
                  Vaibhav Rastogi and
                  Mihai Christodorescu and
                  Somesh Jha},
  editor       = {Xiaodong Lin and
                  Ali A. Ghorbani and
                  Kui Ren and
                  Sencun Zhu and
                  Aiqing Zhang},
  title        = {Enhancing Android Security Through App Splitting},
  booktitle    = {Security and Privacy in Communication Networks - 13th International
                  Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25,
                  2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {238},
  pages        = {24--44},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-78813-5\_2},
  doi          = {10.1007/978-3-319-78813-5\_2},
  timestamp    = {Wed, 22 Dec 2021 13:40:59 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/DavidsonRCJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/0001LKCJN17,
  author       = {Xi Wu and
                  Fengan Li and
                  Arun Kumar and
                  Kamalika Chaudhuri and
                  Somesh Jha and
                  Jeffrey F. Naughton},
  editor       = {Semih Salihoglu and
                  Wenchao Zhou and
                  Rada Chirkova and
                  Jun Yang and
                  Dan Suciu},
  title        = {Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based
                  Analytics},
  booktitle    = {Proceedings of the 2017 {ACM} International Conference on Management
                  of Data, {SIGMOD} Conference 2017, Chicago, IL, USA, May 14-19, 2017},
  pages        = {1307--1322},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3035918.3064047},
  doi          = {10.1145/3035918.3064047},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/0001LKCJN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/RastogiDCJM17,
  author       = {Vaibhav Rastogi and
                  Drew Davidson and
                  Lorenzo De Carli and
                  Somesh Jha and
                  Patrick D. McDaniel},
  editor       = {Eric Bodden and
                  Wilhelm Sch{\"{a}}fer and
                  Arie van Deursen and
                  Andrea Zisman},
  title        = {Cimplifier: automatically debloating containers},
  booktitle    = {Proceedings of the 2017 11th Joint Meeting on Foundations of Software
                  Engineering, {ESEC/FSE} 2017, Paderborn, Germany, September 4-8, 2017},
  pages        = {476--486},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3106237.3106271},
  doi          = {10.1145/3106237.3106271},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/RastogiDCJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/WangBLJ17,
  author       = {Tianhao Wang and
                  Jeremiah Blocki and
                  Ninghui Li and
                  Somesh Jha},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {Locally Differentially Private Protocols for Frequency Estimation},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {729--745},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/wang-tianhao},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/WangBLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SenZPJ17,
  author       = {Rathijit Sen and
                  Jianqiao Zhu and
                  Jignesh M. Patel and
                  Somesh Jha},
  title        = {{ROSA:} {R} Optimizations with Static Analysis},
  journal      = {CoRR},
  volume       = {abs/1704.02996},
  year         = {2017},
  url          = {http://arxiv.org/abs/1704.02996},
  eprinttype    = {arXiv},
  eprint       = {1704.02996},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SenZPJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangBLJ17,
  author       = {Tianhao Wang and
                  Jeremiah Blocki and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Optimizing Locally Differentially Private Protocols},
  journal      = {CoRR},
  volume       = {abs/1705.04421},
  year         = {2017},
  url          = {http://arxiv.org/abs/1705.04421},
  eprinttype    = {arXiv},
  eprint       = {1705.04421},
  timestamp    = {Sat, 08 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/WangBLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WangJC17,
  author       = {Yizhen Wang and
                  Somesh Jha and
                  Kamalika Chaudhuri},
  title        = {Analyzing the Robustness of Nearest Neighbors to Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1706.03922},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.03922},
  eprinttype    = {arXiv},
  eprint       = {1706.03922},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WangJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NadkarniEJS17,
  author       = {Adwait Nadkarni and
                  William Enck and
                  Somesh Jha and
                  Jessica Staddon},
  title        = {Policy by Example: An Approach for Security Policy Specification},
  journal      = {CoRR},
  volume       = {abs/1707.03967},
  year         = {2017},
  url          = {http://arxiv.org/abs/1707.03967},
  eprinttype    = {arXiv},
  eprint       = {1707.03967},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NadkarniEJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1708-06674,
  author       = {Tianhao Wang and
                  Ninghui Li and
                  Somesh Jha},
  title        = {Locally Differentially Private Heavy Hitter Identification},
  journal      = {CoRR},
  volume       = {abs/1708.06674},
  year         = {2017},
  url          = {http://arxiv.org/abs/1708.06674},
  eprinttype    = {arXiv},
  eprint       = {1708.06674},
  timestamp    = {Sat, 08 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1708-06674.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-01604,
  author       = {Samuel Yeom and
                  Matt Fredrikson and
                  Somesh Jha},
  title        = {The Unintended Consequences of Overfitting: Training Data Inference
                  Attacks},
  journal      = {CoRR},
  volume       = {abs/1709.01604},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.01604},
  eprinttype    = {arXiv},
  eprint       = {1709.01604},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-01604.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1710-05202,
  author       = {Irfan Ul Haq and
                  Sergio Chica and
                  Juan Caballero and
                  Somesh Jha},
  title        = {Malware Lineage in the Wild},
  journal      = {CoRR},
  volume       = {abs/1710.05202},
  year         = {2017},
  url          = {http://arxiv.org/abs/1710.05202},
  eprinttype    = {arXiv},
  eprint       = {1710.05202},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1710-05202.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1711-08001,
  author       = {Xi Wu and
                  Uyeong Jang and
                  Lingjiao Chen and
                  Somesh Jha},
  title        = {Manifold Assumption and Defenses Against Adversarial Perturbations},
  journal      = {CoRR},
  volume       = {abs/1711.08001},
  year         = {2017},
  url          = {http://arxiv.org/abs/1711.08001},
  eprinttype    = {arXiv},
  eprint       = {1711.08001},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1711-08001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiacomelliJPY17,
  author       = {Irene Giacomelli and
                  Somesh Jha and
                  C. David Page and
                  Kyonghwan Yoon},
  title        = {Privacy-Preserving Ridge Regression on Distributed Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {707},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/707},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiacomelliJPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GiacomelliJJPY17,
  author       = {Irene Giacomelli and
                  Somesh Jha and
                  Marc Joye and
                  C. David Page and
                  Kyonghwan Yoon},
  title        = {Privacy-Preserving Ridge Regression with only Linearly-Homomorphic
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {979},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/979},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GiacomelliJJPY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/OcteauLJM16,
  author       = {Damien Octeau and
                  Daniel Luchaup and
                  Somesh Jha and
                  Patrick D. McDaniel},
  title        = {Composite Constant Propagation and its Application to Android Program
                  Analysis},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {42},
  number       = {11},
  pages        = {999--1014},
  year         = {2016},
  url          = {https://doi.org/10.1109/TSE.2016.2550446},
  doi          = {10.1109/TSE.2016.2550446},
  timestamp    = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/OcteauLJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/0001FJN16,
  author       = {Xi Wu and
                  Matthew Fredrikson and
                  Somesh Jha and
                  Jeffrey F. Naughton},
  title        = {A Methodology for Formalizing Model-Inversion Attacks},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {355--370},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.32},
  doi          = {10.1109/CSF.2016.32},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/0001FJN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/PapernotMJFCS16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Somesh Jha and
                  Matt Fredrikson and
                  Z. Berkay Celik and
                  Ananthram Swami},
  title        = {The Limitations of Deep Learning in Adversarial Settings},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages        = {372--387},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/EuroSP.2016.36},
  doi          = {10.1109/EUROSP.2016.36},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/PapernotMJFCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/OcteauJDMB0KT16,
  author       = {Damien Octeau and
                  Somesh Jha and
                  Matthew L. Dering and
                  Patrick D. McDaniel and
                  Alexandre Bartel and
                  Li Li and
                  Jacques Klein and
                  Yves Le Traon},
  editor       = {Rastislav Bod{\'{\i}}k and
                  Rupak Majumdar},
  title        = {Combining static analysis with probabilistic models to enable market-scale
                  Android inter-component analysis},
  booktitle    = {Proceedings of the 43rd Annual {ACM} {SIGPLAN-SIGACT} Symposium on
                  Principles of Programming Languages, {POPL} 2016, St. Petersburg,
                  FL, USA, January 20 - 22, 2016},
  pages        = {469--484},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2837614.2837661},
  doi          = {10.1145/2837614.2837661},
  timestamp    = {Fri, 16 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/OcteauJDMB0KT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PapernotM0JS16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Xi Wu and
                  Somesh Jha and
                  Ananthram Swami},
  title        = {Distillation as a Defense to Adversarial Perturbations Against Deep
                  Neural Networks},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {582--597},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.41},
  doi          = {10.1109/SP.2016.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/PapernotM0JS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/NadkarniAEJ16,
  author       = {Adwait Nadkarni and
                  Benjamin Andow and
                  William Enck and
                  Somesh Jha},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Practical {DIFC} Enforcement on Android},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {1119--1136},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nadkarni},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/NadkarniAEJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotMGJCS16,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Ian J. Goodfellow and
                  Somesh Jha and
                  Z. Berkay Celik and
                  Ananthram Swami},
  title        = {Practical Black-Box Attacks against Deep Learning Systems using Adversarial
                  Examples},
  journal      = {CoRR},
  volume       = {abs/1602.02697},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.02697},
  eprinttype    = {arXiv},
  eprint       = {1602.02697},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotMGJCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RastogiDCJM16,
  author       = {Vaibhav Rastogi and
                  Drew Davidson and
                  Lorenzo De Carli and
                  Somesh Jha and
                  Patrick D. McDaniel},
  title        = {Towards Least Privilege Containers with Cimplifier},
  journal      = {CoRR},
  volume       = {abs/1602.08410},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.08410},
  eprinttype    = {arXiv},
  eprint       = {1602.08410},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/RastogiDCJM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0001KCJN16,
  author       = {Xi Wu and
                  Arun Kumar and
                  Kamalika Chaudhuri and
                  Somesh Jha and
                  Jeffrey F. Naughton},
  title        = {Differentially Private Stochastic Gradient Descent for in-RDBMS Analytics},
  journal      = {CoRR},
  volume       = {abs/1606.04722},
  year         = {2016},
  url          = {http://arxiv.org/abs/1606.04722},
  eprinttype    = {arXiv},
  eprint       = {1606.04722},
  timestamp    = {Thu, 01 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/0001KCJN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FredriksonJR15,
  author       = {Matt Fredrikson and
                  Somesh Jha and
                  Thomas Ristenpart},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Model Inversion Attacks that Exploit Confidence Information and Basic
                  Countermeasures},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1322--1333},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813677},
  doi          = {10.1145/2810103.2813677},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FredriksonJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/OcteauLDJM15,
  author       = {Damien Octeau and
                  Daniel Luchaup and
                  Matthew L. Dering and
                  Somesh Jha and
                  Patrick D. McDaniel},
  editor       = {Antonia Bertolino and
                  Gerardo Canfora and
                  Sebastian G. Elbaum},
  title        = {Composite Constant Propagation: Application to Android Inter-Component
                  Communication Analysis},
  booktitle    = {37th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1},
  pages        = {77--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSE.2015.30},
  doi          = {10.1109/ICSE.2015.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/OcteauLDJM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotMWJS15,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Xi Wu and
                  Somesh Jha and
                  Ananthram Swami},
  title        = {Distillation as a Defense to Adversarial Perturbations against Deep
                  Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1511.04508},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.04508},
  eprinttype    = {arXiv},
  eprint       = {1511.04508},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotMWJS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PapernotMJFCS15,
  author       = {Nicolas Papernot and
                  Patrick D. McDaniel and
                  Somesh Jha and
                  Matt Fredrikson and
                  Z. Berkay Celik and
                  Ananthram Swami},
  title        = {The Limitations of Deep Learning in Adversarial Settings},
  journal      = {CoRR},
  volume       = {abs/1511.07528},
  year         = {2015},
  url          = {http://arxiv.org/abs/1511.07528},
  eprinttype    = {arXiv},
  eprint       = {1511.07528},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PapernotMJFCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/0001FWJN15,
  author       = {Xi Wu and
                  Matthew Fredrikson and
                  Wentao Wu and
                  Somesh Jha and
                  Jeffrey F. Naughton},
  title        = {Revisiting Differentially Private Regression: Lessons From Learning
                  Theory and their Consequences},
  journal      = {CoRR},
  volume       = {abs/1512.06388},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.06388},
  eprinttype    = {arXiv},
  eprint       = {1512.06388},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/0001FWJN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuchaupSRJ14,
  author       = {Daniel Luchaup and
                  Thomas Shrimpton and
                  Thomas Ristenpart and
                  Somesh Jha},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Formatted Encryption Beyond Regular Languages},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1292--1303},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660351},
  doi          = {10.1145/2660267.2660351},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LuchaupSRJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CarliSJ14,
  author       = {Lorenzo De Carli and
                  Robin Sommer and
                  Somesh Jha},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Beyond Pattern Matching: {A} Concurrency Model for Stateful Deep Packet
                  Inspection},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1378--1390},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660361},
  doi          = {10.1145/2660267.2660361},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CarliSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/FredriksonJ14,
  author       = {Matthew Fredrikson and
                  Somesh Jha},
  editor       = {Thomas A. Henzinger and
                  Dale Miller},
  title        = {Satisfiability modulo counting: a new approach for analyzing privacy
                  properties},
  booktitle    = {Joint Meeting of the Twenty-Third {EACSL} Annual Conference on Computer
                  Science Logic {(CSL)} and the Twenty-Ninth Annual {ACM/IEEE} Symposium
                  on Logic in Computer Science (LICS), {CSL-LICS} '14, Vienna, Austria,
                  July 14 - 18, 2014},
  pages        = {42:1--42:10},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2603088.2603097},
  doi          = {10.1145/2603088.2603097},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csl/FredriksonJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/LuchaupCJB14,
  author       = {Daniel Luchaup and
                  Lorenzo De Carli and
                  Somesh Jha and
                  Eric Bach},
  title        = {Deep packet inspection with DFA-trees and parametrized language overapproximation},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {531--539},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6847977},
  doi          = {10.1109/INFOCOM.2014.6847977},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/LuchaupCJB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/JoinerRJDG14,
  author       = {Richard Joiner and
                  Thomas W. Reps and
                  Somesh Jha and
                  Mohan Dhawan and
                  Vinod Ganapathy},
  editor       = {Shing{-}Chi Cheung and
                  Alessandro Orso and
                  Margaret{-}Anne D. Storey},
  title        = {Efficient runtime-enforcement techniques for policy weaving},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSOFT} International Symposium on
                  Foundations of Software Engineering, (FSE-22), Hong Kong, China, November
                  16 - 22, 2014},
  pages        = {224--234},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2635868.2635907},
  doi          = {10.1145/2635868.2635907},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/JoinerRJDG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FredriksonLJLPR14,
  author       = {Matthew Fredrikson and
                  Eric Lantz and
                  Somesh Jha and
                  Simon M. Lin and
                  David Page and
                  Thomas Ristenpart},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized
                  Warfarin Dosing},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {17--32},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/fredrikson\_matthew},
  timestamp    = {Mon, 01 Feb 2021 08:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FredriksonLJLPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/LuchaupDJRS14,
  author       = {Daniel Luchaup and
                  Kevin P. Dyer and
                  Somesh Jha and
                  Thomas Ristenpart and
                  Thomas Shrimpton},
  editor       = {Kevin Fu and
                  Jaeyeon Jung},
  title        = {LibFTE: {A} Toolkit for Constructing Practical, Format-Abiding Encryption
                  Schemes},
  booktitle    = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA,
                  USA, August 20-22, 2014},
  pages        = {877--891},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/luchaup},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/LuchaupDJRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/FranzDHJKS13,
  author       = {Martin Franz and
                  Bj{\"{o}}rn Deiseroth and
                  Kay Hamacher and
                  Somesh Jha and
                  Stefan Katzenbeisser and
                  Heike Schr{\"{o}}der},
  title        = {Secure computations on non-integer values with applications to privacy-preserving
                  sequence analysis},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {17},
  number       = {3},
  pages        = {117--128},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.istr.2012.10.001},
  doi          = {10.1016/J.ISTR.2012.10.001},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/FranzDHJKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/HarrisJLJ13,
  author       = {William R. Harris and
                  Guoliang Jin and
                  Shan Lu and
                  Somesh Jha},
  editor       = {Natasha Sharygina and
                  Helmut Veith},
  title        = {Validating Library Usage Interactively},
  booktitle    = {Computer Aided Verification - 25th International Conference, {CAV}
                  2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8044},
  pages        = {796--812},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39799-8\_56},
  doi          = {10.1007/978-3-642-39799-8\_56},
  timestamp    = {Wed, 07 Dec 2022 23:12:58 +0100},
  biburl       = {https://dblp.org/rec/conf/cav/HarrisJLJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/SagstetterLSWBHJPPC13,
  author       = {Florian Sagstetter and
                  Martin Lukasiewycz and
                  Sebastian Steinhorst and
                  Marko Wolf and
                  Alexandre Bouard and
                  William R. Harris and
                  Somesh Jha and
                  Thomas Peyrin and
                  Axel Poschmann and
                  Samarjit Chakraborty},
  editor       = {Enrico Macii},
  title        = {Security challenges in automotive hardware/software architecture design},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 13, Grenoble, France,
                  March 18-22, 2013},
  pages        = {458--463},
  publisher    = {{EDA} Consortium San Jose, CA, {USA} / {ACM} {DL}},
  year         = {2013},
  url          = {https://doi.org/10.7873/DATE.2013.102},
  doi          = {10.7873/DATE.2013.102},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/SagstetterLSWBHJPPC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmcad/JhaRH13,
  author       = {Somesh Jha and
                  Thomas W. Reps and
                  William R. Harris},
  title        = {Secure programs via game-based synthesis},
  booktitle    = {Formal Methods in Computer-Aided Design, {FMCAD} 2013, Portland, OR,
                  USA, October 20-23, 2013},
  pages        = {12--13},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/FMCAD.2013.7035519},
  doi          = {10.1109/FMCAD.2013.7035519},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/fmcad/JhaRH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/JhaFCSY13,
  author       = {Somesh Jha and
                  Matthew Fredrikson and
                  Mihai Christodorescu and
                  Reiner Sailer and
                  Xifeng Yan},
  title        = {Synthesizing near-optimal malware specifications from suspicious behaviors},
  booktitle    = {8th International Conference on Malicious and Unwanted Software: "The
                  Americas", {MALWARE} 2013, Fajardo, PR, USA, October 22-24, 2013},
  pages        = {41--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MALWARE.2013.6703684},
  doi          = {10.1109/MALWARE.2013.6703684},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/JhaFCSY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HarrisJRAW13,
  author       = {William R. Harris and
                  Somesh Jha and
                  Thomas W. Reps and
                  Jonathan Anderson and
                  Robert N. M. Watson},
  title        = {Declarative, Temporal, and Practical Programming with Capabilities},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {18--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.11},
  doi          = {10.1109/SP.2013.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HarrisJRAW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DavidsonMRJ13,
  author       = {Drew Davidson and
                  Benjamin Moench and
                  Thomas Ristenpart and
                  Somesh Jha},
  editor       = {Samuel T. King},
  title        = {{FIE} on Firmware: Finding Vulnerabilities in Embedded Systems Using
                  Symbolic Execution},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {463--478},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/davidson},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DavidsonMRJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/OcteauMJBBKT13,
  author       = {Damien Octeau and
                  Patrick D. McDaniel and
                  Somesh Jha and
                  Alexandre Bartel and
                  Eric Bodden and
                  Jacques Klein and
                  Yves Le Traon},
  editor       = {Samuel T. King},
  title        = {Effective Inter-Component Communication Mapping in Android: An Essential
                  Step Towards Holistic Security Analysis},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {543--558},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/octeau},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/OcteauMJBBKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SyversonJ12,
  author       = {Paul F. Syverson and
                  Somesh Jha},
  title        = {Guest Editorial: Special Issue on Computer and Communications Security},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {15},
  number       = {1},
  pages        = {1:1--1:2},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133375.2133376},
  doi          = {10.1145/2133375.2133376},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SyversonJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/FredriksonJJRPSY12,
  author       = {Matthew Fredrikson and
                  Richard Joiner and
                  Somesh Jha and
                  Thomas W. Reps and
                  Phillip A. Porras and
                  Hassen Sa{\"{\i}}di and
                  Vinod Yegneswaran},
  editor       = {P. Madhusudan and
                  Sanjit A. Seshia},
  title        = {Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction
                  Refinement},
  booktitle    = {Computer Aided Verification - 24th International Conference, {CAV}
                  2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7358},
  pages        = {548--563},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31424-7\_39},
  doi          = {10.1007/978-3-642-31424-7\_39},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/FredriksonJJRPSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/HarrisJR12,
  author       = {William R. Harris and
                  Somesh Jha and
                  Thomas W. Reps},
  editor       = {P. Madhusudan and
                  Sanjit A. Seshia},
  title        = {Secure Programming via Visibly Pushdown Safety Games},
  booktitle    = {Computer Aided Verification - 24th International Conference, {CAV}
                  2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7358},
  pages        = {581--598},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31424-7\_41},
  doi          = {10.1007/978-3-642-31424-7\_41},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/HarrisJR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/LiSJ12,
  author       = {Wenchao Li and
                  Sanjit A. Seshia and
                  Somesh Jha},
  editor       = {Patrick Groeneveld and
                  Donatella Sciuto and
                  Soha Hassoun},
  title        = {CrowdMine: towards crowdsourced human-assisted verification},
  booktitle    = {The 49th Annual Design Automation Conference 2012, {DAC} '12, San
                  Francisco, CA, USA, June 3-7, 2012},
  pages        = {1254--1255},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2228360.2228590},
  doi          = {10.1145/2228360.2228590},
  timestamp    = {Mon, 05 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/LiSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/KruijfSJ12,
  author       = {Marc de Kruijf and
                  Karthikeyan Sankaralingam and
                  Somesh Jha},
  editor       = {Jan Vitek and
                  Haibo Lin and
                  Frank Tip},
  title        = {Static analysis and compiler design for idempotent processing},
  booktitle    = {{ACM} {SIGPLAN} Conference on Programming Language Design and Implementation,
                  {PLDI} '12, Beijing, China - June 11 - 16, 2012},
  pages        = {475--486},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2254064.2254120},
  doi          = {10.1145/2254064.2254120},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pldi/KruijfSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/OcteauJM12,
  author       = {Damien Octeau and
                  Somesh Jha and
                  Patrick D. McDaniel},
  editor       = {Will Tracz and
                  Martin P. Robillard and
                  Tevfik Bultan},
  title        = {Retargeting Android applications to Java bytecode},
  booktitle    = {20th {ACM} {SIGSOFT} Symposium on the Foundations of Software Engineering
                  (FSE-20), SIGSOFT/FSE'12, Cary, NC, {USA} - November 11 - 16, 2012},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2393596.2393600},
  doi          = {10.1145/2393596.2393600},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/OcteauJM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LuchaupSEJ11,
  author       = {Daniel Luchaup and
                  Randy Smith and
                  Cristian Estan and
                  Somesh Jha},
  title        = {Speculative Parallel Pattern Matching},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {6},
  number       = {2},
  pages        = {438--451},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIFS.2011.2112647},
  doi          = {10.1109/TIFS.2011.2112647},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LuchaupSEJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/FredriksonCJ11,
  author       = {Matthew Fredrikson and
                  Mihai Christodorescu and
                  Somesh Jha},
  editor       = {Nikolaj S. Bj{\o}rner and
                  Viorica Sofronie{-}Stokkermans},
  title        = {Dynamic Behavior Matching: {A} Complexity Analysis and New Approximation
                  Algorithms},
  booktitle    = {Automated Deduction - {CADE-23} - 23rd International Conference on
                  Automated Deduction, Wroclaw, Poland, July 31 - August 5, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6803},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22438-6\_20},
  doi          = {10.1007/978-3-642-22438-6\_20},
  timestamp    = {Mon, 28 Aug 2023 21:17:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/FredriksonCJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FranzDHJKS11,
  author       = {Martin Franz and
                  Bj{\"{o}}rn Deiseroth and
                  Kay Hamacher and
                  Somesh Jha and
                  Stefan Katzenbeisser and
                  Heike Schr{\"{o}}der},
  editor       = {George Danezis},
  title        = {Towards Secure Bioinformatics Services (Short Paper)},
  booktitle    = {Financial Cryptography and Data Security - 15th International Conference,
                  {FC} 2011, Gros Islet, St. Lucia, February 28 - March 4, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7035},
  pages        = {276--283},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27576-0\_23},
  doi          = {10.1007/978-3-642-27576-0\_23},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FranzDHJKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ChristodorescuFJG11,
  author       = {Mihai Christodorescu and
                  Matthew Fredrikson and
                  Somesh Jha and
                  Jonathon T. Giffin},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {End-to-End Software Diversification of Internet Services},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {117--130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_7},
  doi          = {10.1007/978-1-4614-0977-9\_7},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ChristodorescuFJG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2010Datta,
  author       = {Anupam Datta and
                  Somesh Jha and
                  Ninghui Li and
                  David Melski and
                  Thomas W. Reps},
  title        = {Analysis Techniques for Information Security},
  series       = {Synthesis Lectures on Information Security, Privacy, and Trust},
  publisher    = {Morgan {\&} Claypool Publishers},
  year         = {2010},
  url          = {https://doi.org/10.2200/S00260ED1V01Y201003SPT002},
  doi          = {10.2200/S00260ED1V01Y201003SPT002},
  isbn         = {978-3-031-01206-8},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/synthesis/2010Datta.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/JhaKSVC10,
  author       = {Somesh Jha and
                  Stefan Katzenbeisser and
                  Christian Schallhart and
                  Helmut Veith and
                  Stephen Chenney},
  title        = {Semantic integrity in large-scale online simulations},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {10},
  number       = {1},
  pages        = {2:1--2:24},
  year         = {2010},
  url          = {https://doi.org/10.1145/1667067.1667069},
  doi          = {10.1145/1667067.1667069},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/JhaKSVC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEpact/KumarCKKSEJ10,
  author       = {Amit Kumar and
                  Lorenzo De Carli and
                  Sung Jin Kim and
                  Marc de Kruijf and
                  Karthikeyan Sankaralingam and
                  Cristian Estan and
                  Somesh Jha},
  editor       = {Valentina Salapura and
                  Michael Gschwind and
                  Jens Knoop},
  title        = {Design and implementation of the {PLUG} architecture for programmable
                  and efficient network lookups},
  booktitle    = {19th International Conference on Parallel Architectures and Compilation
                  Techniques, {PACT} 2010, Vienna, Austria, September 11-15, 2010},
  pages        = {331--342},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854273.1854316},
  doi          = {10.1145/1854273.1854316},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEpact/KumarCKKSEJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/Jha10,
  author       = {Somesh Jha},
  editor       = {Tayssir Touili and
                  Byron Cook and
                  Paul B. Jackson},
  title        = {Retrofitting Legacy Code for Security},
  booktitle    = {Computer Aided Verification, 22nd International Conference, {CAV}
                  2010, Edinburgh, UK, July 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6174},
  pages        = {19},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14295-6\_2},
  doi          = {10.1007/978-3-642-14295-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/Jha10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HarrisJR10,
  author       = {William R. Harris and
                  Somesh Jha and
                  Thomas W. Reps},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {{DIFC} programs by automatic instrumentation},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {284--296},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866340},
  doi          = {10.1145/1866307.1866340},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HarrisJR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/KingJMJJS10,
  author       = {Dave King and
                  Susmit Jha and
                  Divya Muthukumaran and
                  Trent Jaeger and
                  Somesh Jha and
                  Sanjit A. Seshia},
  editor       = {Andrew D. Gordon},
  title        = {Automating Security Mediation Placement},
  booktitle    = {Programming Languages and Systems, 19th European Symposium on Programming,
                  {ESOP} 2010, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2010, Paphos, Cyprus, March 20-28,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6012},
  pages        = {327--344},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11957-6\_18},
  doi          = {10.1007/978-3-642-11957-6\_18},
  timestamp    = {Mon, 14 Feb 2022 09:20:30 +0100},
  biburl       = {https://dblp.org/rec/conf/esop/KingJMJJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FredriksonJCSY10,
  author       = {Matt Fredrikson and
                  Somesh Jha and
                  Mihai Christodorescu and
                  Reiner Sailer and
                  Xifeng Yan},
  title        = {Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {45--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.11},
  doi          = {10.1109/SP.2010.11},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FredriksonJCSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PaleariMPDFGJ10,
  author       = {Roberto Paleari and
                  Lorenzo Martignoni and
                  Emanuele Passerini and
                  Drew Davidson and
                  Matt Fredrikson and
                  Jonathon T. Giffin and
                  Somesh Jha},
  title        = {Automatic Generation of Remediation Procedures for Malware Infections},
  booktitle    = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
                  2010, Proceedings},
  pages        = {419--434},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {http://www.usenix.org/events/sec10/tech/full\_papers/Paleari.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PaleariMPDFGJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wifs/FranzDHJ0S10,
  author       = {Martin Franz and
                  Bj{\"{o}}rn Deiseroth and
                  Kay Hamacher and
                  Somesh Jha and
                  Stefan Katzenbeisser and
                  Heike Schr{\"{o}}der},
  title        = {Secure computations on non-integer values},
  booktitle    = {2010 {IEEE} International Workshop on Information Forensics and Security,
                  {WIFS} 2010, Seattle, WA, USA, December 12-15, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WIFS.2010.5711458},
  doi          = {10.1109/WIFS.2010.5711458},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wifs/FranzDHJ0S10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10,
  author       = {Paul Barford and
                  Marc Dacier and
                  Thomas G. Dietterich and
                  Matt Fredrikson and
                  Jonathon T. Giffin and
                  Sushil Jajodia and
                  Somesh Jha and
                  Jason H. Li and
                  Peng Liu and
                  Peng Ning and
                  Xinming Ou and
                  Dawn Song and
                  Laura Strater and
                  Vipin Swarup and
                  George P. Tadda and
                  C. Wang and
                  John Yen},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber {SA:} Situational Awareness for Cyber Defense},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_1},
  doi          = {10.1007/978-1-4419-0140-8\_1},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FredriksonCGJ10,
  author       = {Matt Fredrikson and
                  Mihai Christodorescu and
                  Jonathon T. Giffin and
                  Somesh Jha},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {A Declarative Framework for Intrusion Analysis},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {179--200},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_9},
  doi          = {10.1007/978-1-4419-0140-8\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FredriksonCGJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2010,
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9},
  doi          = {10.1007/978-3-642-17714-9},
  isbn         = {978-3-642-17713-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2010,
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3},
  doi          = {10.1007/978-3-642-15512-3},
  isbn         = {978-3-642-15511-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranzDHJKS10,
  author       = {Martin Franz and
                  Bj{\"{o}}rn Deiseroth and
                  Kay Hamacher and
                  Somesh Jha and
                  Stefan Katzenbeisser and
                  Heike Schr{\"{o}}der},
  title        = {Secure Computations on Non-Integer Values},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {499},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/499},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranzDHJKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DavidsonSDJ09,
  author       = {Drew Davidson and
                  Randy Smith and
                  Nic Doyle and
                  Somesh Jha},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Protocol Normalization Using Attribute Grammars},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {216--231},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_14},
  doi          = {10.1007/978-3-642-04444-1\_14},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DavidsonSDJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/HarrisKCJR09,
  author       = {William R. Harris and
                  Nicholas Kidd and
                  Sagar Chaki and
                  Somesh Jha and
                  Thomas W. Reps},
  editor       = {Ana Cavalcanti and
                  Dennis Dams},
  title        = {Verifying Information Flow Control over Unbounded Processes},
  booktitle    = {{FM} 2009: Formal Methods, Second World Congress, Eindhoven, The Netherlands,
                  November 2-6, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5850},
  pages        = {773--789},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05089-3\_49},
  doi          = {10.1007/978-3-642-05089-3\_49},
  timestamp    = {Mon, 21 Feb 2022 14:40:51 +0100},
  biburl       = {https://dblp.org/rec/conf/fm/HarrisKCJR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LuchaupSEJ09,
  author       = {Daniel Luchaup and
                  Randy Smith and
                  Cristian Estan and
                  Somesh Jha},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Multi-byte Regular Expression Matching with Speculation},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {284--303},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_15},
  doi          = {10.1007/978-3-642-04342-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LuchaupSEJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009,
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  publisher    = {{ACM}},
  year         = {2009},
  isbn         = {978-1-60558-894-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2009,
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0},
  doi          = {10.1007/978-3-642-04342-0},
  isbn         = {978-3-642-04341-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BrumleyNSWJ08,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Theory and Techniques for Automatic Generation of Vulnerability-Based
                  Signatures},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {224--241},
  year         = {2008},
  url          = {https://doi.org/10.1109/TDSC.2008.55},
  doi          = {10.1109/TDSC.2008.55},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BrumleyNSWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JhaLTWW08,
  author       = {Somesh Jha and
                  Ninghui Li and
                  Mahesh V. Tripunitara and
                  Qihua Wang and
                  William H. Winsborough},
  title        = {Towards Formal Verification of Role-Based Access Control Policies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {5},
  number       = {4},
  pages        = {242--255},
  year         = {2008},
  url          = {https://doi.org/10.1109/TDSC.2007.70225},
  doi          = {10.1109/TDSC.2007.70225},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JhaLTWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/PredaCJD08,
  author       = {Mila Dalla Preda and
                  Mihai Christodorescu and
                  Somesh Jha and
                  Saumya K. Debray},
  title        = {A semantics-based approach to malware detection},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {30},
  number       = {5},
  pages        = {25:1--25:54},
  year         = {2008},
  url          = {https://doi.org/10.1145/1387673.1387674},
  doi          = {10.1145/1387673.1387674},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/PredaCJD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/GanapathyRBSJ08,
  author       = {Vinod Ganapathy and
                  Matthew J. Renzelmann and
                  Arini Balakrishnan and
                  Michael M. Swift and
                  Somesh Jha},
  editor       = {Susan J. Eggers and
                  James R. Larus},
  title        = {The design and implementation of microdrivers},
  booktitle    = {Proceedings of the 13th International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2008, Seattle, WA, USA, March 1-5, 2008},
  pages        = {168--178},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1346281.1346303},
  doi          = {10.1145/1346281.1346303},
  timestamp    = {Wed, 07 Jul 2021 13:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asplos/GanapathyRBSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SmithEJS08,
  author       = {Randy Smith and
                  Cristian Estan and
                  Somesh Jha and
                  Ida Sri Rejeki Siahaan},
  editor       = {R. Sekar and
                  Arun K. Pujari},
  title        = {Fast Signature Matching Using Extended Finite Automaton {(XFA)}},
  booktitle    = {Information Systems Security, 4th International Conference, {ICISS}
                  2008, Hyderabad, India, December 16-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5352},
  pages        = {158--172},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89862-7\_15},
  doi          = {10.1007/978-3-540-89862-7\_15},
  timestamp    = {Thu, 18 Nov 2021 17:21:37 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/SmithEJS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indiaSE/ChristodorescuJK08,
  author       = {Mihai Christodorescu and
                  Somesh Jha and
                  Christopher Kruegel},
  editor       = {Gautam Shroff and
                  Pankaj Jalote and
                  Sriram K. Rajamani},
  title        = {Mining specifications of malicious behavior},
  booktitle    = {Proceeding of the 1st Annual India Software Engineering Conference,
                  {ISEC} 2008, Hyderabad, India, February 19-22, 2008},
  pages        = {5--14},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1342211.1342215},
  doi          = {10.1145/1342211.1342215},
  timestamp    = {Thu, 10 Dec 2020 11:39:56 +0100},
  biburl       = {https://dblp.org/rec/conf/indiaSE/ChristodorescuJK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MartignoniSFJM08,
  author       = {Lorenzo Martignoni and
                  Elizabeth Stinson and
                  Matt Fredrikson and
                  Somesh Jha and
                  John C. Mitchell},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {A Layered Architecture for Detecting Malicious Behaviors},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {78--97},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_5},
  doi          = {10.1007/978-3-540-87403-4\_5},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MartignoniSFJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/SmithEJK08,
  author       = {Randy Smith and
                  Cristian Estan and
                  Somesh Jha and
                  Shijin Kong},
  editor       = {Victor Bahl and
                  David Wetherall and
                  Stefan Savage and
                  Ion Stoica},
  title        = {Deflating the big bang: fast and scalable deep packet inspection with
                  extended finite automata},
  booktitle    = {Proceedings of the {ACM} {SIGCOMM} 2008 Conference on Applications,
                  Technologies, Architectures, and Protocols for Computer Communications,
                  Seattle, WA, USA, August 17-22, 2008},
  pages        = {207--218},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1402958.1402983},
  doi          = {10.1145/1402958.1402983},
  timestamp    = {Wed, 21 Jul 2021 16:09:54 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcomm/SmithEJK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/KingJJS08,
  author       = {Dave King and
                  Trent Jaeger and
                  Somesh Jha and
                  Sanjit A. Seshia},
  editor       = {Mary Jean Harrold and
                  Gail C. Murphy},
  title        = {Effective blame for information-flow violations},
  booktitle    = {Proceedings of the 16th {ACM} {SIGSOFT} International Symposium on
                  Foundations of Software Engineering, 2008, Atlanta, Georgia, USA,
                  November 9-14, 2008},
  pages        = {250--260},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1453101.1453135},
  doi          = {10.1145/1453101.1453135},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/KingJJS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SmithEJ08,
  author       = {Randy Smith and
                  Cristian Estan and
                  Somesh Jha},
  title        = {{XFA:} Faster Signature Matching with Extended Automata},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {187--201},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.14},
  doi          = {10.1109/SP.2008.14},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SmithEJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JhaKS08,
  author       = {Somesh Jha and
                  Louis Kruger and
                  Vitaly Shmatikov},
  title        = {Towards Practical Privacy for Genomic Computation},
  booktitle    = {2008 {IEEE} Symposium on Security and Privacy {(SP} 2008), 18-21 May
                  2008, Oakland, California, {USA}},
  pages        = {216--230},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SP.2008.34},
  doi          = {10.1109/SP.2008.34},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JhaKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008,
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-59593-810-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ChristodorescuJKKV07,
  author       = {Mihai Christodorescu and
                  Somesh Jha and
                  Johannes Kinder and
                  Stefan Katzenbeisser and
                  Helmut Veith},
  title        = {Software transformations to improve malware detection},
  journal      = {J. Comput. Virol.},
  volume       = {3},
  number       = {4},
  pages        = {253--265},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11416-007-0059-8},
  doi          = {10.1007/S11416-007-0059-8},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/virology/ChristodorescuJKKV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MartignoniCJ07,
  author       = {Lorenzo Martignoni and
                  Mihai Christodorescu and
                  Somesh Jha},
  title        = {OmniUnpack: Fast, Generic, and Safe Unpacking of Malware},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {431--441},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.15},
  doi          = {10.1109/ACSAC.2007.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/MartignoniCJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BrumleyWJS07,
  author       = {David Brumley and
                  Hao Wang and
                  Somesh Jha and
                  Dawn Xiaodong Song},
  title        = {Creating Vulnerability Signatures Using Weakest Preconditions},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {311--325},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.17},
  doi          = {10.1109/CSF.2007.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BrumleyWJS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/GanapathyBSJ07,
  author       = {Vinod Ganapathy and
                  Arini Balakrishnan and
                  Michael M. Swift and
                  Somesh Jha},
  editor       = {Galen C. Hunt},
  title        = {Microdrivers: {A} New Architecture for Device Drivers},
  booktitle    = {Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating
                  Systems, May 7-9, 2005, San Diego, California, {USA}},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {http://www.usenix.org/events/hotos07/tech/full\_papers/ganapathy/ganapathy.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotos/GanapathyBSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GanapathyKJJ07,
  author       = {Vinod Ganapathy and
                  Dave King and
                  Trent Jaeger and
                  Somesh Jha},
  title        = {Mining Security-Sensitive Operations in Legacy Code Using Concept
                  Analysis},
  booktitle    = {29th International Conference on Software Engineering {(ICSE} 2007),
                  Minneapolis, MN, USA, May 20-26, 2007},
  pages        = {458--467},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICSE.2007.54},
  doi          = {10.1109/ICSE.2007.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/GanapathyKJJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/PredaCJD07,
  author       = {Mila Dalla Preda and
                  Mihai Christodorescu and
                  Somesh Jha and
                  Saumya K. Debray},
  editor       = {Martin Hofmann and
                  Matthias Felleisen},
  title        = {A semantics-based approach to malware detection},
  booktitle    = {Proceedings of the 34th {ACM} {SIGPLAN-SIGACT} Symposium on Principles
                  of Programming Languages, {POPL} 2007, Nice, France, January 17-19,
                  2007},
  pages        = {377--388},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1190216.1190270},
  doi          = {10.1145/1190216.1190270},
  timestamp    = {Fri, 25 Jun 2021 14:48:54 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/PredaCJD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/ChristodorescuJK07,
  author       = {Mihai Christodorescu and
                  Somesh Jha and
                  Christopher Kruegel},
  editor       = {Ivica Crnkovic and
                  Antonia Bertolino},
  title        = {Mining specifications of malicious behavior},
  booktitle    = {Proceedings of the 6th joint meeting of the European Software Engineering
                  Conference and the {ACM} {SIGSOFT} International Symposium on Foundations
                  of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7,
                  2007},
  pages        = {5--14},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1287624.1287628},
  doi          = {10.1145/1287624.1287628},
  timestamp    = {Tue, 01 Feb 2022 10:45:16 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/ChristodorescuJK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JhaKV07,
  author       = {Somesh Jha and
                  Stefan Katzenbeisser and
                  Christian Schallhart and
                  Helmut Veith and
                  Stephen Chenney},
  title        = {Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual
                  Environments},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {179--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.16},
  doi          = {10.1109/SP.2007.16},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JhaKV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/27,
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1},
  doi          = {10.1007/978-0-387-44599-1},
  isbn         = {978-0-387-32720-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/27.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhaKSVC07,
  author       = {Somesh Jha and
                  Stefan Katzenbeisser and
                  Christian Schallhart and
                  Helmut Veith and
                  Stephen Chenney},
  title        = {Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual
                  Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {56},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JhaKSVC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SmithEJ06,
  author       = {Randy Smith and
                  Cristian Estan and
                  Somesh Jha},
  title        = {Backtracking Algorithmic Complexity Attacks against a {NIDS}},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {89--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.17},
  doi          = {10.1109/ACSAC.2006.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/SmithEJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/WangJG06,
  author       = {Hao Wang and
                  Somesh Jha and
                  Vinod Ganapathy},
  title        = {NetSpy: Automatic Generation of Spyware Signatures for {NIDS}},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {99--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.34},
  doi          = {10.1109/ACSAC.2006.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/WangJG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RubinJM06,
  author       = {Shai Rubin and
                  Somesh Jha and
                  Barton P. Miller},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Protomatching network traffic for high throughputnetwork intrusion
                  detection},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {47--58},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180413},
  doi          = {10.1145/1180405.1180413},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RubinJM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrugerJGB06,
  author       = {Louis Kruger and
                  Somesh Jha and
                  Eu{-}Jin Goh and
                  Dan Boneh},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Secure function evaluation with ordered binary decision diagrams},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {410--420},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180455},
  doi          = {10.1145/1180405.1180455},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KrugerJGB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/RubinJM06,
  author       = {Shai Rubin and
                  Somesh Jha and
                  Barton P. Miller},
  title        = {On the Completeness of Attack Mutation Algorithms},
  booktitle    = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
                  5-7 July 2006, Venice, Italy},
  pages        = {43--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CSFW.2006.21},
  doi          = {10.1109/CSFW.2006.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/RubinJM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangJRSS06,
  author       = {Hao Wang and
                  Somesh Jha and
                  Thomas W. Reps and
                  Stefan Schwoon and
                  Stuart G. Stubblebine},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Reducing the Dependence of {SPKI/SDSI} on {PKI}},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {156--173},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_11},
  doi          = {10.1007/11863908\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangJRSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GiffinJM06,
  author       = {Jonathon T. Giffin and
                  Somesh Jha and
                  Barton P. Miller},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Automated Discovery of Mimicry Attacks},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_3},
  doi          = {10.1007/11856214\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GiffinJM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BrumleyNSWJ06,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Xiaodong Song and
                  Hao Wang and
                  Somesh Jha},
  title        = {Towards Automatic Generation of Vulnerability-Based Signatures},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {2--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.41},
  doi          = {10.1109/SP.2006.41},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BrumleyNSWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GanapathyJJ06,
  author       = {Vinod Ganapathy and
                  Trent Jaeger and
                  Somesh Jha},
  title        = {Retrofitting Legacy Code for Authorization Policy Enforcement},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {214--229},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.34},
  doi          = {10.1109/SP.2006.34},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GanapathyJJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/JhaSWR06,
  author       = {Somesh Jha and
                  Stefan Schwoon and
                  Hao Wang and
                  Thomas W. Reps},
  editor       = {Holger Hermanns and
                  Jens Palsberg},
  title        = {Weighted Pushdown Systems and Trust-Management Systems},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  12th International Conference, {TACAS} 2006 Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2006,
                  Vienna, Austria, March 25 - April 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3920},
  pages        = {1--26},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11691372\_1},
  doi          = {10.1007/11691372\_1},
  timestamp    = {Sat, 30 Sep 2023 09:57:43 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/JhaSWR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/logcom/ChakiCJV05,
  author       = {Sagar Chaki and
                  Edmund M. Clarke and
                  Somesh Jha and
                  Helmut Veith},
  title        = {An Iterative Framework for Simulation Conformance},
  journal      = {J. Log. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {465--488},
  year         = {2005},
  url          = {https://doi.org/10.1093/logcom/exi028},
  doi          = {10.1093/LOGCOM/EXI028},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/logcom/ChakiCJV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/RepsSJM05,
  author       = {Thomas W. Reps and
                  Stefan Schwoon and
                  Somesh Jha and
                  David Melski},
  title        = {Weighted pushdown systems and their application to interprocedural
                  dataflow analysis},
  journal      = {Sci. Comput. Program.},
  volume       = {58},
  number       = {1-2},
  pages        = {206--263},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.scico.2005.02.009},
  doi          = {10.1016/J.SCICO.2005.02.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/RepsSJM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GanapathyJJ05,
  author       = {Vinod Ganapathy and
                  Trent Jaeger and
                  Somesh Jha},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Automatic placement of authorization hooks in the linux security modules
                  framework},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {330--339},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102164},
  doi          = {10.1145/1102120.1102164},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GanapathyJJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JhaKM05,
  author       = {Somesh Jha and
                  Louis Kruger and
                  Patrick D. McDaniel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Privacy Preserving Clustering},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {397--417},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_23},
  doi          = {10.1007/11555827\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JhaKM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/SivathanuAAJ05,
  author       = {Muthian Sivathanu and
                  Andrea C. Arpaci{-}Dusseau and
                  Remzi H. Arpaci{-}Dusseau and
                  Somesh Jha},
  editor       = {Garth Gibson},
  title        = {A Logic of File Systems},
  booktitle    = {Proceedings of the {FAST} '05 Conference on File and Storage Technologies,
                  December 13-16, 2005, San Francisco, California, {USA}},
  publisher    = {{USENIX}},
  year         = {2005},
  url          = {http://www.usenix.org/events/fast05/tech/sivathanu\_logic.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fast/SivathanuAAJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/GanapathySJRB05,
  author       = {Vinod Ganapathy and
                  Sanjit A. Seshia and
                  Somesh Jha and
                  Thomas W. Reps and
                  Randal E. Bryant},
  editor       = {Gruia{-}Catalin Roman and
                  William G. Griswold and
                  Bashar Nuseibeh},
  title        = {Automatic discovery of API-level exploits},
  booktitle    = {27th International Conference on Software Engineering {(ICSE} 2005),
                  15-21 May 2005, St. Louis, Missouri, {USA}},
  pages        = {312--321},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1062455.1062518},
  doi          = {10.1145/1062455.1062518},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/GanapathySJRB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GiffinDJLM05,
  author       = {Jonathon T. Giffin and
                  David Dagon and
                  Somesh Jha and
                  Wenke Lee and
                  Barton P. Miller},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Environment-Sensitive Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {185--206},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_10},
  doi          = {10.1007/11663812\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GiffinDJLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RubinJM05,
  author       = {Shai Rubin and
                  Somesh Jha and
                  Barton P. Miller},
  title        = {Language-Based Generation and Evaluation of {NIDS} Signatures},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {3--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.10},
  doi          = {10.1109/SP.2005.10},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RubinJM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChristodorescuJSSB05,
  author       = {Mihai Christodorescu and
                  Somesh Jha and
                  Sanjit A. Seshia and
                  Dawn Xiaodong Song and
                  Randal E. Bryant},
  title        = {Semantics-Aware Malware Detection},
  booktitle    = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11
                  May 2005, Oakland, CA, {USA}},
  pages        = {32--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SP.2005.20},
  doi          = {10.1109/SP.2005.20},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ChristodorescuJSSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/YegneswaranGBJ05,
  author       = {Vinod Yegneswaran and
                  Jonathon T. Giffin and
                  Paul Barford and
                  Somesh Jha},
  editor       = {Patrick D. McDaniel},
  title        = {An Architecture for Generating Semantic Aware Signatures},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/architecture-generating-semantic-aware-signatures},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/YegneswaranGBJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JhaR04,
  author       = {Somesh Jha and
                  Thomas W. Reps},
  title        = {Model checking {SPKI/SDSI}},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {3-4},
  pages        = {317--353},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-123-402},
  doi          = {10.3233/JCS-2004-123-402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/JhaR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ChakiCGJV04,
  author       = {Sagar Chaki and
                  Edmund M. Clarke and
                  Alex Groce and
                  Somesh Jha and
                  Helmut Veith},
  title        = {Modular Verification of Software Components in {C}},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {30},
  number       = {6},
  pages        = {388--402},
  year         = {2004},
  url          = {https://doi.org/10.1109/TSE.2004.22},
  doi          = {10.1109/TSE.2004.22},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/ChakiCGJV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/RubinJM04,
  author       = {Shai Rubin and
                  Somesh Jha and
                  Barton P. Miller},
  title        = {Automatic Generation and Analysis of {NIDS} Attacks},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {28--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.9},
  doi          = {10.1109/CSAC.2004.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/RubinJM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/ChristodorescuJ04,
  author       = {Mihai Christodorescu and
                  Somesh Jha},
  editor       = {George S. Avrunin and
                  Gregg Rothermel},
  title        = {Testing malware detectors},
  booktitle    = {Proceedings of the {ACM/SIGSOFT} International Symposium on Software
                  Testing and Analysis, {ISSTA} 2004, Boston, Massachusetts, USA, July
                  11-14, 2004},
  pages        = {34--44},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1007512.1007518},
  doi          = {10.1145/1007512.1007518},
  timestamp    = {Tue, 06 Nov 2018 16:57:30 +0100},
  biburl       = {https://dblp.org/rec/conf/issta/ChristodorescuJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/GiffinJM04,
  author       = {Jonathon T. Giffin and
                  Somesh Jha and
                  Barton P. Miller},
  title        = {Efficient Context-Sensitive Intrusion Detection},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2004, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2004},
  url          = {https://www.ndss-symposium.org/ndss2004/efficient-context-sensitive-intrusion-detection/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/GiffinJM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/YegneswaranBJ04,
  author       = {Vinod Yegneswaran and
                  Paul Barford and
                  Somesh Jha},
  title        = {Global Intrusion Detection in the {DOMINO} Overlay System},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2004, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2004},
  url          = {https://www.ndss-symposium.org/ndss2004/global-intrusion-detection-domino-overlay-system/},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/YegneswaranBJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/WangJLM04,
  author       = {Hao Wang and
                  Somesh Jha and
                  Miron Livny and
                  Patrick D. McDaniel},
  title        = {Security Policy Reconciliation in Distributed Computing Environments},
  booktitle    = {5th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY,
                  {USA}},
  pages        = {137},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/POLICY.2004.1309160},
  doi          = {10.1109/POLICY.2004.1309160},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/WangJLM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FengGHJLM04,
  author       = {Henry Hanping Feng and
                  Jonathon T. Giffin and
                  Yong Huang and
                  Somesh Jha and
                  Wenke Lee and
                  Barton P. Miller},
  title        = {Formalizing Sensitivity in Static Analysis for Intrusion Detection},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {194},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301324},
  doi          = {10.1109/SECPRI.2004.1301324},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FengGHJLM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jacm/ClarkeGJLV03,
  author       = {Edmund M. Clarke and
                  Orna Grumberg and
                  Somesh Jha and
                  Yuan Lu and
                  Helmut Veith},
  title        = {Counterexample-guided abstraction refinement for symbolic model checking},
  journal      = {J. {ACM}},
  volume       = {50},
  number       = {5},
  pages        = {752--794},
  year         = {2003},
  url          = {https://doi.org/10.1145/876638.876643},
  doi          = {10.1145/876638.876643},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jacm/ClarkeGJLV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/ClarkeJM03,
  author       = {Edmund M. Clarke and
                  Somesh Jha and
                  Wilfredo R. Marrero},
  title        = {Efficient verification of security protocols using partial-order reductions},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {4},
  number       = {2},
  pages        = {173--188},
  year         = {2003},
  url          = {https://doi.org/10.1007/s10009-002-0103-4},
  doi          = {10.1007/S10009-002-0103-4},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/ClarkeJM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GanapathyJCMV03,
  author       = {Vinod Ganapathy and
                  Somesh Jha and
                  David Chandler and
                  David Melski and
                  David Vitek},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Buffer overrun detection using linear programming and static analysis},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {345--354},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948155},
  doi          = {10.1145/948109.948155},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GanapathyJCMV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SchwoonJRS03,
  author       = {Stefan Schwoon and
                  Somesh Jha and
                  Thomas W. Reps and
                  Stuart G. Stubblebine},
  title        = {On Generalized Authorization Problems},
  booktitle    = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003),
                  30 June - 2 July 2003, Pacific Grove, CA, {USA}},
  pages        = {202},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSFW.2003.1212714},
  doi          = {10.1109/CSFW.2003.1212714},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/SchwoonJRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ChakiCGJV03,
  author       = {Sagar Chaki and
                  Edmund M. Clarke and
                  Alex Groce and
                  Somesh Jha and
                  Helmut Veith},
  editor       = {Lori A. Clarke and
                  Laurie Dillon and
                  Walter F. Tichy},
  title        = {Modular Verification of Software Components in {C}},
  booktitle    = {Proceedings of the 25th International Conference on Software Engineering,
                  May 3-10, 2003, Portland, Oregon, {USA}},
  pages        = {385--395},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICSE.2003.1201217},
  doi          = {10.1109/ICSE.2003.1201217},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/ChakiCGJV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sas/RepsSJ03,
  author       = {Thomas W. Reps and
                  Stefan Schwoon and
                  Somesh Jha},
  editor       = {Radhia Cousot},
  title        = {Weighted Pushdown Systems and Their Application to Interprocedural
                  Dataflow Analysis},
  booktitle    = {Static Analysis, 10th International Symposium, {SAS} 2003, San Diego,
                  CA, USA, June 11-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2694},
  pages        = {189--213},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44898-5\_11},
  doi          = {10.1007/3-540-44898-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sas/RepsSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/ChakiFGJKV03,
  author       = {Sagar Chaki and
                  Pascal Fenkam and
                  Harald C. Gall and
                  Somesh Jha and
                  Engin Kirda and
                  Helmut Veith},
  title        = {Integrating Publish/Subscribe into a Mobile Teamwork Support Platform},
  booktitle    = {Proceedings of the Fifteenth International Conference on Software
                  Engineering {\&} Knowledge Engineering (SEKE'2003), Hotel Sofitel,
                  San Francisco Bay, CA, USA, July 1-3, 2003},
  pages        = {510--517},
  year         = {2003},
  timestamp    = {Wed, 01 Apr 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seke/ChakiFGJKV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChristodorescuJ03,
  author       = {Mihai Christodorescu and
                  Somesh Jha},
  title        = {Static Analysis of Executables to Detect Malicious Patterns},
  booktitle    = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C.,
                  USA, August 4-8, 2003},
  publisher    = {{USENIX} Association},
  year         = {2003},
  url          = {https://www.usenix.org/conference/12th-usenix-security-symposium/static-analysis-executables-detect-malicious-patterns},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ChristodorescuJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JhaSW02,
  author       = {Somesh Jha and
                  Oleg Sheyner and
                  Jeannette M. Wing},
  title        = {Two Formal Analys s of Attack Graphs},
  booktitle    = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002),
                  24-26 June 2002, Cape Breton, Nova Scotia, Canada},
  pages        = {49--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSFW.2002.1021806},
  doi          = {10.1109/CSFW.2002.1021806},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/JhaSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JhaR02,
  author       = {Somesh Jha and
                  Thomas W. Reps},
  title        = {Analysis of {SPKI/SDSI} Certificates Using Model Checking},
  booktitle    = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002),
                  24-26 June 2002, Cape Breton, Nova Scotia, Canada},
  pages        = {129},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CSFW.2002.1021812},
  doi          = {10.1109/CSFW.2002.1021812},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/JhaR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/JhaPZ02,
  author       = {Somesh Jha and
                  Jens Palsberg and
                  Tian Zhao},
  editor       = {Mogens Nielsen and
                  Uffe Engberg},
  title        = {Efficient Type Matching},
  booktitle    = {Foundations of Software Science and Computation Structures, 5th International
                  Conference, {FOSSACS} 2002. Held as Part of the Joint European Conferences
                  on Theory and Practice of Software, {ETAPS} 2002 Grenoble, France,
                  April 8-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2303},
  pages        = {187--204},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45931-6\_14},
  doi          = {10.1007/3-540-45931-6\_14},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/JhaPZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lics/ClarkeJLV02,
  author       = {Edmund M. Clarke and
                  Somesh Jha and
                  Yuan Lu and
                  Helmut Veith},
  title        = {Tree-Like Counterexamples in Model Checking},
  booktitle    = {17th {IEEE} Symposium on Logic in Computer Science {(LICS} 2002),
                  22-25 July 2002, Copenhagen, Denmark, Proceedings},
  pages        = {19--29},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/LICS.2002.1029814},
  doi          = {10.1109/LICS.2002.1029814},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lics/ClarkeJLV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SheynerHJLW02,
  author       = {Oleg Sheyner and
                  Joshua W. Haines and
                  Somesh Jha and
                  Richard Lippmann and
                  Jeannette M. Wing},
  title        = {Automated Generation and Analysis of Attack Graphs},
  booktitle    = {2002 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 12-15, 2002},
  pages        = {273--284},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/SECPRI.2002.1004377},
  doi          = {10.1109/SECPRI.2002.1004377},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SheynerHJLW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GiffinJM02,
  author       = {Jonathon T. Giffin and
                  Somesh Jha and
                  Barton P. Miller},
  editor       = {Dan Boneh},
  title        = {Detecting Manipulated Remote Call Streams},
  booktitle    = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
                  CA, USA, August 5-9, 2002},
  pages        = {61--79},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/sec02/giffin.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GiffinJM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/charme/ChauhanCJKVW01,
  author       = {Pankaj Chauhan and
                  Edmund M. Clarke and
                  Somesh Jha and
                  James H. Kukula and
                  Helmut Veith and
                  Dong Wang},
  editor       = {Tiziana Margaria and
                  Thomas F. Melham},
  title        = {Using Combinatorial Optimization Methods for Quantification Scheduling},
  booktitle    = {Correct Hardware Design and Verification Methods, 11th {IFIP} {WG}
                  10.5 Advanced Research Working Conference, {CHARME} 2001, Livingston,
                  Scotland, UK, September 4-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2144},
  pages        = {293--309},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44798-9\_24},
  doi          = {10.1007/3-540-44798-9\_24},
  timestamp    = {Sun, 02 Jun 2019 21:23:48 +0200},
  biburl       = {https://dblp.org/rec/conf/charme/ChauhanCJKVW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JhaTM01,
  author       = {Somesh Jha and
                  Kymie M. C. Tan and
                  Roy A. Maxion},
  title        = {Markov Chains, Classifiers, and Intrusion Detection},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {206--219},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930147},
  doi          = {10.1109/CSFW.2001.930147},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/JhaTM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/ClarkeGJLV01,
  author       = {Edmund M. Clarke and
                  Orna Grumberg and
                  Somesh Jha and
                  Yuan Lu and
                  Helmut Veith},
  editor       = {Reinhard Wilhelm},
  title        = {Progress on the State Explosion Problem in Model Checking},
  booktitle    = {Informatics - 10 Years Back. 10 Years Ahead},
  series       = {Lecture Notes in Computer Science},
  volume       = {2000},
  pages        = {176--194},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44577-3\_12},
  doi          = {10.1007/3-540-44577-3\_12},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/ClarkeGJLV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccad/ChauhanCJKSVW01,
  author       = {Pankaj Chauhan and
                  Edmund M. Clarke and
                  Somesh Jha and
                  James H. Kukula and
                  Thomas R. Shiple and
                  Helmut Veith and
                  Dong Wang},
  editor       = {Rolf Ernst},
  title        = {Non-linear Quantification Scheduling in Image Computation},
  booktitle    = {Proceedings of the 2001 {IEEE/ACM} International Conference on Computer-Aided
                  Design, {ICCAD} 2001, San Jose, CA, USA, November 4-8, 2001},
  pages        = {293},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICCAD.2001.968636},
  doi          = {10.1109/ICCAD.2001.968636},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccad/ChauhanCJKSVW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/JhaW01,
  author       = {Somesh Jha and
                  Jeannette M. Wing},
  editor       = {Hausi A. M{\"{u}}ller and
                  Mary Jean Harrold and
                  Wilhelm Sch{\"{a}}fer},
  title        = {Survivability Analysis of Network Systems},
  booktitle    = {Proceedings of the 23rd International Conference on Software Engineering,
                  {ICSE} 2001, 12-19 May 2001, Toronto, Ontario, Canada},
  pages        = {307--317},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICSE.2001.919104},
  doi          = {10.1109/ICSE.2001.919104},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/JhaW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/CampaillaCCJV01,
  author       = {Alexis Campailla and
                  Sagar Chaki and
                  Edmund M. Clarke and
                  Somesh Jha and
                  Helmut Veith},
  editor       = {Hausi A. M{\"{u}}ller and
                  Mary Jean Harrold and
                  Wilhelm Sch{\"{a}}fer},
  title        = {Efficient Filtering in Publish-Subscribe Systems Using Binary Decision},
  booktitle    = {Proceedings of the 23rd International Conference on Software Engineering,
                  {ICSE} 2001, 12-19 May 2001, Toronto, Ontario, Canada},
  pages        = {443--452},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/ICSE.2001.919117},
  doi          = {10.1109/ICSE.2001.919117},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/CampaillaCCJV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/ClarkeJM00,
  author       = {Edmund M. Clarke and
                  Somesh Jha and
                  Wilfredo R. Marrero},
  title        = {Verifying security protocols with Brutus},
  journal      = {{ACM} Trans. Softw. Eng. Methodol.},
  volume       = {9},
  number       = {4},
  pages        = {443--487},
  year         = {2000},
  url          = {https://doi.org/10.1145/363516.363528},
  doi          = {10.1145/363516.363528},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosem/ClarkeJM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/BerezinCJM00,
  author       = {Sergey Berezin and
                  Edmund M. Clarke and
                  Somesh Jha and
                  Will Marrero},
  editor       = {Gordon D. Plotkin and
                  Colin Stirling and
                  Mads Tofte},
  title        = {Model checking algorithms for the {\(\mathrm{\mu}\)}-calculus},
  booktitle    = {Proof, Language, and Interaction, Essays in Honour of Robin Milner},
  pages        = {309--338},
  publisher    = {The {MIT} Press},
  year         = {2000},
  timestamp    = {Mon, 23 Jun 2008 08:50:50 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/BerezinCJM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ClarkeGJLV00,
  author       = {Edmund M. Clarke and
                  Orna Grumberg and
                  Somesh Jha and
                  Yuan Lu and
                  Helmut Veith},
  editor       = {E. Allen Emerson and
                  A. Prasad Sistla},
  title        = {Counterexample-Guided Abstraction Refinement},
  booktitle    = {Computer Aided Verification, 12th International Conference, {CAV}
                  2000, Chicago, IL, USA, July 15-19, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1855},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722167\_15},
  doi          = {10.1007/10722167\_15},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cav/ClarkeGJLV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/JhaWLL00,
  author       = {Somesh Jha and
                  Jeannette M. Wing and
                  Richard C. Linger and
                  Thomas A. Longstaff},
  title        = {Survivability Analysis of Network Specifications},
  booktitle    = {2000 International Conference on Dependable Systems and Networks {(DSN}
                  2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York,
                  NY, {USA}},
  pages        = {613--622},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICDSN.2000.857597},
  doi          = {10.1109/ICDSN.2000.857597},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/JhaWLL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ClarkeJM00,
  author       = {Edmund M. Clarke and
                  Somesh Jha and
                  Wilfredo R. Marrero},
  editor       = {Susanne Graf and
                  Michael I. Schwartzbach},
  title        = {Partial Order Reductions for Security Protocol Verification},
  booktitle    = {Tools and Algorithms for Construction and Analysis of Systems, 6th
                  International Conference, {TACAS} 2000, Held as Part of the European
                  Joint Conferences on the Theory and Practice of Software, {ETAPS}
                  2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1785},
  pages        = {503--518},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-46419-0\_34},
  doi          = {10.1007/3-540-46419-0\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/ClarkeJM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/ChalasaniJS99,
  author       = {Prasad Chalasani and
                  Somesh Jha and
                  Isaac Saias},
  title        = {Approximate Option Pricing},
  journal      = {Algorithmica},
  volume       = {25},
  number       = {1},
  pages        = {2--21},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00009280},
  doi          = {10.1007/PL00009280},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/ChalasaniJS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/charme/ClarkeJLW99,
  author       = {Edmund M. Clarke and
                  Somesh Jha and
                  Yuan Lu and
                  Dong Wang},
  editor       = {Laurence Pierre and
                  Thomas Kropf},
  title        = {Abstract BDDs: {A} Technique for Using Abstraction in Model Checking},
  booktitle    = {Correct Hardware Design and Verification Methods, 10th {IFIP} {WG}
                  10.5 Advanced Research Working Conference, {CHARME} '99, Bad Herrenalb,
                  Germany, September 27-29, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1703},
  pages        = {172--186},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48153-2\_14},
  doi          = {10.1007/3-540-48153-2\_14},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/charme/ClarkeJLW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdpta/JhaP99,
  author       = {Somesh Jha and
                  Doron A. Peled},
  editor       = {Hamid R. Arabnia},
  title        = {Generalized Stuttering Equivalence},
  booktitle    = {Proceedings of the International Conference on Parallel and Distributed
                  Processing Techniques and Applications, {PDPTA} 1999, June 28 - Junlly
                  1, 1999, Las Vegas, Nevada, {USA}},
  pages        = {1054--1060},
  publisher    = {{CSREA} Press},
  year         = {1999},
  timestamp    = {Fri, 12 Feb 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pdpta/JhaP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ShehorySCJ98,
  author       = {Onn Shehory and
                  Katia P. Sycara and
                  Prasad Chalasani and
                  Somesh Jha},
  title        = {Agent cloning: an approach to agent mobility and resource allocation},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {36},
  number       = {7},
  pages        = {58},
  year         = {1998},
  url          = {https://doi.org/10.1109/35.689632},
  doi          = {10.1109/35.689632},
  timestamp    = {Tue, 06 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ShehorySCJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/DingelGJN98,
  author       = {J{\"{u}}rgen Dingel and
                  David Garlan and
                  Somesh Jha and
                  David Notkin},
  title        = {Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee
                  Reasoning},
  journal      = {Formal Aspects Comput.},
  volume       = {10},
  number       = {3},
  pages        = {193--213},
  year         = {1998},
  url          = {https://doi.org/10.1007/s001650050011},
  doi          = {10.1007/S001650050011},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/DingelGJN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/JacksonJD98,
  author       = {Daniel Jackson and
                  Somesh Jha and
                  Craig Damon},
  title        = {Isomorph-Free Model Enumeration: {A} New Method for Checking Relational
                  Specifications},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {20},
  number       = {2},
  pages        = {302--343},
  year         = {1998},
  url          = {https://doi.org/10.1145/276393.276396},
  doi          = {10.1145/276393.276396},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/JacksonJD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agents/ChalasaniJSS98,
  author       = {Prasad Chalasani and
                  Somesh Jha and
                  Onn Shehory and
                  Katia P. Sycara},
  editor       = {Katia P. Sycara and
                  Michael J. Wooldridge},
  title        = {Query Restart Strategies for Web Agent},
  booktitle    = {Proceedings of the Second International Conference on Autonomous Agents,
                  {AGENTS} 1998, St. Paul, Minnepolis, USA, May 9-13, 1998},
  pages        = {124--131},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/280765.280787},
  doi          = {10.1145/280765.280787},
  timestamp    = {Fri, 26 Apr 2019 14:26:42 +0200},
  biburl       = {https://dblp.org/rec/conf/agents/ChalasaniJSS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agents/JhaCSS98,
  author       = {Somesh Jha and
                  Prasad Chalasani and
                  Onn Shehory and
                  Katia P. Sycara},
  editor       = {Katia P. Sycara and
                  Michael J. Wooldridge},
  title        = {A Formal Treatment of Distributed Matchmaking},
  booktitle    = {Proceedings of the Second International Conference on Autonomous Agents,
                  {AGENTS} 1998, St. Paul, Minnepolis, USA, May 9-13, 1998},
  pages        = {457--458},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/280765.280897},
  doi          = {10.1145/280765.280897},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/agents/JhaCSS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/ShehorySCJ98,
  author       = {Onn Shehory and
                  Katia P. Sycara and
                  Prasad Chalasani and
                  Somesh Jha},
  editor       = {J{\"{o}}rg P. M{\"{u}}ller and
                  Munindar P. Singh and
                  Anand S. Rao},
  title        = {Increasing Resource Utilization and Task Performance by Agent Cloning},
  booktitle    = {Intelligent Agents V, Agent Theories, Architectures, and Languages,
                  5th International Workshop, {ATAL} '98, Paris, France, July 4-7, 1998,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1555},
  pages        = {413--426},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49057-4\_27},
  doi          = {10.1007/3-540-49057-4\_27},
  timestamp    = {Tue, 29 Dec 2020 18:27:45 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/ShehorySCJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ClarkeEJS98,
  author       = {Edmund M. Clarke and
                  E. Allen Emerson and
                  Somesh Jha and
                  A. Prasad Sistla},
  editor       = {Alan J. Hu and
                  Moshe Y. Vardi},
  title        = {Symmetry Reductions in Model Checking},
  booktitle    = {Computer Aided Verification, 10th International Conference, {CAV}
                  '98, Vancouver, BC, Canada, June 28 - July 2, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1427},
  pages        = {147--158},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0028741},
  doi          = {10.1007/BFB0028741},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cav/ClarkeEJS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cia/ChalasaniJSS98,
  author       = {Prasad Chalasani and
                  Somesh Jha and
                  Onn Shehory and
                  Katia P. Sycara},
  editor       = {Matthias Klusch and
                  Gerhard Wei{\ss}},
  title        = {Strategies for Querying Information Agents},
  booktitle    = {Cooperative Information Agents II, Learning, Mobility and Electronic
                  Commerce for Information Discovery on the Internet, Second International
                  Workshop, CIA' 98, Paris, France, July 4-7, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1435},
  pages        = {94--107},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053677},
  doi          = {10.1007/BFB0053677},
  timestamp    = {Tue, 08 Mar 2022 10:12:49 +0100},
  biburl       = {https://dblp.org/rec/conf/cia/ChalasaniJSS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmas/ShehorySCJ98,
  author       = {Onn Shehory and
                  Katia P. Sycara and
                  Prasad Chalasani and
                  Somesh Jha},
  editor       = {Yves Demazeau},
  title        = {Agent Cloning},
  booktitle    = {Proceedings of the Third International Conference on Multiagent Systems,
                  {ICMAS} 1998, Paris, France, July 3-7, 1998},
  pages        = {463--464},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/ICMAS.1998.699287},
  doi          = {10.1109/ICMAS.1998.699287},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmas/ShehorySCJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/procomet/ClarkeJM98,
  author       = {Edmund M. Clarke and
                  Somesh Jha and
                  Wilfredo R. Marrero},
  editor       = {David Gries and
                  Willem P. de Roever},
  title        = {Using state space exploration and a natural deduction style message
                  derivation engine to verify security protocols},
  booktitle    = {Programming Concepts and Methods, {IFIP} TC2/WG2.2,2.3 International
                  Conference on Programming Concepts and Methods {(PROCOMET} '98) 8-12
                  June 1998, Shelter Island, New York, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {125},
  pages        = {87--106},
  publisher    = {Chapman {\&} Hall},
  year         = {1998},
  timestamp    = {Thu, 21 Nov 2002 11:12:21 +0100},
  biburl       = {https://dblp.org/rec/conf/procomet/ClarkeJM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/GarlanJN98,
  author       = {David Garlan and
                  Somesh Jha and
                  David Notkin},
  editor       = {Leon J. Osterweil and
                  William L. Scherlis},
  title        = {Reasoning about Implicit Invocation},
  booktitle    = {Proceedings of the {ACM} {SIGSOFT} International Symposium on Foundations
                  of Software Engineering, {SIGSOFT} 1998, Lake Buena Vista, Florida,
                  USA, November 3-5, 1998},
  pages        = {209--221},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288195.288312},
  doi          = {10.1145/288195.288312},
  timestamp    = {Tue, 27 Jul 2021 17:16:40 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/GarlanJN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BrowneCJLM97,
  author       = {Anca Browne and
                  Edmund M. Clarke and
                  Somesh Jha and
                  David E. Long and
                  Wilfredo R. Marrero},
  title        = {An Improved Algorithm for the Evaluation of Fixpoint Expressions},
  journal      = {Theor. Comput. Sci.},
  volume       = {178},
  number       = {1-2},
  pages        = {237--255},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0304-3975(96)00228-9},
  doi          = {10.1016/S0304-3975(96)00228-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BrowneCJLM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toplas/ClarkeGJ97,
  author       = {Edmund M. Clarke and
                  Orna Grumberg and
                  Somesh Jha},
  title        = {Verifying Parameterized Networks},
  journal      = {{ACM} Trans. Program. Lang. Syst.},
  volume       = {19},
  number       = {5},
  pages        = {726--750},
  year         = {1997},
  url          = {https://doi.org/10.1145/265943.265960},
  doi          = {10.1145/265943.265960},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toplas/ClarkeGJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atal/ShehorySJ97,
  author       = {Onn Shehory and
                  Katia P. Sycara and
                  Somesh Jha},
  editor       = {Munindar P. Singh and
                  Anand S. Rao and
                  Michael J. Wooldridge},
  title        = {Multi-Agent Coordination through Coalition Formation},
  booktitle    = {Intelligent Agents IV, Agent Theories, Architectures, and Languages,
                  4th International Workshop, {ATAL} '97, Providence, Rhode Island,
                  USA, July 24-26, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1365},
  pages        = {143--154},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0026756},
  doi          = {10.1007/BFB0026756},
  timestamp    = {Tue, 29 Dec 2020 18:27:45 +0100},
  biburl       = {https://dblp.org/rec/conf/atal/ShehorySJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccd/JhaLMC97,
  author       = {Somesh Jha and
                  Yuan Lu and
                  Marius Minea and
                  Edmund M. Clarke},
  title        = {Equivalence Checking Using Abstract BDDs},
  booktitle    = {Proceedings 1997 International Conference on Computer Design: {VLSI}
                  in Computers {\&} Processors, {ICCD} '97, Austin, Texas, USA,
                  October 12-15, 1997},
  pages        = {332--337},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/ICCD.1997.628891},
  doi          = {10.1109/ICCD.1997.628891},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccd/JhaLMC97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/EmersonJP97,
  author       = {E. Allen Emerson and
                  Somesh Jha and
                  Doron A. Peled},
  editor       = {Ed Brinksma},
  title        = {Combining Partial Order and Symmetry Reductions},
  booktitle    = {Tools and Algorithms for Construction and Analysis of Systems, Third
                  International Workshop, {TACAS} '97, Enschede, The Netherlands, April
                  2-4, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1217},
  pages        = {19--34},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0035378},
  doi          = {10.1007/BFB0035378},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/EmersonJP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/ClarkeJEF96,
  author       = {Edmund M. Clarke and
                  Somesh Jha and
                  Reinhard Enders and
                  Thomas Filkorn},
  title        = {Exploiting Symmetry in Temporal Logic Model Checking},
  journal      = {Formal Methods Syst. Des.},
  volume       = {9},
  number       = {1/2},
  pages        = {77--104},
  year         = {1996},
  url          = {https://doi.org/10.1007/BF00625969},
  doi          = {10.1007/BF00625969},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/ClarkeJEF96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/ChalasaniJS96,
  author       = {Prasad Chalasani and
                  Somesh Jha and
                  Isaac Saias},
  title        = {Approximate Option Pricing},
  booktitle    = {37th Annual Symposium on Foundations of Computer Science, {FOCS} '96,
                  Burlington, Vermont, USA, 14-16 October, 1996},
  pages        = {244--253},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SFCS.1996.548483},
  doi          = {10.1109/SFCS.1996.548483},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/ChalasaniJS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/popl/JacksonJD96,
  author       = {Daniel Jackson and
                  Somesh Jha and
                  Craig Damon},
  editor       = {Hans{-}Juergen Boehm and
                  Guy L. Steele Jr.},
  title        = {Faster Checking of Software Specifications by Eliminating Isomorphs},
  booktitle    = {Conference Record of POPL'96: The 23rd {ACM} {SIGPLAN-SIGACT} Symposium
                  on Principles of Programming Languages, Papers Presented at the Symposium,
                  St. Petersburg Beach, Florida, USA, January 21-24, 1996},
  pages        = {79--90},
  publisher    = {{ACM} Press},
  year         = {1996},
  url          = {https://doi.org/10.1145/237721.237733},
  doi          = {10.1145/237721.237733},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/popl/JacksonJD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/DamonJJ96,
  author       = {Craig Damon and
                  Daniel Jackson and
                  Somesh Jha},
  editor       = {David Garlan},
  title        = {Checking Relational Specifications With Binary Decision Diagrams},
  booktitle    = {Proceedings of the Fourth {ACM} {SIGSOFT} Symposium on Foundations
                  of Software Engineering, SIGSOFT1996, San Francisco, California, USA,
                  October 16-18, 1996},
  pages        = {70--80},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/239098.239110},
  doi          = {10.1145/239098.239110},
  timestamp    = {Tue, 27 Jul 2021 17:16:40 +0200},
  biburl       = {https://dblp.org/rec/conf/sigsoft/DamonJJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/ClarkeGHJLMN95,
  author       = {Edmund M. Clarke and
                  Orna Grumberg and
                  Hiromi Hiraishi and
                  Somesh Jha and
                  David E. Long and
                  Kenneth L. McMillan and
                  Linda A. Ness},
  title        = {Verification of the Futurebus+ Cache Coherence Protocol},
  journal      = {Formal Methods Syst. Des.},
  volume       = {6},
  number       = {2},
  pages        = {217--232},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01383968},
  doi          = {10.1007/BF01383968},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/ClarkeGHJLMN95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/concur/ClarkeGJ95,
  author       = {Edmund M. Clarke and
                  Orna Grumberg and
                  Somesh Jha},
  editor       = {Insup Lee and
                  Scott A. Smolka},
  title        = {Veryfying Parameterized Networks using Abstraction and Regular Languages},
  booktitle    = {{CONCUR} '95: Concurrency Theory, 6th International Conference, Philadelphia,
                  PA, USA, August 21-24, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {962},
  pages        = {395--407},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60218-6\_30},
  doi          = {10.1007/3-540-60218-6\_30},
  timestamp    = {Thu, 26 Jan 2023 14:05:52 +0100},
  biburl       = {https://dblp.org/rec/conf/concur/ClarkeGJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/cstoday95/ClarkeJ95,
  author       = {Edmund M. Clarke and
                  Somesh Jha},
  editor       = {Jan van Leeuwen},
  title        = {Symmetry and Induction in Model Checking},
  booktitle    = {Computer Science Today: Recent Trends and Developments},
  series       = {Lecture Notes in Computer Science},
  volume       = {1000},
  pages        = {455--470},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0015260},
  doi          = {10.1007/BFB0015260},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/books/sp/cstoday95/ClarkeJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/LongBCJM94,
  author       = {David E. Long and
                  Anca Browne and
                  Edmund M. Clarke and
                  Somesh Jha and
                  Wilfredo R. Marrero},
  editor       = {David L. Dill},
  title        = {An Improved Algorithm for the Evaluation of Fixpoint Expressions},
  booktitle    = {Computer Aided Verification, 6th International Conference, {CAV} '94,
                  Stanford, California, USA, June 21-23, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {818},
  pages        = {338--350},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58179-0\_66},
  doi          = {10.1007/3-540-58179-0\_66},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/LongBCJM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ClarkeFJ93,
  author       = {Edmund M. Clarke and
                  Thomas Filkorn and
                  Somesh Jha},
  editor       = {Costas Courcoubetis},
  title        = {Exploiting Symmetry In Temporal Logic Model Checking},
  booktitle    = {Computer Aided Verification, 5th International Conference, {CAV} '93,
                  Elounda, Greece, June 28 - July 1, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {697},
  pages        = {450--462},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-56922-7\_37},
  doi          = {10.1007/3-540-56922-7\_37},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ClarkeFJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chdl/ClarkeGHJLMN93,
  author       = {Edmund M. Clarke and
                  Orna Grumberg and
                  Hiromi Hiraishi and
                  Somesh Jha and
                  David E. Long and
                  Kenneth L. McMillan and
                  Linda A. Ness},
  editor       = {David Agnew and
                  Luc J. M. Claesen and
                  Raul Camposano},
  title        = {Verification of the Futurebus+ Cache Coherence Protocol},
  booktitle    = {Computer Hardware Description Languages and their Applications, Proceedings
                  of the 11th {IFIP} {WG10.2} International Conference on Computer Hardware
                  Description Languages and their Applications - {CHDL} '93, sponsored
                  by {IFIP} {WG10.2} and in cooperation with {IEEE} COMPSOC, Ottawa,
                  Ontario, Canada, 26-28 April, 1993},
  series       = {{IFIP} Transactions},
  volume       = {{A-32}},
  pages        = {15--30},
  publisher    = {North-Holland},
  year         = {1993},
  timestamp    = {Thu, 03 Jan 2002 11:54:34 +0100},
  biburl       = {https://dblp.org/rec/conf/chdl/ClarkeGHJLMN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/orl/PardalosJ92,
  author       = {Panos M. Pardalos and
                  Somesh Jha},
  title        = {Complexity of uniqueness and local search in quadratic 0-1 programming},
  journal      = {Oper. Res. Lett.},
  volume       = {11},
  number       = {2},
  pages        = {119--123},
  year         = {1992},
  url          = {https://doi.org/10.1016/0167-6377(92)90043-3},
  doi          = {10.1016/0167-6377(92)90043-3},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/orl/PardalosJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics