default search action
Carl A. Gunter
Person information
- affiliation: University of Illinois, Urbana-Champaign, IL, USA
- affiliation: University of Pennsylvania, Philadelphia, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 1993
- [b1]Carl A. Gunter:
Semantics of programming languages - structures and techniques. Foundations of computing, MIT Press 1993, ISBN 978-0-262-07143-7, pp. I-XVIII, 1-419
Journal Articles
- 2020
- [j37]Michael J. May, Kevin D. Lux, Carl A. Gunter:
WSEmail. Serv. Oriented Comput. Appl. 14(1): 5-17 (2020) - 2018
- [j36]Varun Badrinath Krishna, Carl A. Gunter, William H. Sanders:
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud. IEEE J. Sel. Top. Signal Process. 12(4): 790-805 (2018) - 2017
- [j35]Vincent Bindschaedler, Reza Shokri, Carl A. Gunter:
Plausible Deniability for Privacy-Preserving Data Synthesis. Proc. VLDB Endow. 10(5): 481-492 (2017) - 2016
- [j34]David Kotz, Carl A. Gunter, Santosh Kumar, Jonathan P. Weiner:
Privacy and Security in Mobile Health: A Research Agenda. Computer 49(6): 22-30 (2016) - 2015
- [j33]David Kotz, Kevin Fu, Carl A. Gunter, Aviel D. Rubin:
Security for mobile and cloud frontiers in healthcare. Commun. ACM 58(8): 21-23 (2015) - [j32]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. ACM Comput. Surv. 48(1): 6:1-6:44 (2015) - [j31]Charles P. Friedman, Joshua C. Rubin, Jeffrey S. Brown, Melinda Buntin, Milton Corn, Lynn Etheredge, Carl A. Gunter, Mark A. Musen, Richard Platt, William W. Stead, Kevin Sullivan, Douglas Van Houweling:
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System. J. Am. Medical Informatics Assoc. 22(1): 43-50 (2015) - [j30]You Chen, Joydeep Ghosh, Cosmin Adrian Bejan, Carl A. Gunter, Siddharth Gupta, Abel N. Kho, David M. Liebovitz, Jimeng Sun, Joshua C. Denny, Bradley A. Malin:
Building bridges across electronic health record systems through inferred phenotypic topics. J. Biomed. Informatics 55: 82-93 (2015) - 2013
- [j29]Denise L. Anthony, Andrew T. Campbell, Thomas Candon, Andrew Gettinger, David Kotz, Lisa A. Marsch, Andres Molina-Markham, Karen Page, Sean W. Smith, Carl A. Gunter, M. Eric Johnson:
Securing Information Technology in Healthcare. IEEE Secur. Priv. 11(6): 25-33 (2013) - [j28]He Zhang, Sanjay Mehrotra, David M. Liebovitz, Carl A. Gunter, Bradley A. Malin:
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits. ACM Trans. Manag. Inf. Syst. 4(4): 17:1-17:20 (2013) - 2012
- [j27]Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter:
Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks. IEEE/ACM Trans. Netw. 20(3): 715-728 (2012) - [j26]Michael LeMay, Carl A. Gunter:
Cumulative Attestation Kernels for Embedded Systems. IEEE Trans. Smart Grid 3(2): 744-760 (2012) - 2011
- [j25]Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems. IEEE Secur. Priv. 9(5): 48-55 (2011) - [j24]Jianqing Zhang, Carl A. Gunter:
Application-aware secure multicast for power grid communications. Int. J. Secur. Networks 6(1): 40-52 (2011) - [j23]David C. Bergman, Dong (Kevin) Jin, Joshua Juen, Naoki Tanaka, Carl A. Gunter, Andrew K. Wright:
Nonintrusive Load-Shed Verification. IEEE Pervasive Comput. 10(1): 49-57 (2011) - 2010
- [j22]Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana, Manoj Prabhakaran:
Attribute-Based Messaging: Access Control and Confidentiality. ACM Trans. Inf. Syst. Secur. 13(4): 31:1-31:35 (2010) - 2009
- [j21]Paul Anderson, Carl A. Gunter, Charles R. Kalmanek, Sanjai Narain, Jonathan M. Smith, Rajesh Talpade, Geoffrey G. Xie:
Guest editorial network infrastructure configuration. IEEE J. Sel. Areas Commun. 27(3): 249-252 (2009) - 2007
- [j20]Ratul K. Guha, Carl A. Gunter, Saswati Sarkar:
Fair Coalitions for Power-Aware Routing in Wireless Networks. IEEE Trans. Mob. Comput. 6(2): 206-220 (2007) - 2005
- [j19]Karthikeyan Bhargavan, Carl A. Gunter:
Network Event Recognition. Formal Methods Syst. Des. 27(3): 213-251 (2005) - 2003
- [j18]Pankaj Kakkar, Carl A. Gunter, Martín Abadi:
Reasoning About Secrecy for Active Networks. J. Comput. Secur. 11(2): 245-287 (2003) - 2002
- [j17]Karthikeyan Bhargavan, Davor Obradovic, Carl A. Gunter:
Formal verification of standards for distance vector routing protocols. J. ACM 49(4): 538-576 (2002) - [j16]Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan:
Verisim: Formal Analysis of Network Simulations. IEEE Trans. Software Eng. 28(2): 129-145 (2002) - 2000
- [j15]Carl A. Gunter:
Automated analysis of standard ML. ACM SIGSOFT Softw. Eng. Notes 25(1): 53 (2000) - [j14]Carl A. Gunter, Elsa L. Gunter, Pamela Zave:
Formal software engineering. ACM SIGSOFT Softw. Eng. Notes 25(1): 54 (2000) - [j13]Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave:
A Reference Model for Requirements and Specifications. IEEE Softw. 17(3): 37-43 (2000) - [j12]Carl A. Gunter, Trevor Jim:
Policy-directed certificate retrieval. Softw. Pract. Exp. 30(15): 1609-1640 (2000) - [j11]Carl A. Gunter:
Abstracting dependencies between software configuration items. ACM Trans. Softw. Eng. Methodol. 9(1): 94-131 (2000) - 1998
- [j10]D. Scott Alexander, William Arbaugh, Michael Hicks, Pankaj Kakkar, Angelos Dennis Keromytis, Jonathan T. Moore, Carl A. Gunter, Scott Nettles, Jonathan M. Smith:
The SwitchWare active network architecture. IEEE Netw. 12(3): 29-36 (1998) - 1997
- [j9]Carl A. Gunter, Teow-Hin Ngair, Devika Subramanian:
The Common Order-Theoretic Structure of Version Spaces and ATMSs. Artif. Intell. 95(2): 357-407 (1997) - 1996
- [j8]Carl A. Gunter, John C. Mitchell, David Notkin:
Strategic Directions in Software Engineering and Programming Languages. ACM Comput. Surv. 28(4): 727-737 (1996) - [j7]Jawahar Chirimar, Carl A. Gunter, Jon G. Riecke:
Reference Counting as a Computational Interpretation of Linear Logic. J. Funct. Program. 6(2): 195-244 (1996) - 1993
- [j6]Carl A. Gunter, Elsa L. Gunter, David B. MacQueen:
Computing ML Equality Kinds Using Abstract Interpretation. Inf. Comput. 107(2): 303-323 (1993) - 1992
- [j5]Carl A. Gunter:
The Mixed Powerdomain. Theor. Comput. Sci. 103(2): 311-334 (1992) - 1991
- [j4]Carl A. Gunter:
Forms of Semantic Specification. Bull. EATCS 45: 98-113 (1991) - [j3]Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov:
Inheritance as Implicit Coercion. Inf. Comput. 93(1): 172-221 (1991) - 1989
- [j2]Thierry Coquand, Carl A. Gunter, Glynn Winskel:
Domain Theoretic Models of Polymorphism. Inf. Comput. 81(2): 123-167 (1989) - 1987
- [j1]Carl A. Gunter:
Universal Profinite Domains. Inf. Comput. 72(1): 1-30 (1987)
Conference and Workshop Papers
- 2023
- [c132]Berkay Kaplan, Israel J. Lopez-Toledo, Carl A. Gunter, Jingyu Qian:
A Tagging Solution to Discover IoT Devices in Apartments. ACSAC 2023: 205-215 - [c131]Xiaojun Xu, Hanzhang Wang, Alok Lal, Carl A. Gunter, Bo Li:
EDoG: Adversarial Edge Detection For Graph Neural Networks. SaTML 2023: 291-305 - [c130]Hsiao-Ying Huang, Soteris Demetriou, Muhammad Hassan, Güliz Seray Tuncay, Carl A. Gunter, Masooda N. Bashir:
Evaluating User Behavior in Smartphone Security: A Psychometric Perspective. SOUPS 2023: 509-524 - [c129]Xiaojun Xu, Qingying Hao, Zhuolin Yang, Bo Li, David M. Liebovitz, Gang Wang, Carl A. Gunter:
How to Cover up Anomalous Accesses to Electronic Health Records. USENIX Security Symposium 2023: 229-246 - [c128]Denise L. Anthony, Carl A. Gunter, Weijia He, Mounib Khanafer, Susan Landau, Ravindra Mangar, Nathan Reitinger:
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson. WPES@CCS 2023: 129-134 - 2021
- [c127]Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
DOVE: A Data-Oblivious Virtual Environment. NDSS 2021 - [c126]Yunhui Long, Boxin Wang, Zhuolin Yang, Bhavya Kailkhura, Aston Zhang, Carl A. Gunter, Bo Li:
