Follow
Arvind Narayanan
Arvind Narayanan
Verified email at cs.princeton.edu - Homepage
Title
Cited by
Cited by
Year
Robust de-anonymization of large sparse datasets
A Narayanan, V Shmatikov
Security and Privacy, 2008. SP 2008. IEEE Symposium on, 111-125, 2008
3984*2008
Semantics derived automatically from language corpora contain human-like biases
A Caliskan, JJ Bryson, A Narayanan
Science 356 (6334), 183-186, 2017
36252017
Bitcoin and cryptocurrency technologies: A comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
33192016
Fairness and Machine Learning: Limitations and Opportunities
S Barocas, M Hardt, A Narayanan
MIT Press. https://fairmlbook.org, 2023
2077*2023
Research perspectives and challenges for Bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
Security and Privacy (SP), 2015 IEEE Symposium on, 104-121, 2015
1855*2015
De-anonymizing social networks
A Narayanan, V Shmatikov
IEEE Symposium on Security and Privacy 2009, 2009
18452009
The Web never forgets: Persistent tracking mechanisms in the wild
G Acar, C Eubank, S Englehardt, M Juarez, A Narayanan, C Diaz
ACM SIGSAC Conference on Computer and Communications Security, 674-689, 2014
10582014
Online tracking: A 1-million-site measurement and analysis
S Englehardt, A Narayanan
ACM Conference on Computer and Communications Security, 2016
10122016
Dark patterns at scale: Findings from a crawl of 11K shopping websites
A Mathur, G Acar, MJ Friedman, E Lucherini, J Mayer, M Chetty, ...
Proceedings of the ACM on human-computer interaction 3 (CSCW), 1-32, 2019
6552019
Mixcoin: Anonymity for bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
6442014
Fast dictionary attacks on passwords using time-space tradeoff
A Narayanan, V Shmatikov
Proceedings of the 12th ACM conference on Computer and communications …, 2005
6172005
Myths and fallacies of personally identifiable information
A Narayanan, V Shmatikov
Communications of the ACM 53 (6), 24-26, 2010
5352010
Routes for breaching and protecting genetic privacy
Y Erlich, A Narayanan
Nature Reviews Genetics 15 (6), 409-421, 2014
5132014
Adnostic: Privacy preserving targeted advertising
V Toubiana, A Narayanan, D Boneh, H Nissenbaum, S Barocas
17th Network and Distributed System Security Symposium, 2010
5002010
Location Privacy via Private Proximity Testing
A Narayanan, N Thiagarajan, M Lakhani, M Hamburg, D Boneh
18th Network and Distributed System Security Symposium, 2011
4782011
On the instability of Bitcoin without the block reward
M Carlsten, H Kalodner, SM Weinberg, A Narayanan
ACM Conference on Computer and Communications Security, 2016
4672016
Keeping the Smart Home Private with Smart (er) IoT Traffic Shaping
N Apthorpe, DY Huang, D Reisman, A Narayanan, N Feamster
Proceedings on Privacy Enhancing Technologies 2019, 2019
466*2019
Bitcoin's academic pedigree
A Narayanan, J Clark
Communications of the ACM 60 (12), 36-45, 2017
449*2017
Leakage and the reproducibility crisis in machine-learning-based science
S Kapoor, A Narayanan
Patterns 4 (9), 2023
436*2023
“You Might Also Like:” Privacy Risks of Collaborative Filtering
JA Calandrino, A Kilzer, A Narayanan, EW Felten, V Shmatikov
Security and Privacy (SP), 2011 IEEE Symposium on, 231-246, 2011
4332011
The system can't perform the operation now. Try again later.
Articles 1–20