


default search action
Anupam Datta
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [i52]Sanjari Srivastava, Piotr Mardziel, Zhikhun Zhang, Archana Ahlawat, Anupam Datta, John C. Mitchell:
De-amplifying Bias from Differential Privacy in Language Model Fine-tuning. CoRR abs/2402.04489 (2024) - 2023
- [j10]Clark W. Barrett, Brad Boyd, Elie Bursztein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang
, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. Found. Trends Priv. Secur. 6(1): 1-52 (2023) - [i51]Clark W. Barrett, Brad Boyd, Ellie Burzstein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. CoRR abs/2308.14840 (2023) - [i50]Ravi Mangal, Klas Leino, Zifan Wang, Kai Hu, Weicheng Yu, Corina S. Pasareanu, Anupam Datta, Matt Fredrikson
:
Is Certifying 𝓁p Robustness Still Worthwhile? CoRR abs/2310.09361 (2023) - 2022
- [c82]Zifan Wang, Matt Fredrikson, Anupam Datta:
Robust Models Are More Interpretable Because Attributions Look Normal. ICML 2022: 22625-22651 - [i49]Zifan Wang, Yuhang Yao, Chaoran Zhang, Han Zhang, Youjie Kang, Carlee Joe-Wong, Matt Fredrikson
, Anupam Datta:
Faithful Explanations for Deep Graph Models. CoRR abs/2205.11850 (2022) - [i48]Kaiji Lu, Anupam Datta:
Order-sensitive Shapley Values for Evaluating Conceptual Soundness of NLP Models. CoRR abs/2206.00192 (2022) - 2021
- [j9]Sanghamitra Dutta
, Praveen Venkatesh
, Piotr Mardziel, Anupam Datta, Pulkit Grover
:
Fairness Under Feature Exemptions: Counterfactual and Observational Measures. IEEE Trans. Inf. Theory 67(10): 6675-6710 (2021) - [c81]Anupam Datta, Matt Fredrikson
, Klas Leino, Kaiji Lu, Shayak Sen, Zifan Wang:
Machine Learning Explainability and Robustness: Connected at the Hip. KDD 2021: 4035-4036 - [c80]Anupam Datta, Matt Fredrikson, Klas Leino, Kaiji Lu, Shayak Sen, Ricardo Shih, Zifan Wang:
Exploring Conceptual Soundness with TruLens. NeurIPS (Competition and Demos) 2021: 302-307 - [c79]Kaiji Lu, Zifan Wang, Piotr Mardziel, Anupam Datta:
Influence Patterns for Explaining Information Flow in BERT. NeurIPS 2021: 4461-4474 - [i47]Zifan Wang, Matt Fredrikson
, Anupam Datta:
Boundary Attributions Provide Normal (Vector) Explanations. CoRR abs/2103.11257 (2021) - [i46]Emily Black, Zifan Wang, Matt Fredrikson
, Anupam Datta:
Consistent Counterfactuals for Deep Models. CoRR abs/2110.03109 (2021) - 2020
- [c78]Sanghamitra Dutta, Praveen Venkatesh
, Piotr Mardziel, Anupam Datta, Pulkit Grover
:
An Information-Theoretic Quantification of Discrimination with Exempt Features. AAAI 2020: 3825-3833 - [c77]Kaiji Lu, Piotr Mardziel, Klas Leino, Matt Fredrikson
, Anupam Datta:
Influence Paths for Characterizing Subject-Verb Number Agreement in LSTM Language Models. ACL 2020: 4748-4757 - [c76]Kaiji Lu, Piotr Mardziel, Fangjing Wu, Preetam Amancharla, Anupam Datta:
Gender Bias in Neural Natural Language Processing. Logic, Language, and Security 2020: 189-202 - [c75]Zifan Wang, Piotr Mardziel, Anupam Datta, Matt Fredrikson
:
Interpreting Interpretations: Organizing Attribution Methods by Criteria. CVPR Workshops 2020: 48-55 - [c74]Zifan Wang, Haofan Wang, Shakul Ramkumar, Piotr Mardziel, Matt Fredrikson, Anupam Datta:
Smoothed Geometry for Robust Attribution. NeurIPS 2020 - [c73]Michael Carl Tschantz, Shayak Sen, Anupam Datta:
SoK: Differential Privacy as a Causal Property. SP 2020: 354-371 - [i45]Zifan Wang, Piotr Mardziel, Anupam Datta, Matt Fredrikson
:
Interpreting Interpretations: Organizing Attribution Methods by Criteria. CoRR abs/2002.07985 (2020) - [i44]Kaiji Lu, Piotr Mardziel, Klas Leino, Matt Fredrikson, Anupam Datta:
Influence Paths for Characterizing Subject-Verb Number Agreement in LSTM Language Models. CoRR abs/2005.01190 (2020) - [i43]Zifan Wang, Haofan Wang, Shakul Ramkumar, Matt Fredrikson
, Piotr Mardziel, Anupam Datta:
Smoothed Geometry for Robust Attribution. CoRR abs/2006.06643 (2020) - [i42]Sanghamitra Dutta, Praveen Venkatesh, Piotr Mardziel, Anupam Datta, Pulkit Grover
:
Fairness Under Feature Exemptions: Counterfactual and Observational Measures. CoRR abs/2006.07986 (2020) - [i41]Xuan Chen, Zifan Wang, Yucai Fan, Bonan Jin, Piotr Mardziel, Carlee Joe-Wong, Anupam Datta:
Towards Behavior-Level Explanation for Deep Reinforcement Learning. CoRR abs/2009.08507 (2020) - [i40]Kaiji Lu, Zifan Wang, Piotr Mardziel, Anupam Datta:
Abstracting Influence Paths for Explaining (Contextualization of) BERT Models. CoRR abs/2011.00740 (2020)
2010 – 2019
- 2019
- [c72]Klas Leino, Emily Black, Matt Fredrikson, Shayak Sen, Anupam Datta:
Feature-Wise Bias Amplification. ICLR (Poster) 2019 - 2018
- [j8]Dhiman Chattopadhyay, Abinash Samantaray, Anupam Datta:
Device microagent for IoT home gateway: a lightweight plug-n-play architecture. SIGBED Rev. 15(2): 16-23 (2018) - [c71]Amit Datta, Anupam Datta, Jael Makagon, Deirdre K. Mulligan, Michael Carl Tschantz:
Discrimination in Online Personalization: A Multidisciplinary Inquiry. FAT 2018: 20-34 - [c70]Klas Leino, Shayak Sen, Anupam Datta, Matt Fredrikson
, Linyi Li:
Influence-Directed Explanations for Deep Convolutional Networks. ITC 2018: 1-8 - [c69]Samuel Yeom, Anupam Datta, Matt Fredrikson:
Hunting for Discriminatory Proxies in Linear Regression Models. NeurIPS 2018: 4573-4583 - [r1]Anupam Datta:
Privacy Through Accountability. Encyclopedia of Database Systems (2nd ed.) 2018 - [i39]Klas Leino, Linyi Li, Shayak Sen, Anupam Datta, Matt Fredrikson
:
Influence-Directed Explanations for Deep Convolutional Networks. CoRR abs/1802.03788 (2018) - [i38]Shayak Sen, Piotr Mardziel, Anupam Datta, Matthew Fredrikson
:
Supervising Feature Influence. CoRR abs/1803.10815 (2018) - [i37]Kaiji Lu, Piotr Mardziel, Fangjing Wu, Preetam Amancharla, Anupam Datta:
Gender Bias in Neural Natural Language Processing. CoRR abs/1807.11714 (2018) - [i36]Anupam Datta, Shayak Sen, Michael Carl Tschantz:
Correspondences between Privacy and Nondiscrimination: Why They Should Be Studied Together. CoRR abs/1808.01735 (2018) - [i35]Samuel Yeom, Anupam Datta, Matt Fredrikson
:
Hunting for Discriminatory Proxies in Linear Regression Models. CoRR abs/1810.07155 (2018) - [i34]Klas Leino, Matt Fredrikson
, Emily Black, Shayak Sen, Anupam Datta:
Feature-Wise Bias Amplification. CoRR abs/1812.08999 (2018) - 2017
- [c68]Anupam Datta, Matthew Fredrikson
, Gihyuk Ko, Piotr Mardziel, Shayak Sen:
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs. CCS 2017: 1193-1210 - [c67]Jeremiah Blocki
, Manuel Blum, Anupam Datta, Santosh S. Vempala:
Towards Human Computable Passwords. ITCS 2017: 10:1-10:47 - [e4]José M. del Álamo, Seda F. Gürses, Anupam Datta:
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, IWPE@SP 2017, San Jose, CA, USA, May 25, 2017. CEUR Workshop Proceedings 1873, CEUR-WS.org 2017 [contents] - [i33]Anupam Datta, Matthew Fredrikson
, Gihyuk Ko, Piotr Mardziel, Shayak Sen:
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs. CoRR abs/1705.07807 (2017) - [i32]Anupam Datta, Matt Fredrikson
, Gihyuk Ko, Piotr Mardziel, Shayak Sen:
Proxy Non-Discrimination in Data-Driven Systems. CoRR abs/1707.08120 (2017) - [i31]Michael Carl Tschantz, Shayak Sen, Anupam Datta:
Differential Privacy as a Causal Property. CoRR abs/1710.05899 (2017) - [i30]Anupam Datta, Sophia Kovaleva, Piotr Mardziel, Shayak Sen:
Latent Factor Interpretations for Collaborative Filtering. CoRR abs/1711.10816 (2017) - 2016
- [c66]Sean Weerakkody, Bruno Sinopoli, Soummya Kar
, Anupam Datta:
Information flow for security in control systems. CDC 2016: 5065-5072 - [c65]Anupam Datta, Soummya Kar
, Bruno Sinopoli, Sean Weerakkody:
Accountability in cyber-physical systems. SOSCYPS@CPSWeek 2016: 1-3 - [c64]Jeremiah Blocki
, Anupam Datta:
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. CSF 2016: 371-386 - [c63]Jeremiah Blocki, Anupam Datta, Joseph Bonneau:
Differentially Private Password Frequency Lists. NDSS 2016 - [c62]Anupam Datta, Shayak Sen, Yair Zick
:
Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems. IEEE Symposium on Security and Privacy 2016: 598-617 - [c61]Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta:
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor. USENIX Security Symposium 2016: 87-104 - [i29]Sean Weerakkody, Bruno Sinopoli, Soummya Kar
, Anupam Datta:
Information Flow for Security in Control Systems. CoRR abs/1603.05710 (2016) - [i28]Stephen Chong, Joshua D. Guttman, Anupam Datta, Andrew C. Myers, Benjamin C. Pierce, Patrick Schaumont, Tim Sherwood, Nickolai Zeldovich:
Report on the NSF Workshop on Formal Methods for Security. CoRR abs/1608.00678 (2016) - [i27]Jeremiah Blocki, Anupam Datta, Joseph Bonneau:
Differentially Private Password Frequency Lists. IACR Cryptol. ePrint Arch. 2016: 153 (2016) - 2015
- [j7]Amit Datta, Michael Carl Tschantz, Anupam Datta:
Automated Experiments on Ad Privacy Settings. Proc. Priv. Enhancing Technol. 2015(1): 92-112 (2015) - [c60]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games with Multiple Defender Resources. AAAI 2015: 791-797 - [c59]Omar Chowdhury, Deepak Garg, Limin Jia
, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CCS 2015: 1130-1143 - [c58]Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha
:
Program Actions as Actual Causes: A Building Block for Accountability. CSF 2015: 261-275 - [c57]Limin Jia
, Shayak Sen, Deepak Garg, Anupam Datta:
A Logic of Programs with Interface-Confined Code. CSF 2015: 512-525 - [c56]Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:
A Methodology for Information Flow Experiments. CSF 2015: 554-568 - [c55]Alejandro Uriel Carbonara, Anupam Datta, Arunesh Sinha, Yair Zick:
Incentivizing Peer Grading in MOOCS: An Audit Game Approach. IJCAI 2015: 497-503 - [c54]Amit Datta, Anupam Datta, Ariel D. Procaccia, Yair Zick:
Influence in Classification via Cooperative Game Theory. IJCAI 2015: 511-517 - [c53]Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta:
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. NDSS 2015 - [c52]Aaron Kane, Omar Chowdhury, Anupam Datta, Philip Koopman:
A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System. RV 2015: 102-117 - [i26]Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta:
System M: A Program Logic for Code Sandboxing and Identification. CoRR abs/1501.05673 (2015) - [i25]Amit Datta, Anupam Datta, Ariel D. Procaccia, Yair Zick:
Influence in Classification via Cooperative Game Theory. CoRR abs/1505.00036 (2015) - [i24]Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha:
Program Actions as Actual Causes: A Building Block for Accountability. CoRR abs/1505.01131 (2015) - [i23]Omar Chowdhury, Deepak Garg, Limin Jia
, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CoRR abs/1508.02448 (2015) - [i22]Jeremiah Blocki, Anupam Datta:
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. CoRR abs/1509.00239 (2015) - [i21]Anupam Datta, Joseph Y. Halpern, John C. Mitchell, Arnab Roy, Shayak Sen:
A Symbolic Logic with Concrete Bounds for Cryptographic Protocols. CoRR abs/1511.07536 (2015) - [i20]Jeremiah Blocki, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. IACR Cryptol. ePrint Arch. 2015: 166 (2015) - 2014
- [c51]Omar Chowdhury, Limin Jia
, Deepak Garg, Anupam Datta:
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies. CAV 2014: 131-149 - [c50]Gail-Joon Ahn
, Anupam Datta:
WPES 2014: 13th Workshop on Privacy in the Electronic Society. CCS 2014: 1546-1547 - [c49]Se Eun Oh, Ji Young Chun, Limin Jia
, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. CODASPY 2014: 313-320 - [c48]Anupam Datta:
Privacy through Accountability: A Computer Science Perspective. ICDCIT 2014: 43-49 - [c47]Shayak Sen, Saikat Guha, Anupam Datta, Sriram K. Rajamani, Janice Y. Tsai, Jeannette M. Wing:
Bootstrapping Privacy Compliance in Big Data Systems. IEEE Symposium on Security and Privacy 2014: 327-342 - [c46]Bruce DeBruhl, Christian Kroer, Anupam Datta, Tuomas Sandholm, Patrick Tague
:
Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. WISEC 2014: 117-128 - [e3]Gail-Joon Ahn, Anupam Datta:
Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3148-7 [contents] - [i19]Jeremiah Blocki, Manuel Blum, Anupam Datta:
Human Computable Passwords. CoRR abs/1404.0024 (2014) - [i18]Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:
A Methodology for Information Flow Experiments. CoRR abs/1405.2376 (2014) - [i17]Amit Datta, Michael Carl Tschantz, Anupam Datta:
Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination. CoRR abs/1408.6491 (2014) - [i16]Jeremiah Blocki, Nicolas Christin
, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games with Multiple Defender Resources. CoRR abs/1409.4503 (2014) - [i15]Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta:
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. CoRR abs/1410.1490 (2014) - 2013
- [c45]Jeremiah Blocki
, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. ASIACRYPT (2) 2013: 361-380 - [c44]Jeremiah Blocki
, Manuel Blum, Anupam Datta:
GOTCHA password hackers! AISec 2013: 25-34 - [c43]Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
Purpose Restrictions on Information Use. ESORICS 2013: 610-627 - [c42]Jeremiah Blocki
, Nicolas Christin
, Anupam Datta, Arunesh Sinha
:
Adaptive Regret Minimization in Bounded-Memory Games. GameSec 2013: 65-84 - [c41]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games. IJCAI 2013: 41-47 - [c40]Jeremiah Blocki
, Avrim Blum, Anupam Datta, Or Sheffet:
Differentially private data analysis of social networks via restricted sensitivity. ITCS 2013: 87-96 - [c39]Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne
, Jared Bennatt, Anupam Datta, Limin Jia
, William H. Winsborough:
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. SACMAT 2013: 3-14 - [c38]Amit Vasudevan, Sagar Chaki, Limin Jia
, Jonathan M. McCune, James Newsome, Anupam Datta:
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. IEEE Symposium on Security and Privacy 2013: 430-444 - [i14]Jeremiah Blocki, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. CoRR abs/1302.5122 (2013) - [i13]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games. CoRR abs/1303.0356 (2013) - [i12]Jeremiah Blocki, Manuel Blum, Anupam Datta:
GOTCHA Password Hackers! CoRR abs/1310.1137 (2013) - 2012
- [c37]Jeremiah Blocki
, Avrim Blum, Anupam Datta, Or Sheffet:
The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy. FOCS 2012: 410-419 - [c36]Jeremiah Blocki
, Nicolas Christin
, Anupam Datta, Arunesh Sinha
:
Audit Mechanisms for Provable Risk Management and Accountable Data Governance. GameSec 2012: 38-59 - [c35]Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan M. McCune, Amit Vasudevan:
Parametric Verification of Address Space Separation. POST 2012: 51-68 - [c34]Anupam Datta, Divya Sharma, Arunesh Sinha
:
Provable De-anonymization of Large Datasets with Sparse Dimensions. POST 2012: 229-248 - [c33]Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
Formalizing and Enforcing Purpose Restrictions in Privacy Policies. IEEE Symposium on Security and Privacy 2012: 176-190 - [e2]Gilles Barthe
, Anupam Datta, Sandro Etalle:
Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7140, Springer 2012, ISBN 978-3-642-29419-8 [contents] - [i11]Jeremiah Blocki, Avrim Blum, Anupam Datta, Or Sheffet:
The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy. CoRR abs/1204.2136 (2012) - [i10]Jeremiah Blocki, Avrim Blum, Anupam Datta, Or Sheffet:
Differentially Private Data Analysis of Social Networks via Restricted Sensitivity. CoRR abs/1208.4586 (2012) - 2011
- [j6]Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar:
On Adversary Models and Compositional Security. IEEE Secur. Priv. 9(3): 26-32 (2011) - [c32]Deepak Garg, Limin Jia
, Anupam Datta:
Policy auditing over incomplete logs: theory, implementation and applications. CCS 2011: 151-162 - [c31]Jeremiah Blocki
, Nicolas Christin
, Anupam Datta, Arunesh Sinha
:
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection. CSF 2011: 312-327 - [c30]Anupam Datta, Jeremiah Blocki
, Nicolas Christin
, Henry DeYoung, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar, Arunesh Sinha
:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. ICISS 2011: 1-27 - [c29]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Audit Mechanisms for Privacy Protection in Healthcare Environments. HealthSec 2011 - [c28]Michael Carl Tschantz, Dilsun Kirli Kaynar, Anupam Datta:
Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract). MFPS 2011: 61-79 - [p1]Anupam Datta, John C. Mitchell, Arnab Roy, Stephan Hyeonjun Stiller:
Protocol Composition Logic. Formal Models and Techniques for Analyzing Security Protocols 2011: 182-221 - [i9]Michael Carl Tschantz, Dilsun Kirli Kaynar, Anupam Datta:
Formal Verification of Differential Privacy for Interactive Systems. CoRR abs/1101.2819 (2011) - [i8]Deepak Garg, Limin Jia, Anupam Datta:
A Logical Method for Policy Enforcement over Evolving Audit Logs. CoRR abs/1102.2521 (2011) - [i7]Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
On the Semantics of Purpose Requirements in Privacy Policies. CoRR abs/1102.4326 (2011) - [i6]Jeremiah Blocki, Nicolas Christin
, Anupam Datta, Arunesh Sinha:
Adaptive Regret Minimization in Bounded-Memory Games. CoRR abs/1111.2888 (2011) - 2010
- [b2]Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas W. Reps:
Analysis Techniques for Information Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2010, ISBN 978-3-031-01206-8 - [j5]Anupam Datta:
Logical Methods in Security and Privacy. IEEE Secur. Priv. 8(6): 86-89 (2010) - [j4]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
:
Inductive trace properties for computational security. J. Comput. Secur. 18(6): 1035-1073 (2010) - [c27]Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig:
TrustVisor: Efficient TCB Reduction and Attestation. IEEE Symposium on Security and Privacy 2010: 143-158 - [c26]Jason Franklin, Sagar Chaki, Anupam Datta, Arvind Seshadri:
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size. IEEE Symposium on Security and Privacy 2010: 365-379 - [c25]Kumar Avijit, Anupam Datta, Robert Harper:
Distributed programming with distributed authorization. TLDI 2010: 27-38 - [c24]Anupam Datta, Nipun Dave, John C. Mitchell, Helen Nissenbaum, Divya Sharma:
Privacy Challenges in Patient-centric Health Information Systems. HealthSec 2010 - [c23]Henry DeYoung, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar, Anupam Datta:
Experiences in the logical specification of the HIPAA and GLBA privacy laws. WPES 2010: 73-82 - [c22]Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, Anupam Datta:
Compositional System Security with Interface-Confined Adversaries. MFPS 2010: 49-71
2000 – 2009
- 2009
- [c21]Sagar Chaki, Anupam Datta:
ASPIER: An Automated Framework for Verifying Security Protocol Implementations. CSF 2009: 172-185 - [c20]