default search action
Atul Prakash 0001
Person information
- affiliation: University of Michigan, Department of Electrical Engineering and Computer Science, Ann Arbor, MI, USA
- affiliation (PhD): University of California, Berkeley, CA, USA
Other persons with the same name
- Atul Prakash 0002 — Birla Institute of Technology, Department of Electronics and Communication Engineering, Ranchi, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c102]Neal Mangaokar, Ashish Hooda, Jihye Choi, Shreyas Chandrashekaran, Kassem Fawaz, Somesh Jha, Atul Prakash:
PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails. ACL (1) 2024: 10960-10976 - [c101]Haizhong Zheng, Jiachen Sun, Shutong Wu, Bhavya Kailkhura, Z. Morley Mao, Chaowei Xiao, Atul Prakash:
Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation. ECCV (24) 2024: 166-182 - [c100]Jiachen Sun, Haizhong Zheng, Qingzhao Zhang, Atul Prakash, Zhuoqing Mao, Chaowei Xiao:
CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception. ICLR 2024 - [c99]Elisa Tsai, Ram Sundara Raman, Atul Prakash, Roya Ensafi:
Modeling and Detecting Internet Censorship Events. NDSS 2024 - [c98]Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash:
D4: Detection of Adversarial Diffusion Deepfakes Using Disjoint Ensembles. WACV 2024: 3800-3810 - [i34]Haizhong Zheng, Xiaoyan Bai, Beidi Chen, Fan Lai, Atul Prakash:
Learn To be Efficient: Build Structured Sparsity in Large Language Models. CoRR abs/2402.06126 (2024) - [i33]Shuowei Jin, Yongji Wu, Haizhong Zheng, Qingzhao Zhang, Matthew Lentz, Z. Morley Mao, Atul Prakash, Feng Qian, Danyang Zhuo:
Adaptive Skeleton Graph Decoding. CoRR abs/2402.12280 (2024) - [i32]Neal Mangaokar, Ashish Hooda, Jihye Choi, Shreyas Chandrashekaran, Kassem Fawaz, Somesh Jha, Atul Prakash:
PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails. CoRR abs/2402.15911 (2024) - [i31]Haizhong Zheng, Elisa Tsai, Yifu Lu, Jiachen Sun, Brian R. Bartoldson, Bhavya Kailkhura, Atul Prakash:
ELFS: Enhancing Label-Free Coreset Selection via Clustering-based Pseudo-Labeling. CoRR abs/2406.04273 (2024) - 2023
- [c97]Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash:
Stateful Defenses for Machine Learning Models Are Not Yet Secure Against Black-box Attacks. CCS 2023: 786-800 - [c96]Haizhong Zheng, Rui Liu, Fan Lai, Atul Prakash:
Coverage-centric Coreset Selection for High Pruning Rates. ICLR 2023 - [c95]Jihye Choi, Jayaram Raghuram, Ryan Feng, Jiefeng Chen, Somesh Jha, Atul Prakash:
Concept-based Explanations for Out-of-Distribution Detectors. ICML 2023: 5817-5837 - [i30]Ryan Feng, Ashish Hooda, Neal Mangaokar, Kassem Fawaz, Somesh Jha, Atul Prakash:
Investigating Stateful Defenses Against Black-Box Adversarial Examples. CoRR abs/2303.06280 (2023) - [i29]Jiachen Sun, Haizhong Zheng, Qingzhao Zhang, Atul Prakash, Z. Morley Mao, Chaowei Xiao:
CALICO: Self-Supervised Camera-LiDAR Contrastive Pre-training for BEV Perception. CoRR abs/2306.00349 (2023) - [i28]Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash:
Theoretically Principled Trade-off for Stateful Defenses against Query-Based Black-Box Attacks. CoRR abs/2307.16331 (2023) - [i27]Haizhong Zheng, Jiachen Sun, Shutong Wu, Bhavya Kailkhura, Zhuoqing Mao, Chaowei Xiao, Atul Prakash:
Leveraging Hierarchical Feature Sharing for Efficient Dataset Condensation. CoRR abs/2310.07506 (2023) - 2022
- [j32]Neal Mangaokar, Atul Prakash:
Dispelling Misconceptions and Characterizing the Failings of Deepfake Detection. IEEE Secur. Priv. 20(2): 61-67 (2022) - [c94]Ryan Feng, Neal Mangaokar, Jiefeng Chen, Earlence Fernandes, Somesh Jha, Atul Prakash:
GRAPHITE: Generating Automatic Physical Examples for Machine-Learning Attacks on Computer Vision Systems. EuroS&P 2022: 664-683 - [c93]Renuka Kumar, Apurva Virkud, Ram Sundara Raman, Atul Prakash, Roya Ensafi:
A Large-scale Investigation into Geodifferences in Mobile Apps. USENIX Security Symposium 2022: 1203-1220 - [i26]Ashish Hooda, Neal Mangaokar, Ryan Feng, Kassem Fawaz, Somesh Jha, Atul Prakash:
Towards Adversarially Robust Deepfake Detection: An Ensemble Approach. CoRR abs/2202.05687 (2022) - [i25]Jihye Choi, Jayaram Raghuram, Ryan Feng, Jiefeng Chen, Somesh Jha, Atul Prakash:
Concept-based Explanations for Out-Of-Distribution Detectors. CoRR abs/2203.02586 (2022) - [i24]Ryan Feng, Somesh Jha, Atul Prakash:
Constraining the Attack Space of Machine Learning Models with Distribution Clamping Preprocessing. CoRR abs/2205.08989 (2022) - [i23]Haizhong Zheng, Rui Liu, Fan Lai, Atul Prakash:
Coverage-centric Coreset Selection for High Pruning Rates. CoRR abs/2210.15809 (2022) - 2021
- [j31]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j30]Szu-Yun Lin, Andrew W. Hlynka, Lichao Xu, Hao Lu, Omar A. Sediek, Sherif El-Tawil, Vineet R. Kamat, Jason McCormick, Carol C. Menassa, Seymour M. J. Spence, Atul Prakash, Benigno Aguirre:
Simple Run-Time Infrastructure (SRTI): An accessible distributed computing platform for interdisciplinary simulation. J. Comput. Sci. 55: 101455 (2021) - [c92]Sanjay Kariyappa, Atul Prakash, Moinuddin K. Qureshi:
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation. CVPR 2021: 13814-13823 - [c91]Sanjay Kariyappa, Atul Prakash, Moinuddin K. Qureshi:
Protecting DNNs from Theft using an Ensemble of Diverse Models. ICLR 2021 - [i22]Nelson Manohar-Alers, Ryan Feng, Sahib Singh, Jiguo Song, Atul Prakash:
Using Anomaly Feature Vectors for Detecting, Classifying and Warning of Outlier Adversarial Examples. CoRR abs/2107.00561 (2021) - 2020
- [c90]Haizhong Zheng, Ziqi Zhang, Juncheng Gu, Honglak Lee, Atul Prakash:
Efficient Adversarial Training With Transferable Adversarial Examples. CVPR 2020: 1178-1187 - [c89]Renuka Kumar, Sreesh Kishore, Hao Lu, Atul Prakash:
Security Analysis of Unified Payments Interface and Payment Apps in India. USENIX Security Symposium 2020: 1499-1516 - [i21]Ryan Feng, Jiefeng Chen, Nelson R. Manohar, Earlence Fernandes, Somesh Jha, Atul Prakash:
Query-Efficient Physical Hard-Label Attacks on Deep Learning Visual Classification. CoRR abs/2002.07088 (2020) - [i20]Sanjay Kariyappa, Atul Prakash, Moinuddin K. Qureshi:
MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation. CoRR abs/2005.03161 (2020) - [i19]Liang Tong, Minzhe Guo, Atul Prakash, Yevgeniy Vorobeychik:
Towards Robustness against Unsuspicious Adversarial Examples. CoRR abs/2005.04272 (2020) - [i18]Haizhong Zheng, Ziqi Zhang, Honglak Lee, Atul Prakash:
Understanding and Diagnosing Vulnerability under Adversarial Attacks. CoRR abs/2007.08716 (2020) - [i17]Ryan Feng, Wu-chi Feng, Atul Prakash:
Essential Features: Reducing the Attack Surface of Adversarial Perturbations with Robust Content-Aware Image Preprocessing. CoRR abs/2012.01699 (2020)
2010 – 2019
- 2019
- [c88]Brandon Carlson, Kevin Leach, Darko Marinov, Meiyappan Nagappan, Atul Prakash:
Open Source Vulnerability Notification. OSS 2019: 12-23 - [c87]Davino Mauro Junior, Luis Melo, Hao Lu, Marcelo d'Amorim, Atul Prakash:
A Study of Vulnerability Analysis of Popular Smart Devices Through Their Companion Apps. IEEE Symposium on Security and Privacy Workshops 2019: 181-186 - [i16]Davino Mauro Junior, Luis Melo, Harvey Lu, Marcelo d'Amorim, Atul Prakash:
Beware of the App! On the Vulnerability Surface of Smart Devices through their Companion Apps. CoRR abs/1901.10062 (2019) - [i15]Kevin Eykholt, Swati Gupta, Atul Prakash, Haizhong Zheng:
Robust Classification using Robust Feature Augmentation. CoRR abs/1905.10904 (2019) - [i14]Haizhong Zheng, Earlence Fernandes, Atul Prakash:
Analyzing the Interpretability Robustness of Self-Explaining Models. CoRR abs/1905.12429 (2019) - [i13]Pratik Vaishnavi, Kevin Eykholt, Atul Prakash, Amir Rahmati:
Transferable Adversarial Robustness using Adversarially Trained Autoencoders. CoRR abs/1909.05921 (2019) - [i12]Pratik Vaishnavi, Tianji Cong, Kevin Eykholt, Atul Prakash, Amir Rahmati:
Can Attention Masks Improve Adversarial Robustness? CoRR abs/1911.11946 (2019) - [i11]Haizhong Zheng, Ziqi Zhang, Juncheng Gu, Honglak Lee, Atul Prakash:
Efficient Adversarial Training with Transferable Adversarial Examples. CoRR abs/1912.11969 (2019) - 2018
- [c86]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Chaowei Xiao, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Robust Physical-World Attacks on Deep Learning Visual Classification. CVPR 2018: 1625-1634 - [c85]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Decentralized Action Integrity for Trigger-Action IoT Platforms. NDSS 2018 - [c84]Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash:
Tyche: A Risk-Based Permission Model for Smart Homes. SecDev 2018: 29-36 - [c83]Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno:
Physical Adversarial Examples for Object Detectors. WOOT @ USENIX Security Symposium 2018 - [i10]Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Atul Prakash:
Tyche: Risk-Based Permissions for Smart Home Platforms. CoRR abs/1801.04609 (2018) - [i9]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno, Dawn Song:
Physical Adversarial Examples for Object Detectors. CoRR abs/1807.07769 (2018) - [i8]Davino Mauro Junior, Kiev Gama, Atul Prakash:
Securing IoT Apps with Fine-grained Control of Information Flows. CoRR abs/1810.13367 (2018) - [i7]Kevin Eykholt, Atul Prakash:
Designing Adversarially Resilient Classifiers using Resilient Feature Engineering. CoRR abs/1812.06626 (2018) - 2017
- [j29]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Security Implications of Permission Models in Smart-Home Application Frameworks. IEEE Secur. Priv. 15(2): 24-30 (2017) - [j28]Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash:
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? IEEE Secur. Priv. 15(4): 79-84 (2017) - [c82]Amir Rahmati, Earlence Fernandes, Kevin Eykholt, Xinheng Chen, Atul Prakash:
Heimdall: A Privacy-Respecting Implicit Preference Collection Framework. MobiSys 2017: 453-463 - [c81]Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash:
ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms. NDSS 2017 - [c80]Kevin Eykholt, Atul Prakash, Barzan Mozafari:
Ensuring Authorized Updates in Multi-user Database-Backed Applications. USENIX Security Symposium 2017: 1445-1462 - [i6]Earlence Fernandes, Amir Rahmati, Kevin Eykholt, Atul Prakash:
Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges? CoRR abs/1705.08522 (2017) - [i5]Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash:
Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things. CoRR abs/1707.00405 (2017) - [i4]Ivan Evtimov, Kevin Eykholt, Earlence Fernandes, Tadayoshi Kohno, Bo Li, Atul Prakash, Amir Rahmati, Dawn Song:
Robust Physical-World Attacks on Machine Learning Models. CoRR abs/1707.08945 (2017) - [i3]Amir Rahmati, Earlence Fernandes, Jaeyeon Jung, Atul Prakash:
IFTTT vs. Zapier: A Comparative Study of Trigger-Action Programming Frameworks. CoRR abs/1709.02788 (2017) - [i2]Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Dawn Song, Tadayoshi Kohno, Amir Rahmati, Atul Prakash, Florian Tramèr:
Note on Attacking Object Detectors with Adversarial Stickers. CoRR abs/1712.08062 (2017) - 2016
- [j27]Yilan Zhang, Sean M. O'connor, Gwendolyn W. van der Linden, Atul Prakash, Jerome P. Lynch:
SenStore: A Scalable Cyberinfrastructure Platform for Implementation of Data-to-Decision Frameworks for Infrastructure Health Management. J. Comput. Civ. Eng. 30(5) (2016) - [c79]Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Zhuoqing Morley Mao, Atul Prakash:
Android UI Deception Revisited: Attacks and Defenses. Financial Cryptography 2016: 41-59 - [c78]Amir Rahmati, Earlence Fernandes, Atul Prakash:
Applying the Opacified Computation Model to Enforce Information Flow Policies in IoT Applications. SecDev 2016: 88-93 - [c77]Earlence Fernandes, Jaeyeon Jung, Atul Prakash:
Security Analysis of Emerging Smart Home Applications. IEEE Symposium on Security and Privacy 2016: 636-654 - [c76]Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, Atul Prakash:
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. USENIX Security Symposium 2016: 531-548 - 2015
- [j26]Manu Akula, Atul Sandur, Vineet R. Kamat, Atul Prakash:
Context-Aware Framework for Highway Bridge Inspections. J. Comput. Civ. Eng. 29(1) (2015) - [c75]Earlence Fernandes, Ajit Aluri, Alexander Crowell, Atul Prakash:
Decomposable Trust for Android Applications. DSN 2015: 343-354 - [c74]Justin Paupore, Earlence Fernandes, Atul Prakash, Sankardas Roy, Xinming Ou:
Practical Always-on Taint Tracking on Mobile Devices. HotOS 2015 - 2014
- [j25]Biswajit Panja, David Morrison, Priyanka Meharia, Bharat Bharat, Atul Prakash:
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services. Int. J. Next Gener. Comput. 5(3) (2014) - [c73]Mauro Conti, Earlence Fernandes, Justin Paupore, Atul Prakash, Daniel Simionato:
OASIS: Operational Access Sandboxes for Information Security. SPSM@CCS 2014: 105-110 - [c72]Jiaan Zeng, Guangchen Ruan, Alexander Crowell, Atul Prakash, Beth Plale:
Cloud computing data capsules for non-consumptiveuse of texts. ScienceCloud@HPDC 2014: 9-16 - [e2]Atul Prakash, Rudrapatna K. Shyamasundar:
Information Systems Security - 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014, Proceedings. Lecture Notes in Computer Science 8880, Springer 2014, ISBN 978-3-319-13840-4 [contents] - [i1]Earlence Fernandes, Alexander Crowell, Ajit Aluri, Atul Prakash:
Anception: Application Virtualization For Android. CoRR abs/1401.6726 (2014) - 2013
- [j24]Alexander Crowell, Beng Heng Ng, Earlence Fernandes, Atul Prakash:
The Confinement Problem: 40 Years Later. J. Inf. Process. Syst. 9(2): 189-204 (2013) - [c71]Beng Heng Ng, Atul Prakash:
Expose: Discovering Potential Binary Code Re-use. COMPSAC 2013: 492-501 - [c70]Beng Heng Ng, Atul Prakash:
Let the Right One in: Discovering and Mitigating Permission Gaps. ICISS 2013: 297-313 - 2012
- [c69]Beng Heng Ng, Alexander Crowell, Atul Prakash:
Adaptive semi-private email aliases. AsiaCCS 2012: 69-70 - [c68]Biswajit Panja, Atul Prakash, Priyanka Meharia, Bradley Schneider:
Security in sensor network based SCADA system for adaptive traffic signal operation. CTS 2012: 195-202 - 2011
- [c67]Heqing Huang, Su Zhang, Xinming Ou, Atul Prakash, Karem A. Sakallah:
Distilling critical attack graph surface iteratively through minimum-cost SAT solving. ACSAC 2011: 31-40 - [c66]Billy Lau, Atul Prakash, Venkatanathan Annamalai:
Accessing Trusted Web Sites from Low-Integrity Systems without End-Host Snooping. SocialCom/PASSAT 2011: 1012-1019 - 2010
- [c65]Jordan Crain, Lukasz Opyrchal, Atul Prakash:
Fighting Phishing with Trusted Email. ARES 2010: 462-467 - [c64]Beng Heng Ng, Xin Hu, Atul Prakash:
A Study on Latent Vulnerabilities. SRDS 2010: 333-337 - [c63]Mark W. Newman, Mark S. Ackerman, Jungwoo Kim, Atul Prakash, Zhenan Hong, Jacob Mandel, Tao Dong:
Bringing the field into the lab: supporting capture and replay of contextual data for the design of context-aware applications. UIST 2010: 105-108
2000 – 2009
- 2009
- [j23]Mark S. Ackerman, Tao Dong, Scott Gifford, Jungwoo Kim, Mark W. Newman, Atul Prakash, Sarah Qidwai, David García, Paulo Villegas, Alejandro Cadenas, Antonio Sánchez-Esguevillas, Javier M. Aguiar, Belén Carro, Sean Mailander, Ronald Schroeter, Marcus Foth, Amiya Bhattacharya, Partha Dasgupta:
Location-Aware Computing, Virtual Networks. IEEE Pervasive Comput. 8(4): 28-32 (2009) - [c62]Feng Qian, Zhiyun Qian, Zhuoqing Morley Mao, Atul Prakash:
Ensemble: Community-Based Anomaly Detection for Popular Applications. SecureComm 2009: 163-184 - [c61]Kevin Borders, Atul Prakash:
Quantifying Information Leaks in Outbound Web Traffic. SP 2009: 129-140 - [c60]Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash:
Protecting Confidential Data on Personal Computers with Storage Capsules. USENIX Security Symposium 2009: 367-382 - [e1]Atul Prakash, Indranil Gupta:
Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings. Lecture Notes in Computer Science 5905, Springer 2009, ISBN 978-3-642-10771-9 [contents] - 2008
- [c59]Garrett Brown, Travis Howe, Micheal Ihbe, Atul Prakash, Kevin Borders:
Social networks and context-aware spam. CSCW 2008: 403-412 - [c58]Xin Zhao, Kevin Borders, Atul Prakash:
Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers. Middleware 2008: 388-407 - [c57]Laura Falk, Atul Prakash, Kevin Borders:
Analyzing websites for user-visible security design flaws. SOUPS 2008: 117-126 - [c56]Kevin Borders, Atul Prakash:
Towards Quantification of Network-Based Information Leaks via HTTP. HotSec 2008 - [p2]Lukasz Opyrchal, Atul Prakash:
Large-Scale Group Collaboration Systems. Wiley Encyclopedia of Computer Science and Engineering 2008 - [p1]Hyong Sop Shim, Atul Prakash, Jang Ho Lee:
Distributed and Collaborative Development. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [j22]Xin Zhao, Kevin Borders, Atul Prakash:
Using a virtual machine to protect sensitive Grid resources. Concurr. Comput. Pract. Exp. 19(14): 1917-1935 (2007) - [j21]Lukasz Opyrchal, Atul Prakash, Amit Agrawal:
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments. J. Networks 2(1): 17-26 (2007) - [c55]Kevin Borders, Atul Prakash, Mark Zielinski:
Spector: Automatically Analyzing Shell Code. ACSAC 2007: 501-514 - [c54]Atul Prakash:
Security in Practice - Security-Usability Chasm. ICISS 2007: 1-9 - [c53]Kevin Borders, Laura Falk, Atul Prakash:
OpenFire: Using deception to reduce network attacks. SecureComm 2007: 224-233 - [c52]Kevin Borders, Atul Prakash:
Securing Network Input via a Trusted Input Proxy. HotSec 2007 - 2006
- [j20]Patrick D. McDaniel, Atul Prakash:
Enforcing provisioning and authorization policy in the Antigone system. J. Comput. Secur. 14(6): 483-511 (2006) - [j19]Patrick D. McDaniel, Atul Prakash:
Methods and limitations of security policy reconciliation. ACM Trans. Inf. Syst. Secur. 9(3): 259-291 (2006) - [c51]Scott Gifford, Jim Knox, Jonathan James, Atul Prakash:
Introduction to the talking points project. ASSETS 2006: 271-272 - [c50]Kevin Borders, Xin Zhao, Atul Prakash:
Securing sensitive content in a view-only file system. Digital Rights Management Workshop 2006: 27-36 - [c49]Lukasz Opyrchal, Atul Prakash, Amit Agrawal:
Designing a Publish-Subscribe Substrate for Privacy/Security in Pervasive Environments. ICPS 2006: 313-316 - [c48]Kevin Borders, Xin Zhao, Atul Prakash:
Siren: Catching Evasive Malware (Short Paper). S&P 2006: 78-85 - 2005
- [c47]Kevin Borders, Xin Zhao, Atul Prakash:
CPOL: high-performance policy evaluation. CCS 2005: 147-157 - [c46]Xin Zhao, Kevin Borders, Atul Prakash:
SVGrid: a secure virtual environment for untrusted grid applications. MGC@Middleware 2005: 2:1-2:6 - [c45]Xin Zhao, Atul Prakash:
WSF: An HTTP-Level Firewall for Hardening Web Servers. IASTED PDCS 2005: 248-253 - [c44]Pavan Verma, Atul Prakash:
FACE: A Firewall Analysis and Configuration Engine. SAINT 2005: 74-81 - [c43]Xin Zhao, Kevin Borders, Atul Prakash:
Towards Protecting Sensitive Files in a Compromised System. IEEE Security in Storage Workshop 2005: 21-28 - 2004
- [c42]Kevin Borders, Atul Prakash:
Web tap: detecting covert web traffic. CCS 2004: 110-120 - 2003
- [c41]Xin Zhao, Atul Prakash:
Source Authentication in Group Communication Systems. DEXA Workshops 2003: 455-459 - [c40]Jim Irrer, Atul Prakash, Patrick D. McDaniel:
Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System. DISCEX (2) 2003: 44-46 - [c39]Patrick D. McDaniel, Atul Prakash:
A Flexible Architecture for Security Policy Enforcement. DISCEX (2) 2003: 234-239 - [c38]Radu Litiu, Atul Prakash:
Persistent connectivity and Reliable Message Delivery in Component-based Mobile Applications. MWCN 2003 - 2002
- [c37]Patrick D. McDaniel, Atul Prakash:
Methods and Limitations of Security Policy Reconciliation. S&P 2002: 73-87 - 2001
- [j18]Radu Litiu, Atul Prakash:
DACIA: A Mobile Component Framework for Buildinh Adaptive Distributed Applications. ACM SIGOPS Oper. Syst. Rev. 35(2): 31-42 (2001) - [c36]Lukasz Opyrchal, Atul Prakash:
Secure Distribution of Events in Content-Based Publish Subscribe Systems. USENIX Security Symposium 2001 - 2000
- [c35]Radu Litiu, Atul Prakash:
Developing adaptive groupware applications using a mobile component framework. CSCW 2000: 107-116
1990 – 1999
- 1999
- [j17]Sushila Subramanian, G. Robert Malan, Hyong Sop Shim, Jang Ho Lee, Peter Knoop, Terry E. Weymouth, Farnam Jahanian, Atul Prakash:
Software Architecture for the UARC Web-Based Collaboratory. IEEE Internet Comput. 3(2): 46-54 (1999) - [j16]Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam:
Flexible Control of Downloaded Executable Content. ACM Trans. Inf. Syst. Secur. 2(2): 177-228 (1999) - [j15]Atul Prakash, Hyong Sop Shim, Jang Ho Lee:
Data Management Issues and Trade-Offs in CSCW Systems. IEEE Trans. Knowl. Data Eng. 11(1): 213-227 (1999) - [c34]Brian Noble, Li Li, Atul Prakash:
The Case for Better Throughput Estimation. Workshop on Hot Topics in Operating Systems 1999: 70-75 - [c33]Radu Litiu, Atul Prakash:
Stateful Group Communication Services. ICDCS 1999: 82-89 - [c32]Patrick D. McDaniel, Atul Prakash, Peter Honeyman:
Antigone: A Flexible Framework for Secure Group Communication. USENIX Security Symposium 1999 - 1998
- [j14]Gary M. Olson, Daniel E. Atkins, C. Robert Clauer, Thomas A. Finholt, Farnam Jahanian, Timothy L. Killeen, Atul Prakash, Terry E. Weymouth:
The Upper Atmospheric Research Collaboratory (UARC). Interactions 5(3): 48-55 (1998) - [j13]Robert E. Strom, Guruduth Banavar, Kevan Miller, Atul Prakash, Michael Ward:
Concurrency Control and View Notification Algorithms for Collaborative Replicated Objects. IEEE Trans. Computers 47(4): 458-471 (1998) - [c31]Radu Litiu, Atul Prakash:
Adaptive group communication services for groupware systems. EDOC 1998: 218-229 - [c30]Hyong Sop Shim, Atul Prakash:
Tolerating Client and Communication Failures in Distributed Groupware Systems. SRDS 1998: 221-227 - 1997
- [c29]Hyong Sop Shim, Robert W. Hall, Atul Prakash, Farnam Jahanian:
Providing Flexible Services for Managing Shared State in Collaborative Systems. ECSCW 1997: 237- - [c28]Robert E. Strom, Guruduth Banavar, Kevan Miller, Atul Prakash, Michael Ward:
Concurrency Control and View Notification Algorithms for Collaborative Replicated Objects. ICDCS 1997: 194-203 - 1996
- [j12]Santanu Paul, Atul Prakash:
A Query Algebra for Program Databases. IEEE Trans. Software Eng. 22(3): 202-217 (1996) - [c27]Robert W. Hall, Amit G. Mathur, Farnam Jahanian, Atul Prakash, Craig Rassmussen:
Corona: A Communication Service for Scalable, Reliable Group Collaboration Systems. CSCW 1996: 140-149 - [c26]Jang Ho Lee, Atul Prakash, Trent Jaeger, Gwobaw Wu:
Supporting Multi-User, Multi-Applet Workspaces in CBE. CSCW 1996: 344-353 - [c25]Amit G. Mathur, Atul Prakash:
A Protocol Composition-Based Approach to QoS Control in Collaboration Systems. ICMCS 1996: 62-69 - [c24]Nelson R. Manohar, Atul Prakash:
A Flexible Architecture for Integrating Heterogeneous Media on Replayable Workspaces. ICMCS 1996: 274-278 - [c23]Trent Jaeger, Atul Prakash:
Building Systems That Flexibly Download Executable Content. USENIX Security Symposium 1996 - 1995
- [j11]Ratib Al-Zoubi, Atul Prakash:
Program view generation and change analysis using attributed dependency graphs. J. Softw. Maintenance Res. Pract. 7(4): 239-261 (1995) - [c22]Trent Jaeger, Atul Prakash:
Implementation of a discretionary access control model for script-based systems. CSFW 1995: 70-84 - [c21]Nelson R. Manohar, Atul Prakash:
The Session Capture and Replay Paradigm for Asynchronous Collaboration. ECSCW 1995: 147- - [c20]Trent Jaeger, Atul Prakash:
Management and utilization of knowledge for the automatic improvement of workflow performance. COOCS 1995: 32-43 - [c19]Tom Rodden, Paul Dourish, Lennart E. Fahlén, Chris Greenhalgh, Atul Prakash, John Riedl:
Computer Supported Cooperative Work: New Challenges or Old Problems (Panel). ICDCS 1995: 180-181 - [c18]Nelson R. Manohar, Atul Prakash:
Dealing with Synchronization and Timing Variability in the Playback of Interactive Session Recordings. ACM Multimedia 1995: 45-56 - [c17]Trent Jaeger, Atul Prakash:
Requirements of role-based access control for collaborative systems. ACM Workshop on Role-Based Access Control 1995 - [c16]Trent Jaeger, Atul Prakash:
Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems. SEKE 1995: 103-105 - 1994
- [j10]Erich B. Buss, Renato de Mori, W. Morven Gentleman, John Henshaw, J. Howard Johnson, Kostas Kontogiannis, Ettore Merlo, Hausi A. Müller, John Mylopoulos, Santanu Paul, Atul Prakash, Martin Stanley, Scott R. Tilley, Joel Troster, Kenny Wong:
Investigating Reverse Engineering Technologies for the CAS Program Understanding Project. IBM Syst. J. 33(3): 477-500 (1994) - [j9]Santanu Paul, Atul Prakash:
Supporting Queries on Source Code: a Formal Framework. Int. J. Softw. Eng. Knowl. Eng. 4(3): 325-348 (1994) - [j8]Atul Prakash, Michael J. Knister:
A Framework for Undoing Actions in Collaborative Systems. ACM Trans. Comput. Hum. Interact. 1(4): 295-330 (1994) - [j7]Santanu Paul, Atul Prakash:
A Framework for Source Code Search Using Program Patterns. IEEE Trans. Software Eng. 20(6): 463-475 (1994) - [c15]Trent Jaeger, Atul Prakash:
Support for the File System Security Requirements of Computational E-Mail Systems. CCS 1994: 1-9 - [c14]Susan E. McDaniel, Gary M. Olson, Terry E. Weymouth, Craig E. Rasmussen, Atul Prakash, C. Robert Clauer, Daniel E. Atkins, Ramani Penmetsa, Nelson R. Manohar, Hyong Sop Shim:
The upper atmospheric research collaboratory. CHI Conference Companion 1994: 21-22 - [c13]Atul Prakash, Hyong Sop Shim:
DistView: Support for Building Efficient Collaborative Applications Using Replicated Objects. CSCW 1994: 153-164 - [c12]Santanu Paul, Atul Prakash:
Querying Source Code Using an Algebraic Query Language. ICSM 1994: 127-136 - [c11]Trent Jaeger, Atul Prakash, Masayuki Ishikawa:
A Framework for Automatic Improvement of Workflows to Meet Performance Goals. ICTAI 1994: 640-646 - [c10]Santanu Paul, Atul Prakash:
Object data models to support source code queries: implementing SCA within REFINE. WPC 1994: 145-152 - [c9]Amit G. Mathur, Atul Prakash:
Protocols for Integrated Audio and Shared Windows in Collaborative Systems. ACM Multimedia 1994: 381-388 - 1993
- [j6]Michael J. Knister, Atul Prakash:
Issues in the Design of a Toolkit for Supporting Multiple Group Editors. Comput. Syst. 6(2): 135-166 (1993) - [c8]Santanu Paul, Atul Prakash:
Generating programming language-based pattern matchers. CASCON 1993: 227-243 - [c7]Trent Jaeger, Atul Prakash:
BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems. SEKE 1993: 191-198 - 1992
- [c6]Atul Prakash, Michael J. Knister:
Design Considerations in Choosing Operations for Building Groupware Systems. CSCW Tools and Technologies Workshop 1992: 9 - [c5]Atul Prakash, Michael J. Knister:
Undoing Actions in Collaborative Work. CSCW 1992: 273-280 - 1991
- [c4]Atul Prakash, Rajalakshmi Subramanian:
Filter: an algorithm for reducing cascaded rollbacks in optimistic distributed simulations. Annual Simulation Symposium 1991: 123-132 - [c3]Santanu Paul, Atul Prakash, Erich B. Buss, John Henshaw:
Theories and techniques of program understanding. CASCON 1991: 37-53 - 1990
- [j5]C. V. Ramamoorthy, Yutaka Usuda, Atul Prakash, Wei-Tek Tsai:
The Evolution Support Environment System. IEEE Trans. Software Eng. 16(11): 1225-1234 (1990) - [c2]Michael J. Knister, Atul Prakash:
DistEdit: A Distributed Toolkit for Supporting Multiple Group Editors. CSCW 1990: 343-355
1980 – 1989
- 1988
- [j4]C. V. Ramamoorthy, Vijay K. Garg, Atul Prakash:
Support for Reusability in Genesis. IEEE Trans. Software Eng. 14(8): 1145-1154 (1988) - [c1]Atul Prakash, C. V. Ramamoorthy:
Hierarchical Distributed Simulations. ICDCS 1988: 341-348 - 1987
- [j3]C. V. Ramamoorthy, Atul Prakash, Vijay K. Garg, Tsuneo Yamaura, Anupam Bhide:
Issues in the Development of Large, Distributed, and Reliable Software. Adv. Comput. 26: 393-443 (1987) - 1986
- [j2]C. V. Ramamoorthy, Vijay K. Garg, Atul Prakash:
Programming in the Large. IEEE Trans. Software Eng. 12(7): 769-783 (1986) - 1984
- [j1]C. V. Ramamoorthy, Atul Prakash, Wei-Tek Tsai, Yutaka Usuda:
Software Engineering: Problems and Perspectives. Computer 17(10): 191-209 (1984)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint