Ashish Gehani
Orcid: 0000-0002-3940-2467
According to our database1,
Ashish Gehani
authored at least 89 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, 2024
Proceedings of the 2024 Workshop on Forming an Ecosystem Around Software Transformation, 2024
Proceedings of the 24th IEEE International Symposium on Cluster, 2024
2023
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning.
IEEE Trans. Software Eng., April, 2023
OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-Program Specialization.
Commun. ACM, 2023
IOSPReD: I/O Specialized Packaging of Reduced Datasets and Data-Intensive Applications for Efficient Reproducibility.
IEEE Access, 2023
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023
Proceedings of the IEEE Secure Development Conference, 2023
Proceedings of the IEEE Secure Development Conference, 2023
Proceedings of the Critical Infrastructure Protection XVII, 2023
SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions.
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
IEEE Trans. Software Eng., 2022
OCCAM-v2: Combining Static and Dynamic Analysis for Effective and Efficient Whole-program Specialization: Leveraging scalable pointer analysis, value analysis, and dynamic analysis.
ACM Queue, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the IEEE International Conference on Cloud Engineering, 2022
Proceedings of the 29th IEEE International Conference on High Performance Computing, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
ACM Queue, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 13th International Workshop on Theory and Practice of Provenance, 2021
ALchemist: Fusing Application and Audit Logs for Precise Attack Provenance without Instrumentation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020
Proceedings of the 12th International Workshop on Theory and Practice of Provenance, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2020
Proceedings of the 3rd International Workshop on Practical Reproducible Evaluation of Computer Systems, 2020
2019
Proceedings of the 11th International Workshop on Theory and Practice of Provenance, 2019
Proceedings of the 20th International Middleware Conference, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018
Proceedings of the Provenance and Annotation of Data and Processes, 2018
Proceedings of the Formal Methods for Industrial Critical Systems, 2018
Proceedings of the Fourth IEEE International Conference on Big Data Computing Service and Applications, 2018
2017
Dagstuhl Manifestos, 2017
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
2016
Proceedings of the 8th USENIX Workshop on the Theory and Practice of Provenance, 2016
Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, 2016
Proceedings of the Provenance and Annotation of Data and Processes, 2016
Energy efficient, context-aware cache coding for mobile information-centric networks.
Proceedings of the 10th ACM International Conference on Distributed and Event-based Systems, 2016
2015
Proceedings of the Security and Privacy in Communication Networks, 2015
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Proceedings of the Logic, Rewriting, and Concurrency, 2015
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the 6th Workshop on the Theory and Practice of Provenance, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the 5th Workshop on the Theory and Practice of Provenance, 2013
Proceedings of the 5th Workshop on the Theory and Practice of Provenance, 2013
Maximizing availability of content in disruptive environments by cross-layer optimization.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013
ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge.
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
Proceedings of the 4th Workshop on the Theory and Practice of Provenance, 2012
Proceedings of the Middleware 2012, 2012
2011
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the POLICY 2011, 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the Formal Modeling: Actors, Open Systems, Biological Systems, 2011
2010
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Policy-Based Data Downgrading: Toward a Semantic Framework and Automated Tools to Balance Need-to-Protect and Need-to-Share Policies.
Proceedings of the POLICY 2010, 2010
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010
Mendel: efficiently verifying the lineage of data modified in multiple trust domains.
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010
Proceedings of the 2010 11th IEEE/ACM International Conference on Grid Computing, 2010
Proceedings of the Sixth International Conference on e-Science, 2010
2009
Proceedings of the Advances in Digital Forensics V, 2009
Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007
Proceedings of the Advances in Digital Forensics III, 2007
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Augmenting storage with an intrusion response primitive to ensure the security of critical data.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Proceedings of the Recent Advances in Intrusion Detection: 7th International Symposium, 2004