Calculated based on number of publications stored in Pure and citations from Scopus
20052024

Research activity per year

Filter
Conference contribution

Search results

  • 2022

    How algorithms shape the distribution of political advertising: Case studies of facebook, google, and TikTok

    Papakyriakopoulos, O., Tessono, C., Narayanan, A. & Kshirsagar, M., Jul 26 2022, AIES 2022 - Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society. Association for Computing Machinery, Inc, p. 532-546 15 p. (AIES 2022 - Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    11 Scopus citations
  • Password policies of most top websites fail to follow best practices

    Lee, K., Sjöberg, S. & Narayanan, A., 2022, Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022. USENIX Association, p. 561-580 20 p. (Proceedings of the 18th Symposium on Usable Privacy and Security, SOUPS 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    22 Scopus citations
  • Resurrecting Address Clustering in Bitcoin

    Möser, M. & Narayanan, A., 2022, Financial Cryptography and Data Security - 26th International Conference, FC 2022, Revised Selected Papers. Eyal, I. & Garay, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 386-403 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13411 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • The Worst of Both Worlds: A Comparative Analysis of Errors in Learning from Data in Psychology and Machine Learning

    Hullman, J., Kapoor, S., Nanayakkara, P., Gelman, A. & Narayanan, A., Jul 26 2022, AIES 2022 - Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society. Association for Computing Machinery, Inc, p. 335-348 14 p. (AIES 2022 - Proceedings of the 2022 AAAI/ACM Conference on AI, Ethics, and Society).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    13 Scopus citations
  • 2021

    Privacy policies over time: Curation and analysis of a million-document dataset

    Amos, R., Acar, G., Lucherini, E., Kshirsagar, M., Narayanan, A. & Mayer, J., Apr 19 2021, The Web Conference 2021 - Proceedings of the World Wide Web Conference, WWW 2021. Association for Computing Machinery, Inc, p. 2165-2176 12 p. (The Web Conference 2021 - Proceedings of the World Wide Web Conference, WWW 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    64 Scopus citations
  • Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States

    Lee, K. & Narayanan, A., 2021, Proceedings of the 2021 APWG Symposium on Electronic Crime Research, eCrime 2021. IEEE Computer Society, (eCrime Researchers Summit, eCrime; vol. 2021-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Virtual classrooms and real harms: Remote learning at U.S. Universities

    Cohney, S., Teixeira, R., Kohlbrenner, A., Narayanan, A., Kshirsagar, M., Shvartzshnaider, Y. & Sanfilippo, M., 2021, Proceedings of the 17th Symposium on Usable Privacy and Security, SOUPS 2021. USENIX Association, p. 653-673 21 p. (Proceedings of the 17th Symposium on Usable Privacy and Security, SOUPS 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • 2020

    An empirical study of wireless carrier authentication for SIM swaps

    Lee, K., Kaiser, B., Mayer, J. & Narayanan, A., 2020, Proceedings of the 16th Symposium on Usable Privacy and Security, SOUPS 2020. USENIX Association, p. 61-80 20 p. (Proceedings of the 16th Symposium on Usable Privacy and Security, SOUPS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Scopus citations
  • BlockSci: Design and applications of a blockchain analysis platform

    Kalodner, H., Möser, M., Lee, K., Goldfeder, S., Plattner, M., Chator, A. & Narayanan, A., 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association, p. 2721-2738 18 p. (Proceedings of the 29th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    100 Scopus citations
  • REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets

    Wang, A., Narayanan, A. & Russakovsky, O., 2020, Computer Vision – ECCV 2020 - 16th European Conference 2020, Proceedings. Vedaldi, A., Bischof, H., Brox, T. & Frahm, J.-M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 733-751 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12348 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • 2019

    Characterizing the use of browser-based blocking extensions to prevent online tracking

    Mathur, A., Narayanan, A., Vitak, J. & Chetty, M., Jan 1 2019, Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018. USENIX Association, p. 103-116 14 p. (Proceedings of the 14th Symposium on Usable Privacy and Security, SOUPS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • Formal barriers to longest-chain Proof-of-Stake protocols?

    Brown-Cohen, J., Narayanan, A., Psomas, A. & Matthew Weinberg, S., Jun 17 2019, ACM EC 2019 - Proceedings of the 2019 ACM Conference on Economics and Computation. Association for Computing Machinery, Inc, p. 459-473 15 p. (ACM EC 2019 - Proceedings of the 2019 ACM Conference on Economics and Computation).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    43 Scopus citations
  • Watching you watch: The tracking ecosystem of over-the-top TV streaming devices

    Moghaddam, H. M., Acar, G., Burgess, B., Mathur, A., Huang, D. Y., Feamster, N., Felten, E. W., Mittal, P. & Narayanan, A., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 131-147 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    53 Scopus citations
  • 2018

    Web-based attacks to discover and control local IoT devices

    Acar, G., Huang, D. Y., Li, F., Narayanan, A. & Feamster, N., Aug 7 2018, IoT S and P 2018 - Proceedings of the 2018 Workshop on IoT Security and Privacy, Part of SIGCOMM 2018. Association for Computing Machinery, Inc, p. 29-35 7 p. (IoT S and P 2018 - Proceedings of the 2018 Workshop on IoT Security and Privacy, Part of SIGCOMM 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    43 Scopus citations
  • When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

    Caliskan, A., Yamaguchi, F., Dauber, E., Harang, R., Rieck, K., Greenstadt, R. & Narayanan, A., 2018, 25th Annual Network and Distributed System Security Symposium, NDSS 2018. The Internet Society, (25th Annual Network and Distributed System Security Symposium, NDSS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    43 Scopus citations
  • 2017

    De-anonymizing web browsing data with social networks

    Su, J., Shukla, A., Goel, S. & Narayanan, A., 2017, 26th International World Wide Web Conference, WWW 2017. International World Wide Web Conferences Steering Committee, p. 1261-1269 9 p. 3052714. (26th International World Wide Web Conference, WWW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    69 Scopus citations
  • Escrow protocols for cryptocurrencies: How to buy physical goods using bitcoin

    Goldfeder, S., Bonneau, J., Gennaro, R. & Narayanan, A., 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Kiayias, A. (ed.). Springer Verlag, p. 321-339 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    46 Scopus citations
  • 2016

    Online tracking: A 1-million-site measurement and analysis

    Englehardt, S. & Narayanan, A., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1388-1401 14 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    493 Scopus citations
  • On the instability of Bitcoin without the block reward

    Carlsten, M., Kalodner, H., Narayanan, A. & Weinberg, S. M., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 154-167 14 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    239 Scopus citations
  • Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security

    Gennaro, R., Goldfeder, S. & Narayanan, A., 2016, Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Proceedings. Manulis, M., Schneider, S. & Sadeghi, A.-R. (eds.). Springer Verlag, p. 156-174 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    164 Scopus citations
  • 2015

    Cookies that give you away: The surveillance implications of web tracking

    Englehardt, S., Reisman, D., Eubank, C., Zimmerman, P., Mayer, J., Narayanan, A. & Felten, E. W., May 18 2015, WWW 2015 - Proceedings of the 24th International Conference on World Wide Web. Association for Computing Machinery, Inc, p. 289-299 11 p. (WWW 2015 - Proceedings of the 24th International Conference on World Wide Web).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    141 Scopus citations
  • De-anonymizing programmers via code stylometry

    Caliskan-Islam, A., Harang, R., Liu, A., Narayanan, A., Voss, C., Yamaguchi, F. & Greenstadt, R., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 255-270 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    172 Scopus citations
  • SoK: Research perspectives and challenges for bitcoin and cryptocurrencies

    Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A. & Felten, E. W., Jul 17 2015, Proceedings - 2015 IEEE Symposium on Security and Privacy, SP 2015. Institute of Electrical and Electronics Engineers Inc., p. 104-121 18 p. 7163021. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    826 Scopus citations
  • 2014

    Mixcoin: Anonymity for bitcoin with accountable mixes

    Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J. A. & Felten, E. W., 2014, Financial Cryptography and Data Security - 18th International Conference, FC 2014, Revised Selected Papers. Safavi-Naini, R. & Christin, N. (eds.). Springer Verlag, p. 486-504 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8437).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    331 Scopus citations
  • The web never forgets: Persistent tracking mechanisms in the wild

    Acar, G., Eubank, C., Englehardt, S., Juarez, M., Narayanan, A. & Diaz, C., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 674-689 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    341 Scopus citations
  • 2013

    A scanner darkly: Protecting user privacy from perceptual applications

    Jana, S., Narayanan, A. & Shmatikov, V., 2013, Proceedings - 2013 IEEE Symposium on Security and Privacy, SP 2013. p. 349-363 15 p. 6547120. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    119 Scopus citations
  • 2012

    On the feasibility of internet-scale author identification

    Narayanan, A., Paskov, H., Gong, N. Z., Bethencourt, J., Stefanov, E., Shin, E. C. R. & Song, D., 2012, Proceedings - 2012 IEEE Symposium on Security and Privacy, S and P 2012. Institute of Electrical and Electronics Engineers Inc., p. 300-314 15 p. 6234420. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    202 Scopus citations
  • 2011

    Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge

    Narayanan, A., Shi, E. & Rubinstein, B. I. P., 2011, 2011 International Joint Conference on Neural Networks, IJCNN 2011 - Final Program. p. 1825-1834 10 p. 6033446. (Proceedings of the International Joint Conference on Neural Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    114 Scopus citations
  • "You might also like:" Privacy risks of collaborative filtering

    Calandrino, J. A., Kilzer, A., Narayanan, A., Felten, E. W. & Shmatikov, V., 2011, Proceedings - 2011 IEEE Symposium on Security and Privacy, SP 2011. Institute of Electrical and Electronics Engineers Inc., p. 231-246 16 p. 5958032. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    262 Scopus citations
  • 2009

    De-anonymizing social networks

    Narayanan, A. & Shmatikov, V., 2009, 2009 30th IEEE Symposium on Security and Privacy. p. 173-187 15 p. 5207644. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    974 Scopus citations
  • 2008

    Robust de-anonymization of large sparse datasets

    Narayanan, A. & Shmatikov, V., 2008, Proceedings - 2008 IEEE Symposium on Security and Privacy, SP. p. 111-125 15 p. 4531148. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1666 Scopus citations
  • 2005

    Fast dictionary attacks on passwords using time-space tradeoff

    Narayanan, A. & Shmatikov, V., 2005, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security. p. 364-372 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    369 Scopus citations
  • Obfuscated databases and group privacy

    Narayanan, A. & Shmatikov, V., 2005, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security. p. 102-111 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations