Calculated based on number of publications stored in Pure and citations from Scopus
20062025

Research activity per year

Filter
Conference contribution

Search results

  • 2018

    Blind source separation in the physical layer

    Tait, A. N., De Lima, T. F., Ma, P. Y., Chang, M. P., Nahmias, M. A., Shastri, B. J., Mittal, P. & Prucnal, P. R., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Enhancing robustness of machine learning systems via data transformations

    Bhagoji, A. N., Cullina, D., Sitawarin, C. & Mittal, P., May 21 2018, 2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. (2018 52nd Annual Conference on Information Sciences and Systems, CISS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    144 Scopus citations
  • Fundamental Limits of Database Alignment

    Cullina, D., Mittal, P. & Kiyavash, N., Aug 15 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., p. 651-655 5 p. 8437908. (IEEE International Symposium on Information Theory - Proceedings; vol. 2018-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    26 Scopus citations
  • How to quantify graph De-anonymization risks

    Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R. B., 2018, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Mori, P., Camp, O. & Furnell, S. (eds.). Springer Verlag, p. 84-104 21 p. (Communications in Computer and Information Science; vol. 867).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Learning Informative and Private Representations via Generative Adversarial Networks

    Yang, T. Y., Brinton, C., Mittal, P., Chiang, M. & Lan, A., Jul 2 2018, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Abe, N., Liu, H., Pu, C., Hu, X., Ahmed, N., Qiao, M., Song, Y., Kossmann, D., Liu, B., Lee, K., Tang, J., He, J. & Saltz, J. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 1534-1543 10 p. 8622089. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • MVG mechanism: Differential privacy under matrix-valued query

    Chanyaswad, T., Dytso, A., Poor, H. V. & Mittal, P., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 230-246 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    32 Scopus citations
  • SAQL: A stream-based query system for real-time abnormal system behavior detection

    Gao, P., Xiao, X., Li, D., Li, Z., Jee, K., Wu, Z., Kim, C. H., Kulkarni, S. R. & Mittal, P., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SAQL: A stream-based query system for real-time abnormal system behavior detection

    Gao, P., Xiao, X., Li, D., Li, Z., Jee, K., Wu, Z., Kim, C. H., Kulkarni, S. R. & Mittal, P., 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 27th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    88 Scopus citations
  • SYBILFUSE: Combining local attributes with global structure to perform robust sybil detection

    Gao, P., Wang, B., Gong, N. Z., Kulkarni, S. R., Thomas, K. & Mittal, P., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433147. (2018 IEEE Conference on Communications and Network Security, CNS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    44 Scopus citations
  • Towards a Timely Causality Analysis for Enterprise Security

    Liu, Y., Zhang, M., Li, D., Jee, K., Li, Z., Wu, Z., Rhee, J. & Mittal, P., 2018, 25th Annual Network and Distributed System Security Symposium, NDSS 2018. The Internet Society, (25th Annual Network and Distributed System Security Symposium, NDSS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    139 Scopus citations
  • 2017

    Blind De-anonymization Attacks using Social Networks

    Lee, W. H., Ji, S., Liu, C., Mittal, P. & Lee, R. B., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 1-4 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    17 Scopus citations
  • Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks

    Zhou, Y., Wagh, S., Mittal, P. & Wentzlaff, D., May 5 2017, Proceedings - 2017 IEEE 23rd Symposium on High Performance Computer Architecture, HPCA 2017. IEEE Computer Society, p. 337-348 12 p. 7920837. (Proceedings - International Symposium on High-Performance Computer Architecture).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Scopus citations
  • Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks

    Sun, Y., Edmundson, A., Feamster, N., Chiang, M. & Mittal, P., Jun 23 2017, 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 977-992 16 p. 7958620. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    45 Scopus citations
  • Poster: Inaudible voice commands

    Song, L. & Mittal, P., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2583-2585 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    42 Scopus citations
  • Quantification of de-anonymization risks in social networks

    Lee, W. H., Liu, C., Ji, S., Mittal, P. & Lee, R., 2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). SciTePress, p. 126-135 10 p. (ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Scopus citations
  • TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

    Liu, Z., Liu, Y., Winter, P., Mittal, P. & Hu, Y. C., Nov 21 2017, 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 8117564. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2017-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Using EEG-based BCI devices to subliminally probe for private information

    Frank, M., Hwu, T., Jain, S., Knight, R. T., Martinovic, I., Mittal, P., Perito, D., Sluganovic, I. & Song, D., Oct 30 2017, WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 133-136 4 p. (WPES 2017 - Proceedings of the 2017 Workshop on Privacy in the Electronic Society, co-located with CCS 2017; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • 2016

    Dependence Makes You Vulnerable: Differential Privacy Under Dependent Tuples

    Liu, C., Chakraborty, S. & Mittal, P., 2016, 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society, (23rd Annual Network and Distributed System Security Symposium, NDSS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    138 Scopus citations
  • Discriminant-component eigenfaces for privacy-preserving face recognition

    Chanyaswad, T., Chang, J. M., Mittal, P. & Kung, S. Y., Nov 8 2016, 2016 IEEE International Workshop on Machine Learning for Signal Processing, MLSP 2016 - Proceedings. Diamantaras, K., Uncini, A., Palmieri, F. A. N. & Larsen, J. (eds.). IEEE Computer Society, 7738871. (IEEE International Workshop on Machine Learning for Signal Processing, MLSP; vol. 2016-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Learning Privacy Expectations by Crowdsourcing Contextual Informational Norms

    Shvartzshnaider, Y., Tong, S., Wies, T., Kift, P., Nissenbaum, H., Subramanian, L. & Mittal, P., Nov 3 2016, Proceedings of the 4th AAAI Conference on Human Computation and Crowdsourcing, HCOMP 2016. Ghosh, A. & Lease, M. (eds.). AAAI press, p. 209-218 10 p. (Proceedings of the 4th AAAI Conference on Human Computation and Crowdsourcing, HCOMP 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Scopus citations
  • LinkMirage: Enabling Privacy-preserving Analytics on Social Relationships

    Liu, C. & Mittal, P., 2016, 23rd Annual Network and Distributed System Security Symposium, NDSS 2016. The Internet Society, (23rd Annual Network and Distributed System Security Symposium, NDSS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    33 Scopus citations
  • On the relative de-anonymizability of graph data: Quantification and evaluation

    Ji, S., Li, W., Yang, S., Mittal, P. & Beyah, R., Jul 27 2016, IEEE INFOCOM 2016 - 35th Annual IEEE International Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., 7524585. (Proceedings - IEEE INFOCOM; vol. 2016-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • SmartWalk: Enhancing social network security via adaptive random walks

    Liu, Y., Ji, S. & Mittal, P., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 492-503 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    24 Scopus citations
  • 2015

    Exploiting temporal dynamics in Sybil defenses

    Liu, C., Gao, P., Wright, M. & Mittal, P., Oct 12 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 805-816 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    26 Scopus citations
  • Raptor: Routing attacks on privacy in tor

    Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M. & Mittal, P., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 271-286 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    174 Scopus citations
  • Raptor: Routing attacks on privacy in tor

    Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M. & Mittal, P., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 271-286 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

    Ji, S., Li, W., Mittal, P., Hu, X. & Beyah, R., 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 303-318 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    94 Scopus citations
  • Secgraph: A uniform and open-source evaluation system for graph data anonymization and de-anonymization

    Ji, S., Li, W., Mittal, P., Hu, X. & Beyah, R., Jan 1 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 303-318 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Anonymity on QuickSand: Using BGP to compromise tor

    Vanbever, L., Li, O., Rexford, J. L. & Mittal, P., Oct 27 2014, Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014. Association for Computing Machinery, 2673869. (Proceedings of the 13th ACM Workshop on Hot Topics in Networks, HotNets 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Re3: Relay reliability reputation for anonymity systems

    Das, A., Borisov, N., Mittal, P. & Caesar, M., Jun 4 2014, ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. Association for Computing Machinery, Inc, p. 63-74 12 p. (ASIA CCS 2014 - Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2012

    Cachet: A decentralized architecture for privacy preserving social networking with caching

    Nilizadeh, S., Jahid, S., Mittal, P., Borisov, N. & Kapadia, A., 2012, CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies. p. 337-348 12 p. (CoNEXT 2012 - Proceedings of the 2012 ACM Conference on Emerging Networking Experiments and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    96 Scopus citations
  • DECENT: A decentralized architecture for enforcing privacy in online social networks

    Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N. & Kapadia, A., 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 326-332 7 p. 6197504. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    80 Scopus citations
  • Evolution of social-attribute networks: Measurements, modeling, and implications using Google+

    Gong, N. Z., Xu, W., Huang, L., Mittal, P., Stefanov, E., Sekar, V. & Song, D., 2012, IMC 2012 - Proceedings of the ACM Internet Measurement Conference. p. 131-144 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    149 Scopus citations
  • SybilControl: Practical sybil defense with computational puzzles

    Li, F., Mittal, P., Caesar, M. & Borisov, N., 2012, STC'12 - Proceedings of the Workshop on Scalable Trusted Computing. p. 67-78 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • 2011

    EASiER: Encryption-based access control in social networks with efficient revocation

    Jahid, S., Mittal, P. & Borisov, N., 2011, Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011. Association for Computing Machinery, p. 411-415 5 p. (Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    201 Scopus citations
  • PIR-Tor: Scalable anonymous communication using private information retrieval

    Mittal, P., Olumofin, F., Troncoso, C., Borisov, N. & Goldberg, I., Jan 1 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 475-490 16 p. (Proceedings of the 20th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • PIR-Tor: Scalable anonymous communication using private information retrieval

    Mittal, P., Olumofin, F., Troncoso, C., Borisov, N. & Goldberg, I., 2011, Proceedings of the 20th USENIX Security Symposium. USENIX Association, p. 475-490 16 p. (Proceedings of the 20th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    80 Scopus citations
  • Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting

    Mittal, P., Khurshid, A., Juen, J., Caesar, M. & Borisov, N., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 215-226 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    87 Scopus citations
  • 2010

    BotGrep: Finding P2P bots with structured graph analysis

    Nagaraja, S., Mittal, P., Hong, C. Y., Caesar, M. & Borisov, N., Jan 1 2010, Proceedings of the 19th USENIX Security Symposium. USENIX Association, p. 95-110 16 p. (Proceedings of the 19th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • BotGrep: Finding P2P bots with structured graph analysis

    Nagaraja, S., Mittal, P., Hong, C. Y., Caesar, M. & Borisov, N., 2010, Proceedings of the 19th USENIX Security Symposium. USENIX Association, p. 95-110 16 p. (Proceedings of the 19th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    208 Scopus citations
  • In search of an anonymous and secure lookup attacks on structured peer-to-peer anonymous communication systems

    Wang, Q., Mittal, P. & Borisov, N., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 308-318 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • 2009

    ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies

    Mittal, P. & Borisov, N., 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 161-172 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    64 Scopus citations
  • 2008

    Fair k mutual exclusion algorithm for peer to peer systems

    Reddy, V. A., Mittal, P. & Gupta, I., 2008, Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008. p. 655-662 8 p. 4595939. (Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Information leaks in structured peer-to-peer anonymous communication systems

    Mittal, P. & Borisov, N., 2008, Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. p. 267-278 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    35 Scopus citations
  • 2007

    Denial of service or denial of security?

    Borisov, N., Danezis, G., Mittal, P. & Tabriz, P., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 92-102 11 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    102 Scopus citations
  • 2006

    Defeating reflector attacks: Signature conflict triggered filtering

    Mittal, P., Barua, G. & Narang, S., 2006, 5th European Conference on Information Warfare and Security 2006, ECIW 2006. p. 169-176 8 p. (5th European Conference on Information Warfare and Security 2006, ECIW 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations