default search action
Aashish Kolluri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j1]Bo Wang, Aashish Kolluri, Ivica Nikolic, Teodora Baluta, Prateek Saxena:
User-Customizable Transpilation of Scripting Languages. Proc. ACM Program. Lang. 7(OOPSLA1): 201-229 (2023)
Conference and Workshop Papers
- 2024
- [c8]Sarthak Choudhary, Aashish Kolluri, Prateek Saxena:
Attacking Byzantine Robust Aggregation in High Dimensions. SP 2024: 1325-1344 - 2022
- [c7]Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena:
LPGNet: Link Private Graph Networks for Node Classification. CCS 2022: 1813-1827 - 2021
- [c6]Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury:
Localizing Vulnerabilities Statistically From One Exploit. AsiaCCS 2021: 537-549 - [c5]Aashish Kolluri, Teodora Baluta, Prateek Saxena:
Private Hierarchical Clustering in Federated Networks. CCS 2021: 2342-2360 - [c4]Bo Wang, Teodora Baluta, Aashish Kolluri, Prateek Saxena:
SynGuar: guaranteeing generalization in programming by example. ESEC/SIGSOFT FSE 2021: 677-689 - 2019
- [c3]Aashish Kolluri, Ivica Nikolic, Ilya Sergey, Aquinas Hobor, Prateek Saxena:
Exploiting the laws of order in smart contracts. ISSTA 2019: 363-373 - 2018
- [c2]Ivica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor:
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. ACSAC 2018: 653-663 - [c1]Sourav Das, Aashish Kolluri, Prateek Saxena, Haifeng Yu:
(Invited Paper) on the Security of Blockchain Consensus Protocols. ICISS 2018: 465-480
Informal and Other Publications
- 2023
- [i8]Aashish Kolluri, Sarthak Choudhary, Bryan Hooi, Prateek Saxena:
RETEXO: Scalable Neural Network Training over Distributed Graphs. CoRR abs/2302.13053 (2023) - [i7]Sarthak Choudhary, Aashish Kolluri, Prateek Saxena:
Attacking Byzantine Robust Aggregation in High Dimensions. CoRR abs/2312.14461 (2023) - 2022
- [i6]Aashish Kolluri, Teodora Baluta, Bryan Hooi, Prateek Saxena:
LPGNet: Link Private Graph Networks for Node Classification. CoRR abs/2205.03105 (2022) - 2021
- [i5]Aashish Kolluri, Teodora Baluta, Prateek Saxena:
Private Hierarchical Clustering in Federated Networks. CoRR abs/2105.09057 (2021) - [i4]Bo Wang, Teodora Baluta, Aashish Kolluri, Prateek Saxena:
SynGuar: Guaranteeing Generalization in Programming by Example. CoRR abs/2106.11610 (2021) - 2020
- [i3]Shiqi Shen, Aashish Kolluri, Zhen Dong, Prateek Saxena, Abhik Roychoudhury:
Localizing Patch Points From One Exploit. CoRR abs/2008.04516 (2020) - 2018
- [i2]Ivica Nikolic, Aashish Kolluri, Ilya Sergey, Prateek Saxena, Aquinas Hobor:
Finding The Greedy, Prodigal, and Suicidal Contracts at Scale. CoRR abs/1802.06038 (2018) - [i1]Aashish Kolluri, Ivica Nikolic, Ilya Sergey, Aquinas Hobor, Prateek Saxena:
Exploiting The Laws of Order in Smart Contracts. CoRR abs/1810.11605 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint