Arvind Narayanan
Orcid: 0000-0001-7176-4479
According to our database1,
Arvind Narayanan
authored at least 123 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CORE-Bench: Fostering the Credibility of Published Research Through a Computational Reproducibility Agent Benchmark.
CoRR, 2024
The Responsible Foundation Model Development Cheatsheet: A Review of Tools & Resources.
CoRR, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Patterns, September, 2023
Manipulative tactics are the norm in political emails: Evidence from 300K emails from the 2020 US election cycle.
Big Data Soc., January, 2023
CoRR, 2023
An In-Depth Measurement Analysis of 5G mmWave PHY Latency and Its Impact on End-to-End Delay.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023
Against Predictive Optimization: On the Legitimacy of Decision-Making Algorithms that Optimize Predictive Accuracy.
Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, 2023
2022
GranularNF: Granular Decomposition of Stateful NFV at 100 Gbps Line Speed and Beyond.
SIGMETRICS Perform. Evaluation Rev., August, 2022
Int. J. Comput. Vis., 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the Financial Cryptography and Data Security, 2022
How Algorithms Shape the Distribution of Political Advertising: Case Studies of Facebook, Google, and TikTok.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022
The Worst of Both Worlds: A Comparative Analysis of Errors in Learning from Data in Psychology and Machine Learning.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022
2021
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union).
CoRR, 2021
Simulation as Experiment: An Empirical Critique of Simulation Research on Recommender Systems.
CoRR, 2021
CoRR, 2021
Proceedings of the WWW '21: The Web Conference 2021, 2021
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
Proceedings of the 5G-MeMU '21: Proceedings of the 1st Workshop on 5G Measurements, 2021
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020
Proceedings of the SIGCOMM '20: ACM SIGCOMM 2020 Conference, 2020
Proceedings of the 2020 IFIP Networking Conference, 2020
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
2019
Proc. Priv. Enhancing Technol., 2019
Proc. ACM Hum. Comput. Interact., 2019
CoRR, 2019
Proceedings of the 2019 ACM Conference on Economics and Computation, 2019
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 3rd Asia-Pacific Workshop on Networking, 2019
2018
Proc. Priv. Enhancing Technol., 2018
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies.
Proc. Priv. Enhancing Technol., 2018
Proc. Priv. Enhancing Technol., 2018
Endorsements on Social Media: An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest.
Proc. ACM Hum. Comput. Interact., 2018
CoRR, 2018
CoRR, 2018
Comput. Commun. Rev., 2018
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018
Proceedings of the 2018 Workshop on Network Meets AI & ML, 2018
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018
Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2018
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
OpenCDN: An ICN-based open content distribution system using distributed actor model.
Proceedings of the IEEE INFOCOM 2018, 2018
2017
CoRR, 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Proceedings of the 29th International Teletraffic Congress, 2017
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning.
ACM Queue, 2016
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security.
IACR Cryptol. ePrint Arch., 2016
Semantics derived automatically from language corpora necessarily contain human biases.
CoRR, 2016
Proceedings of the Annual IEEE Systems Conference, 2016
Mining Spatial-Temporal <i>geoMobile</i> Data via Feature Distributional Similarity Graph.
Proceedings of the First Workshop on Mobile Data, 2016
Most Calls Are Local (But Some Are Regional): Dissecting Cellular Communication Patterns.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Princeton University Press, ISBN: 978-0-691-17169-2, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 24th International Conference on World Wide Web, 2015
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
CONIA: Content (provider)-oriented, namespace-independent architecture for multimedia information delivery.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
2012
Tiny Trans. Comput. Sci., 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011
2010
Proceedings of the Network and Distributed System Security Symposium, 2010
2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009
2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
2006
2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003