G-PATE: Scalable Differentially Private Data Generator via Private Aggregation of Teacher Discriminators. NeurIPS 2021: 2965-2977 - [c125]Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. SP 2021: 103-120 - 2020
- [c124]Yunhui Long, Le Xu, Carl A. Gunter:
A Hypothesis Testing Approach to Sharing Logs with Confidence. CODASPY 2020: 307-318 - [c123]Yunhui Long, Lei Wang, Diyue Bu, Vincent Bindschaedler, XiaoFeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
A Pragmatic Approach to Membership Inferences on Machine Learning Models. EuroS&P 2020: 521-534 - [c122]Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, Wei Cheng, Carl A. Gunter, Haifeng Chen:
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. NDSS 2020 - [c121]Güliz Seray Tuncay, Jingyu Qian, Carl A. Gunter:
See No Evil: Phishing for Permissions with False Transparency. USENIX Security Symposium 2020: 415-432 - 2019
- [c120]Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter:
Charting the Attack Surface of Trigger-Action IoT Platforms. CCS 2019: 1439-1453 - [c119]Avesta Hojjati, Yunhui Long, Soteris Demetriou, Carl A. Gunter:
BEEER: distributed record and replay for medical devices in hospital operating rooms. HotSoS 2019: 1:1-1:10 - 2018
- [c118]Karan Ganju, Qi Wang, Wei Yang, Carl A. Gunter, Nikita Borisov:
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations. CCS 2018: 619-633 - [c117]Bo Chen, Klara Nahrstedt, Carl A. Gunter:
ReSPonSe: Real-time, Secure, and Privacy-aware Video Redaction System. MobiQuitous 2018: 39-48 - [c116]Güliz Seray Tuncay, Soteris Demetriou, Karan Ganju, Carl A. Gunter:
Resolving the Predicament of Android Custom Permissions. NDSS 2018 - [c115]Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter:
Fear and Logging in the Internet of Things. NDSS 2018 - [c114]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. USENIX Security Symposium 2018: 49-64 - [c113]Shubhra Kanti Karmaker Santu, Vincent Bindschaedler, ChengXiang Zhai, Carl A. Gunter:
NRF: A Naive Re-identification Framework. WPES@CCS 2018: 121-132 - 2017
- [c112]Wei Yang, Deguang Kong, Tao Xie, Carl A. Gunter:
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. ACSAC 2017: 288-302 - [c111]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CCS 2017: 2421-2434 - [c110]Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov:
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises. RAID 2017: 287-310 - [c109]Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. WISEC 2017: 122-133 - 2016
- [c108]Güliz Seray Tuncay, Soteris Demetriou, Carl A. Gunter:
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android. CCS 2016: 104-115 - [c107]Avesta Hojjati, Anku Adhikari, Katarina Struckmann, Edward Chou, Thi Ngoc Tho Nguyen, Kushagra Madan, Marianne Southall Winslett, Carl A. Gunter, William P. King:
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. CCS 2016: 883-894 - [c106]Soteris Demetriou, Whitney Merrill, Wei Yang, Aston Zhang, Carl A. Gunter:
Free for All! Assessing User Data Exposure to Advertising Libraries on Android. NDSS 2016 - [c105]Aston Zhang, Amit Goyal, Ricardo Baeza-Yates, Yi Chang, Jiawei Han, Carl A. Gunter, Hongbo Deng:
Towards Mobile Query Auto-Completion: An Efficient Mobile Application-Aware Approach. WWW 2016: 579-590 - 2015
- [c104]You Chen, Wei Xie, Carl A. Gunter, David M. Liebovitz, Sanjay Mehrotra, He Zhang, Bradley A. Malin:
Inferring Clinical Workflow Efficiency via Electronic Medical Record Utilization. AMIA 2015 - [c103]Xun Lu, Aston Zhang, Carl A. Gunter, Daniel Fabbri, David M. Liebovitz, Bradley A. Malin:
Discovering de facto diagnosis specialties. BCB 2015: 7-16 - [c102]Michael LeMay, Carl A. Gunter:
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. Logic, Rewriting, and Concurrency 2015: 404-426 - [c101]Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl A. Gunter:
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. NDSS 2015 - [c100]Aston Zhang, Amit Goyal, Weize Kong, Hongbo Deng, Anlei Dong, Yi Chang, Carl A. Gunter, Jiawei Han:
adaQAC: Adaptive Query Auto-Completion via Implicit Negative Feedback. SIGIR 2015: 143-152 - 2014
- [c99]Dongjing He, Muhammad Naveed, Carl A. Gunter, Klara Nahrstedt:
Security Concerns in Android mHealth Apps. AMIA 2014 - [c98]Prateek Jindal, Dan Roth, Carl A. Gunter:
Joint inference for end-to-end coreference resolution for clinical notes. BCB 2014: 192-201 - [c97]Prateek Jindal, Carl A. Gunter, Dan Roth:
Detecting privacy-sensitive events in medical text. BCB 2014: 617-620 - [c96]Wen Zhang, You Chen, Thaddeus Cybulski, Daniel Fabbri, Carl A. Gunter, Patrick N. Lawlor, David M. Liebovitz, Bradley A. Malin:
Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions. CCS 2014: 1182-1192 - [c95]Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter:
Controlled Functional Encryption. CCS 2014: 1280-1291 - [c94]Se Eun Oh, Ji Young Chun, Limin Jia, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. CODASPY 2014: 313-320 - [c93]Aston Zhang, Xing Xie, Kevin Chen-Chuan Chang, Carl A. Gunter, Jiawei Han, XiaoFeng Wang:
Privacy Risk in Anonymized Heterogeneous Information Networks. EDBT 2014: 595-606 - [c92]Muhammad Naveed, Xiao-yong Zhou, Soteris Demetriou, XiaoFeng Wang, Carl A. Gunter:
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android. NDSS 2014 - [c91]Carl A. Gunter:
Detecting Roles and Anomalies in Hospital Access Audit Logs. SafeConfig 2014: 1 - [c90]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IEEE Symposium on Security and Privacy 2014: 639-654 - 2013
- [c89]Xiao-yong Zhou, Soteris Demetriou, Dongjing He, Muhammad Naveed, Xiaorui Pan, XiaoFeng Wang, Carl A. Gunter, Klara Nahrstedt:
Identity, location, disease and more: inferring your secrets from android public resources. CCS 2013: 1017-1028 - [c88]Siddharth Gupta, Casey Hanson, Carl A. Gunter, Mario Frank, David M. Liebovitz, Bradley A. Malin:
Modeling and detecting anomalous topic access. ISI 2013: 100-105 - [c87]Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
Evolving role definitions through permission invocation patterns. SACMAT 2013: 37-48 - [c86]Eric Duffy, Steve Nyemba, Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs. HealthTech 2013 - 2012
- [c85]Quanyan Zhu, Carl A. Gunter, Tamer Basar:
Tragedy of Anticommons in Digital Right Management of Medical Records. HealthSec 2012 - 2011
- [c84]Omid Fatemieh, Michael LeMay, Carl A. Gunter:
Reliable telemetry in white spaces using remote attestation. ACSAC 2011: 323-332 - [c83]Sonia Jahid, Carl A. Gunter, Imranul Hoque, Hamed Okhravi:
MyABDAC: compiling XACML policies for attribute-based database access control. CODASPY 2011: 97-108 - [c82]Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter:
Reconstructing Hash Reversal based Proof of Work Schemes. LEET 2011 - [c81]Omid Fatemieh, Ali Farhadi, Ranveer Chandra, Carl A. Gunter:
Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks. NDSS 2011 - [c80]Md. Yusuf Sarwar Uddin, Ahmed Khurshid, Hee Dong Jung, Carl A. Gunter, Matthew Caesar, Tarek F. Abdelzaher:
Making DTNs robust against spoofing attacks with localized countermeasures. SECON 2011: 332-340 - [c79]Michael LeMay, Carl A. Gunter:
Enforcing Executing-Implies-Verified with the Integrity-Aware Processor. TRUST 2011: 202-216 - [c78]Wen Zhang, Carl A. Gunter, David M. Liebovitz, Jian Tian:
Role Prediction Using Electronic Medical Record System Audits. HealthSec 2011 - 2010
- [c77]Mohammad Maifi Hasan Khan, Hieu Khac Le, Michael LeMay, Paria Moinzadeh, Lili Wang, Yong Yang, Dong Kun Noh, Tarek F. Abdelzaher, Carl A. Gunter, Jiawei Han, Xin Jin:
Diagnostic powertracing for sensor node failure analysis. IPSN 2010: 117-128 - [c76]Fariba Khan, Carl A. Gunter:
Tiered Incentives for Integrity Based Queuing. NetEcon 2010: 8:1-8:7 - [c75]Carl A. Gunter, David M. Liebovitz, Bradley A. Malin:
EBAM: Experience-Based Access Management for Healthcare. HealthSec 2010 - 2009
- [c74]Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett:
Implementing Reflective Access Control in SQL. DBSec 2009: 17-32 - [c73]Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer:
Model-Checking DoS Amplification for VoIP Session Initiation. ESORICS 2009: 390-405 - [c72]Michael LeMay, Carl A. Gunter:
Cumulative Attestation Kernels for Embedded Systems. ESORICS 2009: 655-670 - [c71]Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, Anh Nguyen:
Specifying and Analyzing Workflows for Automated Identification and Data Capture. HICSS 2009: 1-11 - [c70]Michael LeMay, Jason J. Haas, Carl A. Gunter:
Collaborative Recommender Systems for Building Automation. HICSS 2009: 1-10 - [c69]Michael J. May, Carl A. Gunter, Insup Lee, Steve Zdancewic:
Strong and Weak Policy Relations. POLICY 2009: 33-36 - [c68]Carl A. Gunter:
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers. POLICY 2009: 114-117 - [c67]Kazuhiro Minami, Nikita Borisov, Carl A. Gunter:
Safety in discretionary access control for logic-based publish-subscribe systems. SACMAT 2009: 3-12 - [c66]Alwyn Goodloe, Carl A. Gunter:
Completeness of discovery protocols. SafeConfig 2009: 29-36 - [c65]Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
How to Bootstrap Security for Ad-Hoc Network: Revisited. SEC 2009: 119-131 - [c64]Alejandro Gutierrez, Apeksha Godiyal, Matt Stockton, Michael LeMay, Carl A. Gunter, Roy H. Campbell:
Sh@re: Negotiated Audit in Social Networks. SMC 2009: 74-79 - 2008
- [c63]Ellick Chan, Carl A. Gunter, Sonia Jahid, Evgeni Peryshkin, Daniel Rebolledo:
Using rhythmic nonces for puzzle-based DoS resistance. CSAW 2008: 51-58 - [c62]Lars E. Olson, Carl A. Gunter, P. Madhusudan:
A formal framework for reflective database access control policies. CCS 2008: 289-298 - [c61]Rohit Chadha, Carl A. Gunter, José Meseguer, Ravinder Shankesi, Mahesh Viswanathan:
Modular Preservation of Safety Properties by Cookie-Based DoS-Protection Wrappers. FMOODS 2008: 39-58 - [c60]Michael LeMay, Rajesh Nelli, George Gross, Carl A. Gunter:
An Integrated Architecture for Demand Response Communications and Control. HICSS 2008: 174 - [c59]Sanjeev Khanna, Santosh S. Venkatesh, Omid Fatemieh, Fariba Khan, Carl A. Gunter:
Adaptive SelectiveVerification. INFOCOM 2008: 529-537 - [c58]Musab AlTurki, José Meseguer, Carl A. Gunter:
Probabilistic Modeling and Analysis of DoS Protection for the ASV Protocol. SecReT@LICS/CSF 2008: 3-18 - 2007
- [c57]Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila:
Improving multi-tier security using redundant authentication. CSAW 2007: 54-62 - [c56]Alwyn Goodloe, Carl A. Gunter:
Reasoning about Concurrency for Security Tunnels. CSF 2007: 64-78 - [c55]Michael LeMay, George Gross, Carl A. Gunter, Sanjam Garg:
Unified Architecture for Large-Scale Attested Metering. HICSS 2007: 115 - [c54]Michael LeMay, Carl A. Gunter:
Supporting Emergency-Response by Retasking Network Infrastructures. HotNets 2007 - [c53]Michael LeMay, Omid Fatemieh, Carl A. Gunter:
PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. SACMAT 2007: 205-214 - [c52]Charles C. Zhang, Marianne Winslett, Carl A. Gunter:
On the Safety and Efficiency of Firewall Policy Deployment. S&P 2007: 33-50 - 2006
- [c51]Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana:
Using Attribute-Based Access Control to Enable Attribute-Based Messaging. ACSAC 2006: 403-413 - [c50]Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee:
Securing the drop-box architecture for assisted living. FMSE 2006: 1-12 - [c49]Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter:
Defeasible security policy composition for web services. FMSE 2006: 45-54 - [c48]Girish Baliga, Scott R. Graham, Carl A. Gunter, Panganamala R. Kumar:
Reducing Risk by Managing Software Related Failures in Networked Control Systems. CDC 2006: 2866-2871 - [c47]Michael J. May, Carl A. Gunter, Insup Lee:
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. CSFW 2006: 85-97 - [c46]Raja Afandi, Jianqing Zhang, Munawar Hafiz, Carl A. Gunter:
AMPol: Adaptive Messaging Policy. ECOWS 2006: 53-64 - [c45]Raja Afandi, Jianqing Zhang, Carl A. Gunter:
AMPol-Q: Adaptive Middleware Policy to Support QoS. ICSOC 2006: 165-178 - [c44]Qixin Wang, Wook Shin, Xue Liu, Zheng Zeng, Cham Oh, Bedoor K. AlShebli, Marco Caccamo, Carl A. Gunter, Elsa L. Gunter, Jennifer C. Hou, Karrie Karahalios, Lui Sha:
I-Living: An Open System Architecture for Assisted Living. SMC 2006: 4268-4275 - [c43]Jodie P. Boyer, Kaijun Tan, Carl A. Gunter:
Privacy Sensitive Location Information Systems in Smart Buildings. SPC 2006: 149-164 - 2005
- [c42]Kevin D. Lux, Michael J. May, Nayan L. Bhattad, Carl A. Gunter:
WSEmail: Secure Internet Messaging Based on Web Services. ICWS 2005: 75-82 - [c41]Alwyn Goodloe, Carl A. Gunter, Mark-Oliver Stehr:
Formal prototyping in early stages of protocol design. WITS 2005: 67-80 - 2004
- [c40]Ratul K. Guha, Carl A. Gunter, Saswati Sarkar:
Fair coalitions for power-aware routing in wireless networks. CDC 2004: 3271-3276 - [c39]Kaijun Tan, Jason Crampton, Carl A. Gunter:
The Consistency of Task-Based Authorization Constraints in Workflow Systems. CSFW 2004: 155- - [c38]Michael McDougall, Rajeev Alur, Carl A. Gunter:
A model-based approach to integrating security policies for embedded devices. EMSOFT 2004: 211-219 - [c37]Carl A. Gunter, Sanjeev Khanna, Kaijun Tan, Santosh S. Venkatesh:
DoS Protection for Reliably Authenticated Broadcast. NDSS 2004 - [c36]Carl A. Gunter, Michael J. May, Stuart G. Stubblebine:
A Formal Privacy System and Its Application to Location Based Services. Privacy Enhancing Technologies 2004: 256-282 - 2003
- [c35]Carl A. Gunter:
Open APIs for Embedded Security. ECOOP 2003: 225-247 - 2002
- [c34]Alwyn Goodloe, Michael McDougall, Carl A. Gunter, Rajeev Alur:
Predictable programs in barcodes. CASES 2002: 298-303 - [c33]Carl A. Gunter:
Micro Mobile Programs. IFIP TCS 2002: 356-369 - [c32]Karthikeyan Bhargavan, Carl A. Gunter:
Requirements for a Practical Network Event Recognition Language. RV@FLoC 2002: 1-20 - 2001
- [c31]Carl A. Gunter, Stephen Weeks, Andrew K. Wright:
Models and Languages for Digital Rights. HICSS 2001 - [c30]Karthikeyan Bhargavan, Satish Chandra, Peter J. McCann, Carl A. Gunter:
What packets may come: automata for network monitoring. POPL 2001: 206-219 - 2000
- [c29]Pankaj Kakkar, Carl A. Gunter, Martín Abadi:
Reasoning about Secrecy for Active Networks. CSFW 2000: 118-129 - [c28]Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic:
Fault origin adjudication. FMSP 2000: 61-71 - [c27]Bow-Yaw Wang, José Meseguer, Carl A. Gunter:
Specification and Formal Analysis of a PLAN Algorithm in Maude. ICDCS Workshop on Distributed System Validation and Verification 2000: E49-E56 - [c26]Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Pamela Zave:
A Reference Model for Requirements and Specifications-Extended Abstract. ICRE 2000: 189 - [c25]Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim, Insup Lee, Davor Obradovic, Oleg Sokolsky, Mahesh Viswanathan:
Verisim: Formal analysis of network simulations. ISSTA 2000: 2-13 - [c24]Pankaj Kakkar, Michael McDougall, Carl A. Gunter, Trevor Jim:
Certificate Distribution with Local Autonomy. IWAN 2000: 277-295 - [c23]Carl A. Gunter, Trevor Jim:
Generalized Certificate Revocation. POPL 2000: 316-329 - [c22]Karthikeyan Bhargavan, Carl A. Gunter, Davor Obradovic:
Routing Information Protocol in HOL/SPIN. TPHOLs 2000: 53-72 - 1999
- [c21]Michael W. Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter, Scott Nettles:
PLANet: An Active Internetwork. INFOCOM 1999: 1124-1133 - [c20]Pankaj Kakkar, Michael W. Hicks, Jonathan T. Moore, Carl A. Gunter:
Specifying the PLAN Network Programming Langauge. HOOTS 1999: 87-104 - 1998
- [c19]Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles:
Network Programming Using PLAN. ICCL Workshop: Internet Programming Languages 1998: 127-143 - [c18]Michael W. Hicks, Pankaj Kakkar, Jonathan T. Moore, Carl A. Gunter, Scott Nettles:
PLAN: A Packet Language for Active Networks. ICFP 1998: 86-93 - [c17]Karthikeyan Bhargavan, Carl A. Gunter, Elsa L. Gunter, Michael Jackson, Davor Obradovic, Pamela Zave:
The Village Telephone System: A Case Study in Formal Software Engineering. TPHOLs 1998: 49-66 - 1996
- [c16]Carl A. Gunter, Teow-Hin Ngair, Devika Subramanian:
Sets as Anti-Chains. ASIAN 1996: 116-128 - [c15]Carl A. Gunter:
Abstracting Dependencies between Software Configuration Items. SIGSOFT FSE 1996: 167-178 - 1995
- [c14]Carl A. Gunter, Didier Rémy, Jon G. Riecke:
A Generalization of Exceptions and Control in ML-like Languages. FPCA 1995: 12-23 - 1992
- [c13]Jawahar Chirimar, Carl A. Gunter, Myra Van Inwegen:
Xpnet: A Graphical Interface to Proof Nets with an Efficient Proof Checker. CADE 1992: 711-715 - [c12]Jawahar Chirimar, Carl A. Gunter, Jon G. Riecke:
Proving Memory Management Invariants for a Language Based on Linear Logic. LISP and Functional Programming 1992: 139-150 - 1991
- [c11]Carl A. Gunter, Teow-Hin Ngair, Prakash Panangaden, Devika Subramanian:
The Common Order-Theoretic Structure of Version Spaces and ATMS's. AAAI 1991: 500-505 - [c10]Carl A. Gunter, Elsa L. Gunter, David B. MacQueen:
An Abstract Interpretation for ML Equality Kinds. TACS 1991: 112-130 - 1990
- [c9]Val Tannen, Carl A. Gunter, Andre Scedrov:
Computing with Coercions. LISP and Functional Programming 1990: 44-60 - [c8]Vijay Gehlot, Carl A. Gunter:
Normal Process Representatives. LICS 1990: 200-207 - [c7]Carl A. Gunter:
Relating Total and Partial Correctness Interpretations of Non-Deterministic Programs. POPL 1990: 306-319 - 1989
- [c6]Val Tannen, Thierry Coquand, Carl A. Gunter, Andre Scedrov:
Inheritance and Explicit Coercion (Preliminary Report). LICS 1989: 112-129 - 1988
- [c5]Carl A. Gunter, Achim Jung:
Coherence and Consistency in Domains (Extended Outline). LICS 1988: 309-317 - 1987
- [c4]Thierry Coquand, Carl A. Gunter, Glynn Winskel:
DI-Domains as a Model of Polymorphism. MFPS 1987: 344-363 - 1986
- [c3]Carl A. Gunter:
The Largest First-Order-Axiomatizable Cartesian Closed Category of Domains. LICS 1986: 142-148 - 1985
- [c2]Carl A. Gunter:
A Universal Domain Technique for Profinite Posets. ICALP 1985: 232-243 - [c1]Carl A. Gunter:
Comparing Categories of Domains. Mathematical Foundations of Programming Semantics 1985: 101-121
Parts in Books or Collections
- 1993
- [p2]Carl A. Gunter:
Forms of Semantic Specification. Current Trends in Theoretical Computer Science 1993: 332-353 - 1990
- [p1]Carl A. Gunter, Dana S. Scott:
Semantic Domains. Handbook of Theoretical Computer Science, Volume B: Formal Models and Sematics (B) 1990: 633-674
Editorship
- 2012
- [e1]Carl A. Gunter, Zachary N. J. Peterson:
3rd USENIX Workshop on Health Security and Privacy, HealthSec'12, Bellevue, WA, USA, August 6-7, 2012. USENIX Association 2012 [contents]
Informal and Other Publications
- 2022
- [i22]Berkay Kaplan, Jingyu Qian, Israel Lopez-Toledo, Carl A. Gunter:
A Tagging Solution to Discover IoT Devices in Apartments. CoRR abs/2210.06676 (2022) - [i21]Klara Nahrstedt, Naresh R. Shanbhag, Vikram S. Adve, Nancy M. Amato, Romit Roy Choudhury, Carl A. Gunter, Nam Sung Kim, Olgica Milenkovic, Sayan Mitra, Lav R. Varshney, Yurii Vlasov, Sarita V. Adve, Rashid Bashir, Andreas Cangellaris, James DiCarlo, Katie Driggs Campbell, Nick Feamster, Mattia Gazzola, Karrie Karahalios, Sanmi Koyejo, Paul G. Kwiat, Bo Li, Negar Mehr, Ravish Mehra, Andrew Miller, Daniela Rus, Alexander G. Schwing, Anshumali Shrivastava:
Coordinated Science Laboratory 70th Anniversary Symposium: The Future of Computing. CoRR abs/2210.08974 (2022) - [i20]Xiaojun Xu, Yue Yu, Hanzhang Wang, Alok Lal, Carl A. Gunter, Bo Li:
EDoG: Adversarial Edge Detection For Graph Neural Networks. CoRR abs/2212.13607 (2022) - 2021
- [i19]Hyun Bin Lee, Tushar M. Jois, Christopher W. Fletcher, Carl A. Gunter:
DOVE: A Data-Oblivious Virtual Environment. CoRR abs/2102.05195 (2021) - [i18]George Gunter, Huichen Li, Avesta Hojjati, Matthew Nice, Matthew R. Bunting, Carl A. Gunter, Bo Li, Jonathan Sprinkle, Daniel B. Work:
Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection. CoRR abs/2112.11986 (2021) - 2020
- [i17]Wayne P. Burleson, Kevin Fu, Denise L. Anthony, Jorge Guajardo, Carl A. Gunter, Kyle Ingols, Jean-Baptiste Jeannin, Farinaz Koushanfar, Carl E. Landwehr, Susan Squires:
Grand Challenges for Embedded Security Research in a Connected World. CoRR abs/2005.06585 (2020) - [i16]Hsiao-Ying Huang, Soteris Demetriou, Rini Banerjee, Güliz Seray Tuncay, Carl A. Gunter, Masooda N. Bashir:
Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security. CoRR abs/2007.01721 (2020) - 2019
- [i15]Yunhui Long, Suxin Lin, Zhuolin Yang, Carl A. Gunter, Bo Li:
Scalable Differentially Private Generative Student Model via PATE. CoRR abs/1906.09338 (2019) - [i14]Kevin D. Lux, Michael J. May, Carl A. Gunter:
WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services. CoRR abs/1908.02108 (2019) - [i13]Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li:
Detecting AI Trojans Using Meta Neural Analysis. CoRR abs/1910.03137 (2019) - 2018
- [i12]Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Xiaokang Liu, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang, Carl A. Gunter:
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. CoRR abs/1801.08535 (2018) - [i11]Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen:
Understanding Membership Inferences on Well-Generalized Learning Models. CoRR abs/1802.04889 (2018) - [i10]Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl A. Gunter:
Distributed and Secure ML with Self-tallying Multi-party Aggregation. CoRR abs/1811.10296 (2018) - 2017
- [i9]Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiao-yong Zhou, Michael Grace:
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness. CoRR abs/1703.01537 (2017) - [i8]Nan Zhang, Soteris Demetriou, Xianghang Mi, Wenrui Diao, Kan Yuan, Peiyuan Zong, Feng Qian, XiaoFeng Wang, Kai Chen, Yuan Tian, Carl A. Gunter, Kehuan Zhang, Patrick Tague, Yue-Hsun Lin:
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be. CoRR abs/1703.09809 (2017) - [i7]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CoRR abs/1705.07289 (2017) - [i6]Vincent Bindschaedler, Reza Shokri, Carl A. Gunter:
Plausible Deniability for Privacy-Preserving Data Synthesis. CoRR abs/1708.07975 (2017) - [i5]Yunhui Long, Vincent Bindschaedler, Carl A. Gunter:
Towards Measuring Membership Privacy. CoRR abs/1712.09136 (2017) - 2015
- [i4]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy in the Genomic Era. IACR Cryptol. ePrint Arch. 2015: 563 (2015) - 2014
- [i3]Michael LeMay, Carl A. Gunter:
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. CoRR abs/1404.3465 (2014) - [i2]Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:
Privacy and Security in the Genomic Era. CoRR abs/1405.1891 (2014) - [i1]Muhammad Naveed, Manoj Prabhakaran, Carl A. Gunter:
Dynamic Searchable Encryption via Blind Storage. IACR Cryptol. ePrint Arch. 2014: 219 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint