Certified robustness to adversarial examples with differential privacy M Lecuyer, V Atlidakis, R Geambasu, D Hsu, S Jana 2019 IEEE symposium on security and privacy (SP), 656-672, 2019 | 1085 | 2019 |
Vanish: Increasing Data Privacy with Self-Destructing Data. R Geambasu, T Kohno, AA Levy, HM Levy USENIX security symposium 316, 10-5555, 2009 | 584 | 2009 |
FairTest: Discovering Unwarranted Associations in Data-Driven Applications F Tramer, V Atlidakis, R Geambasu, D Hsu, JP Hubaux, M Humbert, ... IEEE European Symposium on Security and Privacy (EuroS&P), 2017 | 214 | 2017 |
XRay: Increasing the Web's Transparency with Differential Correlation M Lecuyer, G Ducoffe, F Lan, A Papancea, T Petsios, R Spahn, ... Proceedings of the USENIX Security Symposium, 2014 | 163* | 2014 |
{CleanOS}: Limiting Mobile Data Exposure with Idle Eviction Y Tang, P Ames, S Bhamidipati, A Bijlani, R Geambasu, N Sarda 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012 | 149 | 2012 |
Comet: An Active Distributed {Key-Value} Store R Geambasu, AA Levy, T Kohno, A Krishnamurthy, HM Levy 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 122 | 2010 |
Sunlight: Fine-grained targeting detection at scale with statistical confidence M Lecuyer, R Spahn, Y Spiliopolous, A Chaintreau, R Geambasu, D Hsu Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 94 | 2015 |
Homeviews: peer-to-peer middleware for personal data sharing applications R Geambasu, M Balazinska, SD Gribble, HM Levy Proceedings of the 2007 ACM SIGMOD international conference on Management of …, 2007 | 90 | 2007 |
Systems and methods for file access auditing T Kohno, R Geambasu, H Levy, S Gribble US Patent 9,489,523, 2016 | 79 | 2016 |
POSIX abstractions in modern operating systems: The old, the new, and the missing V Atlidakis, J Andrus, R Geambasu, D Mitropoulos, J Nieh Proceedings of the Eleventh European Conference on Computer Systems, 1-17, 2016 | 75 | 2016 |
Toward training at imagenet scale with differential privacy A Kurakin, S Song, S Chien, R Geambasu, A Terzis, A Thakurta arXiv preprint arXiv:2201.12328, 2022 | 74 | 2022 |
Synapse: a microservices architecture for heterogeneous-database web applications N Viennot, M Lécuyer, J Bell, R Geambasu, J Nieh Proceedings of the tenth european conference on computer systems, 1-16, 2015 | 73 | 2015 |
Encapsulation and decapsulation for data disintegration T Kohno, R Geambasu, HM Levy US Patent 8,520,855, 2013 | 72 | 2013 |
Keypad: An auditing file system for theft-prone devices R Geambasu, JP John, SD Gribble, T Kohno, HM Levy Proceedings of the sixth conference on Computer systems, 1-16, 2011 | 70 | 2011 |
Organizing and sharing distributed personal web-service data R Geambasu, C Cheung, A Moshchuk, SD Gribble, HM Levy Proceedings of the 17th international conference on World Wide Web, 755-764, 2008 | 63 | 2008 |
CloudViews: Communal Data Sharing in Public Clouds. R Geambasu, SD Gribble, HM Levy HotCloud, 2009 | 52 | 2009 |
Pythia: grammar-based fuzzing of rest apis with coverage-guided feedback and learning-based mutations V Atlidakis, R Geambasu, P Godefroid, M Polishchuk, B Ray arXiv preprint arXiv:2005.11498, 2020 | 49 | 2020 |
Privacy accounting and quality control in the sage differentially private ML platform M Lécuyer, R Spahn, K Vodrahalli, R Geambasu, D Hsu Proceedings of the 27th ACM Symposium on Operating Systems Principles, 181-195, 2019 | 49 | 2019 |
The meerkats cloud security architecture AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ... 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 43 | 2012 |
Privacy budget scheduling T Luo, M Pan, P Tholoniat, A Cidon, R Geambasu, M Lécuyer 15th {USENIX} Symposium on Operating Systems Design and Implementation …, 2021 | 38 | 2021 |