Follow
Martin Abadi
Martin Abadi
Research Scientist, Google, and Professor Emeritus, UC Santa Cruz
Verified email at cs.ucsc.edu - Homepage
Title
Cited by
Cited by
Year
TensorFlow: a system for large-scale machine learning.
M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ...
OSDI 16, 265-283, 2016
313222016
TensorFlow: large-scale machine learning on heterogeneous distributed systems
M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ...
arXiv preprint arXiv:1603.04467 172, 2015
24547*2015
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
58572016
A logic of authentication
M Burrows, M Abadi, R Needham
Proc. R. Soc. Lond. A 426 (1871), 233-271, 1989
54711989
Control-Flow Integrity: Principles, Implementations, and Applications
M Abadi, M Budiu, Ú Erlingsson, J Ligatti
ACM Transactions on Information and System Security-TISSEC 13 (1), 2009
25462009
A calculus for cryptographic protocols: The spi calculus
M Abadi, AD Gordon
Proceedings of the 4th ACM Conference on Computer and Communications …, 1997
21051997
A theory of objects
M Abadi, L Cardelli
Springer, 1996
2026*1996
The existence of refinement mappings
M Abadi, L Lamport
Theoretical Computer Science 82 (2), 253-284, 1991
14981991
Mobile values, new names, and secure communication
M Abadi, C Fournet
ACM Sigplan Notices 36 (3), 104-115, 2001
12452001
Explicit substitutions
M Abadi, L Cardelli, PL Curien, JJ Lévy
Journal of Functional Programming 6 (2), 299-327, 1996
1217*1996
Authentication in distributed systems: Theory and practice
B Lampson, M Abadi, M Burrows, E Wobber
ACM Transactions on Computer Systems (TOCS) 10 (4), 265-310, 1992
11531992
Naiad: a timely dataflow system
DG Murray, F McSherry, R Isaacs, M Isard, P Barham, M Abadi
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013
11022013
Semi-supervised knowledge transfer for deep learning from private training data
N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar
arXiv preprint arXiv:1610.05755, 2016
10932016
Prudent engineering practice for cryptographic protocols
M Abadi, R Needham
IEEE transactions on Software Engineering 22 (1), 6-15, 1996
10411996
Adversarial patch
TB Brown, D Mané, A Roy, M Abadi, J Gilmer
arXiv preprint arXiv:1712.09665, 2017
9202017
A calculus for access control in distributed systems
M Abadi, M Burrows, B Lampson, G Plotkin
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (4), 706-734, 1993
8291993
Composing specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 73-132, 1993
8121993
Conjoining specifications
M Abadi, L Lamport
ACM Transactions on Programming Languages and Systems (TOPLAS) 17 (3), 507-535, 1995
6631995
A semantics for a logic of authentication
M Abadi, MR Tuttle
Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991
597*1991
XFI: Software guards for system address spaces
U Erlingsson, M Abadi, M Vrable, M Budiu, GC Necula
Proceedings of the 7th symposium on Operating systems design and …, 2006
5692006
Dynamic typing in a statically typed language
M Abadi, L Cardelli, B Pierce, G Plotkin
ACM transactions on programming languages and systems (TOPLAS) 13 (2), 237-268, 1991
5561991
A core calculus of dependency
M Abadi, A Banerjee, N Heintze, JG Riecke
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of …, 1999
5491999
Access control subsystem and method for distributed computer system using locally cached authentication credentials
E Wobber, M Abadi, A Birrell, B Lampson
US Patent 5,235,642, 1993
5451993
Automated verification of selected equivalences for security protocols
B Blanchet, M Abadi, C Fournet
The Journal of Logic and Algebraic Programming 75 (1), 3-51, 2008
5062008
Reconciling two views of cryptography (the computational soundness of formal encryption)
M Abadi, P Rogaway
Journal of cryptology 15, 103-127, 2002
4792002
Tensorflow: A system for large-scale machine learning
A Martín, B Paul, C Jianmin, C Zhifeng, D Andy, D Jeffrey, D Matthieu, ...
12th USENIX symposium on operating systems design and implementation (OSDI …, 2016
4722016
TensorFlow: learning functions at scale
M Abadi
Proceedings of the 21st ACM SIGPLAN international conference on functional …, 2016
4422016
Realizable and unrealizable specifications of reactive systems
M Abadi, L Lamport, P Wolper
International Colloquium on Automata, Languages, and Programming, 1-17, 1989
431*1989
Secure web tunnel
AD Birrell, EP Wobber, M Abadi, RP Stata
US Patent 5,805,803, 1998
4241998
Authentication in the Taos operating system
E Wobber, M Abadi, M Burrows, B Lampson
ACM Transactions on Computer Systems (TOCS) 12 (1), 3-32, 1994
4101994
Reconciling two views of cryptography: The computational soundness of formal encryption
M Abadi, P Rogaway
IFIP International Conference on Theoretical Computer Science, 3-22, 2000
4052000
Understanding typescript
G Bierman, M Abadi, M Torgersen
ECOOP 2014–Object-Oriented Programming: 28th European Conference, Uppsala …, 2014
3992014
Method for selectively restricting access to computer systems
MD Lillibridge, M Abadi, K Bharat, AZ Broder
US Patent 6,195,698, 2001
3992001
On hiding information from an oracle
M Abadi, J Feigenbaum, J Kilian
Journal of Computer and System Sciences 39 (1), 21-50, 1989
3891989
Moderately hard, memory-bound functions
M Abadi, M Burrows, M Manasse, T Wobber
ACM Transactions on Internet Technology (TOIT) 5 (2), 299-327, 2005
3792005
Secrecy by typing in security protocols
M Abadi
Journal of the ACM (JACM) 46 (5), 749-786, 1999
3771999
An old-fashioned recipe for real time
M Abadi, L Lamport
Workshop/School/Symposium of the REX Project (Research and Education in …, 1991
3691991
Temporal logic programming
M Abadi, Z Manna
Journal of symbolic computation 8 (3), 277-295, 1989
3421989
A type system for Java bytecode subroutines
R Stata, M Abadi
ACM Transactions on Programming Languages and Systems (TOPLAS) 21 (1), 90-137, 1999
3341999
The geometry of optimal lambda reduction
G Gonthier, M Abadi, JJ Lévy
Proceedings of the 19th ACM SIGPLAN-SIGACT symposium on Principles of …, 1992
3201992
The system can't perform the operation now. Try again later.
Articles 1–40