Analysis of malware propagation in Twitter A Sanzgiri, A Hughes, S Upadhyaya 2013 IEEE 32nd International Symposium on Reliable Distributed Systems, 195-204, 2013 | 28 | 2013 |
A thirty year old conjecture about promise problems A Hughes, D Mandal, A Pavan, N Russell, AL Selman computational complexity 25 (4), 883-919, 2016 | 8 | 2016 |
Complexity of Insider Attacks to Databases G Kul, S Upadhyaya, A Hughes Proceedings of the 2017 International Workshop on Managing Insider Security …, 2017 | 7 | 2017 |
Disjoint NP-pairs and propositional proof systems C Glaßer, A Hughes, AL Selman, N Wisiol ACM SIGACT News 45 (4), 59-75, 2014 | 6 | 2014 |
An analysis of complexity of insider attacks to databases G Kul, S Upadhyaya, A Hughes ACM Transactions on Management Information Systems (TMIS) 12 (1), 1-18, 2020 | 4 | 2020 |
Chromatic kernel and its applications H Ding, B Stojkovic, Z Chen, A Hughes, L Xu, A Fritz, N Sehgal, ... Journal of Combinatorial Optimization 31 (3), 1298-1315, 2016 | | 2016 |
Structural properties of disjoint NP-pairs and the random oracle model AR Hughes | | 2016 |