Somesh Jha
Orcid: 0000-0001-5877-0436Affiliations:
- University of Wisconsin-Madison, Madison, USA
According to our database1,
Somesh Jha
authored at least 306 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2016, "For contributions to verification, programming languages, and software engineering".
IEEE Fellow
IEEE Fellow 2018, "For contributions to the application of formal methods to security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.wisc.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Trans. Cyber Phys. Syst., April, 2024
Trans. Mach. Learn. Res., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Functional Homotopy: Smoothing Discrete Optimization via Continuous Parameters for LLM Jailbreak Attacks.
CoRR, 2024
MALADE: Orchestration of LLM-powered Agents with Retrieval Augmented Generation for Pharmacovigilance.
CoRR, 2024
Mechanistically Interpreting a Transformer-based 2-SAT Solver: An Axiomatic Approach.
CoRR, 2024
A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems.
CoRR, 2024
CoRR, 2024
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024
Two Heads are Actually Better than One: Towards Better Adversarial Robustness via Transduction and Rejection.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Do Large Code Models Understand Programming Concepts? Counterfactual Analysis for Code Predicates.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
On the Scalability and Memory Efficiency of Semidefinite Programs for Lipschitz Constant Estimation of Neural Networks.
Proceedings of the Twelfth International Conference on Learning Representations, 2024
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
2023
autoMPI: Automated Multiple Perspective Attack Investigation With Semantics Aware Execution Partitioning.
IEEE Trans. Software Eng., April, 2023
ACM Trans. Cyber Phys. Syst., January, 2023
Proc. Priv. Enhancing Technol., January, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Found. Trends Priv. Secur., 2023
CoRR, 2023
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks.
CoRR, 2023
Pareto-Secure Machine Learning (PSML): Fingerprinting and Securing Inference Serving Systems.
CoRR, 2023
Two Heads are Better than One: Towards Better Adversarial Robustness by Combining Transduction and Rejection.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Less is More: Dimension Reduction Finds On-Manifold Adversarial Examples in Hard-Label Attacks.
Proceedings of the 2023 IEEE Conference on Secure and Trustworthy Machine Learning, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the International Conference on Machine Learning, 2023
The Trade-off between Universality and Label Efficiency of Representations from Contrastive Learning.
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
2022
Dagstuhl Reports, July, 2022
Formal Methods Syst. Des., 2022
Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing.
CoRR, 2022
Optimal Membership Inference Bounds for Adaptive Composition of Sampled Gaussian Mechanisms.
CoRR, 2022
Using Illustrations to Communicate Differential Privacy Trust Models: An Investigation of Users' Comprehension, Perception, and Data Sharing Decision.
CoRR, 2022
Proceedings of the IEEE International Conference on Software Analysis, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Domain Adaptation for Autoencoder-Based End-to-End Communication Over Wireless Channels.
CoRR, 2021
Hard-label Manifolds: Unexpected Advantages of Query Efficiency for Finding On-manifold Adversarial Examples.
CoRR, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Detecting Errors and Estimating Accuracy on Unlabeled Data with Self-training Ensembles.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proc. VLDB Endow., 2020
Overfitting, robustness, and malicious algorithms: A study of potential causes of privacy risk in machine learning.
J. Comput. Secur., 2020
CoRR, 2020
CoRR, 2020
Detecting Anomalous Inputs to DNN Classifiers By Joint Statistical Testing at the Layers.
CoRR, 2020
CoRR, 2020
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Towards Effective Differential Privacy Communication for Users' Data Sharing Decision and Comprehension.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 International Conference on Management of Data, 2020
Proceedings of the 37th International Conference on Machine Learning, 2020
Proceedings of the 37th International Conference on Machine Learning, 2020
Data-Dependent Differentially Private Parameter Learning for Directed Graphical Models.
Proceedings of the 37th International Conference on Machine Learning, 2020
Proceedings of the 8th International Conference on Learning Representations, 2020
Proceedings of the Algorithmic Learning Theory, 2020
2019
CoRR, 2019
Proceedings of the 2019 International Conference on Management of Data, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Towards Understanding Limitations of Pixel Discretization Against Adversarial Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
2018
Proceedings of the 2018 USENIX Annual Technical Conference, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018
Proceedings of the 2018 International Conference on Management of Data, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice, 2018
Proceedings of the 35th International Conference on Machine Learning, 2018
Reinforcing Adversarial Robustness using Model Confidence Induced by Adversarial Training.
Proceedings of the 35th International Conference on Machine Learning, 2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Bolt-on Differential Privacy for Scalable Stochastic Gradient Descent-based Analytics.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 12th International Conference on Malicious and Unwanted Software, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Secure Integration of Web Content and Applications on Commodity Mobile Operating Systems.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
IEEE Trans. Software Eng., 2016
Practical Black-Box Attacks against Deep Learning Systems using Adversarial Examples.
CoRR, 2016
CoRR, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Combining static analysis with probabilistic models to enable market-scale Android inter-component analysis.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
2015
Revisiting Differentially Private Regression: Lessons From Learning Theory and their Consequences.
CoRR, 2015
Composite Constant Propagation: Application to Android Inter-Component Communication Analysis.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Secure computations on non-integer values with applications to privacy-preserving sequence analysis.
Inf. Secur. Tech. Rep., 2013
Effective Inter-Component Communication Mapping in Android: An Essential Step Towards Holistic Security Analysis.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Formal Methods in Computer-Aided Design, 2013
Proceedings of the Design, Automation and Test in Europe, 2013
Proceedings of the Computer Aided Verification - 25th International Conference, 2013
2012
ACM Trans. Inf. Syst. Secur., 2012
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012
Proceedings of the 49th Annual Design Automation Conference 2012, 2012
Proceedings of the Computer Aided Verification - 24th International Conference, 2012
Efficient Runtime Policy Enforcement Using Counterexample-Guided Abstraction Refinement.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012
2011
Proceedings of the Moving Target Defense, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the Automated Deduction - CADE-23 - 23rd International Conference on Automated Deduction, Wroclaw, Poland, July 31, 2011
2010
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02334-7, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
ACM Trans. Internet Techn., 2010
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Programming Languages and Systems, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Computer Aided Verification, 22nd International Conference, 2010
Design and implementation of the PLUG architecture for programmable and efficient network lookups.
Proceedings of the 19th International Conference on Parallel Architectures and Compilation Techniques, 2010
2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the FM 2009: Formal Methods, 2009
Proceedings of the Computer Security, 2009
2008
ACM Trans. Program. Lang. Syst., 2008
IEEE Trans. Dependable Secur. Comput., 2008
IEEE Trans. Dependable Secur. Comput., 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the 2008 IEEE Symposium on Security and Privacy (SP 2008), 2008
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008
Deflating the big bang: fast and scalable deep packet inspection with extended finite automata.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the Proceeding of the 1st Annual India Software Engineering Conference, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Recent Advances in Intrusion Detection, 9th International Symposium, 2006
Proceedings of the Computer Security, 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Weighted pushdown systems and their application to interprocedural dataflow analysis.
Sci. Comput. Program., 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005
Proceedings of the 27th International Conference on Software Engineering (ICSE 2005), 2005
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2004
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Int. J. Softw. Tools Technol. Transf., 2003
J. ACM, 2003
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
Integrating Publish/Subscribe into a Mobile Teamwork Support Platform.
Proceedings of the Fifteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2003), 2003
Weighted Pushdown Systems and Their Application to Interprocedural Dataflow Analysis.
Proceedings of the Static Analysis, 10th International Symposium, 2003
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the 11th USENIX Security Symposium, 2002
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002
Proceedings of the 17th IEEE Symposium on Logic in Computer Science (LICS 2002), 2002
Proceedings of the Foundations of Software Science and Computation Structures, 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
Proceedings of the 23rd International Conference on Software Engineering, 2001
Proceedings of the 23rd International Conference on Software Engineering, 2001
Proceedings of the 2001 IEEE/ACM International Conference on Computer-Aided Design, 2001
Proceedings of the Informatics - 10 Years Back. 10 Years Ahead., 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the Correct Hardware Design and Verification Methods, 2001
2000
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
Proceedings of the Computer Aided Verification, 12th International Conference, 2000
Model checking algorithms for the µ-calculus.
Proceedings of the Proof, Language, and Interaction, Essays in Honour of Robin Milner, 2000
1999
Generalized Stuttering Equivalence.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Proceedings of the Correct Hardware Design and Verification Methods, 1999
1998
Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications.
ACM Trans. Program. Lang. Syst., 1998
Formal Aspects Comput., 1998
IEEE Commun. Mag., 1998
Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 1998
Using state space exploration and a natural deduction style message derivation engine to verify security protocols.
Proceedings of the Programming Concepts and Methods, 1998
Proceedings of the Third International Conference on Multiagent Systems, 1998
Proceedings of the Cooperative Information Agents II, 1998
Proceedings of the Computer Aided Verification, 10th International Conference, 1998
Proceedings of the Intelligent Agents V, 1998
Proceedings of the Second International Conference on Autonomous Agents, 1998
Proceedings of the Second International Conference on Autonomous Agents, 1998
1997
Theor. Comput. Sci., 1997
Proceedings of the Tools and Algorithms for Construction and Analysis of Systems, 1997
Proceedings of the Proceedings 1997 International Conference on Computer Design: VLSI in Computers & Processors, 1997
Proceedings of the Intelligent Agents IV, 1997
1996
Formal Methods Syst. Des., 1996
Proceedings of the Fourth ACM SIGSOFT Symposium on Foundations of Software Engineering, 1996
Proceedings of the Conference Record of POPL'96: The 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 1996
1995
Formal Methods Syst. Des., 1995
Proceedings of the CONCUR '95: Concurrency Theory, 1995
Proceedings of the Computer Science Today: Recent Trends and Developments, 1995
1993
Proceedings of the Computer Aided Verification, 5th International Conference, 1993
1992
Oper. Res. Lett., 1992