What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Saurabh Bagchi
Google Scholar
49
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/dsn
A Lightweight Reputation-Based Mechanism for Incentivizing Cooperation in Decentralized Federated Learning.
Kavindu Herath
Suraj Mahangade
Saurabh Bagchi
2024
conf/ccs
Threshold Cryptography.
Akhil Bandarupalli
Adithya Bhat
Saurabh Bagchi
Aniket Kate
Michael K. Reiter
2024
conf/sp
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors.
Taylor R. Schorlemmer
Kelechi G. Kalu
Luke Chigges
Kyung Myung Ko
Eman Abu Ishgair
Saurabh Bagchi
Santiago Torres-Arias
James C. Davis
2024
conf/sp
Loki: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation.
Joshua C. Zhao
Atul Sharma
Ahmed Roushdy Elkordy
Yahya H. Ezzeldin
Salman Avestimehr
Saurabh Bagchi
2024
conf/dsn
(Re)-envisioning Approximate Agreement for Distributed Cryptography and Oracles.
Akhil Bandarupalli
Saurabh Bagchi
Aniket Kate
2024
conf/dsn
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles.
Akhil Bandarupalli
Adithya Bhat
Saurabh Bagchi
Aniket Kate
Chen-Da Liu-Zhang
Michael K. Reiter
2023
conf/fc
The Unique Chain Rule and Its Applications.
Adithya Bhat
Akhil Bandarupalli
Saurabh Bagchi
Aniket Kate
Michael K. Reiter
2023
conf/asiaccs
FLAIR: Defense against Model Poisoning Attack in Federated Learning.
Atul Sharma
Wei Chen
Joshua C. Zhao
Qiang Qiu
Saurabh Bagchi
Somali Chaterji
2023
conf/asiaccs
Security Properties of Virtual Remotes and SPOOKing their violations.
Joshua David Oetting Majors
Edgardo Barsallo Yi
Amiya Maji
Darren Wu
Saurabh Bagchi
Aravind Machiry
2023
conf/dsn
How to Learn Collaboratively - Federated Learning to Peer-to-Peer Learning and What's at Stake.
Atul Sharma
Joshua C. Zhao
Wei Chen
Qiang Qiu
Saurabh Bagchi
Somali Chaterji
2022
conf/sp
TASHAROK: Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.
Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh
Issa Khalil
Timothy N. Cason
Shreyas Sundaram
Saurabh Bagchi
2022
conf/dsn
Real-Time Digital Filtering for IoT Data in Programmable Network Switches.
Nathaniel Nauman
Ruochong Wu
Saurabh Bagchi
2021
conf/sp
HIOA-CPS: Combining Hybrid Input-Output Automaton and Game Theory for Security Modeling of Cyber-Physical Systems.
Mustafa Abdallah
Sayan Mitra
Shreyas Sundaram
Saurabh Bagchi
2021
conf/asiaccs
Morshed: Guiding Behavioral Decision-Makers towards Better Security Investment in Interdependent Systems.
Mustafa Abdallah
Daniel Woods
Parinaz Naghizadeh
Issa Khalil
Timothy N. Cason
Shreyas Sundaram
Saurabh Bagchi
2020
conf/ccs
Privacy in the Mobile World: An Analysis of Bluetooth Scan Traces.
Heng Zhang
Amiya Kumar Maji
Saurabh Bagchi
2020
conf/uss
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation.
Abraham A. Clements
Eric Gustafson
Tobias Scharnowski
Paul Grosen
David Fritz
Christopher Kruegel
Giovanni Vigna
Saurabh Bagchi
Mathias Payer
2020
conf/ndss
µRAI: Securing Embedded Systems with Return Address Integrity.
Naif Saleh Almakhdhub
Abraham A. Clements
Saurabh Bagchi
Mathias Payer
2020
conf/dsn
Reliability Analysis of Edge Scenarios Using Pedestrian Mobility.
Kshitiz Goel
Abhishek Bhaumick
Deepika Kaushal
Saurabh Bagchi
2020
conf/dsn
The Effect of Motion on PPG Heart Rate Sensors.
Daniel Hu
Calvin Henry
Saurabh Bagchi
2019
conf/dsn
BenchIoT: A Security Benchmark for the Internet of Things.
Naif Saleh Almakhdhub
Abraham A. Clements
Mathias Payer
Saurabh Bagchi
2018
journals/compsec
Reactive redundancy for data destruction protection (R2D2).
Christopher N. Gutierrez
Eugene H. Spafford
Saurabh Bagchi
Thomas Yurek
2018
conf/uss
ACES: Automatic Compartments for Embedded Systems.
Abraham A. Clements
Naif Saleh Almakhdhub
Saurabh Bagchi
Mathias Payer
2018
conf/sec
A Hypergame Analysis for ErsatzPasswords.
Christopher N. Gutierrez
Mohammed H. Almeshekah
Saurabh Bagchi
Eugene H. Spafford
2018
conf/dsn
How Reliable is My Wearable: A Fuzz Testing-Based Study.
Edgardo Barsallo Yi
Amiya Maji
Saurabh Bagchi
2017
conf/sp
Protecting Bare-Metal Embedded Systems with Privilege Overlays.
Abraham A. Clements
Naif Saleh Almakhdhub
Khaled Saab
Prashast Srivastava
Jinkyu Koo
Saurabh Bagchi
Mathias Payer
2017
conf/dsn
RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters.
Jinkyu Koo
Xiaojun Lin
Saurabh Bagchi
2014
conf/dsn
pSigene: Webcrawling to Generalize SQL Injection Signatures.
Gaspar Modelo-Howard
Christopher N. Gutierrez
Fahad A. Arshad
Saurabh Bagchi
Yuan Qi
2013
conf/cns
Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks.
Dong-Hoon Shin
Jinkyu Koo
Lei Yang
Xiaojun Lin
Saurabh Bagchi
Junshan Zhang
2013
conf/dsn
Lilliput meets brobdingnagian: Data center systems management through mobile devices.
Saurabh Bagchi
Fahad A. Arshad
Jan S. Rellermeyer
Thomas H. Osiecki
Michael Kistler
Ahmed Gheith
2012
conf/esorics
PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters.
Jinkyu Koo
Xiaojun Lin
Saurabh Bagchi
2012
conf/dsn
A study of soft error consequences in hard disk drives.
Timothy K. Tsai
Nawanol Theera-Ampornpunt
Saurabh Bagchi
2012
conf/dsn
Automatic fault characterization via abnormality-enhanced classification.
Greg Bronevetsky
Ignacio Laguna
Bronis R. de Supinski
Saurabh Bagchi
2012
conf/dsn
An empirical study of the robustness of Inter-component Communication in Android.
Amiya Kumar Maji
Fahad A. Arshad
Saurabh Bagchi
Jan S. Rellermeyer
2012
conf/dsn
Dependability as a cloud service - a modular approach.
Jan S. Rellermeyer
Saurabh Bagchi
2010
conf/dsn
AutomaDeD: Automata-based debugging for dissimilar parallel tasks.
Greg Bronevetsky
Ignacio Laguna
Saurabh Bagchi
Bronis R. de Supinski
Dong H. Ahn
Martin Schulz
2009
conf/dsn
Spam detection in voice-over-IP calls through semi-supervised clustering.
Yu-Sung Wu
Saurabh Bagchi
Navjot Singh
Ratsameetip Wita
2009
conf/dsn
3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009.
Saurabh Bagchi
Miguel Correia
Partha P. Pal
2007
conf/dsn
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks.
Issa M. Khalil
Saurabh Bagchi
Ness B. Shroff
2006
conf/dsn
Fast Abstracts.
Saurabh Bagchi
2005
conf/dsn
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment.
Bingrui Foo
Yu-Sung Wu
Yu-Chun Mao
Saurabh Bagchi
Eugene H. Spafford
2005
conf/dsn
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks.
Issa M. Khalil
Saurabh Bagchi
Ness B. Shroff
2005
conf/dsn
Modeling and Automated Containment of Worms.
Sarah H. Sellke
Ness B. Shroff
Saurabh Bagchi
2005
conf/dsn
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks.
Mark D. Krasniewski
Padma Varadharajan
Bryan Rabeler
Saurabh Bagchi
Y. Charlie Hu
2004
conf/dsn
DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks.
Saurabh Bagchi
Douglas M. Blough
Paolo Santi
Nitin H. Vaidya
2004
conf/dsn
Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks.
Gunjan Khanna
Saurabh Bagchi
Yu-Sung Wu
2004
conf/dsn
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments.
Yu-Sung Wu
Saurabh Bagchi
Sachin Garg
Navjot Singh
Timothy K. Tsai
2003
conf/acsac
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS.
Yu-Sung Wu
Bingrui Foo
Yongguo Mei
Saurabh Bagchi
2002
conf/dsn
Exactly-once Delivery in a Content-based Publish-Subscribe System.
Sumeer Bhola
Robert E. Strom
Saurabh Bagchi
Yuanyuan Zhao
Joshua S. Auerbach
2001
conf/dsn
A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Saurabh Bagchi
Y. Liu
Keith Whisnant
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Ytzhak H. Levendel
Lawrence G. Votta
Coauthors
Abhishek Bhaumick
(1)
Abraham A. Clements
(5)
Adithya Bhat
(3)
Ahmed Gheith
(1)
Ahmed Roushdy Elkordy
(1)
Akhil Bandarupalli
(4)
Amiya Kumar Maji
(2)
Amiya Maji
(2)
Aniket Kate
(4)
Aravind Machiry
(1)
Atul Sharma
(3)
Bingrui Foo
(2)
Bronis R. de Supinski
(2)
Bryan Rabeler
(1)
Calvin Henry
(1)
Chen-Da Liu-Zhang
(1)
Christopher Kruegel
(1)
Christopher N. Gutierrez
(3)
Daniel Hu
(1)
Daniel Woods
(2)
Darren Wu
(1)
David Fritz
(1)
Deepika Kaushal
(1)
Dong H. Ahn
(1)
Dong-Hoon Shin
(1)
Douglas M. Blough
(1)
Edgardo Barsallo Yi
(2)
Eman Abu Ishgair
(1)
Eric Gustafson
(1)
Eugene H. Spafford
(3)
Fahad A. Arshad
(3)
Gaspar Modelo-Howard
(1)
Giovanni Vigna
(1)
Greg Bronevetsky
(2)
Gunjan Khanna
(1)
Heng Zhang
(1)
Ignacio Laguna
(2)
Issa Khalil
(2)
Issa M. Khalil
(2)
James C. Davis
(1)
Jan S. Rellermeyer
(3)
Jinkyu Koo
(4)
Joshua C. Zhao
(3)
Joshua David Oetting Majors
(1)
Joshua S. Auerbach
(1)
Junshan Zhang
(1)
Kavindu Herath
(1)
Keith Whisnant
(1)
Kelechi G. Kalu
(1)
Khaled Saab
(1)
Kshitiz Goel
(1)
Kyung Myung Ko
(1)
Lawrence G. Votta
(1)
Lei Yang
(1)
Luke Chigges
(1)
Mark D. Krasniewski
(1)
Martin Schulz
(1)
Mathias Payer
(5)
Michael K. Reiter
(3)
Michael Kistler
(1)
Miguel Correia
(1)
Mohammed H. Almeshekah
(1)
Mustafa Abdallah
(3)
Naif Saleh Almakhdhub
(4)
Nathaniel Nauman
(1)
Navjot Singh
(2)
Nawanol Theera-Ampornpunt
(1)
Ness B. Shroff
(3)
Nitin H. Vaidya
(1)
Padma Varadharajan
(1)
Paolo Santi
(1)
Parinaz Naghizadeh
(2)
Partha P. Pal
(1)
Paul Grosen
(1)
Prashast Srivastava
(1)
Qiang Qiu
(2)
Ratsameetip Wita
(1)
Ravishankar K. Iyer
(1)
Robert E. Strom
(1)
Ruochong Wu
(1)
Sachin Garg
(1)
Salman Avestimehr
(1)
Santiago Torres-Arias
(1)
Sarah H. Sellke
(1)
Saurabh Bagchi
(49)
Sayan Mitra
(1)
Shreyas Sundaram
(3)
Somali Chaterji
(2)
Sumeer Bhola
(1)
Suraj Mahangade
(1)
Taylor R. Schorlemmer
(1)
Thomas H. Osiecki
(1)
Thomas Yurek
(1)
Timothy K. Tsai
(2)
Timothy N. Cason
(2)
Tobias Scharnowski
(1)
Wei Chen
(2)
Xiaojun Lin
(3)
Y. Charlie Hu
(1)
Y. Liu
(1)
Yahya H. Ezzeldin
(1)
Yongguo Mei
(1)
Ytzhak H. Levendel
(1)
Yu-Chun Mao
(1)
Yu-Sung Wu
(5)
Yuan Qi
(1)
Yuanyuan Zhao
(1)
Zbigniew Kalbarczyk
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to