Follow
Bimal Viswanath
Bimal Viswanath
Assistant Professor of Computer Science at Virginia Tech
Verified email at cs.vt.edu - Homepage
Title
Cited by
Cited by
Year
On the evolution of user interaction in facebook
B Viswanath, A Mislove, M Cha, KP Gummadi
Proceedings of the 2nd ACM workshop on Online social networks, 37-42, 2009
18262009
You are who you know: inferring user profiles in online social networks
A Mislove, B Viswanath, KP Gummadi, P Druschel
Proceedings of the third ACM international conference on Web search and data …, 2010
9612010
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
6532019
Understanding and combating link farming in the twitter social network
S Ghosh, B Viswanath, F Kooti, NK Sharma, G Korlam, F Benevenuto, ...
Proceedings of the 21st international conference on World Wide Web, 61-70, 2012
4952012
An analysis of social network-based sybil defenses
B Viswanath, A Post, KP Gummadi, A Mislove
ACM SIGCOMM Computer Communication Review 40 (4), 363-374, 2010
4562010
Towards detecting anomalous user behavior in online social networks
B Viswanath, MA Bashir, M Crovella, S Guha, KP Gummadi, ...
23rd usenix security symposium (usenix security 14), 223-238, 2014
3232014
Automated crowdturfing attacks and defenses in online review systems
Y Yao, B Viswanath, J Cryan, H Zheng, BY Zhao
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
1652017
With great training comes great vulnerability: Practical attacks against transfer learning
B Wang, Y Yao, B Viswanath, H Zheng, BY Zhao
27th USENIX security symposium (USENIX Security 18), 1281-1297, 2018
922018
Canal: Scaling social network-based Sybil tolerance schemes
B Viswanath, M Mondal, KP Gummadi, A Mislove, A Post
Proceedings of the 7th ACM european conference on Computer Systems, 309-322, 2012
862012
Complexity vs. performance: empirical analysis of machine learning as a service
Y Yao, Z Xiao, B Wang, B Viswanath, H Zheng, BY Zhao
Proceedings of the 2017 Internet Measurement Conference, 384-397, 2017
752017
Sieve: Actionable insights from monitored metrics in distributed systems
J Thalheim, A Rodrigues, IE Akkus, P Bhatotia, R Chen, B Viswanath, ...
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, 14-27, 2017
742017
Exploring the design space of social network-based sybil defenses
B Viswanath, M Mondal, A Clement, P Druschel, KP Gummadi, A Mislove, ...
2012 Fourth International Conference on Communication Systems and Networks …, 2012
612012
Strength in numbers: Robust tamper detection in crowd computations
B Viswanath, MA Bashir, MB Zafar, S Bouget, S Guha, KP Gummadi, ...
Proceedings of the 2015 ACM on Conference on Online Social Networks, 113-124, 2015
532015
Sharing social content from home: a measurement-driven feasibility study
M Marcon, B Viswanath, M Cha, KP Gummadi
Proceedings of the 21st international workshop on Network and operating …, 2011
412011
Defending against large-scale crawls in online social networks
M Mondal, B Viswanath, A Clement, P Druschel, KP Gummadi, A Mislove, ...
Proceedings of the 8th international conference on Emerging networking …, 2012
402012
Understanding and specifying social access control lists
M Mondal, Y Liu, B Viswanath, KP Gummadi, A Mislove
10th Symposium On Usable Privacy and Security (SOUPS 2014), 271-283, 2014
352014
Keeping information safe from social networking apps
B Viswanath, E Kiciman, S Saroiu
Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012
352012
Throwing darts in the dark? detecting bots with limited data using neural data augmentation
STK Jan, Q Hao, T Hu, J Pu, S Oswal, G Wang, B Viswanath
2020 IEEE symposium on security and privacy (SP), 1190-1206, 2020
272020
What happens after you leak your password: Understanding credential sharing on phishing sites
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
252019
Strengthening weak identities through inter-domain trust transfer
G Venkatadri, O Goga, C Zhong, B Viswanath, KP Gummadi, N Sastry
Proceedings of the 25th International Conference on World Wide Web, 1249-1259, 2016
222016
The system can't perform the operation now. Try again later.
Articles 1–20