Bimal Viswanath
Bimal Viswanath
Assistant Professor of Computer Science at Virginia Tech
Verified email at - Homepage
Cited by
Cited by
On the evolution of user interaction in facebook
B Viswanath, A Mislove, M Cha, KP Gummadi
Proceedings of the 2nd ACM workshop on Online social networks, 37-42, 2009
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
You are who you know: inferring user profiles in online social networks
A Mislove, B Viswanath, KP Gummadi, P Druschel
Proceedings of the third ACM international conference on Web search and data …, 2010
Understanding and combating link farming in the twitter social network
S Ghosh, B Viswanath, F Kooti, NK Sharma, G Korlam, F Benevenuto, ...
Proceedings of the 21st international conference on World Wide Web, 61-70, 2012
An analysis of social network-based sybil defenses
B Viswanath, A Post, KP Gummadi, A Mislove
ACM SIGCOMM Computer Communication Review 40 (4), 363-374, 2010
Towards detecting anomalous user behavior in online social networks
B Viswanath, MA Bashir, M Crovella, S Guha, KP Gummadi, ...
23rd usenix security symposium (usenix security 14), 223-238, 2014
Automated crowdturfing attacks and defenses in online review systems
Y Yao, B Viswanath, J Cryan, H Zheng, BY Zhao
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
With great training comes great vulnerability: Practical attacks against transfer learning
B Wang, Y Yao, B Viswanath, H Zheng, BY Zhao
27th USENIX security symposium (USENIX Security 18), 1281-1297, 2018
Complexity vs. performance: empirical analysis of machine learning as a service
Y Yao, Z Xiao, B Wang, B Viswanath, H Zheng, BY Zhao
Proceedings of the 2017 Internet Measurement Conference, 384-397, 2017
Sieve: Actionable insights from monitored metrics in distributed systems
J Thalheim, A Rodrigues, IE Akkus, P Bhatotia, R Chen, B Viswanath, ...
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, 14-27, 2017
Canal: Scaling social network-based Sybil tolerance schemes
B Viswanath, M Mondal, KP Gummadi, A Mislove, A Post
Proceedings of the 7th ACM european conference on Computer Systems, 309-322, 2012
{T-Miner}: A generative approach to defend against trojan attacks on {DNN-based} text classification
A Azizi, IA Tahmid, A Waheed, N Mangaokar, J Pu, M Javed, CK Reddy, ...
30th USENIX Security Symposium (USENIX Security 21), 2255-2272, 2021
Throwing darts in the dark? detecting bots with limited data using neural data augmentation
STK Jan, Q Hao, T Hu, J Pu, S Oswal, G Wang, B Viswanath
2020 IEEE symposium on security and privacy (SP), 1190-1206, 2020
Exploring the design space of social network-based sybil defenses
B Viswanath, M Mondal, A Clement, P Druschel, KP Gummadi, A Mislove, ...
2012 Fourth International Conference on Communication Systems and Networks …, 2012
Strength in numbers: Robust tamper detection in crowd computations
B Viswanath, MA Bashir, MB Zafar, S Bouget, S Guha, KP Gummadi, ...
Proceedings of the 2015 ACM on Conference on Online Social Networks, 113-124, 2015
What happens after you leak your password: Understanding credential sharing on phishing sites
P Peng, C Xu, L Quinn, H Hu, B Viswanath, G Wang
Proceedings of the 2019 ACM Asia conference on computer and communications …, 2019
Deepfake videos in the wild: Analysis and detection
J Pu, N Mangaokar, L Kelly, P Bhattacharya, K Sundaram, M Javed, ...
Proceedings of the Web Conference 2021, 981-992, 2021
Defending against large-scale crawls in online social networks
M Mondal, B Viswanath, A Clement, P Druschel, KP Gummadi, A Mislove, ...
Proceedings of the 8th international conference on Emerging networking …, 2012
Sharing social content from home: a measurement-driven feasibility study
M Marcon, B Viswanath, M Cha, KP Gummadi
Proceedings of the 21st international workshop on Network and operating …, 2011
Understanding and specifying social access control lists
M Mondal, Y Liu, B Viswanath, KP Gummadi, A Mislove
10th Symposium On Usable Privacy and Security (SOUPS 2014), 271-283, 2014
The system can't perform the operation now. Try again later.
Articles 1–20