Arvind Narayanan

Orcid: 0000-0001-7176-4479

According to our database1, Arvind Narayanan authored at least 123 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Special Issue on 6G Technologies and Applications.
IEEE Internet Comput., 2024

CORE-Bench: Fostering the Credibility of Published Research Through a Computational Reproducibility Agent Benchmark.
CoRR, 2024

AI Agents That Matter.
CoRR, 2024

The Responsible Foundation Model Development Cheatsheet: A Review of Tools & Resources.
CoRR, 2024

AI Risk Management Should Incorporate Both Safety and Security.
CoRR, 2024

On the Societal Impact of Open Foundation Models.
CoRR, 2024

A Safe Harbor for AI Evaluation and Red Teaming.
CoRR, 2024

Foundation Model Transparency Reports.
CoRR, 2024

Promises and pitfalls of artificial intelligence for legal applications.
CoRR, 2024



2023
Leakage and the reproducibility crisis in machine-learning-based science.
Patterns, September, 2023

Manipulative tactics are the norm in political emails: Evidence from 300K emails from the 2020 US election cycle.
Big Data Soc., January, 2023

Security Policy Audits: Why and How.
IEEE Secur. Priv., 2023

REFORMS: Reporting Standards for Machine Learning Based Science.
CoRR, 2023

A semi-automatic method for document classification in the shipping industry.
CoRR, 2023

An In-Depth Measurement Analysis of 5G mmWave PHY Latency and Its Impact on End-to-End Delay.
Proceedings of the Passive and Active Measurement - 24th International Conference, 2023

Against Predictive Optimization: On the Legitimacy of Decision-Making Algorithms that Optimize Predictive Accuracy.
Proceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency, 2023

2022
GranularNF: Granular Decomposition of Stateful NFV at 100 Gbps Line Speed and Beyond.
SIGMETRICS Perform. Evaluation Rev., August, 2022

REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets.
Int. J. Comput. Vis., 2022

Leakage and the Reproducibility Crisis in ML-based Science.
CoRR, 2022

Password policies of most top websites fail to follow best practices.
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022

Vivisecting mobility management in 5G cellular networks.
Proceedings of the SIGCOMM '22: ACM SIGCOMM 2022 Conference, Amsterdam, The Netherlands, August 22, 2022

Vues: practical mobile volumetric video streaming through multiview transcoding.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

A Comparative Measurement Study of Commercial 5G mmWave Deployments.
Proceedings of the IEEE INFOCOM 2022, 2022

Resurrecting Address Clustering in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2022

How Algorithms Shape the Distribution of Political Advertising: Case Studies of Facebook, Google, and TikTok.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022

The Worst of Both Worlds: A Comparative Analysis of Errors in Learning from Data in Psychology and Machine Learning.
Proceedings of the AIES '22: AAAI/ACM Conference on AI, Ethics, and Society, Oxford, United Kingdom, May 19, 2022

2021
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union).
CoRR, 2021

Simulation as Experiment: An Empirical Critique of Simulation Research on Recommender Systems.
CoRR, 2021

T-RECS: A Simulation Tool to Study the Societal Impact of Recommender Systems.
CoRR, 2021

Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

Case for 5G-aware video streaming applications.
Proceedings of the 5G-MeMU '21: Proceedings of the 1st Workshop on 5G Measurements, 2021

A variegated look at 5G in the wild: performance, power, and QoE implications.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021

Mitigating dataset harms requires stewardship: Lessons from 1000 papers.
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021

Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States.
Proceedings of the APWG Symposium on Electronic Crime Research, 2021

The Ethics of Datasets: Moving Forward Requires Stepping Back.
Proceedings of the AIES '21: AAAI/ACM Conference on AI, 2021

2020
Dark Patterns: Past, Present, and Future.
ACM Queue, 2020

No boundaries: data exfiltration by third parties embedded on web pages.
Proc. Priv. Enhancing Technol., 2020

Virtual Classrooms and Real Harms.
CoRR, 2020

ViBE: A Tool for Measuring and Mitigating Bias in Image Datasets.
CoRR, 2020

A First Look at Commercial 5G Performance on Smartphones.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

BlockSci: Design and applications of a blockchain analysis platform.
Proceedings of the 29th USENIX Security Symposium, 2020

An Empirical Study of Wireless Carrier Authentication for SIM Swaps.
Proceedings of the Sixteenth Symposium on Usable Privacy and Security, 2020

5G tracker: a crowdsourced platform to enable research using commercial 5g services.
Proceedings of the SIGCOMM '20: ACM SIGCOMM 2020 Conference, 2020

NFV Performance Profiling on Multi-core Servers.
Proceedings of the 2020 IFIP Networking Conference, 2020

Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets.
Proceedings of the Computer Vision - ECCV 2020, 2020

2019
Mining latent patterns in geoMobile data via EPIC.
World Wide Web, 2019

Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping.
Proc. Priv. Enhancing Technol., 2019

Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites.
Proc. ACM Hum. Comput. Interact., 2019

A First Measurement Study of Commercial mmWave 5G Performance on Smartphones.
CoRR, 2019

Formal Barriers to Longest-Chain Proof-of-Stake Protocols.
Proceedings of the 2019 ACM Conference on Economics and Computation, 2019

Towards a Scalable, Flexible and High Performance NFV Execution Model.
Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, 2019

Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

A Closer Look at NFV Execution Models.
Proceedings of the 3rd Asia-Pacific Workshop on Networking, 2019

2018
An Empirical Analysis of Traceability in the Monero Blockchain.
Proc. Priv. Enhancing Technol., 2018

When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies.
Proc. Priv. Enhancing Technol., 2018

I never signed up for this! Privacy implications of email tracking.
Proc. Priv. Enhancing Technol., 2018

Endorsements on Social Media: An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest.
Proc. ACM Hum. Comput. Interact., 2018

Privacy, ethics, and data access: A case study of the Fragile Families Challenge.
CoRR, 2018

An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest.
CoRR, 2018

Making content caching policies 'smart' using the deepcache framework.
Comput. Commun. Rev., 2018

Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

DeepCache: A Deep Learning Based Framework For Content Caching.
Proceedings of the 2018 Workshop on Network Meets AI & ML, 2018

Web-based Attacks to Discover and Control Local IoT Devices.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

Blockchains: Past, Present, and Future.
Proceedings of the 37th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2018

When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

OpenCDN: An ICN-based open content distribution system using distributed actor model.
Proceedings of the IEEE INFOCOM 2018, 2018

2017
Bitcoin's Academic Pedigree.
ACM Queue, 2017

Ten simple rules for responsible big data research.
PLoS Comput. Biol., 2017

Online Privacy and Web Transparency (Dagstuhl Seminar 17162).
Dagstuhl Reports, 2017

BlockSci: Design and applications of a blockchain analysis platform.
CoRR, 2017

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic.
CoRR, 2017

The Future of Ad Blocking: An Analytical Framework and New Techniques.
CoRR, 2017

Obfuscation in Bitcoin: Techniques and Politics.
CoRR, 2017

An Empirical Analysis of Linkability in the Monero Blockchain.
CoRR, 2017

De-anonymizing Web Browsing Data with Social Networks.
Proceedings of the 26th International Conference on World Wide Web, 2017

Multi-low-rank Approximation for Traffic Matrices.
Proceedings of the 29th International Teletraffic Congress, 2017

Battery Status Not Included: Assessing Privacy in Web Standards.
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, 2017

BIG Cache Abstraction for Cache Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning.
ACM Queue, 2016

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security.
IACR Cryptol. ePrint Arch., 2016

Semantics derived automatically from language corpora necessarily contain human biases.
CoRR, 2016

Position estimation of robotic mobile nodes in wireless testbed using GENI.
Proceedings of the Annual IEEE Systems Conference, 2016

Mining Spatial-Temporal <i>geoMobile</i> Data via Feature Distributional Similarity Graph.
Proceedings of the First Workshop on Mobile Data, 2016

Most Calls Are Local (But Some Are Regional): Dissecting Cellular Communication Patterns.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Online Tracking: A 1-million-site Measurement and Analysis.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

On the Instability of Bitcoin Without the Block Reward.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction.
Princeton University Press, ISBN: 978-0-691-17169-2, 2016

2015
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2015

Cookies That Give You Away: The Surveillance Implications of Web Tracking.
Proceedings of the 24th International Conference on World Wide Web, 2015

An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

De-anonymizing Programmers via Code Stylometry.
Proceedings of the 24th USENIX Security Symposium, 2015

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

CONIA: Content (provider)-oriented, namespace-independent architecture for multimedia information delivery.
Proceedings of the 2015 IEEE International Conference on Multimedia & Expo Workshops, 2015

2014
Mixcoin: Anonymity for Bitcoin with accountable mixes.
IACR Cryptol. ePrint Arch., 2014

Why software engineering courses should include ethics coverage.
Commun. ACM, 2014

The Web Never Forgets: Persistent Tracking Mechanisms in the Wild.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
What Happened to the Crypto Dream?, Part 2.
IEEE Secur. Priv., 2013

What Happened to the Crypto Dream?, Part 1.
IEEE Secur. Priv., 2013

Routes for breaching and protecting genetic privacy.
CoRR, 2013

A Scanner Darkly: Protecting User Privacy from Perceptual Applications.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
33 Bits of Entropy: Myths and Fallacies of "Personally Identifiable Information".
Adv. Math. Commun., 2012

A Critical Look at Decentralized Personal Data Architectures
CoRR, 2012

On the Feasibility of Internet-Scale Author Identification.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

2011
"You Might Also Like: " Privacy Risks of Collaborative Filtering.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Location Privacy via Private Proximity Testing.
Proceedings of the Network and Distributed System Security Symposium, 2011

Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

2010
Myths and fallacies of "personally identifiable information".
Commun. ACM, 2010

Adnostic: Privacy Preserving Targeted Advertising.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
De-anonymizing Social Networks.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Robust De-anonymization of Large Sparse Datasets.
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008

2006
Perfectly Reliable Message Transmission.
Inf. Process. Lett., 2006

On the Limits of Point Function Obfuscation.
IACR Cryptol. ePrint Arch., 2006

How To Break Anonymity of the Netflix Prize Dataset
CoRR, 2006

2005
Fast dictionary attacks on passwords using time-space tradeoff.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Obfuscated databases and group privacy.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Optimal Perfectly Secure Message Transmission.
Proceedings of the Advances in Cryptology, 2004

2003
On the Power of Computational Secret Sharing.
Proceedings of the Progress in Cryptology, 2003

Practical Pay TV Schemes.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...