According to our database1, Anupam Das authored at least 25 papers between 2008 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Enabling Live Video Analytics with a Scalable and Privacy-Aware Framework.
Every Move You Make: Exploring Practical Issues in Smartphone Motion Sensor Fingerprinting and Countermeasures.
Personalized Privacy Assistants for the Internet of Things: Providing Users with Notice and Choice.
IEEE Pervasive Computing, 2018
Riding out DOMsday: Towards Detecting and Preventing DOM Cross-Site Scripting.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
The Web's Sixth Sense: A Study of Scripts Accessing Smartphone Sensors.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Some Recipes Can Do More Than Spoil Your Appetite: Analyzing the Security and Privacy Risks of IFTTT Recipes.
Proceedings of the 26th International Conference on World Wide Web, 2017
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
A Scalable and Privacy-Aware IoT Service for Live Video Analytics.
Proceedings of the 8th ACM on Multimedia Systems Conference, 2017
Password correlation: Quantification, evaluation and application.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Every Move You Make: Tracking Smartphone Users through Motion Sensors.
Proceedings of the 5th ACM Workshop on Information Hiding and Multimedia Security, 2017
Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
Assisting Users in a World Full of Cameras: A Privacy-Aware Infrastructure for Computer Vision Applications.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017
Tracking Mobile Web Users Through Motion Sensors: Attacks and Defenses.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
Defending Tor from Network Adversaries: A Case Study of Network Path Prediction.
The Tangled Web of Password Reuse.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Analyzing an adaptive reputation metric for anonymity systems.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Re3: relay reliability reputation for anonymity systems.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Transparent and Flexible Network Management for Big Data Processing in the Cloud.
Proceedings of the 5th USENIX Workshop on Hot Topics in Cloud Computing, 2013
Securing Anonymous Communication Channels under the Selective DoS Attack.
Proceedings of the Financial Cryptography and Data Security, 2013
PnP: improving web browsing performance over tor using web resource prefetch-and-push.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems.
IEEE Trans. Dependable Sec. Comput., 2012
A novel feedback based fast adaptive trust model for P2P networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Evolving Multilayer Neural Networks Using Permutation free Encoding Technique.
Proceedings of the 2009 International Conference on Artificial Intelligence, 2009
Permutation Free Encoding Technique for Evolving Neural Networks.
Proceedings of the Advances in Neural Networks, 2008