Suresh Chari
According to our database1,
Suresh Chari
authored at least 48 papers
between 1992 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform.
IEEE Trans. Big Data, 2021
2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the First IEEE International Conference on Trust, 2019
2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016
IBM J. Res. Dev., 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
Android malware development on public malware scanning platforms: A large-scale data-driven study.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016
2015
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users.
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
PAKDD'12 best paper: generating balanced classifier-independent training samples from unlabeled data.
Knowl. Inf. Syst., 2014
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
IBM POWER7+ processor on-chip accelerators for cryptography and active memory expansion.
IBM J. Res. Dev., 2013
DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements.
CoRR, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
2012
Generative models for access control policies: applications to role mining over logs with attribution.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012
2011
IACR Cryptol. ePrint Arch., 2011
System for automatic estimation of data sensitivity with applications to access control and other applications.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2011
2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the Smart Card Research and Advanced Application, 2010
2008
Proceedings of the 17th International Conference on World Wide Web, 2008
2007
Improving the resilience of content distribution networks to large scale distributed denial of service attacks.
Comput. Networks, 2007
2005
Proceedings of IEEE International Conference on Communications, 2005
2003
ACM Trans. Inf. Syst. Secur., 2003
2002
Proceedings of the Computer Security, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2001
Proceedings of the E-Commerce Agents, 2001
2000
J. Comput. Syst. Sci., 2000
1999
Proceedings of the Advances in Cryptology, 1999
1996
1995
Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems.
SIAM J. Comput., 1995
Random Struct. Algorithms, 1995
1994
Randomness as a Computational Resource: Issues in Efficient Computation.
PhD thesis, 1994
Improved algorithms via approximations of probability distributions (extended abstract).
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994
Proceedings of the Algorithms and Complexity, Second Italian Conference, 1994
1993
Proceedings of the Current Trends in Theoretical Computer Science - Essays and Tutorials, 1993
1992
Relativization: a revisionistic retrospective.
Bull. EATCS, 1992
Proceedings of the Mathematical Foundations of Computer Science 1992, 1992