


default search action
Anupam Datta
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i53]Minghang Deng, Ashwin Ramachandran, Canwen Xu, Lanxiang Hu, Zhewei Yao, Anupam Datta, Hao Zhang:
ReFoRCE: A Text-to-SQL Agent with Self-Refinement, Format Restriction, and Column Exploration. CoRR abs/2502.00675 (2025) - 2024
- [i52]Sanjari Srivastava, Piotr Mardziel, Zhikhun Zhang, Archana Ahlawat, Anupam Datta, John C. Mitchell:
De-amplifying Bias from Differential Privacy in Language Model Fine-tuning. CoRR abs/2402.04489 (2024) - 2023
- [j10]Clark W. Barrett, Brad Boyd, Elie Bursztein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang
, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. Found. Trends Priv. Secur. 6(1): 1-52 (2023) - [i51]Clark W. Barrett, Brad Boyd, Ellie Burzstein, Nicholas Carlini, Brad Chen, Jihye Choi, Amrita Roy Chowdhury, Mihai Christodorescu, Anupam Datta, Soheil Feizi, Kathleen Fisher, Tatsunori Hashimoto, Dan Hendrycks, Somesh Jha, Daniel Kang, Florian Kerschbaum, Eric Mitchell, John C. Mitchell, Zulfikar Ramzan, Khawaja Shams, Dawn Song, Ankur Taly, Diyi Yang:
Identifying and Mitigating the Security Risks of Generative AI. CoRR abs/2308.14840 (2023) - [i50]Ravi Mangal, Klas Leino, Zifan Wang, Kai Hu, Weicheng Yu, Corina S. Pasareanu, Anupam Datta, Matt Fredrikson
:
Is Certifying 𝓁p Robustness Still Worthwhile? CoRR abs/2310.09361 (2023) - 2022
- [c82]Zifan Wang, Matt Fredrikson, Anupam Datta:
Robust Models Are More Interpretable Because Attributions Look Normal. ICML 2022: 22625-22651 - [i49]Zifan Wang, Yuhang Yao, Chaoran Zhang, Han Zhang, Youjie Kang, Carlee Joe-Wong, Matt Fredrikson
, Anupam Datta:
Faithful Explanations for Deep Graph Models. CoRR abs/2205.11850 (2022) - [i48]Kaiji Lu, Anupam Datta:
Order-sensitive Shapley Values for Evaluating Conceptual Soundness of NLP Models. CoRR abs/2206.00192 (2022) - 2021
- [j9]Sanghamitra Dutta
, Praveen Venkatesh
, Piotr Mardziel, Anupam Datta, Pulkit Grover
:
Fairness Under Feature Exemptions: Counterfactual and Observational Measures. IEEE Trans. Inf. Theory 67(10): 6675-6710 (2021) - [c81]Anupam Datta, Matt Fredrikson
, Klas Leino, Kaiji Lu, Shayak Sen, Zifan Wang:
Machine Learning Explainability and Robustness: Connected at the Hip. KDD 2021: 4035-4036 - [c80]Anupam Datta, Matt Fredrikson, Klas Leino, Kaiji Lu, Shayak Sen, Ricardo Shih, Zifan Wang:
Exploring Conceptual Soundness with TruLens. NeurIPS (Competition and Demos) 2021: 302-307 - [c79]Kaiji Lu, Zifan Wang, Piotr Mardziel, Anupam Datta:
Influence Patterns for Explaining Information Flow in BERT. NeurIPS 2021: 4461-4474 - [i47]Zifan Wang, Matt Fredrikson
, Anupam Datta:
Boundary Attributions Provide Normal (Vector) Explanations. CoRR abs/2103.11257 (2021) - [i46]Emily Black, Zifan Wang, Matt Fredrikson
, Anupam Datta:
Consistent Counterfactuals for Deep Models. CoRR abs/2110.03109 (2021) - 2020
- [c78]Sanghamitra Dutta, Praveen Venkatesh
, Piotr Mardziel, Anupam Datta, Pulkit Grover
:
An Information-Theoretic Quantification of Discrimination with Exempt Features. AAAI 2020: 3825-3833 - [c77]Kaiji Lu, Piotr Mardziel, Klas Leino, Matt Fredrikson
, Anupam Datta:
Influence Paths for Characterizing Subject-Verb Number Agreement in LSTM Language Models. ACL 2020: 4748-4757 - [c76]Kaiji Lu, Piotr Mardziel, Fangjing Wu, Preetam Amancharla, Anupam Datta:
Gender Bias in Neural Natural Language Processing. Logic, Language, and Security 2020: 189-202 - [c75]Zifan Wang, Piotr Mardziel, Anupam Datta, Matt Fredrikson
:
Interpreting Interpretations: Organizing Attribution Methods by Criteria. CVPR Workshops 2020: 48-55 - [c74]Zifan Wang, Haofan Wang, Shakul Ramkumar, Piotr Mardziel, Matt Fredrikson, Anupam Datta:
Smoothed Geometry for Robust Attribution. NeurIPS 2020 - [c73]Michael Carl Tschantz, Shayak Sen, Anupam Datta:
SoK: Differential Privacy as a Causal Property. SP 2020: 354-371 - [i45]Zifan Wang, Piotr Mardziel, Anupam Datta, Matt Fredrikson
:
Interpreting Interpretations: Organizing Attribution Methods by Criteria. CoRR abs/2002.07985 (2020) - [i44]Kaiji Lu, Piotr Mardziel, Klas Leino, Matt Fredrikson, Anupam Datta:
Influence Paths for Characterizing Subject-Verb Number Agreement in LSTM Language Models. CoRR abs/2005.01190 (2020) - [i43]Zifan Wang, Haofan Wang, Shakul Ramkumar, Matt Fredrikson
, Piotr Mardziel, Anupam Datta:
Smoothed Geometry for Robust Attribution. CoRR abs/2006.06643 (2020) - [i42]Sanghamitra Dutta, Praveen Venkatesh, Piotr Mardziel, Anupam Datta, Pulkit Grover
:
Fairness Under Feature Exemptions: Counterfactual and Observational Measures. CoRR abs/2006.07986 (2020) - [i41]Xuan Chen, Zifan Wang, Yucai Fan, Bonan Jin, Piotr Mardziel, Carlee Joe-Wong, Anupam Datta:
Towards Behavior-Level Explanation for Deep Reinforcement Learning. CoRR abs/2009.08507 (2020) - [i40]Kaiji Lu, Zifan Wang, Piotr Mardziel, Anupam Datta:
Abstracting Influence Paths for Explaining (Contextualization of) BERT Models. CoRR abs/2011.00740 (2020)
2010 – 2019
- 2019
- [c72]Klas Leino, Emily Black, Matt Fredrikson, Shayak Sen, Anupam Datta:
Feature-Wise Bias Amplification. ICLR (Poster) 2019 - 2018
- [j8]Dhiman Chattopadhyay, Abinash Samantaray, Anupam Datta:
Device microagent for IoT home gateway: a lightweight plug-n-play architecture. SIGBED Rev. 15(2): 16-23 (2018) - [c71]Amit Datta, Anupam Datta, Jael Makagon, Deirdre K. Mulligan, Michael Carl Tschantz:
Discrimination in Online Personalization: A Multidisciplinary Inquiry. FAT 2018: 20-34 - [c70]Klas Leino, Shayak Sen, Anupam Datta, Matt Fredrikson
, Linyi Li:
Influence-Directed Explanations for Deep Convolutional Networks. ITC 2018: 1-8 - [c69]Samuel Yeom, Anupam Datta, Matt Fredrikson:
Hunting for Discriminatory Proxies in Linear Regression Models. NeurIPS 2018: 4573-4583 - [r1]Anupam Datta:
Privacy Through Accountability. Encyclopedia of Database Systems (2nd ed.) 2018 - [i39]Klas Leino, Linyi Li, Shayak Sen, Anupam Datta, Matt Fredrikson
:
Influence-Directed Explanations for Deep Convolutional Networks. CoRR abs/1802.03788 (2018) - [i38]Shayak Sen, Piotr Mardziel, Anupam Datta, Matthew Fredrikson
:
Supervising Feature Influence. CoRR abs/1803.10815 (2018) - [i37]Kaiji Lu, Piotr Mardziel, Fangjing Wu, Preetam Amancharla, Anupam Datta:
Gender Bias in Neural Natural Language Processing. CoRR abs/1807.11714 (2018) - [i36]Anupam Datta, Shayak Sen, Michael Carl Tschantz:
Correspondences between Privacy and Nondiscrimination: Why They Should Be Studied Together. CoRR abs/1808.01735 (2018) - [i35]Samuel Yeom, Anupam Datta, Matt Fredrikson
:
Hunting for Discriminatory Proxies in Linear Regression Models. CoRR abs/1810.07155 (2018) - [i34]Klas Leino, Matt Fredrikson
, Emily Black, Shayak Sen, Anupam Datta:
Feature-Wise Bias Amplification. CoRR abs/1812.08999 (2018) - 2017
- [c68]Anupam Datta, Matthew Fredrikson
, Gihyuk Ko, Piotr Mardziel, Shayak Sen:
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs. CCS 2017: 1193-1210 - [c67]Jeremiah Blocki
, Manuel Blum, Anupam Datta, Santosh S. Vempala:
Towards Human Computable Passwords. ITCS 2017: 10:1-10:47 - [e4]José M. del Álamo, Seda F. Gürses, Anupam Datta:
Proceedings of the 3rd International Workshop on Privacy Engineering co-located with 38th IEEE Symposium on Security and Privacy, IWPE@SP 2017, San Jose, CA, USA, May 25, 2017. CEUR Workshop Proceedings 1873, CEUR-WS.org 2017 [contents] - [i33]Anupam Datta, Matthew Fredrikson
, Gihyuk Ko, Piotr Mardziel, Shayak Sen:
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs. CoRR abs/1705.07807 (2017) - [i32]Anupam Datta, Matt Fredrikson
, Gihyuk Ko, Piotr Mardziel, Shayak Sen:
Proxy Non-Discrimination in Data-Driven Systems. CoRR abs/1707.08120 (2017) - [i31]Michael Carl Tschantz, Shayak Sen, Anupam Datta:
Differential Privacy as a Causal Property. CoRR abs/1710.05899 (2017) - [i30]Anupam Datta, Sophia Kovaleva, Piotr Mardziel, Shayak Sen:
Latent Factor Interpretations for Collaborative Filtering. CoRR abs/1711.10816 (2017) - 2016
- [c66]Sean Weerakkody, Bruno Sinopoli, Soummya Kar
, Anupam Datta:
Information flow for security in control systems. CDC 2016: 5065-5072 - [c65]Anupam Datta, Soummya Kar
, Bruno Sinopoli, Sean Weerakkody:
Accountability in cyber-physical systems. SOSCYPS@CPSWeek 2016: 1-3 - [c64]Jeremiah Blocki
, Anupam Datta:
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. CSF 2016: 371-386 - [c63]Jeremiah Blocki, Anupam Datta, Joseph Bonneau:
Differentially Private Password Frequency Lists. NDSS 2016 - [c62]Anupam Datta, Shayak Sen, Yair Zick
:
Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems. IEEE Symposium on Security and Privacy 2016: 598-617 - [c61]Amit Vasudevan, Sagar Chaki, Petros Maniatis, Limin Jia, Anupam Datta:
überSpark: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor. USENIX Security Symposium 2016: 87-104 - [i29]Sean Weerakkody, Bruno Sinopoli, Soummya Kar
, Anupam Datta:
Information Flow for Security in Control Systems. CoRR abs/1603.05710 (2016) - [i28]Stephen Chong, Joshua D. Guttman, Anupam Datta, Andrew C. Myers, Benjamin C. Pierce, Patrick Schaumont, Tim Sherwood, Nickolai Zeldovich:
Report on the NSF Workshop on Formal Methods for Security. CoRR abs/1608.00678 (2016) - [i27]Jeremiah Blocki, Anupam Datta, Joseph Bonneau:
Differentially Private Password Frequency Lists. IACR Cryptol. ePrint Arch. 2016: 153 (2016) - 2015
- [j7]Amit Datta, Michael Carl Tschantz, Anupam Datta:
Automated Experiments on Ad Privacy Settings. Proc. Priv. Enhancing Technol. 2015(1): 92-112 (2015) - [c60]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games with Multiple Defender Resources. AAAI 2015: 791-797 - [c59]Omar Chowdhury, Deepak Garg, Limin Jia
, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CCS 2015: 1130-1143 - [c58]Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha
:
Program Actions as Actual Causes: A Building Block for Accountability. CSF 2015: 261-275 - [c57]Limin Jia
, Shayak Sen, Deepak Garg, Anupam Datta:
A Logic of Programs with Interface-Confined Code. CSF 2015: 512-525 - [c56]Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:
A Methodology for Information Flow Experiments. CSF 2015: 554-568 - [c55]Alejandro Uriel Carbonara, Anupam Datta, Arunesh Sinha, Yair Zick:
Incentivizing Peer Grading in MOOCS: An Audit Game Approach. IJCAI 2015: 497-503 - [c54]Amit Datta, Anupam Datta, Ariel D. Procaccia, Yair Zick:
Influence in Classification via Cooperative Game Theory. IJCAI 2015: 511-517 - [c53]Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta:
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. NDSS 2015 - [c52]Aaron Kane, Omar Chowdhury, Anupam Datta, Philip Koopman:
A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System. RV 2015: 102-117 - [i26]Limin Jia, Shayak Sen, Deepak Garg, Anupam Datta:
System M: A Program Logic for Code Sandboxing and Identification. CoRR abs/1501.05673 (2015) - [i25]Amit Datta, Anupam Datta, Ariel D. Procaccia, Yair Zick:
Influence in Classification via Cooperative Game Theory. CoRR abs/1505.00036 (2015) - [i24]Anupam Datta, Deepak Garg, Dilsun Kirli Kaynar, Divya Sharma, Arunesh Sinha:
Program Actions as Actual Causes: A Building Block for Accountability. CoRR abs/1505.01131 (2015) - [i23]Omar Chowdhury, Deepak Garg, Limin Jia
, Anupam Datta:
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits. CoRR abs/1508.02448 (2015) - [i22]Jeremiah Blocki, Anupam Datta:
CASH: A Cost Asymmetric Secure Hash Algorithm for Optimal Password Protection. CoRR abs/1509.00239 (2015) - [i21]Anupam Datta, Joseph Y. Halpern, John C. Mitchell, Arnab Roy, Shayak Sen:
A Symbolic Logic with Concrete Bounds for Cryptographic Protocols. CoRR abs/1511.07536 (2015) - [i20]Jeremiah Blocki, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. IACR Cryptol. ePrint Arch. 2015: 166 (2015) - 2014
- [c51]Omar Chowdhury, Limin Jia
, Deepak Garg, Anupam Datta:
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies. CAV 2014: 131-149 - [c50]Gail-Joon Ahn
, Anupam Datta:
WPES 2014: 13th Workshop on Privacy in the Electronic Society. CCS 2014: 1546-1547 - [c49]Se Eun Oh, Ji Young Chun, Limin Jia
, Deepak Garg, Carl A. Gunter, Anupam Datta:
Privacy-preserving audit for broker-based health information exchange. CODASPY 2014: 313-320 - [c48]Anupam Datta:
Privacy through Accountability: A Computer Science Perspective. ICDCIT 2014: 43-49 - [c47]Shayak Sen, Saikat Guha, Anupam Datta, Sriram K. Rajamani, Janice Y. Tsai, Jeannette M. Wing:
Bootstrapping Privacy Compliance in Big Data Systems. IEEE Symposium on Security and Privacy 2014: 327-342 - [c46]Bruce DeBruhl, Christian Kroer
, Anupam Datta, Tuomas Sandholm, Patrick Tague
:
Power napping with loud neighbors: optimal energy-constrained jamming and anti-jamming. WISEC 2014: 117-128 - [e3]Gail-Joon Ahn, Anupam Datta:
Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3148-7 [contents] - [i19]Jeremiah Blocki, Manuel Blum, Anupam Datta:
Human Computable Passwords. CoRR abs/1404.0024 (2014) - [i18]Michael Carl Tschantz, Amit Datta, Anupam Datta, Jeannette M. Wing:
A Methodology for Information Flow Experiments. CoRR abs/1405.2376 (2014) - [i17]Amit Datta, Michael Carl Tschantz, Anupam Datta:
Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination. CoRR abs/1408.6491 (2014) - [i16]Jeremiah Blocki, Nicolas Christin
, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games with Multiple Defender Resources. CoRR abs/1409.4503 (2014) - [i15]Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta:
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. CoRR abs/1410.1490 (2014) - 2013
- [c45]Jeremiah Blocki
, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. ASIACRYPT (2) 2013: 361-380 - [c44]Jeremiah Blocki
, Manuel Blum, Anupam Datta:
GOTCHA password hackers! AISec 2013: 25-34 - [c43]Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
Purpose Restrictions on Information Use. ESORICS 2013: 610-627 - [c42]Jeremiah Blocki
, Nicolas Christin
, Anupam Datta, Arunesh Sinha
:
Adaptive Regret Minimization in Bounded-Memory Games. GameSec 2013: 65-84 - [c41]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games. IJCAI 2013: 41-47 - [c40]Jeremiah Blocki
, Avrim Blum, Anupam Datta, Or Sheffet:
Differentially private data analysis of social networks via restricted sensitivity. ITCS 2013: 87-96 - [c39]Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne
, Jared Bennatt, Anupam Datta, Limin Jia
, William H. Winsborough:
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. SACMAT 2013: 3-14 - [c38]Amit Vasudevan, Sagar Chaki, Limin Jia
, Jonathan M. McCune, James Newsome, Anupam Datta:
Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework. IEEE Symposium on Security and Privacy 2013: 430-444 - [i14]Jeremiah Blocki, Manuel Blum, Anupam Datta:
Naturally Rehearsing Passwords. CoRR abs/1302.5122 (2013) - [i13]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Ariel D. Procaccia, Arunesh Sinha:
Audit Games. CoRR abs/1303.0356 (2013) - [i12]Jeremiah Blocki, Manuel Blum, Anupam Datta:
GOTCHA Password Hackers! CoRR abs/1310.1137 (2013) - 2012
- [c37]Jeremiah Blocki
, Avrim Blum, Anupam Datta, Or Sheffet:
The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy. FOCS 2012: 410-419 - [c36]Jeremiah Blocki
, Nicolas Christin
, Anupam Datta, Arunesh Sinha
:
Audit Mechanisms for Provable Risk Management and Accountable Data Governance. GameSec 2012: 38-59 - [c35]Jason Franklin, Sagar Chaki, Anupam Datta, Jonathan M. McCune, Amit Vasudevan:
Parametric Verification of Address Space Separation. POST 2012: 51-68 - [c34]Anupam Datta, Divya Sharma, Arunesh Sinha
:
Provable De-anonymization of Large Datasets with Sparse Dimensions. POST 2012: 229-248 - [c33]Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
Formalizing and Enforcing Purpose Restrictions in Privacy Policies. IEEE Symposium on Security and Privacy 2012: 176-190 - [e2]Gilles Barthe
, Anupam Datta, Sandro Etalle:
Formal Aspects of Security and Trust - 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7140, Springer 2012, ISBN 978-3-642-29419-8 [contents] - [i11]Jeremiah Blocki, Avrim Blum, Anupam Datta, Or Sheffet:
The Johnson-Lindenstrauss Transform Itself Preserves Differential Privacy. CoRR abs/1204.2136 (2012) - [i10]Jeremiah Blocki, Avrim Blum, Anupam Datta, Or Sheffet:
Differentially Private Data Analysis of Social Networks via Restricted Sensitivity. CoRR abs/1208.4586 (2012) - 2011
- [j6]Anupam Datta, Jason Franklin, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar:
On Adversary Models and Compositional Security. IEEE Secur. Priv. 9(3): 26-32 (2011) - [c32]Deepak Garg, Limin Jia
, Anupam Datta:
Policy auditing over incomplete logs: theory, implementation and applications. CCS 2011: 151-162 - [c31]Jeremiah Blocki
, Nicolas Christin
, Anupam Datta, Arunesh Sinha
:
Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection. CSF 2011: 312-327 - [c30]Anupam Datta, Jeremiah Blocki
, Nicolas Christin
, Henry DeYoung, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar, Arunesh Sinha
:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. ICISS 2011: 1-27 - [c29]Jeremiah Blocki, Nicolas Christin, Anupam Datta, Arunesh Sinha:
Audit Mechanisms for Privacy Protection in Healthcare Environments. HealthSec 2011 - [c28]Michael Carl Tschantz, Dilsun Kirli Kaynar, Anupam Datta:
Formal Verification of Differential Privacy for Interactive Systems (Extended Abstract). MFPS 2011: 61-79 - [p1]Anupam Datta, John C. Mitchell, Arnab Roy, Stephan Hyeonjun Stiller:
Protocol Composition Logic. Formal Models and Techniques for Analyzing Security Protocols 2011: 182-221 - [i9]Michael Carl Tschantz, Dilsun Kirli Kaynar, Anupam Datta:
Formal Verification of Differential Privacy for Interactive Systems. CoRR abs/1101.2819 (2011) - [i8]Deepak Garg, Limin Jia, Anupam Datta:
A Logical Method for Policy Enforcement over Evolving Audit Logs. CoRR abs/1102.2521 (2011) - [i7]Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing:
On the Semantics of Purpose Requirements in Privacy Policies. CoRR abs/1102.4326 (2011) - [i6]Jeremiah Blocki, Nicolas Christin
, Anupam Datta, Arunesh Sinha:
Adaptive Regret Minimization in Bounded-Memory Games. CoRR abs/1111.2888 (2011) - 2010
- [b2]Anupam Datta, Somesh Jha, Ninghui Li, David Melski, Thomas W. Reps:
Analysis Techniques for Information Security. Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers 2010, ISBN 978-3-031-01206-8 - [j5]Anupam Datta:
Logical Methods in Security and Privacy. IEEE Secur. Priv. 8(6): 86-89 (2010) - [j4]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
:
Inductive trace properties for computational security. J. Comput. Secur. 18(6): 1035-1073 (2010) - [c27]Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig:
TrustVisor: Efficient TCB Reduction and Attestation. IEEE Symposium on Security and Privacy 2010: 143-158 - [c26]Jason Franklin, Sagar Chaki, Anupam Datta, Arvind Seshadri:
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size. IEEE Symposium on Security and Privacy 2010: 365-379 - [c25]Kumar Avijit, Anupam Datta, Robert Harper:
Distributed programming with distributed authorization. TLDI 2010: 27-38 - [c24]Anupam Datta, Nipun Dave, John C. Mitchell, Helen Nissenbaum, Divya Sharma:
Privacy Challenges in Patient-centric Health Information Systems. HealthSec 2010 - [c23]Henry DeYoung, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar, Anupam Datta:
Experiences in the logical specification of the HIPAA and GLBA privacy laws. WPES 2010: 73-82 - [c22]Deepak Garg, Jason Franklin, Dilsun Kirli Kaynar, Anupam Datta:
Compositional System Security with Interface-Confined Adversaries. MFPS 2010: 49-71
2000 – 2009
- 2009
- [c21]Sagar Chaki, Anupam Datta:
ASPIER: An Automated Framework for Verifying Security Protocol Implementations. CSF 2009: 172-185 - [c20]Anupam Datta, Jason Franklin, Deepak Garg, Dilsun Kirli Kaynar:
A Logic of Secure Systems and its Application to Trusted Computing. SP 2009: 221-236 - [e1]Anupam Datta:
Advances in Computer Science - ASIAN 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings. Lecture Notes in Computer Science 5913, Springer 2009, ISBN 978-3-642-10621-7 [contents] - 2008
- [j3]Ralf Küsters, Anupam Datta, John C. Mitchell
, Ajith Ramanathan:
On the Relationships between Notions of Simulation-Based Security. J. Cryptol. 21(4): 492-546 (2008) - 2007
- [c19]Adam Barth, John C. Mitchell, Anupam Datta, Sharada Sundaram:
Privacy and Utility in Business Processes. CSF 2007: 279-294 - [c18]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Proofs of Computational Secrecy. ESORICS 2007: 219-234 - [c17]Arnab Roy, Anupam Datta, John C. Mitchell:
Formal Proofs of Cryptographic Security of Diffie-Hellman-Based Protocols. TGC 2007: 312-329 - [c16]Anupam Datta, Ante Derek, John C. Mitchell
, Arnab Roy:
Protocol Composition Logic (PCL). Computation, Meaning, and Logic 2007: 311-358 - [i5]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Proof Method for Computational Secrecy. IACR Cryptol. ePrint Arch. 2007: 165 (2007) - 2006
- [j2]Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell
, Mathieu Turuani:
Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367(1-2): 33-56 (2006) - [c15]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert:
Secrecy Analysis in Protocol Composition Logic. ASIAN 2006: 197-213 - [c14]Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Computationally Sound Compositional Logic for Key Exchange Protocols. CSFW 2006: 321-334 - [c13]Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum:
Privacy and Contextual Integrity: Framework and Applications. S&P 2006: 184-198 - [c12]Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov
:
Games and the Impossibility of Realizable Ideal Functionality. TCC 2006: 360-379 - [i4]Anupam Datta, Ante Derek, John C. Mitchell, Bogdan Warinschi:
Key Exchange Protocols: Security Definition, Proof Method and Applications. IACR Cryptol. ePrint Arch. 2006: 56 (2006) - [i3]Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security. IACR Cryptol. ePrint Arch. 2006: 153 (2006) - [i2]Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Trace Properties for Computational Security. IACR Cryptol. ePrint Arch. 2006: 486 (2006) - 2005
- [b1]Anupam Datta:
Security analysis of network protocols : compositional reasoning and complexity-theoretic foundations. Stanford University, USA, 2005 - [j1]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
:
A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3): 423-482 (2005) - [c11]Changhua He, Mukund Sundararajan, Anupam Datta, Ante Derek, John C. Mitchell:
A modular correctness proof of IEEE 802.11i and TLS. CCS 2005: 2-15 - [c10]Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani:
Compositional Analysis of Contract Signing Protocols. CSFW 2005: 94-110 - [c9]Anupam Datta, Ante Derek, John C. Mitchell, Vitaly Shmatikov, Mathieu Turuani:
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic. ICALP 2005: 16-29 - [c8]Anupam Datta, Ralf Küsters, John C. Mitchell, Ajith Ramanathan:
On the Relationships Between Notions of Simulation-Based Security. TCC 2005: 476-494 - [i1]Anupam Datta, Ante Derek, John C. Mitchell, Ajith Ramanathan, Andre Scedrov:
Games and the Impossibility of Realizable Ideal Functionality. IACR Cryptol. ePrint Arch. 2005: 211 (2005) - 2004
- [c7]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:
Abstraction and Refinement in Protocol Derivation. CSFW 2004: 30- - 2003
- [c6]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:
Secure protocol composition. FMSE 2003: 11-23 - [c5]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
:
A Derivation System for Security Protocols and its Logical Formalization. CSFW 2003: 109-125 - [c4]Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic:
Secure Protocol Composition. MFPS 2003: 201-226 - 2002
- [c3]Anupam Datta, Sidharth Choudhury, Anupam Basu:
Using Randomized Rounding to Satisfy Timing Constraints of Real-Time Preemptive Tasks. ASP-DAC/VLSI Design 2002: 705-710 - 2001
- [c2]Lawrence M. Fagan, Daniel C. Berrios, Albert Chan, Russell J. Cucina, Anupam Datta, Maulik K. Shah, Sujith Surendran:
Information Retrieval Using UMLS-based Structured Queries. AMIA 2001 - [c1]Anupam Datta, Sidharth Choudhury, Anupam Basu, Hiroyuki Tomiyama, Nikil D. Dutt
:
Satisfying Timing Constraints of Preemptive Real-Time Tasks through Task Layout Technique. VLSI Design 2001: 97-102
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-10 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint