Vitaly Shmatikov
#145,835
Most Influential Person Now
Vitaly Shmatikov's AcademicInfluence.com Rankings
Vitaly Shmatikovcomputer-science Degrees
Computer Science
#7299
World Rank
#7687
Historical Rank
Machine Learning
#2651
World Rank
#2686
Historical Rank
Database
#4360
World Rank
#4534
Historical Rank

Download Badge
Computer Science
Vitaly Shmatikov's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Vitaly Shmatikov Influential?
(Suggest an Edit or Addition)Vitaly Shmatikov's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Membership Inference Attacks Against Machine Learning Models (2016) (2302)
- Robust De-anonymization of Large Sparse Datasets (2008) (2178)
- Privacy-preserving deep learning (2015) (1651)
- De-anonymizing Social Networks (2009) (1339)
- How To Backdoor Federated Learning (2018) (932)
- Exploiting Unintended Feature Leakage in Collaborative Learning (2018) (860)
- Airavat: Security and Privacy for MapReduce (2010) (530)
- The most dangerous code in the world: validating SSL certificates in non-browser software (2012) (483)
- How To Break Anonymity of the Netflix Prize Dataset (2006) (483)
- Fast dictionary attacks on passwords using time-space tradeoff (2005) (417)
- The cost of privacy: destruction of data-mining utility in anonymized data publishing (2008) (382)
- Constraint solving for bounded-process cryptographic protocol analysis (2001) (365)
- Machine Learning Models that Remember Too Much (2017) (347)
- Myths and fallacies of "Personally Identifiable Information" (2010) (331)
- "You Might Also Like:" Privacy Risks of Collaborative Filtering (2011) (321)
- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses (2006) (266)
- Differential Privacy Has Disparate Impact on Model Accuracy (2019) (255)
- Finite-State Analysis of SSL 3.0 (1998) (214)
- Information Hiding, Anonymity and Privacy: a Modular Approach (2004) (208)
- Towards Practical Privacy for Genomic Computation (2008) (208)
- Privacy-Preserving Graph Algorithms in the Semi-honest Model (2005) (204)
- Intruder deductions, constraint solving and insecurity decision in presence of exclusive or (2003) (189)
- Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations (2014) (188)
- Privacy-preserving data exploration in genome-wide association studies (2013) (181)
- The Parrot Is Dead: Observing Unobservable Network Communications (2013) (181)
- Efficient Two-Party Secure Computation on Committed Inputs (2007) (165)
- Memento: Learning Secrets from Process Footprints (2012) (160)
- Chiron: Privacy-preserving Machine Learning as a Service (2018) (155)
- Salvaging Federated Learning by Local Adaptation (2020) (154)
- Defeating Image Obfuscation with Deep Learning (2016) (147)
- Auditing Data Provenance in Text-Generation Models (2018) (147)
- Privacy-preserving remote diagnostics (2007) (141)
- A Scanner Darkly: Protecting User Privacy from Perceptual Applications (2013) (134)
- Beauty and the Burst: Remote Identification of Encrypted Video Streams (2017) (130)
- Blind Backdoors in Deep Learning Models (2020) (126)
- Privacy-Preserving Sharing and Correlation of Security Alerts (2004) (115)
- Finite-state analysis of two contract signing protocols (2002) (114)
- The Hitchhiker's Guide to DNS Cache Poisoning (2010) (113)
- A Core Calculus of Classes and Mixins (1999) (101)
- Probabilistic Polynomial-Time Semantics for a Protocol Security Logic (2005) (101)
- Probabilistic analysis of an anonymity system (2004) (94)
- Breaking and Fixing Origin-Based Access Control in Hybrid Web/Mobile Application Frameworks (2014) (94)
- Reputation-based trust management (2005) (93)
- Security Analysis of Voice-over-IP Protocols (2007) (87)
- Abusing File Processing in Malware Detectors for Fun and Profit (2012) (87)
- Probabilistic Model Checking of an Anonymity System (2004) (87)
- Overlearning Reveals Sensitive Attributes (2019) (86)
- Inference Attacks Against Collaborative Learning (2018) (84)
- RoleCast: finding missing security checks when you do not know what checks are (2011) (83)
- Breaking Web Applications Built On Top of Encrypted Data (2016) (82)
- Analysis of probabilistic contract signing (2002) (82)
- Probabilistic analysis of anonymity (2002) (81)
- Efficient anonymity-preserving data collection (2006) (79)
- Is it possible to decide whether a cryptographic protocol is secure or not (2002) (79)
- Diglossia: detecting code injection attacks with precision and efficiency (2013) (79)
- What Mobile Ads Know About Mobile Users (2016) (77)
- Fix Me Up: Repairing Access-Control Bugs in Web Applications (2013) (77)
- The Tao of Inference in Privacy-Protected Databases (2018) (76)
- The Postman Always Rings Twice: Attacking and Defending postMessage in HTML5 Websites (2013) (76)
- dFence: Transparent Network-based Denial of Service Mitigation (2007) (75)
- Synchronous Batching: From Cascades to Free Routes (2004) (71)
- Symbolic protocol analysis with products and Diffie-Hellman exponentiation (2003) (71)
- Analysis of a Fair Exchange Protocol (2000) (70)
- Efficient finite-state analysis for large security protocols (1998) (68)
- πBox: A Platform for Privacy-Preserving Apps (2013) (68)
- Situational Access Control in the Internet of Things (2018) (67)
- Measuring relationship anonymity in mix networks (2006) (67)
- Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels (2012) (63)
- Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, October 17-21, 2011 (2011) (62)
- Why Your Encrypted Database Is Not Secure (2017) (62)
- SAFERPHP: finding semantic vulnerabilities in PHP applications (2011) (61)
- A security policy oracle: detecting security holes using multiple API implementations (2011) (60)
- Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities (2009) (59)
- CloudTransport: Using Cloud Storage for Censorship-Resistant Networking (2014) (57)
- Contract signing, optimism, and advantage (2003) (55)
- You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion (2020) (54)
- Obfuscated databases and group privacy (2005) (54)
- Can we still avoid automatic face detection? (2016) (54)
- Game-based analysis of denial-of-service prevention protocols (2005) (52)
- No Direction Home: The True Cost of Routing Around Decoys (2014) (51)
- Analysis of Abuse-Free Contract Signing (2000) (44)
- Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation (2004) (44)
- Large-scale collection and sanitization of network security data: risks and challenges (2006) (42)
- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme (2004) (41)
- Formal Analysis of Authentication in Bluetooth Device Pairing (2007) (41)
- Truth in advertising: lightweight verification of route integrity (2007) (41)
- Privacy-Preserving Classifier Learning (2009) (40)
- Fooling OCR Systems with Adversarial Text Images (2018) (39)
- CovertCast: Using Live Streaming to Evade Internet Censorship (2016) (38)
- Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation (2005) (38)
- Security against probe-response attacks in collaborative intrusion detection (2007) (34)
- No Escape From Reality: Security and Privacy of Augmented Reality Browsers (2015) (31)
- Secure Verification of Location Claims with Simultaneous Distance Modification (2007) (27)
- Combining Control-Flow Integrity and Static Analysis for Efficient and Validated Data Sandboxing (2011) (27)
- Towards computationally sound symbolic analysis of key exchange protocols (2005) (25)
- Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning (2020) (25)
- TxBox: Building Secure, Efficient Sandboxes with System Transactions (2011) (22)
- Privacy and Security Myths and Fallacies of Personally Identifiable Information (2010) (21)
- Adversarial Semantic Collisions (2020) (19)
- Unifying Equivalence-Based Definitions of Protocol Security (2004) (17)
- A Core Calculus of Classes and Objects (1999) (16)
- The Natural Auditor: How To Tell If Someone Used Your Words To Train Their Model (2018) (16)
- Rethinking Security of Web-Based System Applications (2015) (15)
- Using Program Analysis to Synthesize Sensor Spoofing Attacks (2017) (15)
- Towards a Privacy Research Roadmap for the Computing Community (2016) (15)
- Efficient, context-sensitive detection of real-world semantic attacks (2010) (12)
- Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures (2021) (12)
- : Using Live Streaming to Evade Internet Censorship (2016) (11)
- Security Protocols (2007) (10)
- Finite-state analysis of security protocols (2000) (10)
- Negotiated privacy (2002) (10)
- Key confirmation and adaptive corruptions in the protocol security logic (2006) (9)
- Robust de-anonymization of large sparse datasets : a decade later (2019) (8)
- Gone in Six Characters: Short URLs Considered Harmful for Cloud Services (2016) (7)
- EARP: Principled Storage, Sharing, and Protection for Mobile Apps (2016) (7)
- Spinning Language Models for Propaganda-As-A-Service (2021) (6)
- On the Limits of Point Function Obfuscation (2006) (6)
- Spinning Sequence-to-Sequence Models with Meta-Backdoors (2021) (6)
- EVE: Verifying Correct Execution of Cloud-Hosted Web Applications (2011) (5)
- 2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014 (2014) (5)
- Efficient , Context-Sensitive Detection of Semantic Attacks (2009) (5)
- Data privacy: the non-interactive setting (2009) (4)
- Anonymity is not privacy (2011) (4)
- COLLOCATION COARSE APPROXIMATION (CCA) IN MULTIGRID (2009) (3)
- Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008 (2008) (3)
- Negotiated Privacy: (Extended Abstract) (2002) (3)
- De-Anonymizing Text by Fingerprinting Language Generation (2020) (3)
- Probabilistic Escrow of Financial Transactions with Cumulative Threshold Disclosure (2005) (3)
- Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing (2011) (3)
- Certificate Free Anonymous Routing for Mobile Ad Hoc Networks (2006) (2)
- Constraint solving, exclusive or and the decision of confide ntiality for security protocols assuming a bounded number of sessions. (2003) (2)
- CCS 2006 : proceedings of the 13th ACM Conference on Computer and Communications Security : October 30-November 3, 2006, Alexandria, Virginia, USA (2006) (2)
- Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 (2010) (1)
- Computationally Sound Compositional Logic for Security Protocols (2006) (1)
- Data Isotopes for Data Provenance in DNNs (2022) (1)
- CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA (2010) (1)
- Private Data at AI Risk (2018) (0)
- Private Information Retrieval (2010) (0)
- BigFoot: Exploiting and Mitigating Leakage in Encrypted Write-Ahead Logs (2021) (0)
- Proceedings of the ACM Conference on Computer and Communications Security: CCS 2010 program chair's welcome (2010) (0)
- : Lexical and Syntactic Analysis (2010) (0)
- Session details: Data disclosure (2007) (0)
- Get Off My Prefix ! Using Gerontocratic Policies to Improve the Security and Stability of Internet Routing (2009) (0)
- Proceedings of the ACM Conference on Computer and Communications Security: Foreword (2008) (0)
- Negotiated Priva y ( extended abstra t ) (2007) (0)
- Reputation-Based Trust Management (extended abstract) (2003) (0)
- Unifying Equivalen e-Based De nitions of Proto ol Se urity ? (2004) (0)
- Hyperparameter Search Is All You Need For Training-Agnostic Backdoor Robustness (2023) (0)
This paper list is powered by the following services: