팔로우
Bimal Viswanath
Bimal Viswanath
Assistant Professor of Computer Science at Virginia Tech
cs.vt.edu의 이메일 확인됨 - 홈페이지
제목
인용
인용
연도
On the evolution of user interaction in facebook
B Viswanath, A Mislove, M Cha, KP Gummadi
Proceedings of the 2nd ACM workshop on Online social networks, 37-42, 2009
18412009
You are who you know: inferring user profiles in online social networks
A Mislove, B Viswanath, KP Gummadi, P Druschel
Proceedings of the third ACM international conference on Web search and data …, 2010
9732010
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
7302019
Understanding and combating link farming in the twitter social network
S Ghosh, B Viswanath, F Kooti, NK Sharma, G Korlam, F Benevenuto, ...
Proceedings of the 21st international conference on World Wide Web, 61-70, 2012
4982012
An analysis of social network-based sybil defenses
B Viswanath, A Post, KP Gummadi, A Mislove
ACM SIGCOMM Computer Communication Review 40 (4), 363-374, 2010
4592010
Towards detecting anomalous user behavior in online social networks
B Viswanath, MA Bashir, M Crovella, S Guha, KP Gummadi, ...
23rd usenix security symposium (usenix security 14), 223-238, 2014
3262014
Automated crowdturfing attacks and defenses in online review systems
Y Yao, B Viswanath, J Cryan, H Zheng, BY Zhao
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1662017
With great training comes great vulnerability: Practical attacks against transfer learning
B Wang, Y Yao, B Viswanath, H Zheng, BY Zhao
27th USENIX security symposium (USENIX Security 18), 1281-1297, 2018
982018
Canal: Scaling social network-based Sybil tolerance schemes
B Viswanath, M Mondal, KP Gummadi, A Mislove, A Post
Proceedings of the 7th ACM european conference on Computer Systems, 309-322, 2012
872012
Complexity vs. performance: empirical analysis of machine learning as a service
Y Yao, Z Xiao, B Wang, B Viswanath, H Zheng, BY Zhao
Proceedings of the 2017 Internet Measurement Conference, 384-397, 2017
812017
Sieve: Actionable insights from monitored metrics in distributed systems
J Thalheim, A Rodrigues, IE Akkus, P Bhatotia, R Chen, B Viswanath, ...
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, 14-27, 2017
802017
Exploring the design space of social network-based sybil defenses
B Viswanath, M Mondal, A Clement, P Druschel, KP Gummadi, A Mislove, ...
2012 Fourth International Conference on Communication Systems and Networks …, 2012
612012
Strength in numbers: Robust tamper detection in crowd computations
B Viswanath, MA Bashir, MB Zafar, S Bouget, S Guha, KP Gummadi, ...
Proceedings of the 2015 ACM on Conference on Online Social Networks, 113-124, 2015
542015
Sharing social content from home: a measurement-driven feasibility study
M Marcon, B Viswanath, M Cha, KP Gummadi
Proceedings of the 21st international workshop on Network and operating …, 2011
412011
Defending against large-scale crawls in online social networks
M Mondal, B Viswanath, A Clement, P Druschel, KP Gummadi, A Mislove, ...
Proceedings of the 8th international conference on Emerging networking …, 2012
402012
Keeping information safe from social networking apps
B Viswanath, E Kiciman, S Saroiu
Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012
362012
Understanding and specifying social access control lists
M Mondal, Y Liu, B Viswanath, KP Gummadi, A Mislove
10th Symposium On Usable Privacy and Security (SOUPS 2014), 271-283, 2014
352014
Throwing darts in the dark? detecting bots with limited data using neural data augmentation
STK Jan, Q Hao, T Hu, J Pu, S Oswal, G Wang, B Viswanath
2020 IEEE symposium on security and privacy (SP), 1190-1206, 2020
302020
What happens after you leak your password: Understanding credential sharing on phishing sites
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
272019
{T-Miner}: A Generative Approach to Defend Against Trojan Attacks on {DNN-based} Text Classification
A Azizi, IA Tahmid, A Waheed, N Mangaokar, J Pu, M Javed, CK Reddy, ...
30th USENIX Security Symposium (USENIX Security 21), 2255-2272, 2021
262021
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20