default search action
Arvind Narayanan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Arvind Narayanan, Mahesh K. Marina, Vijay Gopalakrishnan:
Special Issue on 6G Technologies and Applications. IEEE Internet Comput. 28(2): 6-7 (2024) - [c66]Sayash Kapoor, Rishi Bommasani, Kevin Klyman, Shayne Longpre, Ashwin Ramaswami, Peter Cihon, Aspen K. Hopkins, Kevin Bankston, Stella Biderman, Miranda Bogen, Rumman Chowdhury, Alex Engler, Peter Henderson, Yacine Jernite, Seth Lazar, Stefano Maffulli, Alondra Nelson, Joelle Pineau, Aviya Skowron, Dawn Song, Victor Storchan, Daniel Zhang, Daniel E. Ho, Percy Liang, Arvind Narayanan:
Position: On the Societal Impact of Open Foundation Models. ICML 2024 - [c65]Shayne Longpre, Sayash Kapoor, Kevin Klyman, Ashwin Ramaswami, Rishi Bommasani, Borhane Blili-Hamelin, Yangsibo Huang, Aviya Skowron, Zheng Xin Yong, Suhas Kotha, Yi Zeng, Weiyan Shi, Xianjun Yang, Reid Southen, Alexander Robey, Patrick Chao, Diyi Yang, Ruoxi Jia, Daniel Kang, Sandy Pentland, Arvind Narayanan, Percy Liang, Peter Henderson:
Position: A Safe Harbor for AI Evaluation and Red Teaming. ICML 2024 - [i49]Sayash Kapoor, Peter Henderson, Arvind Narayanan:
Promises and pitfalls of artificial intelligence for legal applications. CoRR abs/2402.01656 (2024) - [i48]Rishi Bommasani, Kevin Klyman, Shayne Longpre, Betty Xiong, Sayash Kapoor, Nestor Maslej, Arvind Narayanan, Percy Liang:
Foundation Model Transparency Reports. CoRR abs/2402.16268 (2024) - [i47]Shayne Longpre, Sayash Kapoor, Kevin Klyman, Ashwin Ramaswami, Rishi Bommasani, Borhane Blili-Hamelin, Yangsibo Huang, Aviya Skowron, Zheng Xin Yong, Suhas Kotha, Yi Zeng, Weiyan Shi, Xianjun Yang, Reid Southen, Alexander Robey, Patrick Chao, Diyi Yang, Ruoxi Jia, Daniel Kang, Sandy Pentland, Arvind Narayanan, Percy Liang, Peter Henderson:
A Safe Harbor for AI Evaluation and Red Teaming. CoRR abs/2403.04893 (2024) - [i46]Sayash Kapoor, Rishi Bommasani, Kevin Klyman, Shayne Longpre, Ashwin Ramaswami, Peter Cihon, Aspen K. Hopkins, Kevin Bankston, Stella Biderman, Miranda Bogen, Rumman Chowdhury, Alex Engler, Peter Henderson, Yacine Jernite, Seth Lazar, Stefano Maffulli, Alondra Nelson, Joelle Pineau, Aviya Skowron, Dawn Song, Victor Storchan, Daniel Zhang, Daniel E. Ho, Percy Liang, Arvind Narayanan:
On the Societal Impact of Open Foundation Models. CoRR abs/2403.07918 (2024) - [i45]Xiangyu Qi, Yangsibo Huang, Yi Zeng, Edoardo Debenedetti, Jonas Geiping, Luxi He, Kaixuan Huang, Udari Madhushani, Vikash Sehwag, Weijia Shi, Boyi Wei, Tinghao Xie, Danqi Chen, Pin-Yu Chen, Jeffrey Ding, Ruoxi Jia, Jiaqi Ma, Arvind Narayanan, Weijie J. Su, Mengdi Wang, Chaowei Xiao, Bo Li, Dawn Song, Peter Henderson, Prateek Mittal:
AI Risk Management Should Incorporate Both Safety and Security. CoRR abs/2405.19524 (2024) - [i44]Shayne Longpre, Stella Biderman, Alon Albalak, Hailey Schoelkopf, Daniel McDuff, Sayash Kapoor, Kevin Klyman, Kyle Lo, Gabriel Ilharco, Nay San, Maribeth Rauh, Aviya Skowron, Bertie Vidgen, Laura Weidinger, Arvind Narayanan, Victor Sanh, David Ifeoluwa Adelani, Percy Liang, Rishi Bommasani, Peter Henderson, Sasha Luccioni, Yacine Jernite, Luca Soldaini:
The Responsible Foundation Model Development Cheatsheet: A Review of Tools & Resources. CoRR abs/2406.16746 (2024) - [i43]Sayash Kapoor, Benedikt Stroebl, Zachary S. Siegel, Nitya Nadgir, Arvind Narayanan:
AI Agents That Matter. CoRR abs/2407.01502 (2024) - [i42]Zachary S. Siegel, Sayash Kapoor, Nitya Nagdir, Benedikt Stroebl, Arvind Narayanan:
CORE-Bench: Fostering the Credibility of Published Research Through a Computational Reproducibility Agent Benchmark. CoRR abs/2409.11363 (2024) - 2023
- [j26]Arunesh Mathur, Angelina Wang, Carsten Schwemmer, Maia Hamin, Brandon M. Stewart, Arvind Narayanan:
Manipulative tactics are the norm in political emails: Evidence from 300K emails from the 2020 US election cycle. Big Data Soc. 10(1): 205395172211453 (2023) - [j25]Arvind Narayanan, Kevin Lee:
Security Policy Audits: Why and How. IEEE Secur. Priv. 21(2): 77-81 (2023) - [j24]Sayash Kapoor, Arvind Narayanan:
Leakage and the reproducibility crisis in machine-learning-based science. Patterns 4(9): 100804 (2023) - [c64]Angelina Wang, Sayash Kapoor, Solon Barocas, Arvind Narayanan:
Against Predictive Optimization: On the Legitimacy of Decision-Making Algorithms that Optimize Predictive Accuracy. FAccT 2023: 626 - [c63]Rostand A. K. Fezeu, Eman Ramadan, Wei Ye, Benjamin Minneci, Jack Xie, Arvind Narayanan, Ahmad Hassan, Feng Qian, Zhi-Li Zhang, Jaideep Chandrashekar, Myungjin Lee:
An In-Depth Measurement Analysis of 5G mmWave PHY Latency and Its Impact on End-to-End Delay. PAM 2023: 284-312 - [i41]Arvind Narayanan:
A semi-automatic method for document classification in the shipping industry. CoRR abs/2305.06148 (2023) - [i40]Sayash Kapoor, Emily Cantrell, Kenny Peng, Thanh Hien Pham, Christopher A. Bail, Odd Erik Gundersen, Jake M. Hofman, Jessica Hullman, Michael A. Lones, Momin M. Malik, Priyanka Nanayakkara, Russell A. Poldrack, Inioluwa Deborah Raji, Michael Roberts, Matthew J. Salganik, Marta Serra-Garcia, Brandon M. Stewart, Gilles Vandewiele, Arvind Narayanan:
REFORMS: Reporting Standards for Machine Learning Based Science. CoRR abs/2308.07832 (2023) - 2022
- [j23]Angelina Wang, Alexander Liu, Ryan Zhang, Anat Kleiman, Leslie Kim, Dora Zhao, Iroha Shirai, Arvind Narayanan, Olga Russakovsky:
REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets. Int. J. Comput. Vis. 130(7): 1790-1810 (2022) - [j22]Ziyan Wu, Tianming Cui, Arvind Narayanan, Yang Zhang, Kangjie Lu, Antonia Zhai, Zhi-Li Zhang:
GranularNF: Granular Decomposition of Stateful NFV at 100 Gbps Line Speed and Beyond. SIGMETRICS Perform. Evaluation Rev. 50(2): 46-51 (2022) - [c62]Jessica Hullman, Sayash Kapoor, Priyanka Nanayakkara, Andrew Gelman, Arvind Narayanan:
The Worst of Both Worlds: A Comparative Analysis of Errors in Learning from Data in Psychology and Machine Learning. AIES 2022: 335-348 - [c61]Orestis Papakyriakopoulos, Christelle Tessono, Arvind Narayanan, Mihir Kshirsagar:
How Algorithms Shape the Distribution of Political Advertising: Case Studies of Facebook, Google, and TikTok. AIES 2022: 532-546 - [c60]Malte Möser, Arvind Narayanan:
Resurrecting Address Clustering in Bitcoin. Financial Cryptography 2022: 386-403 - [c59]Arvind Narayanan, Muhammad Iqbal Rochman, Ahmad Hassan, Bariq S. Firmansyah, Vanlin Sathya, Monisha Ghosh, Feng Qian, Zhi-Li Zhang:
A Comparative Measurement Study of Commercial 5G mmWave Deployments. INFOCOM 2022: 800-809 - [c58]Yu Liu, Bo Han, Feng Qian, Arvind Narayanan, Zhi-Li Zhang:
Vues: practical mobile volumetric video streaming through multiview transcoding. MobiCom 2022: 514-527 - [c57]Ahmad Hassan, Arvind Narayanan, Anlan Zhang, Wei Ye, Ruiyang Zhu, Shuowei Jin, Jason Carpenter, Z. Morley Mao, Feng Qian, Zhi-Li Zhang:
Vivisecting mobility management in 5G cellular networks. SIGCOMM 2022: 86-100 - [c56]Kevin Lee, Sten Sjöberg, Arvind Narayanan:
Password policies of most top websites fail to follow best practices. SOUPS @ USENIX Security Symposium 2022: 561-580 - [i39]Jessica Hullman, Sayash Kapoor, Priyanka Nanayakkara, Andrew Gelman, Arvind Narayanan:
The worst of both worlds: A comparative analysis of errors in learning from data in psychology and machine learning. CoRR abs/2203.06498 (2022) - [i38]Orestis Papakyriakopoulos, Christelle Tessono, Arvind Narayanan, Mihir Kshirsagar:
How Algorithms Shape the Distribution of Political Advertising: Case Studies of Facebook, Google, and TikTok. CoRR abs/2206.04720 (2022) - [i37]Sayash Kapoor, Arvind Narayanan:
Leakage and the Reproducibility Crisis in ML-based Science. CoRR abs/2207.07048 (2022) - [i36]Arvind Narayanan, Kevin Lee:
Security policy audits: why and how. CoRR abs/2207.11306 (2022) - 2021
- [c55]Arvind Narayanan:
The Ethics of Datasets: Moving Forward Requires Stepping Back. AIES 2021: 1 - [c54]Kevin Lee, Arvind Narayanan:
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States. eCrime 2021: 1-17 - [c53]Kenneth Peng, Arunesh Mathur, Arvind Narayanan:
Mitigating dataset harms requires stewardship: Lessons from 1000 papers. NeurIPS Datasets and Benchmarks 2021 - [c52]Eman Ramadan, Arvind Narayanan, Udhaya Kumar Dayalan, Rostand A. K. Fezeu, Feng Qian, Zhi-Li Zhang:
Case for 5G-aware video streaming applications. 5G-MeMZ@SIGCOMM 2021: 27-34 - [c51]Arvind Narayanan, Xumiao Zhang, Ruiyang Zhu, Ahmad Hassan, Shuowei Jin, Xiao Zhu, Xiaoxuan Zhang, Denis Rybkin, Zhengxuan Yang, Zhuoqing Morley Mao, Feng Qian, Zhi-Li Zhang:
A variegated look at 5G in the wild: performance, power, and QoE implications. SIGCOMM 2021: 610-625 - [c50]Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, Madelyn Sanfilippo:
Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities. SOUPS @ USENIX Security Symposium 2021: 653-674 - [c49]Ryan Amos, Gunes Acar, Elena Lucherini, Mihir Kshirsagar, Arvind Narayanan, Jonathan R. Mayer:
Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset. WWW 2021: 2165-2176 - [i35]Malte Möser, Arvind Narayanan:
Resurrecting Address Clustering in Bitcoin. CoRR abs/2107.05749 (2021) - [i34]Eli Lucherini, Matthew Sun, Amy A. Winecoff, Arvind Narayanan:
T-RECS: A Simulation Tool to Study the Societal Impact of Recommender Systems. CoRR abs/2107.08959 (2021) - [i33]Amy A. Winecoff, Matthew Sun, Eli Lucherini, Arvind Narayanan:
Simulation as Experiment: An Empirical Critique of Simulation Research on Recommender Systems. CoRR abs/2107.14333 (2021) - [i32]Kenny Peng, Arunesh Mathur, Arvind Narayanan:
Mitigating dataset harms requires stewardship: Lessons from 1000 papers. CoRR abs/2108.02922 (2021) - [i31]Rob van Eijk, Hadi Asghari, Philipp Winter, Arvind Narayanan:
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union). CoRR abs/2110.09832 (2021) - 2020
- [j21]Arvind Narayanan, Arunesh Mathur, Marshini Chetty, Mihir Kshirsagar:
Dark patterns: past, present, and future. Commun. ACM 63(9): 42-47 (2020) - [j20]Gunes Acar, Steven Englehardt, Arvind Narayanan:
No boundaries: data exfiltration by third parties embedded on web pages. Proc. Priv. Enhancing Technol. 2020(4): 220-238 (2020) - [j19]Arvind Narayanan, Arunesh Mathur, Marshini Chetty, Mihir Kshirsagar:
Dark Patterns: Past, Present, and Future. ACM Queue 18(2): 67-92 (2020) - [c48]Angelina Wang, Arvind Narayanan, Olga Russakovsky:
REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets. ECCV (3) 2020: 733-751 - [c47]Arvind Narayanan, Eman Ramadan, Rishabh Mehta, Xinyue Hu, Qingxu Liu, Rostand A. K. Fezeu, Udhaya Kumar Dayalan, Saurabh Verma, Peiqi Ji, Tao Li, Feng Qian, Zhi-Li Zhang:
Lumos5G: Mapping and Predicting Commercial mmWave 5G Throughput. Internet Measurement Conference 2020: 176-193 - [c46]Peng Zheng, Wendi Feng, Arvind Narayanan, Zhi-Li Zhang:
NFV Performance Profiling on Multi-core Servers. Networking 2020: 91-99 - [c45]Arvind Narayanan, Eman Ramadan, Jacob Quant, Peiqi Ji, Feng Qian, Zhi-Li Zhang:
5G tracker: a crowdsourced platform to enable research using commercial 5g services. SIGCOMM Posters and Demos 2020: 65-67 - [c44]Kevin Lee, Benjamin Kaiser, Jonathan R. Mayer, Arvind Narayanan:
An Empirical Study of Wireless Carrier Authentication for SIM Swaps. SOUPS @ USENIX Security Symposium 2020: 61-79 - [c43]Harry A. Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan:
BlockSci: Design and applications of a blockchain analysis platform. USENIX Security Symposium 2020: 2721-2738 - [c42]Arvind Narayanan, Eman Ramadan, Jason Carpenter, Qingxu Liu, Yu Liu, Feng Qian, Zhi-Li Zhang:
A First Look at Commercial 5G Performance on Smartphones. WWW 2020: 894-905 - [i30]Angelina Wang, Arvind Narayanan, Olga Russakovsky:
ViBE: A Tool for Measuring and Mitigating Bias in Image Datasets. CoRR abs/2004.07999 (2020) - [i29]Ryan Amos, Gunes Acar, Elena Lucherini, Mihir Kshirsagar, Arvind Narayanan, Jonathan R. Mayer:
Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset. CoRR abs/2008.09159 (2020) - [i28]Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, Madelyn Sanfilippo:
Virtual Classrooms and Real Harms. CoRR abs/2012.05867 (2020)
2010 – 2019
- 2019
- [j18]Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan R. Mayer, Marshini Chetty, Arvind Narayanan:
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. Proc. ACM Hum. Comput. Interact. 3(CSCW): 81:1-81:32 (2019) - [j17]Noah J. Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, Nick Feamster:
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping. Proc. Priv. Enhancing Technol. 2019(3): 128-148 (2019) - [j16]Arvind Narayanan, Saurabh Verma, Zhi-Li Zhang:
Mining latent patterns in geoMobile data via EPIC. World Wide Web 22(6): 2771-2798 (2019) - [c41]Peng Zheng, Arvind Narayanan, Zhi-Li Zhang:
A Closer Look at NFV Execution Models. APNet 2019: 85-91 - [c40]Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan:
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices. CCS 2019: 131-147 - [c39]Peng Zheng, Arvind Narayanan, Zhi-Li Zhang:
Towards a Scalable, Flexible and High Performance NFV Execution Model. CoNEXT Companion 2019: 68-69 - [c38]Jonah Brown-Cohen, Arvind Narayanan, Alexandros Psomas, S. Matthew Weinberg:
Formal Barriers to Longest-Chain Proof-of-Stake Protocols. EC 2019: 459-473 - [i27]Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan R. Mayer, Marshini Chetty, Arvind Narayanan:
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. CoRR abs/1907.07032 (2019) - [i26]Arvind Narayanan, Jason Carpenter, Eman Ramadan, Qingxu Liu, Yu Liu, Feng Qian, Zhi-Li Zhang:
A First Measurement Study of Commercial mmWave 5G Performance on Smartphones. CoRR abs/1909.07532 (2019) - 2018
- [j15]Arvind Narayanan, Saurabh Verma, Eman Ramadan, Pariya Babaie, Zhi-Li Zhang:
Making content caching policies 'smart' using the deepcache framework. Comput. Commun. Rev. 48(5): 64-69 (2018) - [j14]Arunesh Mathur, Arvind Narayanan, Marshini Chetty:
Endorsements on Social Media: An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest. Proc. ACM Hum. Comput. Interact. 2(CSCW): 119:1-119:26 (2018) - [j13]Steven Englehardt, Jeffrey Han, Arvind Narayanan:
I never signed up for this! Privacy implications of email tracking. Proc. Priv. Enhancing Technol. 2018(1): 109-126 (2018) - [j12]Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, Nicolas Christin:
An Empirical Analysis of Traceability in the Monero Blockchain. Proc. Priv. Enhancing Technol. 2018(3): 143-163 (2018) - [j11]Steven Goldfeder, Harry A. Kalodner, Dillon Reisman, Arvind Narayanan:
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. Proc. Priv. Enhancing Technol. 2018(4): 179-199 (2018) - [c37]Arvind Narayanan, Eman Ramadan, Zhi-Li Zhang:
OpenCDN: An ICN-based open content distribution system using distributed actor model. INFOCOM Workshops 2018: 268-273 - [c36]Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan:
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. NDSS 2018 - [c35]Arvind Narayanan:
Blockchains: Past, Present, and Future. PODS 2018: 193 - [c34]Gunes Acar, Danny Yuxing Huang, Frank Li, Arvind Narayanan, Nick Feamster:
Web-based Attacks to Discover and Control Local IoT Devices. IoT S&P@SIGCOMM 2018: 29-35 - [c33]Arvind Narayanan, Saurabh Verma, Eman Ramadan, Pariya Babaie, Zhi-Li Zhang:
DeepCache: A Deep Learning Based Framework For Content Caching. NetAI@SIGCOMM 2018: 48-53 - [c32]Arunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty:
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking. SOUPS @ USENIX Security Symposium 2018: 103-116 - [i25]Arunesh Mathur, Arvind Narayanan, Marshini Chetty:
An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest. CoRR abs/1803.08488 (2018) - [i24]Ian Lundberg, Arvind Narayanan, Karen Levy, Matthew J. Salganik:
Privacy, ethics, and data access: A case study of the Fragile Families Challenge. CoRR abs/1809.00103 (2018) - [i23]Arunesh Mathur, Arvind Narayanan, Marshini Chetty:
Endorsements on Social Media: An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest. CoRR abs/1809.00620 (2018) - [i22]Jonah Brown-Cohen, Arvind Narayanan, Christos-Alexandros Psomas, S. Matthew Weinberg:
Formal Barriers to Longest-Chain Proof-of-Stake Protocols. CoRR abs/1809.06528 (2018) - [i21]Noah J. Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, Nick Feamster:
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping. CoRR abs/1812.00955 (2018) - 2017
- [j10]Peter Bailis, Arvind Narayanan, Andrew Miller, Song Han:
Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning. Commun. ACM 60(5): 48-51 (2017) - [j9]Arvind Narayanan, Jeremy Clark:
Bitcoin's academic pedigree. Commun. ACM 60(12): 36-45 (2017) - [j8]Matthew Zook, Solon Barocas, danah boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara König, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale:
Ten simple rules for responsible big data research. PLoS Comput. Biol. 13(3) (2017) - [j7]Arvind Narayanan, Jeremy Clark:
Bitcoin's Academic Pedigree. ACM Queue 15(4): 20 (2017) - [c31]Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan:
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin. Financial Cryptography 2017: 321-339 - [c30]Eman Ramadan, Arvind Narayanan, Zhi-Li Zhang, Runhui Li, Gong Zhang:
BIG Cache Abstraction for Cache Networks. ICDCS 2017: 742-752 - [c29]Lukasz Olejnik, Steven Englehardt, Arvind Narayanan:
Battery Status Not Included: Assessing Privacy in Web Standards. IWPE@SP 2017: 17-24 - [c28]Saurabh Verma, Arvind Narayanan, Zhi-Li Zhang:
Multi-low-rank Approximation for Traffic Matrices. ITC 2017: 72-80 - [c27]Jessica Su, Ansh Shukla, Sharad Goel, Arvind Narayanan:
De-anonymizing Web Browsing Data with Social Networks. WWW 2017: 1261-1269 - [i20]Andrew Miller, Malte Möser, Kevin Lee, Arvind Narayanan:
An Empirical Analysis of Linkability in the Monero Blockchain. CoRR abs/1704.04299 (2017) - [i19]Grant Storey, Dillon Reisman, Jonathan R. Mayer, Arvind Narayanan:
The Future of Ad Blocking: An Analytical Framework and New Techniques. CoRR abs/1705.08568 (2017) - [i18]Arvind Narayanan, Malte Möser:
Obfuscation in Bitcoin: Techniques and Politics. CoRR abs/1706.05432 (2017) - [i17]Steven Goldfeder, Harry A. Kalodner, Dillon Reisman, Arvind Narayanan:
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. CoRR abs/1708.04748 (2017) - [i16]Noah J. Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, Nick Feamster:
Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic. CoRR abs/1708.05044 (2017) - [i15]Harry A. Kalodner, Steven Goldfeder, Alishah Chator, Malte Möser, Arvind Narayanan:
BlockSci: Design and applications of a blockchain analysis platform. CoRR abs/1709.02489 (2017) - [i14]Nataliia Bielova, Nikolaos Laoutaris, Arvind Narayanan, Nick Nikiforakis:
Online Privacy and Web Transparency (Dagstuhl Seminar 17162). Dagstuhl Reports 7(4): 83-106 (2017) - 2016
- [b1]Arvind Narayanan, Joseph Bonneau, Edward W. Felten, Andrew Miller, Steven Goldfeder:
Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction. Princeton University Press 2016, ISBN 978-0-691-17169-2, pp. I-XXVII, 1-304 - [j6]Peter Bailis, Arvind Narayanan, Andrew Miller, Song Han:
Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning. ACM Queue 14(6): 43-55 (2016) - [c26]Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security. ACNS 2016: 156-174 - [c25]Miles Carlsten, Harry A. Kalodner, S. Matthew Weinberg, Arvind Narayanan:
On the Instability of Bitcoin Without the Block Reward. CCS 2016: 154-167 - [c24]Steven Englehardt, Arvind Narayanan:
Online Tracking: A 1-million-site Measurement and Analysis. CCS 2016: 1388-1401 - [c23]Arvind Narayanan, Saurabh Verma, Zhi-Li Zhang:
Most Calls Are Local (But Some Are Regional): Dissecting Cellular Communication Patterns. GLOBECOM 2016: 1-6 - [c22]Arvind Narayanan, Saurabh Verma, Zhi-Li Zhang:
Mining Spatial-Temporal geoMobile Data via Feature Distributional Similarity Graph. MobiData@MobiSys 2016: 13-18 - [c21]Ahmed Abdelhadi, Felipe Rechia, Arvind Narayanan, Thiago Teixeira, Ricardo Lent, Driss Benhaddou, Hyunwoo Lee, T. Charles Clancy:
Position estimation of robotic mobile nodes in wireless testbed using GENI. SysCon 2016: 1-6 - [i13]Aylin Caliskan Islam, Joanna J. Bryson, Arvind Narayanan:
Semantics derived automatically from language corpora necessarily contain human biases. CoRR abs/1608.07187 (2016) - [i12]Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. IACR Cryptol. ePrint Arch. 2016: 13 (2016) - 2015
- [c20]Eman Ramadan, Arvind Narayanan, Zhi-Li Zhang:
CONIA: Content (provider)-oriented, namespace-independent architecture for multimedia information delivery. ICME Workshops 2015: 1-6 - [c19]Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE Symposium on Security and Privacy 2015: 104-121 - [c18]Aylin Caliskan Islam, Richard E. Harang, Andrew Liu, Arvind Narayanan, Clare R. Voss, Fabian Yamaguchi, Rachel Greenstadt:
De-anonymizing Programmers via Code Stylometry. USENIX Security Symposium 2015: 255-270 - [c17]Harry A. Kalodner, Miles Carlsten, Paul M. Ellenbogen, Joseph Bonneau, Arvind Narayanan:
An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design. WEIS 2015 - [c16]Steven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman, Jonathan R. Mayer, Arvind Narayanan, Edward W. Felten:
Cookies That Give You Away: The Surveillance Implications of Web Tracking. WWW 2015: 289-299 - [i11]Ahmed Abdelhadi, Felipe Rechia, Arvind Narayanan, Thiago Teixeira, Ricardo Lent, Driss Benhaddou, Hyunwoo Lee, T. Charles Clancy:
Position Estimation of Robotic Mobile Nodes in Wireless Testbed using GENI. CoRR abs/1511.08936 (2015) - [i10]Aylin Caliskan Islam, Fabian Yamaguchi, Edwin Dauber, Richard E. Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan:
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries. CoRR abs/1512.08546 (2015) - [i9]Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IACR Cryptol. ePrint Arch. 2015: 261 (2015) - 2014
- [j5]Arvind Narayanan, Shannon Vallor:
Why software engineering courses should include ethics coverage. Commun. ACM 57(3): 23-25 (2014) - [c15]Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Díaz:
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild. CCS 2014: 674-689 - [c14]Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with Accountable Mixes. Financial Cryptography 2014: 486-504 - [i8]Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with accountable mixes. IACR Cryptol. ePrint Arch. 2014: 77 (2014) - 2013
- [j4]Arvind Narayanan:
What Happened to the Crypto Dream?, Part 1. IEEE Secur. Priv. 11(2): 75-76 (2013) - [j3]Arvind Narayanan:
What Happened to the Crypto Dream?, Part 2. IEEE Secur. Priv. 11(3): 68-71 (2013) - [c13]Suman Jana, Arvind Narayanan, Vitaly Shmatikov:
A Scanner Darkly: Protecting User Privacy from Perceptual Applications. IEEE Symposium on Security and Privacy 2013: 349-363 - [i7]Yaniv Erlich, Arvind Narayanan:
Routes for breaching and protecting genetic privacy. CoRR abs/1310.3197 (2013) - 2012
- [c12]Arvind Narayanan, Hristo S. Paskov, Neil Zhenqiang Gong, John Bethencourt, Emil Stefanov, Eui Chul Richard Shin, Dawn Song:
On the Feasibility of Internet-Scale Author Identification. IEEE Symposium on Security and Privacy 2012: 300-314 - [i6]Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh:
A Critical Look at Decentralized Personal Data Architectures. CoRR abs/1202.4503 (2012) - [i5]Arvind Narayanan:
33 Bits of Entropy: Myths and Fallacies of "Personally Identifiable Information". Adv. Math. Commun. 1 (2012) - 2011
- [c11]Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein:
Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge. IJCNN 2011: 1825-1834 - [c10]Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Michael Hamburg, Dan Boneh:
Location Privacy via Private Proximity Testing. NDSS 2011 - [c9]Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov:
"You Might Also Like: " Privacy Risks of Collaborative Filtering. IEEE Symposium on Security and Privacy 2011: 231-246 - [i4]Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein:
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge. CoRR abs/1102.4374 (2011) - 2010
- [j2]Arvind Narayanan, Vitaly Shmatikov:
Myths and fallacies of "personally identifiable information". Commun. ACM 53(6): 24-26 (2010) - [c8]Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas:
Adnostic: Privacy Preserving Targeted Advertising. NDSS 2010
2000 – 2009
- 2009
- [c7]Arvind Narayanan, Vitaly Shmatikov:
De-anonymizing Social Networks. SP 2009: 173-187 - [i3]Arvind Narayanan, Vitaly Shmatikov:
De-anonymizing Social Networks. CoRR abs/0903.3276 (2009) - 2008
- [c6]Arvind Narayanan, Vitaly Shmatikov:
Robust De-anonymization of Large Sparse Datasets. SP 2008: 111-125 - 2006
- [j1]Arvind Narayanan, K. Srinathan, C. Pandu Rangan:
Perfectly Reliable Message Transmission. Inf. Process. Lett. 100(1): 23-28 (2006) - [i2]Arvind Narayanan, Vitaly Shmatikov:
How To Break Anonymity of the Netflix Prize Dataset. CoRR abs/cs/0610105 (2006) - [i1]Arvind Narayanan, Vitaly Shmatikov:
On the Limits of Point Function Obfuscation. IACR Cryptol. ePrint Arch. 2006: 182 (2006) - 2005
- [c5]Arvind Narayanan, Vitaly Shmatikov:
Obfuscated databases and group privacy. CCS 2005: 102-111 - [c4]Arvind Narayanan, Vitaly Shmatikov:
Fast dictionary attacks on passwords using time-space tradeoff. CCS 2005: 364-372 - 2004
- [c3]K. Srinathan, Arvind Narayanan, C. Pandu Rangan:
Optimal Perfectly Secure Message Transmission. CRYPTO 2004: 545-561 - 2003
- [c2]Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim:
Practical Pay TV Schemes. ACISP 2003: 192-203 - [c1]Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim:
On the Power of Computational Secret Sharing. INDOCRYPT 2003: 162-176
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint