Carl A. Gunter
Orcid: 0009-0006-6943-0684Affiliations:
- University of Illinois, Urbana-Champaign, IL, USA
- University of Pennsylvania, Philadelphia, PA, USA
According to our database1,
Carl A. Gunter
authored at least 180 papers
between 1985 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Nineteenth Symposium on Usable Privacy and Security, 2023
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
CoRR, 2022
2021
Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection.
CoRR, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
G-PATE: Scalable Differentially Private Data Generator via Private Aggregation of Teacher Discriminators.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security.
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
WSEmail: A Retrospective on a System for Secure Internet Messaging Based on Web Services.
CoRR, 2019
BEEER: distributed record and replay for medical devices in hospital operating rooms.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud.
IEEE J. Sel. Top. Signal Process., 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be.
CoRR, 2017
Guardian of the HAN: Thwarting Mobile Attacks on Smart-Home Devices Using OS-level Situation Awareness.
CoRR, 2017
HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Towards Mobile Query Auto-Completion: An Efficient Mobile Application-Aware Approach.
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Building bridges across electronic health record systems through inferred phenotypic topics.
J. Biomed. Informatics, 2015
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System.
J. Am. Medical Informatics Assoc., 2015
Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware.
Proceedings of the Logic, Rewriting, and Concurrency, 2015
Proceedings of the 6th ACM Conference on Bioinformatics, 2015
Proceedings of the AMIA 2015, 2015
2014
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014
Inside Job: Understanding and Mitigating the Threat of External Device Mis-Binding on Android.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 17th International Conference on Extending Database Technology, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Decide Now or Decide Later?: Quantifying the Tradeoff between Prospective and Retrospective Access Decisions.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 5th ACM Conference on Bioinformatics, 2014
Proceedings of the 5th ACM Conference on Bioinformatics, 2014
2013
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits.
ACM Trans. Manag. Inf. Syst., 2013
Proceedings of the 2013 USENIX Workshop on Health Information Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013
Identity, location, disease and more: inferring your secrets from android public resources.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Adaptive Selective Verification: An Efficient Adaptive Countermeasure to Thwart DoS Attacks.
IEEE/ACM Trans. Netw., 2012
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012
2011
Int. J. Secur. Networks, 2011
Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems.
IEEE Secur. Priv., 2011
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011
Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010
Proceedings of the 2010 Workshop on the Economics of Networks, Systems, and Computation, 2010
Proceedings of the 9th International Conference on Information Processing in Sensor Networks, 2010
2009
IEEE J. Sel. Areas Commun., 2009
Proceedings of the IEEE International Conference on Systems, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the 2nd ACM Workshop on Assurable and Usable Security Configuration, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers.
Proceedings of the POLICY 2009, 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009
Proceedings of the Computer Security, 2009
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the Third International Workshop on Security and Rewriting Techniques, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008
Proceedings of the Formal Methods for Open Object-Based Distributed Systems, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008
2007
IEEE Trans. Mob. Comput., 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
PolicyMorph: interactive policy transformations for a logical attribute-based access control framework.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 6th ACM Workshop on Hot Topics in Networks, 2007
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the Service-Oriented Computing, 2006
Proceedings of the Fourth IEEE European Conference on Web Services (ECOWS 2006), 2006
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
Proceedings of the 45th IEEE Conference on Decision and Control, 2006
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005
2004
Proceedings of the Privacy Enhancing Technologies, 4th International Workshop, 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the EMSOFT 2004, 2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
2003
2002
Proceedings of the Runtime Verification 2002, 2002
Proceedings of the Foundations of Information Technology in the Era of Networking and Mobile Computing, 2002
Proceedings of the International Conference on Compilers, 2002
2001
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001
Proceedings of the 34th Annual Hawaii International Conference on System Sciences (HICSS-34), 2001
2000
ACM Trans. Softw. Eng. Methodol., 2000
Proceedings of the Theorem Proving in Higher Order Logics, 13th International Conference, 2000
Proceedings of the Active Networks, Second International Working Conference, 2000
Proceedings of the 4th International Conference on Requirements Engineering, 2000
Specification and Formal Analysis of a PLAN Algorithm in Maude.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000
Proceedings of the Third Workshop on Formal Methods in Software Practice, 2000
1999
Proceedings of the Third Workshop on Higher-Order Operational Techniques in Semantics, 1999
Proceedings of the Proceedings IEEE INFOCOM '99, 1999
1998
Proceedings of the Theorem Proving in Higher Order Logics, 11th International Conference, 1998
Proceedings of the third ACM SIGPLAN International Conference on Functional Programming (ICFP '98), 1998
Proceedings of the Internet Programming Languages, 1998
1997
Artif. Intell., 1997
1996
J. Funct. Program., 1996
ACM Comput. Surv., 1996
1995
Proceedings of the seventh international conference on Functional programming languages and computer architecture, 1995
1993
Inf. Comput., December, 1993
Proceedings of the Current Trends in Theoretical Computer Science - Essays and Tutorials, 1993
Semantics of programming languages - structures and techniques.
Foundations of computing, MIT Press, ISBN: 978-0-262-07143-7, 1993
1992
Proceedings of the Conference on Lisp and Functional Programming, 1992
Proceedings of the Automated Deduction, 1992
1991
Forms of Semantic Specification.
Bull. EATCS, 1991
Proceedings of the Theoretical Aspects of Computer Software, 1991
Proceedings of the 9th National Conference on Artificial Intelligence, 1991
1990
Relating Total and Partial Correctness Interpretations of Non-Deterministic Programs.
Proceedings of the Conference Record of the Seventeenth Annual ACM Symposium on Principles of Programming Languages, 1990
Proceedings of the Fifth Annual Symposium on Logic in Computer Science (LICS '90), 1990
Proceedings of the 1990 ACM Conference on LISP and Functional Programming, 1990
1989
Proceedings of the Fourth Annual Symposium on Logic in Computer Science (LICS '89), 1989
1988
Proceedings of the Third Annual Symposium on Logic in Computer Science (LICS '88), 1988
1987
Proceedings of the Mathematical Foundations of Programming Language Semantics, 1987
1986
The Largest First-Order-Axiomatizable Cartesian Closed Category of Domains
Proceedings of the Symposium on Logic in Computer Science (LICS '86), 1986
1985
Proceedings of the Mathematical Foundations of Programming Semantics, 1985