TensorFlow: a system for large-scale machine learning. M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ... OSDI 16, 265-283, 2016 | 31322 | 2016 |
TensorFlow: large-scale machine learning on heterogeneous distributed systems M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ... arXiv preprint arXiv:1603.04467 172, 2015 | 24547* | 2015 |
Deep learning with differential privacy M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 5857 | 2016 |
A logic of authentication M Burrows, M Abadi, R Needham Proc. R. Soc. Lond. A 426 (1871), 233-271, 1989 | 5471 | 1989 |
Control-Flow Integrity: Principles, Implementations, and Applications M Abadi, M Budiu, Ú Erlingsson, J Ligatti ACM Transactions on Information and System Security-TISSEC 13 (1), 2009 | 2546 | 2009 |
A calculus for cryptographic protocols: The spi calculus M Abadi, AD Gordon Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 2105 | 1997 |
A theory of objects M Abadi, L Cardelli Springer, 1996 | 2026* | 1996 |
The existence of refinement mappings M Abadi, L Lamport Theoretical Computer Science 82 (2), 253-284, 1991 | 1498 | 1991 |
Mobile values, new names, and secure communication M Abadi, C Fournet ACM Sigplan Notices 36 (3), 104-115, 2001 | 1245 | 2001 |
Explicit substitutions M Abadi, L Cardelli, PL Curien, JJ Lévy Journal of Functional Programming 6 (2), 299-327, 1996 | 1217* | 1996 |
Authentication in distributed systems: Theory and practice B Lampson, M Abadi, M Burrows, E Wobber ACM Transactions on Computer Systems (TOCS) 10 (4), 265-310, 1992 | 1153 | 1992 |
Naiad: a timely dataflow system DG Murray, F McSherry, R Isaacs, M Isard, P Barham, M Abadi Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013 | 1102 | 2013 |
Semi-supervised knowledge transfer for deep learning from private training data N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar arXiv preprint arXiv:1610.05755, 2016 | 1093 | 2016 |
Prudent engineering practice for cryptographic protocols M Abadi, R Needham IEEE transactions on Software Engineering 22 (1), 6-15, 1996 | 1041 | 1996 |
Adversarial patch TB Brown, D Mané, A Roy, M Abadi, J Gilmer arXiv preprint arXiv:1712.09665, 2017 | 920 | 2017 |
A calculus for access control in distributed systems M Abadi, M Burrows, B Lampson, G Plotkin ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (4), 706-734, 1993 | 829 | 1993 |
Composing specifications M Abadi, L Lamport ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 73-132, 1993 | 812 | 1993 |
Conjoining specifications M Abadi, L Lamport ACM Transactions on Programming Languages and Systems (TOPLAS) 17 (3), 507-535, 1995 | 663 | 1995 |
A semantics for a logic of authentication M Abadi, MR Tuttle Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991 | 597* | 1991 |
XFI: Software guards for system address spaces U Erlingsson, M Abadi, M Vrable, M Budiu, GC Necula Proceedings of the 7th symposium on Operating systems design and …, 2006 | 569 | 2006 |
Dynamic typing in a statically typed language M Abadi, L Cardelli, B Pierce, G Plotkin ACM transactions on programming languages and systems (TOPLAS) 13 (2), 237-268, 1991 | 556 | 1991 |
A core calculus of dependency M Abadi, A Banerjee, N Heintze, JG Riecke Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999 | 549 | 1999 |
Access control subsystem and method for distributed computer system using locally cached authentication credentials E Wobber, M Abadi, A Birrell, B Lampson US Patent 5,235,642, 1993 | 545 | 1993 |
Automated verification of selected equivalences for security protocols B Blanchet, M Abadi, C Fournet The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008 | 506 | 2008 |
Reconciling two views of cryptography (the computational soundness of formal encryption) M Abadi, P Rogaway Journal of cryptology 15, 103-127, 2002 | 479 | 2002 |
Tensorflow: A system for large-scale machine learning A Martín, B Paul, C Jianmin, C Zhifeng, D Andy, D Jeffrey, D Matthieu, ... 12th USENIX symposium on operating systems design and implementation (OSDI …, 2016 | 472 | 2016 |
TensorFlow: learning functions at scale M Abadi Proceedings of the 21st ACM SIGPLAN international conference on functional …, 2016 | 442 | 2016 |
Realizable and unrealizable specifications of reactive systems M Abadi, L Lamport, P Wolper International Colloquium on Automata, Languages, and Programming, 1-17, 1989 | 431* | 1989 |
Secure web tunnel AD Birrell, EP Wobber, M Abadi, RP Stata US Patent 5,805,803, 1998 | 424 | 1998 |
Authentication in the Taos operating system E Wobber, M Abadi, M Burrows, B Lampson ACM Transactions on Computer Systems (TOCS) 12 (1), 3-32, 1994 | 410 | 1994 |
Reconciling two views of cryptography: The computational soundness of formal encryption M Abadi, P Rogaway IFIP International Conference on Theoretical Computer Science, 3-22, 2000 | 405 | 2000 |
Understanding typescript G Bierman, M Abadi, M Torgersen ECOOP 2014–Object-Oriented Programming: 28th European Conference, Uppsala …, 2014 | 399 | 2014 |
Method for selectively restricting access to computer systems MD Lillibridge, M Abadi, K Bharat, AZ Broder US Patent 6,195,698, 2001 | 399 | 2001 |
On hiding information from an oracle M Abadi, J Feigenbaum, J Kilian Journal of Computer and System Sciences 39 (1), 21-50, 1989 | 389 | 1989 |
Moderately hard, memory-bound functions M Abadi, M Burrows, M Manasse, T Wobber ACM Transactions on Internet Technology (TOIT) 5 (2), 299-327, 2005 | 379 | 2005 |
Secrecy by typing in security protocols M Abadi Journal of the ACM (JACM) 46 (5), 749-786, 1999 | 377 | 1999 |
An old-fashioned recipe for real time M Abadi, L Lamport Workshop/School/Symposium of the REX Project (Research and Education in …, 1991 | 369 | 1991 |
Temporal logic programming M Abadi, Z Manna Journal of symbolic computation 8 (3), 277-295, 1989 | 342 | 1989 |
A type system for Java bytecode subroutines R Stata, M Abadi ACM Transactions on Programming Languages and Systems (TOPLAS) 21 (1), 90-137, 1999 | 334 | 1999 |
The geometry of optimal lambda reduction G Gonthier, M Abadi, JJ Lévy Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of …, 1992 | 320 | 1992 |