Ashish Kundu

According to our database1, Ashish Kundu authored at least 58 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RAW: A Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images with Provable Guarantees.
CoRR, 2024

Transfer Learning for Security: Challenges and Future Directions.
CoRR, 2024

Trust and ethical considerations in a multi-modal, explainable AI-driven chatbot tutoring system: The case of collaboratively solving Rubik's Cube.
CoRR, 2024

2023
Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs.
CoRR, 2023

Demystifying Poisoning Backdoor Attacks from a Statistical Perspective.
CoRR, 2023

Evaluating Chatbots to Promote Users' Trust - Practices and Open Problems.
CoRR, 2023

Large Language Models and Computer Security.
Proceedings of the 5th IEEE International Conference on Trust, 2023

On the Dual Nature of Necessity in Use of Rust Unsafe Code.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

A Unified Detection Framework for Inference-Stage Backdoor Defenses.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Understanding Backdoor Attacks through the Adaptability Hypothesis.
Proceedings of the International Conference on Machine Learning, 2023

A Pro-Active Defense Framework for IoT Systems.
Proceedings of the 9th IEEE International Conference on Collaboration and Internet Computing, 2023

2022
Edge Security: Challenges and Issues.
CoRR, 2022

An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.
Proceedings of the Computer Security - ESORICS 2022, 2022

BeautifAI - Personalised Occasion-based Makeup Recommendation.
Proceedings of the Asian Conference on Machine Learning, 2022

2021
AI-Driven Selective Protection of Multimedia Data.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

2020
StackVault: Protection from Untrusted Functions.
Proceedings of the Second IEEE International Conference on Trust, 2020

Energy Attacks on Mobile Devices.
Proceedings of the Second IEEE International Conference on Trust, 2020

2019
Data Transparency with Blockchain and AI Ethics.
ACM J. Data Inf. Qual., 2019

Uncheatable Machine Learning Inference.
CoRR, 2019

PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets.
Proceedings of the World Wide Web Conference, 2019

Towards Deep Federated Defenses Against Malware in Cloud Ecosystems.
Proceedings of the First IEEE International Conference on Trust, 2019

Malware Containment in Cloud.
Proceedings of the First IEEE International Conference on Trust, 2019

How Secure Is Your IoT Network?
Proceedings of the 2019 IEEE International Congress on Internet of Things, 2019

2018
Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases.
IEEE Trans. Knowl. Data Eng., 2018

Healthcare Informatics and Privacy.
IEEE Internet Comput., 2018

A Trusted Healthcare Data Analytics Cloud Platform.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Research Directions in Blockchain Data Management and Analytics.
Proceedings of the 21st International Conference on Extending Database Technology, 2018

Collaborative and Accountable Hardware Governance Using Blockchain.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Principle of Need-to-Act.
CoRR, 2017

Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress).
CoRR, 2017

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Compliance-Aware Provisioning of Containers on Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Managing sensitive applications in the public cloud.
IBM J. Res. Dev., 2016

An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users.
Proceedings of the Seventh International Workshop on Data-Intensive Computing in the Clouds, 2016

Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2014
Towards a Systematic Study of the Covert Channel Attacks in Smartphones.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Service Usage Metering in Hybrid Cloud Environments.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

Security of graph data: hashing schemes and definitions.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Use-Case Centric Dashboard for Cloud Solutions.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Privacy-preserving authentication of trees and graphs.
Int. J. Inf. Sec., 2013

Towards Authenticated Objects.
Proceedings of the Network and System Security - 7th International Conference, 2013

Network-Level Access Control Management for the Cloud.
Proceedings of the 2013 IEEE International Conference on Cloud Engineering, 2013

2012
On Hashing Graphs.
IACR Cryptol. ePrint Arch., 2012

Efficient Leakage-free Authentication of Trees, Graphs and Forests.
IACR Cryptol. ePrint Arch., 2012

Authentication of Data on Devices.
Proceedings of the Workshops Proceedings of the IEEE 28th International Conference on Data Engineering, 2012

Leakage-free redactable signatures.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
A New Class of Buffer Overflow Attacks.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
How to authenticate graphs without leaking.
Proceedings of the EDBT 2010, 2010

2009
SN2K Attacks and Honest Services.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
A New Model for Secure Dissemination of XML Content.
IEEE Trans. Syst. Man Cybern. Part C, 2008

Structural signatures for tree data structures.
Proc. VLDB Endow., 2008

A tree-covering problem arising in integrity of tree-structured data.
Inf. Process. Lett., 2008

Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors.
Proceedings of the 24th International Conference on Data Engineering, 2008

2006
Secure Dissemination of XML Content Using Structure-based Routing.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006

2005
A service creation environment based on end to end composition of Web services.
Proceedings of the 14th international conference on World Wide Web, 2005

Building Applications Using End to End Composition of Web Services.
Proceedings of the Proceedings, 2005

2004
An Authoring Technology for Multidevice Web Applications.
IEEE Pervasive Comput., 2004


  Loading...