Bimal Viswanath

Orcid: 0000-0002-6559-9689

According to our database1, Bimal Viswanath authored at least 40 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Measurement of Embedding Choices on Cryptographic API Completion Tasks.
ACM Trans. Softw. Eng. Methodol., March, 2024

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape.
CoRR, 2024

Specializing Neural Networks for Cryptographic Code Completion Applications.
IEEE Trans. Software Eng., June, 2023

Deepfake Text Detection: Limitations and Opportunities.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

A First Look at Toxicity Injection Attacks on Open-domain Chatbots.
Proceedings of the Annual Computer Security Applications Conference, 2023

Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons.
CoRR, 2021

Deepfake Videos in the Wild: Analysis and Detection.
Proceedings of the WWW '21: The Web Conference 2021, 2021

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification.
Proceedings of the 30th USENIX Security Symposium, 2021

Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

NoiseScope: Detecting Deepfake Images in a Blind Setting.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning.
Proceedings of the 27th USENIX Security Symposium, 2018

I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Sieve: Actionable Insights from Monitored Metrics in Microservices.
CoRR, 2017

Sieve: actionable insights from monitored metrics in distributed systems.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

Complexity vs. performance: empirical analysis of machine learning as a service.
Proceedings of the 2017 Internet Measurement Conference, 2017

Towards Reliable Application Deployment in the Cloud.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

Automated Crowdturfing Attacks and Defenses in Online Review Systems.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Towards trustworthy social computing systems.
PhD thesis, 2016

Spying Browser Extensions: Analysis and Detection.
CoRR, 2016

Strengthening Weak Identities Through Inter-Domain Trust Transfer.
Proceedings of the 25th International Conference on World Wide Web, 2016

Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Towards Detecting Anomalous User Behavior in Online Social Networks.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Understanding and Specifying Social Access Control Lists.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Simplifying friendlist management.
Proceedings of the 21st World Wide Web Conference, 2012

Understanding and combating link farming in the twitter social network.
Proceedings of the 21st World Wide Web Conference 2012, 2012

Keeping information safe from social networking apps.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Canal: scaling social network-based Sybil tolerance schemes.
Proceedings of the European Conference on Computer Systems, 2012

Defending against large-scale crawls in online social networks.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2012

Exploring the design space of social network-based Sybil defenses.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

A stochastic model for the behavior of multiple TCP NewReno sources over optical burst switching network.
Photonic Netw. Commun., 2011

Limiting large-scale crawls of social networking sites.
Proceedings of the ACM SIGCOMM 2011 Conference on Applications, 2011

Sharing social content from home: a measurement-driven feasibility study.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 2011

You are who you know: inferring user profiles in online social networks.
Proceedings of the Third International Conference on Web Search and Web Data Mining, 2010

An analysis of social network-based Sybil defenses.
Proceedings of the ACM SIGCOMM 2010 Conference on Applications, 2010

On the evolution of user interaction in Facebook.
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009

A Markov Chain Model for TCP NewReno Over Optical Burst Switching Networks.
Proceedings of the Global Communications Conference, 2007