default search action
Martín Abadi
Person information
- affiliation: University of California, Santa Cruz, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j67]Martín Abadi, Gordon D. Plotkin:
Smart Choices and the Selection Monad. Log. Methods Comput. Sci. 19(2) (2023) - 2021
- [c177]Ionel Gog, Michael Isard, Martín Abadi:
Falkirk Wheel: Rollback Recovery for Dataflow Systems. SoCC 2021: 373-387 - [c176]Martín Abadi, Gordon D. Plotkin:
Smart Choices and the Selection Monad. LICS 2021: 1-14 - 2020
- [j66]Martín Abadi, Gordon D. Plotkin:
A simple differentiable programming language. Proc. ACM Program. Lang. 4(POPL): 38:1-38:28 (2020) - [i14]Martín Abadi, Gordon D. Plotkin:
Smart Choices and the Selection Monad. CoRR abs/2007.08926 (2020)
2010 – 2019
- 2019
- [i13]Martín Abadi, Gordon D. Plotkin:
A Simple Differentiable Programming Language. CoRR abs/1911.04523 (2019) - 2018
- [j65]Martín Abadi, Bruno Blanchet, Cédric Fournet:
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication. J. ACM 65(1): 1:1-1:41 (2018) - [c175]Yuan Yu, Martín Abadi, Paul Barham, Eugene Brevdo, Mike Burrows, Andy Davis, Jeff Dean, Sanjay Ghemawat, Tim Harley, Peter Hawkins, Michael Isard, Manjunath Kudlur, Rajat Monga, Derek Gordon Murray, Xiaoqiang Zheng:
Dynamic control flow in large-scale machine learning. EuroSys 2018: 18:1-18:15 - [i12]Yuan Yu, Martín Abadi, Paul Barham, Eugene Brevdo, Mike Burrows, Andy Davis, Jeff Dean, Sanjay Ghemawat, Tim Harley, Peter Hawkins, Michael Isard, Manjunath Kudlur, Rajat Monga, Derek Gordon Murray, Xiaoqiang Zheng:
Dynamic Control Flow in Large-Scale Machine Learning. CoRR abs/1805.01772 (2018) - 2017
- [c174]Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approches. CSF 2017: 1-6 - [c173]Arvind Neelakantan, Quoc V. Le, Martín Abadi, Andrew McCallum, Dario Amodei:
Learning a Natural Language Interface with Neural Programmer. ICLR (Poster) 2017 - [c172]Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, Kunal Talwar:
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. ICLR 2017 - [c171]Martín Abadi, Michael Isard, Derek Gordon Murray:
A computational model for TensorFlow: an introduction. MAPL@PLDI 2017: 1-7 - [i11]Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang:
On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches. CoRR abs/1708.08022 (2017) - [i10]Tom B. Brown, Dandelion Mané, Aurko Roy, Martín Abadi, Justin Gilmer:
Adversarial Patch. CoRR abs/1712.09665 (2017) - 2016
- [j64]Derek Gordon Murray, Frank McSherry, Michael Isard, Rebecca Isaacs, Paul Barham, Martín Abadi:
Incremental, iterative data processing with timely dataflow. Commun. ACM 59(10): 75-83 (2016) - [c170]Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang:
Deep Learning with Differential Privacy. CCS 2016: 308-318 - [c169]Martín Abadi:
TensorFlow: learning functions at scale. ICFP 2016: 1 - [c168]Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek Gordon Murray, Benoit Steiner, Paul A. Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, Xiaoqiang Zheng:
TensorFlow: A System for Large-Scale Machine Learning. OSDI 2016: 265-283 - [i9]Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Gregory S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian J. Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Józefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mané, Rajat Monga, Sherry Moore, Derek Gordon Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul A. Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda B. Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, Xiaoqiang Zheng:
TensorFlow: Large-Scale Machine Learning on Heterogeneous Distributed Systems. CoRR abs/1603.04467 (2016) - [i8]Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, Manjunath Kudlur, Josh Levenberg, Rajat Monga, Sherry Moore, Derek Gordon Murray, Benoit Steiner, Paul A. Tucker, Vijay Vasudevan, Pete Warden, Martin Wicke, Yuan Yu, Xiaoqiang Zhang:
TensorFlow: A system for large-scale machine learning. CoRR abs/1605.08695 (2016) - [i7]Martín Abadi, Andy Chu, Ian J. Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, Li Zhang:
Deep Learning with Differential Privacy. CoRR abs/1607.00133 (2016) - [i6]Martín Abadi, Bruno Blanchet, Cédric Fournet:
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication. CoRR abs/1609.03003 (2016) - [i5]Nicolas Papernot, Martín Abadi, Úlfar Erlingsson, Ian J. Goodfellow, Kunal Talwar:
Semi-supervised Knowledge Transfer for Deep Learning from Private Training Data. CoRR abs/1610.05755 (2016) - [i4]Martín Abadi, David G. Andersen:
Learning to Protect Communications with Adversarial Neural Cryptography. CoRR abs/1610.06918 (2016) - [i3]Arvind Neelakantan, Quoc V. Le, Martín Abadi, Andrew McCallum, Dario Amodei:
Learning a Natural Language Interface with Neural Programmer. CoRR abs/1611.08945 (2016) - 2015
- [c167]Martín Abadi, Mike Burrows, Himabindu Pucha, Adam Sadovsky, Asim Shankar, Ankur Taly:
Distributed Authorization with Distributed Grammars. Programming Languages with Applications to Biology and Security 2015: 10-26 - [c166]Martín Abadi:
The Prophecy of Timely Rollback (Invited Talk). CSL 2015: 1-1 - [c165]Martín Abadi:
The Prophecy of Undo. FASE 2015: 347-361 - [c164]Martín Abadi, Michael Isard:
Timely Dataflow: A Model. FORTE 2015: 131-145 - [c163]Martín Abadi, Frank McSherry, Gordon D. Plotkin:
Foundations of Differential Dataflow. FoSSaCS 2015: 71-83 - [c162]Martín Abadi, Michael Isard:
Timely Rollback: Specification and Verification. NFM 2015: 19-34 - [c161]Martín Abadi, Michael Isard:
On the Flow of Data, Information, and Time. POST 2015: 73-92 - [i2]Michael Isard, Martín Abadi:
Falkirk Wheel: Rollback Recovery for Dataflow Systems. CoRR abs/1503.08877 (2015) - [i1]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. IACR Cryptol. ePrint Arch. 2015: 440 (2015) - 2014
- [c160]Martín Abadi, Jérémy Planul, Gordon D. Plotkin:
Layout Randomization and Nondeterminism. Horizons of the Mind 2014: 1-39 - [c159]Gavin M. Bierman, Martín Abadi, Mads Torgersen:
Understanding TypeScript. ECOOP 2014: 257-281 - [c158]Antoine Delignat-Lavaud, Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Web PKI: Closing the Gap between Guidelines and Practices. NDSS 2014 - [e5]Martín Abadi, Steve Kremer:
Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings. Lecture Notes in Computer Science 8414, Springer 2014, ISBN 978-3-642-54791-1 [contents] - [e4]Martín Abadi, Alberto Lluch-Lafuente:
Trustworthy Global Computing - 8th International Symposium, TGC 2013, Buenos Aires, Argentina, August 30-31, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8358, Springer 2014, ISBN 978-3-319-05118-5 [contents] - 2013
- [c157]Anna Leontjeva, Moisés Goldszmidt, Yinglian Xie, Fang Yu, Martín Abadi:
Early security classification of skype users via machine learning. AISec 2013: 35-44 - [c156]Junxian Huang, Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Zhuoqing Morley Mao:
SocialWatch: detection of online service abuse via large-scale social graphs. AsiaCCS 2013: 143-148 - [c155]Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:
Message-Locked Encryption for Lock-Dependent Messages. CRYPTO (1) 2013: 374-391 - [c154]Martín Abadi, Frank McSherry, Derek Gordon Murray, Thomas L. Rodeheffer:
Formal Analysis of a Distributed Algorithm for Tracking Progress. FMOODS/FORTE 2013: 5-19 - [c153]Martín Abadi, Andrew Birrell, Ilya Mironov, Ted Wobber, Yinglian Xie:
Global Authentication in an Untrustworthy World. HotOS 2013 - [c152]Martín Abadi, Jérémy Planul:
On Layout Randomization for Arrays and Functions. POST 2013: 167-185 - [c151]Derek Gordon Murray, Frank McSherry, Rebecca Isaacs, Michael Isard, Paul Barham, Martín Abadi:
Naiad: a timely dataflow system. SOSP 2013: 439-455 - [c150]Martín Abadi, Jérémy Planul, Gordon D. Plotkin:
Layout Randomization and Nondeterminism. MFPS 2013: 29-50 - 2012
- [j63]Martín Abadi, Gordon D. Plotkin:
On Protection by Layout Randomization. ACM Trans. Inf. Syst. Secur. 15(2): 8:1-8:29 (2012) - [c149]Thomas H. Austin, Cormac Flanagan, Martín Abadi:
A Functional View of Imperative Information Flow. APLAS 2012: 34-49 - [c148]Yinglian Xie, Fang Yu, Qifa Ke, Martín Abadi, Eliot Gillum, Krish Vitaldevaria, Jason Walter, Junxian Huang, Zhuoqing Morley Mao:
Innocent by association: early recognition of legitimate users. CCS 2012: 353-364 - [c147]Martín Abadi:
Software Security: A Formal Perspective - (Notes for a Talk). FM 2012: 1-5 - [c146]Ting-Fang Yen, Yinglian Xie, Fang Yu, Roger Peng Yu, Martín Abadi:
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. NDSS 2012 - 2011
- [j62]Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard:
Semantics of transactional memory and automatic mutual exclusion. ACM Trans. Program. Lang. Syst. 33(1): 2:1-2:50 (2011) - [c145]Tim Harris, Martín Abadi, Rebecca Isaacs, Ross McIlroy:
AC: composable asynchronous IO for native languages. OOPSLA 2011: 903-920 - [c144]Arnar Birgisson, Frank McSherry, Martín Abadi:
Differential privacy with information flow control. PLAS 2011: 2 - [c143]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi:
deSEO: Combating Search-Result Poisoning. USENIX Security Symposium 2011 - [c142]John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martín Abadi:
Heat-seeking honeypots: design and experience. WWW 2011: 207-216 - 2010
- [j61]Martín Abadi, Gordon D. Plotkin:
A Model of Cooperative Threads. Log. Methods Comput. Sci. 6(4) (2010) - [j60]Martín Abadi, Tim Harris, Katherine F. Moore:
A model of dynamic separation for transactional memory. Inf. Comput. 208(10): 1093-1117 (2010) - [j59]Mathieu Baudet, Bogdan Warinschi, Martín Abadi:
Guessing attacks and the computational soundness of static equivalence. J. Comput. Secur. 18(5): 909-968 (2010) - [c141]Martín Abadi, Gordon D. Plotkin:
On Protection by Layout Randomization. CSF 2010: 337-351 - [c140]Andreas Pitsillidis, Yinglian Xie, Fang Yu, Martín Abadi, Geoffrey M. Voelker, Stefan Savage:
How to tell an airport from a home: techniques and applications. HotNets 2010: 13 - [c139]Martín Abadi:
The Fine Print of Security. LICS 2010: 110 - [c138]John P. John, Fang Yu, Yinglian Xie, Martín Abadi, Arvind Krishnamurthy:
Searching the Searchers with SearchAudit. USENIX Security Symposium 2010: 127-142
2000 – 2009
- 2009
- [j58]Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur. 13(1): 4:1-4:40 (2009) - [c137]Martín Abadi, Bruno Blanchet, Hubert Comon-Lundh:
Models and Proofs of Protocol Security: A Progress Report. CAV 2009: 35-49 - [c136]Martín Abadi, Andrew Birrell, Tim Harris, Johnson Hsieh, Michael Isard:
Implementation and Use of Transactional Memory with Dynamic Separation. CC 2009: 63-77 - [c135]Martín Abadi, Tim Harris:
Perspectives on Transactional Memory. CONCUR 2009: 1-14 - [c134]Martín Abadi:
Logic in Access Control (Tutorial Notes). FOSAD 2009: 145-165 - [c133]Wenchao Zhou, Yun Mao, Boon Thau Loo, Martín Abadi:
Unified Declarative Platform for Secure Netwoked Information Systems. ICDE 2009: 150-161 - [c132]Martín Abadi, Gordon D. Plotkin:
A model of cooperative threads. POPL 2009: 29-40 - [c131]Martín Abadi, Tim Harris, Mojtaba Mehrara:
Transactional memory with strong atomicity using off-the-shelf memory protection hardware. PPoPP 2009: 185-196 - [c130]Yinglian Xie, Fang Yu, Martín Abadi:
De-anonymizing the internet using unreliable IDs. SIGCOMM 2009: 75-86 - 2008
- [j57]Martín Abadi, Bogdan Warinschi:
Security analysis of cryptographically controlled access to XML documents. J. ACM 55(2): 6:1-6:29 (2008) - [j56]Bruno Blanchet, Martín Abadi, Cédric Fournet:
Automated verification of selected equivalences for security protocols. J. Log. Algebraic Methods Program. 75(1): 3-51 (2008) - [c129]Martín Abadi:
Automatic Mutual Exclusion and Atomicity Checks. Concurrency, Graphs and Models 2008: 510-526 - [c128]Martín Abadi:
The good, the bad, and the provable. CCS 2008: 1 - [c127]Martín Abadi, Tim Harris, Katherine F. Moore:
A Model of Dynamic Separation for Transactional Memory. CONCUR 2008: 6-20 - [c126]Martín Abadi:
Variations in Access Control Logic. DEON 2008: 96-109 - [c125]Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon:
Code-Carrying Authorization. ESORICS 2008: 563-579 - [c124]Deepak Garg, Martín Abadi:
A Modal Deconstruction of Access Control Logics. FoSSaCS 2008: 216-230 - [c123]Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard:
Semantics of transactional memory and automatic mutual exclusion. POPL 2008: 63-74 - 2007
- [j55]Martín Abadi, Phillip Rogaway:
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption). J. Cryptol. 20(3): 395 (2007) - [j54]Martín Abadi, Bruno Blanchet, Cédric Fournet:
Just fast keying in the pi calculus. ACM Trans. Inf. Syst. Secur. 10(3): 9 (2007) - [j53]Martín Abadi, Jens Palsberg:
Editorial. ACM Trans. Program. Lang. Syst. 29(3): 14 (2007) - [c122]Nathan Whitehead, Jordan Johnson, Martín Abadi:
Policies and Proofs for Code Auditing. ATVA 2007: 1-14 - [c121]Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon:
Authorizing applications in singularity. EuroSys 2007: 355-368 - [c120]Martín Abadi:
Security Protocols: Principles and Calculi. FOSAD 2007: 1-23 - [c119]Martín Abadi, Boon Thau Loo:
Towards a Declarative Language and System for Secure Networking. NetDB 2007 - [c118]Martín Abadi:
Access Control in a Core Calculus of Dependency. Computation, Meaning, and Logic 2007: 5-31 - 2006
- [j52]Martín Abadi, Véronique Cortier:
Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1-2): 2-32 (2006) - [j51]Martín Abadi, Cormac Flanagan, Stephen N. Freund:
