Arvind Narayanan
Associate professor of computer science
Arvind Narayanan's AcademicInfluence.com Rankings
Download Badge
Computer Science
Arvind Narayanan's Degrees
- PhD Computer Science University of Texas at Austin
- Masters Computer Science University of Texas at Austin
Similar Degrees You Can Earn
Why Is Arvind Narayanan Influential?
(Suggest an Edit or Addition)According to Wikipedia, Arvind Narayanan is a computer scientist and a professor at Princeton University. Narayanan is recognized for his research in the de-anonymization of data. Biography Narayanan received technical degrees from the Indian Institute of Technology Madras in 2004. His advisor was C. Pandu Rangan. Narayanan received his PhD in computer science from the University of Texas at Austin in 2009 under Vitaly Shmatikov. He worked briefly as a post-doctoral researcher at Stanford University, working closely with Dan Boneh. Narayanan moved to Princeton University as an assistant professor in September 2012. He was promoted to associate professor in 2014, and to professor in 2022.
Arvind Narayanan's Published Works
Published Works
- Robust De-anonymization of Large Sparse Datasets (2008) (2178)
- Semantics derived automatically from language corpora contain human-like biases (2016) (1661)
- De-anonymizing Social Networks (2009) (1339)
- SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (2015) (1053)
- Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction (2016) (866)
- Online Tracking: A 1-million-site Measurement and Analysis (2016) (575)
- How To Break Anonymity of the Netflix Prize Dataset (2006) (483)
- The Web Never Forgets: Persistent Tracking Mechanisms in the Wild (2014) (465)
- Fast dictionary attacks on passwords using time-space tradeoff (2005) (417)
- Routes for breaching and protecting genetic privacy (2013) (402)
- Mixcoin: Anonymity for Bitcoin with Accountable Mixes (2014) (395)
- Location Privacy via Private Proximity Testing (2011) (379)
- Myths and fallacies of "Personally Identifiable Information" (2010) (331)
- Adnostic: Privacy Preserving Targeted Advertising (2010) (330)
- "You Might Also Like:" Privacy Risks of Collaborative Filtering (2011) (321)
- On the Feasibility of Internet-Scale Author Identification (2012) (306)
- On the Instability of Bitcoin Without the Block Reward (2016) (305)
- Ten simple rules for responsible big data research (2017) (227)
- Bitcoin's academic pedigree (2017) (226)
- An Empirical Analysis of Traceability in the Monero Blockchain (2017) (216)
- Bitcoin and Cryptocurrency Technologies (215)
- Cookies That Give You Away: The Surveillance Implications of Web Tracking (2015) (201)
- Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic (2017) (200)
- De-anonymizing Programmers via Code Stylometry (2015) (178)
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security (2016) (173)
- Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge (2011) (172)
- An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design (2015) (166)
- A Scanner Darkly: Protecting User Privacy from Perceptual Applications (2013) (134)
- Measuring the predictability of life outcomes with a scientific mass collaboration (2020) (134)
- When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies (2017) (134)
- BlockSci: Design and applications of a blockchain analysis platform (2017) (134)
- Semantics derived automatically from language corpora necessarily contain human biases (2016) (121)
- Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping (2018) (115)
- Dark Patterns at Scale (2019) (112)
- Fairness and Machine Learning Limitations and Opportunities (2018) (100)
- When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries (2015) (95)
- Optimal Perfectly Secure Message Transmission (2004) (92)
- Redefining Genomic Privacy: Trust and Empowerment (2014) (91)
- De-anonymizing Web Browsing Data with Social Networks (2017) (86)
- An Empirical Analysis of Linkability in the Monero Blockchain (2017) (83)
- REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets (2020) (82)
- Formal Barriers to Longest-Chain Proof-of-Stake Protocols (2018) (76)
- I never signed up for this! Privacy implications of email tracking (2018) (71)
- No silver bullet: De-identification still doesn't work (2014) (70)
- Dark Patterns: Past, Present, and Future (2020) (66)
- Dark patterns (2020) (62)
- Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin (2017) (62)
- A Critical Look at Decentralized Personal Data Architectures (2012) (62)
- Securing Bitcoin wallets via a new DSA / ECDSA threshold signature scheme (2015) (59)
- A Precautionary Approach to Big Data Privacy (2016) (55)
- Obfuscated databases and group privacy (2005) (54)
- Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices (2019) (50)
- Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking (2018) (48)
- On the Power of Computational Secret Sharing (2003) (46)
- Leakage and the Reproducibility Crisis in ML-based Science (2022) (45)
- The Future of Ad Blocking: An Analytical Framework and New Techniques (2017) (44)
- Bitcoin’s Academic Pedigree (2017) (44)
- Why buy when you can rent ? Bribery attacks on Bitcoin consensus (2015) (41)
- Mitigating dataset harms requires stewardship: Lessons from 1000 papers (2021) (41)
- Web-based Attacks to Discover and Control Local IoT Devices (2018) (40)
- On Decentralizing Prediction Markets and Order Books (2014) (38)
- Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset (2020) (36)
- Securing Bitcoin wallets via threshold signatures (2014) (33)
- Do Not Track: A Universal Third-Party Web Tracking Opt Out (2011) (31)
- Research for practice (2007) (29)
- Endorsements on Social Media (2018) (28)
- Shining the Floodlights on Mobile Web Tracking — A Privacy Survey (2013) (27)
- The Impact of User Location on Cookie Notices (Inside and Outside of the European Union) (2019) (26)
- An Empirical Study of Wireless Carrier Authentication for SIM Swaps (2020) (26)
- Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning (2016) (24)
- Routes for breaching and protecting genetic privacy (2013) (24)
- Battery Status Not Included: Assessing Privacy in Web Standards (2017) (24)
- Why software engineering courses should include ethics coverage (2014) (23)
- Practical Pay TV Schemes (2003) (22)
- Anonymity for Bitcoin with accountable mixes ( Full version ) (2014) (22)
- Privacy and Security Myths and Fallacies of Personally Identifiable Information (2010) (21)
- OpenWPM : An automated platform for web privacy measurement (2016) (21)
- The Princeton Web Transparency and Accountability Project (2017) (20)
- Privacy, Ethics, and Data Access: A Case Study of the Fragile Families Challenge (2018) (20)
- Web Privacy Measurement : Scientific principles , engineering platform , and new results Draft – Jun 1 , 2014 (2014) (19)
- No boundaries: data exfiltration by third parties embedded on web pages (2020) (18)
- What Happened to the Crypto Dream?, Part 1 (2013) (17)
- perspectives on Bitcoin and second-generation cryptocurrencies (2015) (17)
- No Encore for Encore? Ethical questions for web-based censorship measurement (2015) (17)
- T-RECS: A Simulation Tool to Study the Societal Impact of Recommender Systems (2021) (16)
- Obfuscation in Bitcoin: Techniques and Politics (2017) (16)
- Cookies that give you away : Evaluating the surveillance implications of web tracking ( Draft : April 2 , 2014 ) (2016) (16)
- What happened to the crypto dream?, Part 2 (2013) (15)
- Privacy concerns of implicit secondary factors for web authentication (2014) (13)
- Effective Cryptocurrency Regulation Through Blacklisting (2019) (12)
- Manipulative tactics are the norm in political emails: Evidence from 300K emails from the 2020 US election cycle (2023) (10)
- A model for Bitcoin’s security and the declining block subsidy (9)
- Robust de-anonymization of large sparse datasets : a decade later (2019) (8)
- ViBE: A Tool for Measuring and Mitigating Bias in Image Datasets (2020) (8)
- Virtual Classrooms and Real Harms: Remote Learning at U.S. Universities (2020) (8)
- (Ir)Reproducible Machine Learning: A Case Study (2021) (8)
- On the Limits of Point Function Obfuscation (2006) (6)
- Identification of Anonymous DNA Using Genealogical Triangulation (2019) (5)
- An Introduction to Software Engineering Ethics (2013) (5)
- An Adversarial Analysis of the Reidentifiability of the Heritage Health Prize Dataset (2014) (5)
- Simulation as Experiment: An Empirical Critique of Simulation Research on Recommender Systems (2021) (4)
- Perfectly Reliable Message Transmission (2006) (4)
- Blockchains: Past, Present, and Future (2018) (4)
- Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States (2021) (4)
- How Algorithms Shape the Distribution of Political Advertising: Case Studies of Facebook, Google, and TikTok (2022) (4)
- Data privacy: the non-interactive setting (2009) (4)
- Virtual Classrooms and Real Harms (2020) (4)
- Review Routes for breaching and protecting genetic privacy (2013) (4)
- Password policies of most top websites fail to follow best practices (2022) (4)
- Convenience over safety: How authentication cookies compromise user account security on the Web (2014) (3)
- Resurrecting Address Clustering in Bitcoin (2021) (3)
- The Ethics of Datasets: Moving Forward Requires Stepping Back (2021) (2)
- The Web Tracking Arms Race: Past, Present, and Future (2018) (2)
- De-Anonymizing the Bitcoin Blockchain (2017) (2)
- Transfer of Organizational IT Usage Best Practices to the Indian Retail Industry — An Imperative for Enhancing Competitiveness (2008) (2)
- Ballot Acrobatics (2022) (1)
- Uncircumventable enforcement of privacy policies via cryptographic obfuscation (2007) (1)
- Security Policy Audits: Why and How (2022) (1)
- De-anonymizing Programmers via Code (2015) (1)
- Automating the Collection and Analysis of Campaign Emails (2019) (1)
- A Story of Discrimination and Unfairness Implicit Bias Embedded in Language Models (2016) (1)
- Mixcoin Anonymity for Bitcoin with accountable mixes ( abridged pre-proceedings version ) (2014) (0)
- 33 Bits of Entropy: Myths and Fallacies of "Personally Identifiable Information" (2012) (0)
- Monetization on the Modern Web : Automated Micropayments From Bitcoin-Enabled Browsers (2017) (0)
- Online Privacy and Web Transparency (Dagstuhl Seminar 17162) (2017) (0)
- Cryptocurrencies: From Practice to Theory (2018) (0)
- Social Champion Identification for NGOs (2018) (0)
- Case study : the gender earnings gap on Uber (2021) (0)
- Testing Discrimination in Practice (2019) (0)
- Sleep Monitor – Sleeping habits Nest Security Camera – Security monitoring Nes Security Camera – Motion in home Belkin WeMo S itch – Appliance power cycle (2018) (0)
- Keysight ' s Basic Instruments (2015) (0)
- Web measurement for fairness and transparency (2014) (0)
- Erratum: Routes for breaching and protecting genetic privacy (2014) (0)
- Privacy by Design: An Engineering Ethics Perspective (2013) (0)
- (Ir)Reproducible Machine Learning: Supplement (2021) (0)
- Why software engineering courses should include coverage of ethics (2013) (0)
- Limits to prediction : pre (2020) (0)
- The Green Dam Cyber-Censor Case (2010) (0)
- On the Power of Computational Se ret Sharing (2003) (0)
This paper list is powered by the following services:
Other Resources About Arvind Narayanan
What Schools Are Affiliated With Arvind Narayanan?
Arvind Narayanan is affiliated with the following schools: