Robust de-anonymization of large sparse datasets A Narayanan, V Shmatikov 2008 IEEE Symposium on Security and Privacy (sp 2008), 111-125, 2008 | 3285 | 2008 |
Semantics derived automatically from language corpora contain human-like biases A Caliskan, JJ Bryson, A Narayanan Science 356 (6334), 183-186, 2017 | 3099 | 2017 |
Bitcoin and cryptocurrency technologies: a comprehensive introduction A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder Princeton University Press, 2016 | 2839 | 2016 |
De-anonymizing social networks A Narayanan, V Shmatikov 2009 30th IEEE symposium on security and privacy, 173-187, 2009 | 1790 | 2009 |
iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments H Gupta, A Vahid Dastjerdi, SK Ghosh, R Buyya Software: Practice and Experience 47 (9), 1275-1296, 2017 | 1730 | 2017 |
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten 2015 IEEE symposium on security and privacy, 104-121, 2015 | 1683 | 2015 |
Pemanfaatan digital marketing bagi usaha mikro, kecil dan menengah pada era masyarakat ekonomi ASEAN MT Febriyantoro, D Arisandi JMD: Jurnal Riset Manajemen & Bisnis Dewantara 1 (2), 61-76, 2018 | 1046 | 2018 |
The web never forgets: Persistent tracking mechanisms in the wild G Acar, C Eubank, S Englehardt, M Juarez, A Narayanan, C Diaz Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 949 | 2014 |
Online tracking: A 1-million-site measurement and analysis S Englehardt, A Narayanan Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 940 | 2016 |
Fairness and machine learning: Limitations and opportunities S Barocas, M Hardt, A Narayanan MIT Press, 2023 | 909 | 2023 |
graph2vec: Learning distributed representations of graphs A Narayanan, M Chandramohan, R Venkatesan, L Chen, Y Liu, S Jaiswal arXiv preprint arXiv:1707.05005, 2017 | 818 | 2017 |
Development and validation of a risk calculator for prediction of cardiac risk after surgery PK Gupta, H Gupta, A Sundaram, M Kaushik, X Fang, WJ Miller, ... Circulation 124 (4), 381-387, 2011 | 801 | 2011 |
The case for RAMClouds: scalable high-performance storage entirely in DRAM J Ousterhout, P Agrawal, D Erickson, C Kozyrakis, J Leverich, D Mazières, ... ACM SIGOPS Operating Systems Review 43 (4), 92-105, 2010 | 754 | 2010 |
Carbonation− calcination cycle using high reactivity calcium oxide for carbon dioxide separation from flue gas H Gupta, LS Fan Industrial & engineering chemistry research 41 (16), 4035-4042, 2002 | 715 | 2002 |
Fog computing: Principles, architectures, and applications AV Dastjerdi, H Gupta, RN Calheiros, SK Ghosh, R Buyya Internet of things, 61-75, 2016 | 710 | 2016 |
A research on effectiveness of Facebook advertising on enhancing purchase intention of consumers M Dehghani, M Tumer Computers in human behavior 49, 597-600, 2015 | 677 | 2015 |
Introducing robustness in multi-objective optimization K Deb, H Gupta Evolutionary computation 14 (4), 463-494, 2006 | 634 | 2006 |
Mixcoin: Anonymity for bitcoin with accountable mixes J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 608 | 2014 |
Fast dictionary attacks on passwords using time-space tradeoff A Narayanan, V Shmatikov Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 584 | 2005 |
Evaluating the influence of YouTube advertising for attraction of young customers M Dehghani, MK Niaki, I Ramezani, R Sali Computers in human behavior 59, 165-172, 2016 | 572 | 2016 |