Types for safe locking: Static race detection for Java. ACM Trans. Program. Lang. Syst. 28(2): 207-255 (2006) - [c117]Martín Abadi, Ricardo Corin, Cédric Fournet:
Computational Secrecy by Typing for the Pi Calculus. APLAS 2006: 253-269 - [c116]Mihai Budiu, Úlfar Erlingsson, Martín Abadi:
Architectural support for software-based protection. ASID 2006: 42-51 - [c115]Avik Chaudhuri, Martín Abadi:
Secrecy by Typing and File-Access Control. CSFW 2006: 112-123 - [c114]Avik Chaudhuri, Martín Abadi:
Formal Analysis of Dynamic, Distributed File-System Access Controls. FORTE 2006: 99-114 - [c113]Martín Abadi, Mathieu Baudet, Bogdan Warinschi:
Guessing Attacks and the Computational Soundness of Static Equivalence. FoSSaCS 2006: 398-412 - [c112]Martín Abadi:
Access control in a core calculus of dependency. ICFP 2006: 263-273 - [c111]Úlfar Erlingsson, Martín Abadi, Michael Vrable, Mihai Budiu, George C. Necula:
XFI: Software Guards for System Address Spaces. OSDI 2006: 75-88 - 2005
- [j50]Martín Abadi, Bruno Blanchet:
Analyzing security protocols with secrecy types and logic programs. J. ACM 52(1): 102-146 (2005) - [j49]Martín Abadi, Greg Morrisett, Andrei Sabelfeld:
"Language-Based Security". J. Funct. Program. 15(2): 129 (2005) - [j48]Martín Abadi, Bruno Blanchet:
Computer-assisted verification of a protocol for certified email. Sci. Comput. Program. 58(1-2): 3-27 (2005) - [j47]Martín Abadi, Michael Burrows, Mark S. Manasse, Ted Wobber:
Moderately hard, memory-bound functions. ACM Trans. Internet Techn. 5(2): 299-327 (2005) - [c110]Avik Chaudhuri, Martín Abadi:
Formal security analysis of basic network-attached storage. FMSE 2005: 43-52 - [c109]Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
Control-flow integrity. CCS 2005: 340-353 - [c108]Martín Abadi, Véronique Cortier:
Deciding Knowledge in Security Protocols under (Many More) Equational Theories. CSFW 2005: 62-76 - [c107]Martín Abadi, Andrew Birrell, Ted Wobber:
Access Control in a World of Software Diversity. HotOS 2005 - [c106]Martín Abadi, Bogdan Warinschi:
Password-Based Encryption Analyzed. ICALP 2005: 664-676 - [c105]Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
A Theory of Secure Control Flow. ICFEM 2005: 111-124 - [c104]Bruno Blanchet, Martín Abadi, Cédric Fournet:
Automated Verification of Selected Equivalences for Security Protocols. LICS 2005: 331-340 - [c103]Martín Abadi, Bogdan Warinschi:
Security analysis of cryptographically controlled access to XML documents. PODS 2005: 108-117 - [e3]Martín Abadi, Luca de Alfaro:
CONCUR 2005 - Concurrency Theory, 16th International Conference, CONCUR 2005, San Francisco, CA, USA, August 23-26, 2005, Proceedings. Lecture Notes in Computer Science 3653, Springer 2005, ISBN 3-540-28309-9 [contents] - [e2]Jens Palsberg, Martín Abadi:
Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005. ACM 2005, ISBN 1-58113-830-X [contents] - 2004
- [j46]Martín Abadi, Cédric Fournet:
Private authentication. Theor. Comput. Sci. 322(3): 427-476 (2004) - [c102]Nathan Whitehead, Martín Abadi, George C. Necula:
By Reason and Authority: A System for Authorization of Proof-Carrying Code. CSFW 2004: 236-250 - [c101]Martín Abadi, Bruno Blanchet, Cédric Fournet:
Just Fast Keying in the Pi Calculus. ESOP 2004: 340-354 - [c100]Martín Abadi, Ted Wobber:
A Logical Account of NGSCB. FORTE 2004: 1-12 - [c99]Martín Abadi, Georges Gonthier, Benjamin Werner:
Choice in Dynamic Linking. FoSSaCS 2004: 12-26 - [c98]