Anupam Datta
Affiliations:- Carnegie Mellon University, Pittsburgh, USA
According to our database1,
Anupam Datta
authored at least 117 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
15
1
1
1
3
2
3
2
3
3
2
4
2
4
2
1
1
2
2
1
3
6
1
3
2
5
9
6
7
5
5
6
2
4
3
2
1
2
1
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
CoRR, 2024
2023
Found. Trends Priv. Secur., 2023
2022
CoRR, 2022
Proceedings of the International Conference on Machine Learning, 2022
2021
IEEE Trans. Inf. Theory, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the NeurIPS 2021 Competitions and Demonstrations Track, 2021
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
2020
CoRR, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Influence Paths for Characterizing Subject-Verb Number Agreement in LSTM Language Models.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Proceedings of the 7th International Conference on Learning Representations, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
SIGBED Rev., 2018
Correspondences between Privacy and Nondiscrimination: Why They Should Be Studied Together.
CoRR, 2018
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018
Proceedings of the IEEE International Test Conference, 2018
Proceedings of the Conference on Fairness, Accountability and Transparency, 2018
2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Proceedings of the 25th USENIX Security Symposium, 2016
Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the 2016 Science of Security for Cyber-Physical Systems Workshop, 2016
Proceedings of the 55th IEEE Conference on Decision and Control, 2016
2015
Proceedings of the Runtime Verification - 6th International Conference, 2015
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015
2014
Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination.
CoRR, 2014
Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Distributed Computing and Internet Technology, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Computer Aided Verification - 26th International Conference, 2014
2013
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the Innovations in Theoretical Computer Science, 2013
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
2011
Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract).
Proceedings of the Twenty-seventh Conference on the Mathematical Foundations of Programming Semantics, 2011
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02334-7, 2010
Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics, 2010
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of TLDI 2010: 2010 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
2008
2007
Proceedings of the Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin, 2007
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007
Proceedings of the Computer Security, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
Proceedings of the Advances in Computer Science, 2006
2005
Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations.
PhD thesis, 2005
J. Comput. Secur., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
2003
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
2002
Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks.
Proceedings of the 7th Asia and South Pacific Design Automation Conference (ASP-DAC 2002), 2002
2001
Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique.
Proceedings of the 14th International Conference on VLSI Design (VLSI Design 2001), 2001
Proceedings of the AMIA 2001, 2001