Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ankur Taly
@article{DBLP:journals/corr/abs-2402-08096, author = {Andrew Bai and Chih{-}Kuan Yeh and Cho{-}Jui Hsieh and Ankur Taly}, title = {Which Pretrain Samples to Rehearse when Finetuning Pretrained Models?}, journal = {CoRR}, volume = {abs/2402.08096}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.08096}, doi = {10.48550/ARXIV.2402.08096}, eprinttype = {arXiv}, eprint = {2402.08096}, timestamp = {Mon, 19 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-08096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23, author = {Clark W. Barrett and Brad Boyd and Elie Bursztein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {Found. Trends Priv. Secur.}, volume = {6}, number = {1}, pages = {1--52}, year = {2023}, url = {https://doi.org/10.1561/3300000041}, doi = {10.1561/3300000041}, timestamp = {Sun, 24 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftsec/BarrettBBCCCCCDFFHHJKKMMRSSTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-14840, author = {Clark W. Barrett and Brad Boyd and Ellie Burzstein and Nicholas Carlini and Brad Chen and Jihye Choi and Amrita Roy Chowdhury and Mihai Christodorescu and Anupam Datta and Soheil Feizi and Kathleen Fisher and Tatsunori Hashimoto and Dan Hendrycks and Somesh Jha and Daniel Kang and Florian Kerschbaum and Eric Mitchell and John C. Mitchell and Zulfikar Ramzan and Khawaja Shams and Dawn Song and Ankur Taly and Diyi Yang}, title = {Identifying and Mitigating the Security Risks of Generative {AI}}, journal = {CoRR}, volume = {abs/2308.14840}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.14840}, doi = {10.48550/ARXIV.2308.14840}, eprinttype = {arXiv}, eprint = {2308.14840}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-14840.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mima/WatsonGTF22, author = {David S. Watson and Limor Gultchin and Ankur Taly and Luciano Floridi}, title = {Local Explanations via Necessity and Sufficiency: Unifying Theory and Practice}, journal = {Minds Mach.}, volume = {32}, number = {1}, pages = {185--218}, year = {2022}, url = {https://doi.org/10.1007/s11023-022-09598-7}, doi = {10.1007/S11023-022-09598-7}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mima/WatsonGTF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/YehTSLR22, author = {Chih{-}Kuan Yeh and Ankur Taly and Mukund Sundararajan and Frederick Liu and Pradeep Ravikumar}, editor = {Sanmi Koyejo and S. Mohamed and A. Agarwal and Danielle Belgrave and K. Cho and A. Oh}, title = {First is Better Than Last for Language Data Influence}, booktitle = {Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, NeurIPS 2022, New Orleans, LA, USA, November 28 - December 9, 2022}, year = {2022}, url = {http://papers.nips.cc/paper\_files/paper/2022/hash/d07022783ff6f7bf7a288c207b7dcbd1-Abstract-Conference.html}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/YehTSLR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-11844, author = {Chih{-}Kuan Yeh and Ankur Taly and Mukund Sundararajan and Frederick Liu and Pradeep Ravikumar}, title = {First is Better Than Last for Training Data Influence}, journal = {CoRR}, volume = {abs/2202.11844}, year = {2022}, url = {https://arxiv.org/abs/2202.11844}, eprinttype = {arXiv}, eprint = {2202.11844}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-11844.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-02107, author = {Aya Abdelsalam Ismail and Sercan {\"{O}}. Arik and Jinsung Yoon and Ankur Taly and Soheil Feizi and Tomas Pfister}, title = {Interpretable Mixture of Experts for Structured Data}, journal = {CoRR}, volume = {abs/2206.02107}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.02107}, doi = {10.48550/ARXIV.2206.02107}, eprinttype = {arXiv}, eprint = {2206.02107}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-02107.