default search action
Bimal Viswanath
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Ya Xiao, Wenjia Song, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng (Daphne) Yao:
Measurement of Embedding Choices on Cryptographic API Completion Tasks. ACM Trans. Softw. Eng. Methodol. 33(3): 56:1-56:30 (2024) - [c33]Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath:
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape. SP 2024: 91-109 - [i9]Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath:
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape. CoRR abs/2404.16212 (2024) - 2023
- [j2]Ya Xiao, Wenjia Song, Jingyuan Qi, Bimal Viswanath, Patrick D. McDaniel, Danfeng Yao:
Specializing Neural Networks for Cryptographic Code Completion Applications. IEEE Trans. Software Eng. 49(6): 3524-3535 (2023) - [c32]Connor Weeks, Aravind Cheruvu, Sifat Muhammad Abdullah, Shravya Kanchi, Daphne Yao, Bimal Viswanath:
A First Look at Toxicity Injection Attacks on Open-domain Chatbots. ACSAC 2023: 521-534 - [c31]Jiameng Pu, Zain Sarwar, Sifat Muhammad Abdullah, Abdullah Rehman, Yoonjin Kim, Parantapa Bhattacharya, Mobin Javed, Bimal Viswanath:
Deepfake Text Detection: Limitations and Opportunities. SP 2023: 1613-1630 - 2022
- [c30]Ya Xiao, Salman Ahmed, Xinyang Ge, Bimal Viswanath, Na Meng, Danfeng Daphne Yao:
Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion. ICSE-Companion 2022: 360-361 - [i8]Jiameng Pu, Zain Sarwar, Sifat Muhammad Abdullah, Abdullah Rehman, Yoonjin Kim, Parantapa Bhattacharya, Mobin Javed, Bimal Viswanath:
Deepfake Text Detection: Limitations and Opportunities. CoRR abs/2210.09421 (2022) - 2021
- [c29]Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath:
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification. USENIX Security Symposium 2021: 2255-2272 - [c28]Jiameng Pu, Neal Mangaokar, Lauren Kelly, Parantapa Bhattacharya, Kavya Sundaram, Mobin Javed, Bolun Wang, Bimal Viswanath:
Deepfake Videos in the Wild: Analysis and Detection. WWW 2021: 981-992 - [i7]Jiameng Pu, Neal Mangaokar, Lauren Kelly, Parantapa Bhattacharya, Kavya Sundaram, Mobin Javed, Bolun Wang, Bimal Viswanath:
Deepfake Videos in the Wild: Analysis and Detection. CoRR abs/2103.04263 (2021) - [i6]Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath:
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification. CoRR abs/2103.04264 (2021) - [i5]Ya Xiao, Salman Ahmed, Wenjia Song, Xinyang Ge, Bimal Viswanath, Danfeng Yao:
Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons. CoRR abs/2103.08747 (2021) - [i4]Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath:
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models. CoRR abs/2104.02107 (2021) - 2020
- [c27]Jiameng Pu, Neal Mangaokar, Bolun Wang, Chandan K. Reddy, Bimal Viswanath:
NoiseScope: Detecting Deepfake Images in a Blind Setting. ACSAC 2020: 913-927 - [c26]Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath:
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models. EuroS&P 2020: 139-157 - [c25]Steve T. K. Jan, Qingying Hao, Tianrui Hu, Jiameng Pu, Sonal Oswal, Gang Wang, Bimal Viswanath:
Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation. SP 2020: 1190-1206
2010 – 2019
- 2019
- [c24]Peng Peng, Chao Xu, Luke Quinn, Hang Hu, Bimal Viswanath, Gang Wang:
What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites. AsiaCCS 2019: 181-192 - [c23]Bolun Wang, Yuanshun Yao, Shawn Shan, Huiying Li, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks. IEEE Symposium on Security and Privacy 2019: 707-723 - 2018
- [c22]Anupama Aggarwal, Bimal Viswanath, Liang Zhang, Saravana Kumar, Ayush Shah, Ponnurangam Kumaraguru:
I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions. EuroS&P 2018: 47-61 - [c21]Bolun Wang, Yuanshun Yao, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning. USENIX Security Symposium 2018: 1281-1297 - 2017
- [c20]Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao:
Automated Crowdturfing Attacks and Defenses in Online Review Systems. CCS 2017: 1143-1158 - [c19]Ruichuan Chen, Istemi Ekin Akkus, Bimal Viswanath, Ivica Rimac, Volker Hilt:
Towards Reliable Application Deployment in the Cloud. CoNEXT 2017: 464-477 - [c18]Yuanshun Yao, Zhujun Xiao, Bolun Wang, Bimal Viswanath, Haitao Zheng, Ben Y. Zhao:
Complexity vs. performance: empirical analysis of machine learning as a service. Internet Measurement Conference 2017: 384-397 - [c17]Jörg Thalheim, Antonio Rodrigues, Istemi Ekin Akkus, Pramod Bhatotia, Ruichuan Chen, Bimal Viswanath, Lei Jiao, Christof Fetzer:
Sieve: actionable insights from monitored metrics in distributed systems. Middleware 2017: 14-27 - [i3]Yuanshun Yao, Bimal Viswanath, Jenna Cryan, Haitao Zheng, Ben Y. Zhao:
Automated Crowdturfing Attacks and Defenses in Online Review Systems. CoRR abs/1708.08151 (2017) - [i2]Jörg Thalheim, Antonio Rodrigues, Istemi Ekin Akkus, Pramod Bhatotia, Ruichuan Chen, Bimal Viswanath, Lei Jiao, Christof Fetzer:
Sieve: Actionable Insights from Monitored Metrics in Microservices. CoRR abs/1709.06686 (2017) - 2016
- [b1]Bimal Viswanath:
Towards trustworthy social computing systems. Saarland University, 2016 - [c16]Giridhari Venkatadri, Oana Goga, Changtao Zhong, Bimal Viswanath, Krishna P. Gummadi, Nishanth Sastry:
Strengthening Weak Identities Through Inter-Domain Trust Transfer. WWW 2016: 1249-1259 - [i1]Anupama Aggarwal, Saravana Kumar, Ayush Shah, Bimal Viswanath, Liang Zhang, Ponnurangam Kumaraguru:
Spying Browser Extensions: Analysis and Detection. CoRR abs/1612.00766 (2016) - 2015
- [c15]Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha, Krishna P. Gummadi, Aniket Kate, Alan Mislove:
Strength in Numbers: Robust Tamper Detection in Crowd Computations. COSN 2015: 113-124 - 2014
- [c14]Mainack Mondal, Yabing Liu, Bimal Viswanath, Krishna P. Gummadi, Alan Mislove:
Understanding and Specifying Social Access Control Lists. SOUPS 2014: 271-283 - [c13]Bimal Viswanath, Muhammad Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Balachander Krishnamurthy, Alan Mislove:
Towards Detecting Anomalous User Behavior in Online Social Networks. USENIX Security Symposium 2014: 223-238 - 2012
- [c12]Bimal Viswanath, Mainack Mondal, Allen Clement, Peter Druschel, P. Krishna Gummadi, Alan Mislove, Ansley Post:
Exploring the design space of social network-based Sybil defenses. COMSNETS 2012: 1-8 - [c11]Mainack Mondal, Bimal Viswanath, Allen Clement, Peter Druschel, Krishna P. Gummadi, Alan Mislove, Ansley Post:
Defending against large-scale crawls in online social networks. CoNEXT 2012: 325-336 - [c10]Bimal Viswanath, Mainack Mondal, P. Krishna Gummadi, Alan Mislove, Ansley Post:
Canal: scaling social network-based Sybil tolerance schemes. EuroSys 2012: 309-322 - [c9]Bimal Viswanath, Emre Kiciman, Stefan Saroiu:
Keeping information safe from social networking apps. WOSN 2012: 49-54 - [c8]Saptarshi Ghosh, Bimal Viswanath, Farshad Kooti, Naveen Kumar Sharma, Gautam Korlam, Fabrício Benevenuto, Niloy Ganguly, P. Krishna Gummadi:
Understanding and combating link farming in the twitter social network. WWW 2012: 61-70 - [c7]Yabing Liu, Bimal Viswanath, Mainack Mondal, P. Krishna Gummadi, Alan Mislove:
Simplifying friendlist management. WWW (Companion Volume) 2012: 385-388 - 2011
- [j1]Bimal Viswanath, T. Venkatesh, C. Siva Ram Murthy:
A stochastic model for the behavior of multiple TCP NewReno sources over optical burst switching network. Photonic Netw. Commun. 22(2): 109-122 (2011) - [c6]Massimiliano Marcon, Bimal Viswanath, Meeyoung Cha, P. Krishna Gummadi:
Sharing social content from home: a measurement-driven feasibility study. NOSSDAV 2011: 45-50 - [c5]Mainack Mondal, Bimal Viswanath, Allen Clement, Peter Druschel, P. Krishna Gummadi, Alan Mislove, Ansley Post:
Limiting large-scale crawls of social networking sites. SIGCOMM 2011: 398-399 - 2010
- [c4]Bimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove:
An analysis of social network-based Sybil defenses. SIGCOMM 2010: 363-374 - [c3]Alan Mislove, Bimal Viswanath, P. Krishna Gummadi, Peter Druschel:
You are who you know: inferring user profiles in online social networks. WSDM 2010: 251-260
2000 – 2009
- 2009
- [c2]Bimal Viswanath, Alan Mislove, Meeyoung Cha, P. Krishna Gummadi:
On the evolution of user interaction in Facebook. WOSN 2009: 37-42 - 2007
- [c1]Bimal Viswanath, T. Venkatesh, C. Siva Ram Murthy:
A Markov Chain Model for TCP NewReno Over Optical Burst Switching Networks. GLOBECOM 2007: 2215-2219
Coauthor Index
aka: P. Krishna Gummadi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 23:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint