Anupam Datta

Affiliations:
  • Carnegie Mellon University, Pittsburgh, USA


According to our database1, Anupam Datta authored at least 117 papers between 2001 and 2024.

Collaborative distances:

Timeline

2005
2010
2015
2020
0
5
10
15
1
1
1
3
2
3
2
3
3
2
4
2
4
2
1
1
2
2
1
3
6
1
3
2
5
9
6
7
5
5
6
2
4
3
2
1
2
1
2
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
De-amplifying Bias from Differential Privacy in Language Model Fine-tuning.
CoRR, 2024

2023
Identifying and Mitigating the Security Risks of Generative AI.
Found. Trends Priv. Secur., 2023

Is Certifying 𝓁<sub>p</sub> Robustness Still Worthwhile?
CoRR, 2023

Identifying and Mitigating the Security Risks of Generative AI.
CoRR, 2023

2022
Order-sensitive Shapley Values for Evaluating Conceptual Soundness of NLP Models.
CoRR, 2022

Faithful Explanations for Deep Graph Models.
CoRR, 2022

Robust Models Are More Interpretable Because Attributions Look Normal.
Proceedings of the International Conference on Machine Learning, 2022

2021
Fairness Under Feature Exemptions: Counterfactual and Observational Measures.
IEEE Trans. Inf. Theory, 2021

Consistent Counterfactuals for Deep Models.
CoRR, 2021

Boundary Attributions Provide Normal (Vector) Explanations.
CoRR, 2021

Influence Patterns for Explaining Information Flow in BERT.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Exploring Conceptual Soundness with TruLens.
Proceedings of the NeurIPS 2021 Competitions and Demonstrations Track, 2021

Machine Learning Explainability and Robustness: Connected at the Hip.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

2020
Abstracting Influence Paths for Explaining (Contextualization of) BERT Models.
CoRR, 2020

Towards Behavior-Level Explanation for Deep Reinforcement Learning.
CoRR, 2020

SoK: Differential Privacy as a Causal Property.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Smoothed Geometry for Robust Attribution.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Interpreting Interpretations: Organizing Attribution Methods by Criteria.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

Gender Bias in Neural Natural Language Processing.
Proceedings of the Logic, 2020

Influence Paths for Characterizing Subject-Verb Number Agreement in LSTM Language Models.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

An Information-Theoretic Quantification of Discrimination with Exempt Features.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Feature-Wise Bias Amplification.
Proceedings of the 7th International Conference on Learning Representations, 2019

2018
Privacy Through Accountability.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Device microagent for IoT home gateway: a lightweight plug-n-play architecture.
SIGBED Rev., 2018

Correspondences between Privacy and Nondiscrimination: Why They Should Be Studied Together.
CoRR, 2018

Supervising Feature Influence.
CoRR, 2018

Hunting for Discriminatory Proxies in Linear Regression Models.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

Influence-Directed Explanations for Deep Convolutional Networks.
Proceedings of the IEEE International Test Conference, 2018

Discrimination in Online Personalization: A Multidisciplinary Inquiry.
Proceedings of the Conference on Fairness, Accountability and Transparency, 2018

2017
Latent Factor Interpretations for Collaborative Filtering.
CoRR, 2017

Differential Privacy as a Causal Property.
CoRR, 2017

Proxy Non-Discrimination in Data-Driven Systems.
CoRR, 2017

Towards Human Computable Passwords.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Differentially Private Password Frequency Lists.
IACR Cryptol. ePrint Arch., 2016

Report on the NSF Workshop on Formal Methods for Security.
CoRR, 2016

überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor.
Proceedings of the 25th USENIX Security Symposium, 2016

Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

Accountability in cyber-physical systems.
Proceedings of the 2016 Science of Security for Cyber-Physical Systems Workshop, 2016

Information flow for security in control systems.
Proceedings of the 55th IEEE Conference on Decision and Control, 2016

2015
Automated Experiments on Ad Privacy Settings.
Proc. Priv. Enhancing Technol., 2015

Naturally Rehearsing Passwords.
IACR Cryptol. ePrint Arch., 2015

System M: A Program Logic for Code Sandboxing and Identification.
CoRR, 2015

A Symbolic Logic with Concrete Bounds for Cryptographic Protocols.
CoRR, 2015

A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System.
Proceedings of the Runtime Verification - 6th International Conference, 2015

Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Influence in Classification via Cooperative Game Theory.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Incentivizing Peer Grading in MOOCS: An Audit Game Approach.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

A Methodology for Information Flow Experiments.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

A Logic of Programs with Interface-Confined Code.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Program Actions as Actual Causes: A Building Block for Accountability.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Audit Games with Multiple Defender Resources.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination.
CoRR, 2014

Human Computable Passwords.
CoRR, 2014

Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Bootstrapping Privacy Compliance in Big Data Systems.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Privacy through Accountability: A Computer Science Perspective.
Proceedings of the Distributed Computing and Internet Technology, 2014

Privacy-preserving audit for broker-based health information exchange.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

WPES 2014: 13th Workshop on Privacy in the Electronic Society.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

2013
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Differentially private data analysis of social networks via restricted sensitivity.
Proceedings of the Innovations in Theoretical Computer Science, 2013

Audit Games.
Proceedings of the IJCAI 2013, 2013

Adaptive Regret Minimization in Bounded-Memory Games.
Proceedings of the Decision and Game Theory for Security - 4th International Conference, 2013

Purpose Restrictions on Information Use.
Proceedings of the Computer Security - ESORICS 2013, 2013

GOTCHA password hackers!
Proceedings of the AISec'13, 2013

2012
Formalizing and Enforcing Purpose Restrictions in Privacy Policies.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

Parametric Verification of Address Space Separation.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Provable De-anonymization of Large Datasets with Sparse Dimensions.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

Audit Mechanisms for Provable Risk Management and Accountable Data Governance.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

2011
On Adversary Models and Compositional Security.
IEEE Secur. Priv., 2011

Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract).
Proceedings of the Twenty-seventh Conference on the Mathematical Foundations of Programming Semantics, 2011

On the Semantics of Purpose Requirements in Privacy Policies
CoRR, 2011

A Logical Method for Policy Enforcement over Evolving Audit Logs
CoRR, 2011

Formal Verification of Differential Privacy for Interactive Systems
CoRR, 2011

Audit Mechanisms for Privacy Protection in Healthcare Environments.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Policy auditing over incomplete logs: theory, implementation and applications.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Protocol Composition Logic.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2010
Analysis Techniques for Information Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02334-7, 2010

Inductive trace properties for computational security.
J. Comput. Secur., 2010

Logical Methods in Security and Privacy.
IEEE Secur. Priv., 2010

Compositional System Security with Interface-Confined Adversaries.
Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics, 2010

Experiences in the logical specification of the HIPAA and GLBA privacy laws.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Privacy Challenges in Patient-centric Health Information Systems.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Distributed programming with distributed authorization.
Proceedings of TLDI 2010: 2010 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, 2010

TrustVisor: Efficient TCB Reduction and Attestation.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

2009
A Logic of Secure Systems and its Application to Trusted Computing.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

ASPIER: An Automated Framework for Verifying Security Protocol Implementations.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
On the Relationships between Notions of Simulation-Based Security.
J. Cryptol., 2008

2007
Inductive Proof Method for Computational Secrecy.
IACR Cryptol. ePrint Arch., 2007

Protocol Composition Logic (PCL).
Proceedings of the Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin, 2007

Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols.
Proceedings of the Trustworthy Global Computing, Third Symposium, 2007

Inductive Proofs of Computational Secrecy.
Proceedings of the Computer Security, 2007

Privacy and Utility in Business Processes.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Compositional analysis of contract-signing protocols.
Theor. Comput. Sci., 2006

Key Exchange Protocols: Security Definition, Proof Method and Applications.
IACR Cryptol. ePrint Arch., 2006

Privacy and Contextual Integrity: Framework and Applications.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Computationally Sound Compositional Logic for Key Exchange Protocols.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Secrecy Analysis in Protocol Composition Logic.
Proceedings of the Advances in Computer Science, 2006

2005
Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations.
PhD thesis, 2005

A derivation system and compositional logic for security protocols.
J. Comput. Secur., 2005

Games and the Impossibility of Realizable Ideal Functionality.
IACR Cryptol. ePrint Arch., 2005

Probabilistic Polynomial-Time Semantics for a Protocol Security Logic.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

A modular correctness proof of IEEE 802.11i and TLS.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Abstraction and Refinement in Protocol Derivation.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
A Derivation System for Security Protocols and its Logical Formalization.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

Secure protocol composition.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003

2002
Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks.
Proceedings of the 7th Asia and South Pacific Design Automation Conference (ASP-DAC 2002), 2002

2001
Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique.
Proceedings of the 14th International Conference on VLSI Design (VLSI Design 2001), 2001

Information Retrieval Using UMLS-based Structured Queries.
Proceedings of the AMIA 2001, 2001


  Loading...