Suivre
Anupam Datta
Anupam Datta
Snowflake AI Research, Ex-Professor CMU
Adresse e-mail validée de snowflake.com - Page d'accueil
Titre
Citée par
Citée par
Année
Automated experiments on ad privacy settings: A tale of opacity, choice, and discrimination
A Datta, MC Tschantz, A Datta
arXiv preprint arXiv:1408.6491, 2014
11182014
Algorithmic transparency via quantitative input influence: Theory and experiments with learning systems
A Datta, S Sen, Y Zick
2016 IEEE symposium on security and privacy (SP), 598-617, 2016
10442016
TrustVisor: Efficient TCB reduction and attestation
JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig
2010 IEEE Symposium on Security and Privacy, 143-158, 2010
8512010
Privacy and contextual integrity: Framework and applications
A Barth, A Datta, JC Mitchell, H Nissenbaum
2006 IEEE symposium on security and privacy (S&P'06), 15 pp.-198, 2006
6082006
Gender bias in neural natural language processing
K Lu, P Mardziel, F Wu, P Amancharla, A Datta
Logic, language, and security: essays dedicated to Andre Scedrov on the …, 2020
4042020
Protocol composition logic (PCL)
A Datta, A Derek, JC Mitchell, A Roy
Electronic Notes in Theoretical Computer Science 172, 311-358, 2007
2972007
The johnson-lindenstrauss transform itself preserves differential privacy
J Blocki, A Blum, A Datta, O Sheffet
2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 410-419, 2012
2922012
Differentially private data analysis of social networks via restricted sensitivity
J Blocki, A Blum, A Datta, O Sheffet
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
2652013
A derivation system and compositional logic for security protocols
A Datta, A Derek, JC Mitchell, D Pavlovic
Journal of Computer Security 13 (3), 423-482, 2005
2062005
A modular correctness proof of IEEE 802.11 i and TLS
C He, M Sundararajan, A Datta, A Derek, JC Mitchell
Proceedings of the 12th ACM conference on Computer and communications …, 2005
1902005
Machine learning explainability in finance: an application to default risk analysis
P Bracke, A Datta, C Jung, S Sen
Bank of England Working Paper, 2019
1842019
Design, implementation and verification of an extensible and modular hypervisor framework
A Vasudevan, S Chaki, L Jia, J McCune, J Newsome, A Datta
2013 IEEE Symposium on Security and Privacy, 430-444, 2013
1812013
Privacy and utility in business processes
A Barth, J Mitchell, A Datta, S Sundaram
20th IEEE Computer Security Foundations Symposium (CSF'07), 279-294, 2007
1452007
Probabilistic polynomial-time semantics for a protocol security logic
A Datta, A Derek, JC Mitchell, V Shmatikov, M Turuani
International Colloquium on Automata, Languages, and Programming, 16-29, 2005
1412005
A logic of secure systems and its application to trusted computing
A Datta, J Franklin, D Garg, D Kaynar
2009 30th IEEE Symposium on Security and Privacy, 221-236, 2009
1342009
Policy auditing over incomplete logs: theory, implementation and applications
D Garg, L Jia, A Datta
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1322011
Flow distribution in parallel and reverse flow manifolds
AB Datta, AK Majumdar
International Journal of Heat and Fluid Flow 2 (4), 253-262, 1980
1321980
Experiences in the logical specification of the HIPAA and GLBA privacy laws
H DeYoung, D Garg, L Jia, D Kaynar, A Datta
Proceedings of the 9th Annual ACM Workshop on Privacy in the Electronic …, 2010
1312010
Bootstrapping privacy compliance in big data systems
S Sen, S Guha, A Datta, SK Rajamani, J Tsai, JM Wing
2014 IEEE Symposium on Security and Privacy, 327-342, 2014
1292014
ASPIER: An automated framework for verifying security protocol implementations
S Chaki, A Datta
2009 22nd IEEE Computer Security Foundations Symposium, 172-185, 2009
1152009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20