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uai/WatsonGTF21, author = {David S. Watson and Limor Gultchin and Ankur Taly and Luciano Floridi}, editor = {Cassio P. de Campos and Marloes H. Maathuis and Erik Quaeghebeur}, title = {Local explanations via necessity and sufficiency: unifying theory and practice}, booktitle = {Proceedings of the Thirty-Seventh Conference on Uncertainty in Artificial Intelligence, {UAI} 2021, Virtual Event, 27-30 July 2021}, series = {Proceedings of Machine Learning Research}, volume = {161}, pages = {1382--1392}, publisher = {{AUAI} Press}, year = {2021}, url = {https://proceedings.mlr.press/v161/watson21a.html}, timestamp = {Fri, 17 Dec 2021 17:06:27 +0100}, biburl = {https://dblp.org/rec/conf/uai/WatsonGTF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14651, author = {David S. Watson and Limor Gultchin and Ankur Taly and Luciano Floridi}, title = {Local Explanations via Necessity and Sufficiency: Unifying Theory and Practice}, journal = {CoRR}, volume = {abs/2103.14651}, year = {2021}, url = {https://arxiv.org/abs/2103.14651}, eprinttype = {arXiv}, eprint = {2103.14651}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14651.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-14976, author = {Ana Lucic and Madhulika Srikumar and Umang Bhatt and Alice Xiang and Ankur Taly and Q. Vera Liao and Maarten de Rijke}, title = {A Multistakeholder Approach Towards Evaluating {AI} Transparency Mechanisms}, journal = {CoRR}, volume = {abs/2103.14976}, year = {2021}, url = {https://arxiv.org/abs/2103.14976}, eprinttype = {arXiv}, eprint = {2103.14976}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-14976.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdmake/MerrickT20, author = {Luke Merrick and Ankur Taly}, editor = {Andreas Holzinger and Peter Kieseberg and A Min Tjoa and Edgar R. Weippl}, title = {The Explanation Game: Explaining Machine Learning Models Using Shapley Values}, booktitle = {Machine Learning and Knowledge Extraction - 4th {IFIP} {TC} 5, {TC} 12, {WG} 8.4, {WG} 8.9, {WG} 12.9 International Cross-Domain Conference, {CD-MAKE} 2020, Dublin, Ireland, August 25-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12279}, pages = {17--38}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57321-8\_2}, doi = {10.1007/978-3-030-57321-8\_2}, timestamp = {Thu, 20 Aug 2020 13:51:47 +0200}, biburl = {https://dblp.org/rec/conf/cdmake/MerrickT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fat/BhattXSWTJGPME20, author = {Umang Bhatt and Alice Xiang and Shubham Sharma and Adrian Weller and Ankur Taly and Yunhan Jia and Joydeep Ghosh and Ruchir Puri and Jos{\'{e}} M. F. Moura and Peter Eckersley}, editor = {Mireille Hildebrandt and Carlos Castillo and L. Elisa Celis and Salvatore Ruggieri and Linnet Taylor and Gabriela Zanfir{-}Fortuna}, title = {Explainable machine learning in deployment}, booktitle = {FAT* '20: Conference on Fairness, Accountability, and Transparency, Barcelona, Spain, January 27-30, 2020}, pages = {648--657}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3351095.3375624}, doi = {10.1145/3351095.3375624}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fat/BhattXSWTJGPME20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fat/GadeGKMT20, author = {Krishna Gade and Sahin Cem Geyik and Krishnaram Kenthapadi and Varun Mithal and Ankur Taly}, editor = {Mireille Hildebrandt and Carlos Castillo and L. Elisa Celis and Salvatore Ruggieri and Linnet Taylor and Gabriela Zanfir{-}Fortuna}, title = {Explainable {AI} in industry: practical challenges and lessons learned: implications tutorial}, booktitle = {FAT* '20: Conference on Fairness, Accountability, and Transparency, Barcelona, Spain, January 27-30, 2020}, pages = {699}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3351095.3375664}, doi = {10.1145/3351095.3375664}, timestamp = {Thu, 26 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fat/GadeGKMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/GadeGKMT20, author = {Krishna Gade and Sahin Cem Geyik and Krishnaram Kenthapadi and Varun Mithal and Ankur Taly}, editor = {Amal El Fallah Seghrouchni and Gita Sukthankar and Tie{-}Yan Liu and Maarten van Steen}, title = {Explainable {AI} in Industry: Practical Challenges and Lessons Learned}, booktitle = {Companion of The 2020 Web Conference 2020, Taipei, Taiwan, April 20-24, 2020}, pages = {303--304}, publisher = {{ACM} / {IW3C2}}, year = {2020}, url = {https://doi.org/10.1145/3366424.3383110}, doi = {10.1145/3366424.3383110}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/GadeGKMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aies/GargPLTCB19, author = {Sahaj Garg and Vincent Perot and Nicole Limtiaco and Ankur Taly and Ed H. Chi and Alex Beutel}, editor = {Vincent Conitzer and Gillian K. Hadfield and Shannon Vallor}, title = {Counterfactual Fairness in Text Classification through Robustness}, booktitle = {Proceedings of the 2019 {AAAI/ACM} Conference on AI, Ethics, and Society, {AIES} 2019, Honolulu, HI, USA, January 27-28, 2019}, pages = {219--226}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3306618.3317950}, doi = {10.1145/3306618.3317950}, timestamp = {Thu, 11 Jul 2019 09:23:07 +0200}, biburl = {https://dblp.org/rec/conf/aies/GargPLTCB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iui/SundararajanXTS19, author = {Mukund Sundararajan and Jinhua Xu and Ankur Taly and Rory Sayres and Amir Najmi}, editor = {Christoph Trattner and Denis Parra and Nathalie Riche}, title = {Exploring Principled Visualizations for Deep Network Attributions}, booktitle = {Joint Proceedings of the {ACM} {IUI} 2019 Workshops co-located with the 24th {ACM} Conference on Intelligent User Interfaces {(ACM} {IUI} 2019), Los Angeles, USA, March 20, 2019}, series = {{CEUR} Workshop Proceedings}, volume = {2327}, publisher = {CEUR-WS.org}, year = {2019}, url = {https://ceur-ws.org/Vol-2327/IUI19WS-ExSS2019-16.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:10 +0100}, biburl = {https://dblp.org/rec/conf/iui/SundararajanXTS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/GopinathCPT19, author = {Divya Gopinath and Hayes Converse and Corina S. Pasareanu and Ankur Taly}, title = {Property Inference for Deep Neural Networks}, booktitle = {34th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2019, San Diego, CA, USA, November 11-15, 2019}, pages = {797--809}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ASE.2019.00079}, doi = {10.1109/ASE.2019.00079}, timestamp = {Sun, 19 Jan 2020 15:18:02 +0100}, biburl = {https://dblp.org/rec/conf/kbse/GopinathCPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/GadeGKMT19, author = {Krishna Gade and Sahin Cem Geyik and Krishnaram Kenthapadi and Varun Mithal and Ankur Taly}, editor = {Ankur Teredesai and Vipin Kumar and Ying Li and R{\'{o}}mer Rosales and Evimaria Terzi and George Karypis}, title = {Explainable {AI} in Industry}, booktitle = {Proceedings of the 25th {ACM} {SIGKDD} International Conference on Knowledge Discovery {\&} Data Mining, {KDD} 2019, Anchorage, AK, USA, August 4-8, 2019}, pages = {3203--3204}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292500.3332281}, doi = {10.1145/3292500.3332281}, timestamp = {Tue, 16 Aug 2022 23:04:27 +0200}, biburl = {https://dblp.org/rec/conf/kdd/GadeGKMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-13215, author = {Divya Gopinath and Ankur Taly and Hayes Converse and Corina S. Pasareanu}, title = {Finding Invariants in Deep Neural Networks}, journal = {CoRR}, volume = {abs/1904.13215}, year = {2019}, url = {http://arxiv.org/abs/1904.13215}, eprinttype = {arXiv}, eprint = {1904.13215}, timestamp = {Thu, 02 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-13215.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-06342, author = {Umang Bhatt and Alice Xiang and Shubham Sharma and Adrian Weller and Ankur Taly and Yunhan Jia and Joydeep Ghosh and Ruchir Puri and Jos{\'{e}} M. F. Moura and Peter Eckersley}, title = {Explainable Machine Learning in Deployment}, journal = {CoRR}, volume = {abs/1909.06342}, year = {2019}, url = {http://arxiv.org/abs/1909.06342}, eprinttype = {arXiv}, eprint = {1909.06342}, timestamp = {Thu, 14 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-06342.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-08128, author = {Luke Merrick and Ankur Taly}, title = {The Explanation Game: Explaining Machine Learning Models with Cooperative Game Theory}, journal = {CoRR}, volume = {abs/1909.08128}, year = {2019}, url = {http://arxiv.org/abs/1909.08128}, eprinttype = {arXiv}, eprint = {1909.08128}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-08128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/MudrakartaTSD18, author = {Pramod Kaushik Mudrakarta and Ankur Taly and Mukund Sundararajan and Kedar Dhamdhere}, editor = {Iryna Gurevych and Yusuke Miyao}, title = {Did the Model Understand the Question?}, booktitle = {Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, {ACL} 2018, Melbourne, Australia, July 15-20, 2018, Volume 1: Long Papers}, pages = {1896--1906}, publisher = {Association for Computational Linguistics}, year = {2018}, url = {https://aclanthology.org/P18-1176/}, doi = {10.18653/V1/P18-1176}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/MudrakartaTSD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-04579, author = {Pramod Kaushik Mudrakarta and Ankur Taly and Mukund Sundararajan and Kedar Dhamdhere}, title = {It was the training data pruning too!}, journal = {CoRR}, volume = {abs/1803.04579}, year = {2018}, url = {http://arxiv.org/abs/1803.04579}, eprinttype = {arXiv}, eprint = {1803.04579}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-04579.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-05492, author = {Pramod Kaushik Mudrakarta and Ankur Taly and Mukund Sundararajan and Kedar Dhamdhere}, title = {Did the Model Understand the Question?}, journal = {CoRR}, volume = {abs/1805.05492}, year = {2018}, url = {http://arxiv.org/abs/1805.05492}, eprinttype = {arXiv}, eprint = {1805.05492}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-05492.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-04205, author = {Mukund Sundararajan and Ankur Taly}, title = {A Note about: Local Explanation Methods for Deep Neural Networks lack Sensitivity to Parameter Values}, journal = {CoRR}, volume = {abs/1806.04205}, year = {2018}, url = {http://arxiv.org/abs/1806.04205}, eprinttype = {arXiv}, eprint = {1806.04205}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-04205.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-10610, author = {Sahaj Garg and Vincent Perot and Nicole Limtiaco and Ankur Taly and Ed H. Chi and Alex Beutel}, title = {Counterfactual Fairness in Text Classification through Robustness}, journal = {CoRR}, volume = {abs/1809.10610}, year = {2018}, url = {http://arxiv.org/abs/1809.10610}, eprinttype = {arXiv}, eprint = {1809.10610}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-10610.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-11310, author = {Kevin McCloskey and Ankur Taly and Federico Monti and Michael P. Brenner and Lucy J. Colwell}, title = {Using Attribution to Decode Dataset Bias in Neural Network Models for Chemistry}, journal = {CoRR}, volume = {abs/1811.11310}, year = {2018}, url = {http://arxiv.org/abs/1811.11310}, eprinttype = {arXiv}, eprint = {1811.11310}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-11310.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/SundararajanTY17, author = {Mukund Sundararajan and Ankur Taly and Qiqi Yan}, editor = {Doina Precup and Yee Whye Teh}, title = {Axiomatic Attribution for Deep Networks}, booktitle = {Proceedings of the 34th International Conference on Machine Learning, {ICML} 2017, Sydney, NSW, Australia, 6-11 August 2017}, series = {Proceedings of Machine Learning Research}, volume = {70}, pages = {3319--3328}, publisher = {{PMLR}}, year = {2017}, url = {http://proceedings.mlr.press/v70/sundararajan17a.html}, timestamp = {Wed, 29 May 2019 08:41:45 +0200}, biburl = {https://dblp.org/rec/conf/icml/SundararajanTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SundararajanTY17, author = {Mukund Sundararajan and Ankur Taly and Qiqi Yan}, title = {Axiomatic Attribution for Deep Networks}, journal = {CoRR}, volume = {abs/1703.01365}, year = {2017}, url = {http://arxiv.org/abs/1703.01365}, eprinttype = {arXiv}, eprint = {1703.01365}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SundararajanTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-03036, author = {Kedar Dhamdhere and Kevin S. McCurley and Mukund Sundararajan and Ankur Taly}, title = {Abductive Matching in Question Answering}, journal = {CoRR}, volume = {abs/1709.03036}, year = {2017}, url = {http://arxiv.org/abs/1709.03036}, eprinttype = {arXiv}, eprint = {1709.03036}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-03036.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WuTSB16, author = {David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh}, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Privacy, Discovery, and Authentication for the Internet of Things}, booktitle = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, pages = {301--319}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3\_16}, doi = {10.1007/978-3-319-45741-3\_16}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WuTSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/TalyS16, author = {Ankur Taly and Asim Shankar}, editor = {Alessandro Aldini and Javier L{\'{o}}pez and Fabio Martinelli}, title = {Distributed Authorization in Vanadium}, booktitle = {Foundations of Security Analysis and Design {VIII} - {FOSAD} 2014/2015/2016 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {9808}, pages = {139--162}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43005-8\_4}, doi = {10.1007/978-3-319-43005-8\_4}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/fosad/TalyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WuTSB16, author = {David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh}, title = {Privacy, Discovery, and Authentication for the Internet of Things}, journal = {CoRR}, volume = {abs/1604.06959}, year = {2016}, url = {http://arxiv.org/abs/1604.06959}, eprinttype = {arXiv}, eprint = {1604.06959}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WuTSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TalyS16, author = {Ankur Taly and Asim Shankar}, title = {Distributed Authorization in Vanadium}, journal = {CoRR}, volume = {abs/1607.02192}, year = {2016}, url = {http://arxiv.org/abs/1607.02192}, eprinttype = {arXiv}, eprint = {1607.02192}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TalyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SundararajanTY16, author = {Mukund Sundararajan and Ankur Taly and Qiqi Yan}, title = {Gradients of Counterfactuals}, journal = {CoRR}, volume = {abs/1611.02639}, year = {2016}, url = {http://arxiv.org/abs/1611.02639}, eprinttype = {arXiv}, eprint = {1611.02639}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SundararajanTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/AbadiBPSST15, author = {Mart{\'{\i}}n Abadi and Mike Burrows and Himabindu Pucha and Adam Sadovsky and Asim Shankar and Ankur Taly}, editor = {Chiara Bodei and Gian{-}Luigi Ferrari and Corrado Priami}, title = {Distributed Authorization with Distributed Grammars}, booktitle = {Programming Languages with Applications to Biology and Security - Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9465}, pages = {10--26}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25527-9\_3}, doi = {10.1007/978-3-319-25527-9\_3}, timestamp = {Fri, 23 Jun 2023 22:30:53 +0200}, biburl = {https://dblp.org/rec/conf/birthday/AbadiBPSST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BirgissonPETVL14, author = {Arnar Birgisson and Joe Gibbs Politz and {\'{U}}lfar Erlingsson and Ankur Taly and Michael Vrable and Mark Lentczner}, title = {Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud}, booktitle = {21st Annual Network and Distributed System Security Symposium, {NDSS} 2014, San Diego, California, USA, February 23-26, 2014}, publisher = {The Internet Society}, year = {2014}, url = {https://www.ndss-symposium.org/ndss2014/macaroons-cookies-contextual-caveats-decentralized-authorization-cloud}, timestamp = {Mon, 01 Feb 2021 08:42:18 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BirgissonPETVL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Taly13, author = {Ankur Taly}, title = {Sandboxing untrusted JavaScript}, school = {Stanford University, {USA}}, year = {2013}, url = {https://searchworks.stanford.edu/view/10163857}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Taly13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pldi/GodefroidT12, author = {Patrice Godefroid and Ankur Taly}, editor = {Jan Vitek and Haibo Lin and Frank Tip}, title = {Automated synthesis of symbolic instruction encodings from {I/O} samples}, booktitle = {{ACM} {SIGPLAN} Conference on Programming Language Design and Implementation, {PLDI} '12, Beijing, China - June 11 - 16, 2012}, pages = {441--452}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2254064.2254116}, doi = {10.1145/2254064.2254116}, timestamp = {Thu, 24 Jun 2021 16:19:30 +0200}, biburl = {https://dblp.org/rec/conf/pldi/GodefroidT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/TalyGT11, author = {Ankur Taly and Sumit Gulwani and Ashish Tiwari}, title = {Synthesizing switching logic using constraint solving}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {13}, number = {6}, pages = {519--535}, year = {2011}, url = {https://doi.org/10.1007/s10009-010-0172-8}, doi = {10.1007/S10009-010-0172-8}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/TalyGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TalyEMMN11, author = {Ankur Taly and {\'{U}}lfar Erlingsson and John C. Mitchell and Mark S. Miller and Jasvir Nagra}, title = {Automated Analysis of Security-Critical JavaScript APIs}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {363--378}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.39}, doi = {10.1109/SP.2011.39}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/TalyEMMN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emsoft/TalyT10, author = {Ankur Taly and Ashish Tiwari}, editor = {Luca P. Carloni and Stavros Tripakis}, title = {Switching logic synthesis for reachability}, booktitle = {Proceedings of the 10th International conference on Embedded software, {EMSOFT} 2010, Scottsdale, Arizona, USA, October 24-29, 2010}, pages = {19--28}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1879021.1879025}, doi = {10.1145/1879021.1879025}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/emsoft/TalyT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MaffeisMT10, author = {Sergio Maffeis and John C. Mitchell and Ankur Taly}, title = {Object Capabilities and Isolation of Untrusted Web Applications}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {125--140}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.16}, doi = {10.1109/SP.2010.16}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/MaffeisMT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MaffeisT09, author = {Sergio Maffeis and Ankur Taly}, title = {Language-Based Isolation of Untrusted JavaScript}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {77--91}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.11}, doi = {10.1109/CSF.2009.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MaffeisT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MaffeisMT09, author = {Sergio Maffeis and John C. Mitchell and Ankur Taly}, editor = {Michael Backes and Peng Ning}, title = {Isolating JavaScript with Filters, Rewriting, and Wrappers}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {505--522}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_31}, doi = {10.1007/978-3-642-04444-1\_31}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MaffeisMT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/TalyT09, author = {Ankur Taly and Ashish Tiwari}, editor = {Ravi Kannan and K. Narayan Kumar}, title = {Deductive Verification of Continuous Dynamical Systems}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2009, December 15-17, 2009, {IIT} Kanpur, India}, series = {LIPIcs}, volume = {4}, pages = {383--394}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2009}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2009.2334}, doi = {10.4230/LIPICS.FSTTCS.2009.2334}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/TalyT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vmcai/TalyGT09, author = {Ankur Taly and Sumit Gulwani and Ashish Tiwari}, editor = {Neil D. Jones and Markus M{\"{u}}ller{-}Olm}, title = {Synthesizing Switching Logic Using Constraint Solving}, booktitle = {Verification, Model Checking, and Abstract Interpretation, 10th International Conference, {VMCAI} 2009, Savannah, GA, USA, January 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5403}, pages = {305--319}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-540-93900-9\_25}, doi = {10.1007/978-3-540-93900-9\_25}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vmcai/TalyGT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aplas/MaffeisMT08, author = {Sergio Maffeis and John C. Mitchell and Ankur Taly}, editor = {G. Ramalingam}, title = {An Operational Semantics for JavaScript}, booktitle = {Programming Languages and Systems, 6th Asian Symposium, {APLAS} 2008, Bangalore, India, December 9-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5356}, pages = {307--325}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89330-1\_22}, doi = {10.1007/978-3-540-89330-1\_22}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aplas/MaffeisMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/GaubertGTZ07, author = {Stephane Gaubert and Eric Goubault and Ankur Taly and Sarah Zennou}, editor = {Rocco De Nicola}, title = {Static Analysis by Policy Iteration on Relational Domains}, booktitle = {Programming Languages and Systems, 16th European Symposium on Programming, {ESOP} 2007, Held as Part of the Joint European Conferences on Theory and Practics of Software, {ETAPS} 2007, Braga, Portugal, March 24 - April 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4421}, pages = {237--252}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71316-6\_17}, doi = {10.1007/978-3-540-71316-6\_17}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/esop/GaubertGTZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.