Подписаться
Carl A. Gunter
Carl A. Gunter
George and Ann Fisher Distinguished Professor, University of Illinois at Urbana-Champaign
Подтвержден адрес электронной почты в домене illinois.edu - Главная страница
Название
Процитировано
Процитировано
Год
Semantics of programming languages: structures and techniques
CA Gunter
MIT press, 1992
10421992
The SwitchWare active network architecture
DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ...
IEEE Network 12 (3), 29-36, 1998
4811998
PLAN: A packet language for active networks
M Hicks, P Kakkar, JT Moore, CA Gunter, S Nettles
ACM International Conference on Functional Programming Languages (ICFP ’98 …, 1998
4691998
Property inference attacks on fully connected neural networks using permutation invariant representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
4622018
Semantic domains
CA Gunter, DS Scott
Handbook of Theoretical Computer Science, 633-674, 1990
447*1990
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
4222017
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System
C Friedman, J Rubin, J Brown, M Buntin, M Corn, L Etheredge, C Gunter, ...
Journal of the American Medical Informatics Association 22 (1), 43-50, 2015
4112015
A reference model for requirements and specifications
CA Gunter, EL Gunter, M Jackson, P Zave
IEEE Software 17 (3), 37-43, 2000
3972000
Dynamic Searchable Encryption via Blind Storage.
M Naveed, M Prabhakaran, CA Gunter
EEE Symposium on Security and Privacy, San Jose, CA 2014, 2014
3942014
Inheritance as implicit coercion
V Breazu-Tannen, T Coquand, CA Gunter, A Scedrov
Information and computation 93 (1), 172-221, 1991
3451991
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
3252015
Active network encapsulation protocol (ANEP)
DS Alexander, CA Gunter, AD Keromytis, G Minden, D Wetherall, ...
Active Networks Request for Comments, 1997
2981997
{CommanderSong}: A systematic approach for practical adversarial voice recognition
X Yuan, Y Chen, Y Zhao, Y Long, X Liu, K Chen, S Zhang, H Huang, ...
27th USENIX security symposium (USENIX security 18), 49-64, 2018
2712018
Detecting ai trojans using meta neural analysis
X Xu, Q Wang, H Li, N Borisov, CA Gunter, B Li
2021 IEEE Symposium on Security and Privacy (SP), 103-120, 2021
2642021
Understanding membership inferences on well-generalized learning models
Y Long, V Bindschaedler, L Wang, D Bu, X Wang, H Tang, CA Gunter, ...
arXiv preprint arXiv:1802.04889, 2018
2592018
Formal verification of standards for distance vector routing protocols
K Bhargavan, D Obradovic, CA Gunter
Journal of the ACM (JACM) 49 (4), 538-576, 2002
2502002
Identity, location, disease and more: Inferring your secrets from Android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2462013
Fear and logging in the internet of things
Q Wang, WU Hassan, A Bates, C Gunter
Network and Distributed Systems Symposium, 2018
2452018
Privacy and security in mobile health: a research agenda
D Kotz, CA Gunter, S Kumar, JP Weiner
Computer 49 (6), 22-30, 2016
2182016
PLANet: An active internetwork
M Hicks, JT Moore, DS Alexander, CA Gunter, SM Nettles
IEEE Conference on Computer Communications (INFOCOM '99) 3, 1124-1133 vol. 3, 1999
1841999
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20