Follow
Carl A. Gunter
Carl A. Gunter
George and Ann Fisher Distinguished Professor, University of Illinois at Urbana-Champaign
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
Semantics of programming languages: structures and techniques
CA Gunter
MIT press, 1992
10481992
Property inference attacks on fully connected neural networks using permutation invariant representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
5682018
The SwitchWare active network architecture
DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ...
IEEE Network 12 (3), 29-36, 1998
4811998
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
4782017
PLAN: A packet language for active networks
M Hicks, P Kakkar, JT Moore, CA Gunter, S Nettles
ACM International Conference on Functional Programming Languages (ICFP ’98 …, 1998
4741998
Semantic domains
CA Gunter, DS Scott
Handbook of Theoretical Computer Science, 633-674, 1990
447*1990
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System
C Friedman, J Rubin, J Brown, M Buntin, M Corn, L Etheredge, C Gunter, ...
Journal of the American Medical Informatics Association 22 (1), 43-50, 2015
4462015
Dynamic Searchable Encryption via Blind Storage.
M Naveed, M Prabhakaran, CA Gunter
EEE Symposium on Security and Privacy, San Jose, CA 2014, 2014
4172014
A reference model for requirements and specifications
CA Gunter, EL Gunter, M Jackson, P Zave
IEEE Software 17 (3), 37-43, 2000
4042000
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
3522015
Inheritance as implicit coercion
V Breazu-Tannen, T Coquand, CA Gunter, A Scedrov
Information and computation 93 (1), 172-221, 1991
3491991
Detecting ai trojans using meta neural analysis
X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li
2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021
3472021
Active network encapsulation protocol (ANEP)
DS Alexander, CA Gunter, AD Keromytis, G Minden, D Wetherall, ...
Active Networks Request for Comments, 1997
2971997
{CommanderSong}: a systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th USENIX security symposium (USENIX security 18), 49-64, 2018
2962018
Understanding membership inferences on well-generalized learning models
Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ...
arXiv preprint arXiv:1802.04889, 2018
2942018
Fear and logging in the internet of things
Q Wang, WU Hassan, A Bates, C Gunter
Network and Distributed Systems Symposium, 2018
2752018
Identity, location, disease and more: Inferring your secrets from Android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2582013
Formal verification of standards for distance vector routing protocols
K Bhargavan, D Obradovic, CA Gunter
Journal of the ACM (JACM) 49 (4), 538-576, 2002
2562002
Privacy and security in mobile health: a research agenda
D Kotz, CA Gunter, S Kumar, JP Weiner
Computer 49 (6), 22-30, 2016
2292016
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
2122020
The system can't perform the operation now. Try again later.
Articles 1–20