Semantics of programming languages: structures and techniques CA Gunter MIT press, 1992 | 1040 | 1992 |
Property inference attacks on fully connected neural networks using permutation invariant representations K Ganju, Q Wang, W Yang, CA Gunter, N Borisov Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 498 | 2018 |
The SwitchWare active network architecture DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ... IEEE Network 12 (3), 29-36, 1998 | 479 | 1998 |
PLAN: A packet language for active networks M Hicks, P Kakkar, JT Moore, CA Gunter, S Nettles ACM International Conference on Functional Programming Languages (ICFP ’98 …, 1998 | 473 | 1998 |
Semantic domains CA Gunter, DS Scott Handbook of Theoretical Computer Science, 633-674, 1990 | 446* | 1990 |
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 438 | 2017 |
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System C Friedman, J Rubin, J Brown, M Buntin, M Corn, L Etheredge, C Gunter, ... Journal of the American Medical Informatics Association 22 (1), 43-50, 2015 | 426 | 2015 |
Dynamic Searchable Encryption via Blind Storage. M Naveed, M Prabhakaran, CA Gunter EEE Symposium on Security and Privacy, San Jose, CA 2014, 2014 | 401 | 2014 |
A reference model for requirements and specifications CA Gunter, EL Gunter, M Jackson, P Zave IEEE Software 17 (3), 37-43, 2000 | 400 | 2000 |
Inheritance as implicit coercion V Breazu-Tannen, T Coquand, CA Gunter, A Scedrov Information and computation 93 (1), 172-221, 1991 | 348 | 1991 |
Privacy in the genomic era M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ... ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015 | 331 | 2015 |
Active network encapsulation protocol (ANEP) DS Alexander, CA Gunter, AD Keromytis, G Minden, D Wetherall, ... Active Networks Request for Comments, 1997 | 297 | 1997 |
Detecting ai trojans using meta neural analysis X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li 2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021 | 293 | 2021 |
{CommanderSong}: a systematic approach for practical adversarial voice recognition X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ... 27th USENIX security symposium (USENIX security 18), 49-64, 2018 | 279 | 2018 |
Understanding membership inferences on well-generalized learning models Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ... arXiv preprint arXiv:1802.04889, 2018 | 273 | 2018 |
Fear and logging in the internet of things Q Wang, WU Hassan, A Bates, C Gunter Network and Distributed Systems Symposium, 2018 | 259 | 2018 |
Formal verification of standards for distance vector routing protocols K Bhargavan, D Obradovic, CA Gunter Journal of the ACM (JACM) 49 (4), 538-576, 2002 | 253 | 2002 |
Identity, location, disease and more: Inferring your secrets from Android public resources X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ... Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 249 | 2013 |
Privacy and security in mobile health: a research agenda D Kotz, CA Gunter, S Kumar, JP Weiner Computer 49 (6), 22-30, 2016 | 221 | 2016 |
PLANet: An active internetwork M Hicks, JT Moore, DS Alexander, CA Gunter, SM Nettles IEEE Conference on Computer Communications (INFOCOM '99) 3, 1124-1133 vol. 3, 1999 | 186 | 1999 |