Остановите войну!
for scientists:
default search action
Ashish Kundu
- > Home > Persons > Ashish Kundu
Publications
- 2024
- [i16]Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino:
Transfer Learning for Security: Challenges and Future Directions. CoRR abs/2403.00935 (2024) - 2023
- [c38]Elisa Bertino, Hyunwoo Lee, Mengdie Huang, Charalampos Katsis, Zilin Shen, Bruno Ribeiro, Daniel De Mello, Ashish Kundu:
A Pro-Active Defense Framework for IoT Systems. CIC 2023: 125-132 - [i12]Xin Jin, Charalampos Katsis, Fan Sang, Jiahao Sun, Elisa Bertino, Ramana Rao Kompella, Ashish Kundu:
Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs. CoRR abs/2312.13119 (2023) - 2022
- [c32]Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. ESORICS (2) 2022: 549-568 - 2019
- [j9]Elisa Bertino, Ashish Kundu, Zehra Sura:
Data Transparency with Blockchain and AI Ethics. ACM J. Data Inf. Qual. 11(4): 16:1-16:8 (2019) - [c24]Hasini Gunasinghe, Ashish Kundu, Elisa Bertino, Hugo Krawczyk, Suresh Chari, Kapil Singh, Dong Su:
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. WWW 2019: 594-604 - 2018
- [j7]Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Arif Ghafoor, Chinmay Kundu:
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases. IEEE Trans. Knowl. Data Eng. 30(5): 866-879 (2018) - [c20]Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Arif Ghafoor, Chinmay Kundu:
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases. ICDE 2018: 1821-1822 - 2014
- [c14]Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor:
Security of graph data: hashing schemes and definitions. CODASPY 2014: 223-234 - 2013
- [j5]Ashish Kundu, Elisa Bertino:
Privacy-preserving authentication of trees and graphs. Int. J. Inf. Sec. 12(6): 467-494 (2013) - [c10]Daniele Midi, Ashish Kundu, Elisa Bertino:
Towards Authenticated Objects. NSS 2013: 777-783 - 2012
- [c9]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Leakage-free redactable signatures. CODASPY 2012: 307-316 - [i2]Ashish Kundu, Mikhail J. Atallah, Elisa Bertino:
Efficient Leakage-free Authentication of Trees, Graphs and Forests. IACR Cryptol. ePrint Arch. 2012: 36 (2012) - [i1]Ashish Kundu, Elisa Bertino:
On Hashing Graphs. IACR Cryptol. ePrint Arch. 2012: 352 (2012) - 2011
- [c7]Ashish Kundu, Elisa Bertino:
A New Class of Buffer Overflow Attacks. ICDCS 2011: 730-739 - 2010
- [c6]Ashish Kundu, Elisa Bertino:
How to authenticate graphs without leaking. EDBT 2010: 609-620 - 2008
- [j3]Ashish Kundu, Elisa Bertino:
Structural signatures for tree data structures. Proc. VLDB Endow. 1(1): 138-150 (2008) - [j2]Ashish Kundu, Elisa Bertino:
A New Model for Secure Dissemination of XML Content. IEEE Trans. Syst. Man Cybern. Part C 38(3): 292-301 (2008) - 2006
- [c3]Ashish Kundu, Elisa Bertino:
Secure Dissemination of XML Content Using Structure-based Routing. EDOC 2006: 153-164
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-11 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint