Certified robustness to adversarial examples with differential privacy M Lecuyer, V Atlidakis, R Geambasu, D Hsu, S Jana 2019 IEEE Symposium on Security and Privacy (SP), 656-672, 2019 | 607 | 2019 |
Vanish: Increasing Data Privacy with Self-Destructing Data. R Geambasu, T Kohno, AA Levy, HM Levy USENIX security symposium 316, 10-5555, 2009 | 540 | 2009 |
XRay: Increasing the Web's Transparency with Differential Correlation M Lecuyer, G Ducoffe, F Lan, A Papancea, T Petsios, R Spahn, ... Proceedings of the USENIX Security Symposium, 2014 | 149* | 2014 |
{CleanOS}: Limiting Mobile Data Exposure with Idle Eviction Y Tang, P Ames, S Bhamidipati, A Bijlani, R Geambasu, N Sarda 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012 | 143 | 2012 |
FairTest: Discovering Unwarranted Associations in Data-Driven Applications F Tramer, V Atlidakis, R Geambasu, D Hsu, JP Hubaux, M Humbert, ... IEEE European Symposium on Security and Privacy (EuroS&P), 2017 | 129 | 2017 |
Comet: An Active Distributed {Key-Value} Store R Geambasu, AA Levy, T Kohno, A Krishnamurthy, HM Levy 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 109 | 2010 |
Homeviews: peer-to-peer middleware for personal data sharing applications R Geambasu, M Balazinska, SD Gribble, HM Levy Proceedings of the 2007 ACM SIGMOD international conference on Management of …, 2007 | 86 | 2007 |
Sunlight: Fine-grained targeting detection at scale with statistical confidence M Lecuyer, R Spahn, Y Spiliopolous, A Chaintreau, R Geambasu, D Hsu Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 77 | 2015 |
Keypad: An auditing file system for theft-prone devices R Geambasu, JP John, SD Gribble, T Kohno, HM Levy Proceedings of the sixth conference on Computer systems, 1-16, 2011 | 71 | 2011 |
Systems and methods for file access auditing T Kohno, R Geambasu, H Levy, S Gribble US Patent 9,489,523, 2016 | 66 | 2016 |
Organizing and sharing distributed personal web-service data R Geambasu, C Cheung, A Moshchuk, SD Gribble, HM Levy Proceedings of the 17th international conference on World Wide Web, 755-764, 2008 | 63 | 2008 |
POSIX abstractions in modern operating systems: The old, the new, and the missing V Atlidakis, J Andrus, R Geambasu, D Mitropoulos, J Nieh Proceedings of the Eleventh European Conference on Computer Systems, 1-17, 2016 | 58 | 2016 |
Synapse: a microservices architecture for heterogeneous-database web applications N Viennot, M Lécuyer, J Bell, R Geambasu, J Nieh Proceedings of the Tenth European Conference on Computer Systems, 1-16, 2015 | 52 | 2015 |
CloudViews: Communal Data Sharing in Public Clouds. R Geambasu, SD Gribble, HM Levy HotCloud, 2009 | 52 | 2009 |
Encapsulation and decapsulation for data disintegration T Kohno, R Geambasu, HM Levy US Patent 8,520,855, 2013 | 49 | 2013 |
Pebbles:{Fine-Grained} Data Management Abstractions for Modern Operating Systems R Spahn, J Bell, M Lee, S Bhamidipati, R Geambasu, G Kaiser 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014 | 39 | 2014 |
The meerkats cloud security architecture AD Keromytis, R Geambasu, S Sethumadhavan, SJ Stolfo, J Yang, ... 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 39 | 2012 |
Urgent virtual machine eviction with enlightened post-copy Y Abe, R Geambasu, K Joshi, M Satyanarayanan ACM SIGPLAN Notices 51 (7), 51-64, 2016 | 30 | 2016 |
Discovering unwarranted associations in data-driven applications with the fairtest testing toolkit F Tramèr, V Atlidakis, R Geambasu, DJ Hsu, JP Hubaux, M Humbert, ... CoRR, abs/1510.02377, 2015 | 28 | 2015 |
vTube: efficient streaming of virtual appliances over last-mile networks Y Abe, R Geambasu, K Joshi, HA Lagar-Cavilla, M Satyanarayanan Proceedings of the 4th annual Symposium on Cloud Computing, 1-16, 2013 | 28 | 2013 |