default search action
Suresh Chari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j15]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Ian M. Molloy, Suresh Chari, Ce Zhang, Quanlong Guan:
A Large-Scale Study of Android Malware Development Phenomenon on Public Malware Submission and Scanning Platform. IEEE Trans. Big Data 7(2): 255-270 (2021)
2010 – 2019
- 2019
- [c33]Abhishek Malvankar, Josh Payne, Karan K. Budhraja, Ashish Kundu, Suresh Chari, Mukesh K. Mohania:
Malware Containment in Cloud. TPS-ISA 2019: 221-227 - [c32]Hasini Gunasinghe, Ashish Kundu, Elisa Bertino, Hugo Krawczyk, Suresh Chari, Kapil Singh, Dong Su:
PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets. WWW 2019: 594-604 - 2016
- [j14]Josyula R. Rao, Suresh Chari, Dimitrios E. Pendarakis, Reiner Sailer, Marc Ph. Stoecklin, Wilfried Teiken, Andreas Wespi:
Security 360°: Enterprise security for the cognitive era. IBM J. Res. Dev. 60(4): 1 (2016) - [j13]Youngja Park, Wilfried Teiken, Josyula R. Rao, Suresh Chari:
Data classification and sensitivity estimation for critical asset discovery. IBM J. Res. Dev. 60(4): 2 (2016) - [j12]Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken:
A platform and analytics for usage and entitlement analytics. IBM J. Res. Dev. 60(4): 7 (2016) - [j11]Marc Ph. Stoecklin, Kapil Singh, Larry Koved, Xin Hu, Suresh N. Chari, Josyula R. Rao, Pau-Chen Cheng, Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales:
Passive security intelligence to analyze the security risks of mobile/BYOD activities. IBM J. Res. Dev. 60(4): 9 (2016) - [c31]Shandian Zhe, Yuan Qi, Youngja Park, Zenglin Xu, Ian M. Molloy, Suresh Chari:
DinTucker: Scaling Up Gaussian Process Models on Large Multidimensional Arrays. AAAI 2016: 2386-2392 - [c30]Heqing Huang, Cong Zheng, Junyuan Zeng, Wu Zhou, Sencun Zhu, Peng Liu, Suresh Chari, Ce Zhang:
Android malware development on public malware scanning platforms: A large-scale data-driven study. IEEE BigData 2016: 1090-1099 - [c29]Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari:
Comparing Password Ranking Algorithms on Real-World Password Datasets. ESORICS (1) 2016: 69-90 - [c28]Ian M. Molloy, Suresh Chari, Ulrich Finkler, Mark Wiggerman, Coen Jonker, Ted Habeck, Youngja Park, Frank Jordens, Ron van Schaik:
Graph Analytics for Real-Time Scoring of Cross-Channel Transactional Fraud. Financial Cryptography 2016: 22-40 - [c27]Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian M. Molloy, Youngja Park:
Tri-Modularization of Firewall Policies. SACMAT 2016: 37-48 - 2015
- [c26]Youngja Park, Ian M. Molloy, Suresh N. Chari, Zenglin Xu, Christopher S. Gates, Ninghui Li:
Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users. ESORICS (2) 2015: 396-414 - 2014
- [j10]Youngja Park, Zijie Qi, Suresh N. Chari, Ian M. Molloy:
PAKDD'12 best paper: generating balanced classifier-independent training samples from unlabeled data. Knowl. Inf. Syst. 41(3): 871-892 (2014) - [c25]Christopher S. Gates, Ninghui Li, Zenglin Xu, Suresh N. Chari, Ian M. Molloy, Youngja Park:
Detecting Insider Information Theft Using Features from File Access Logs. ESORICS (2) 2014: 383-400 - [c24]Dongyeop Kang, Youngja Park, Suresh Chari:
Hetero-Labeled LDA: A Partially Supervised Topic Model with Heterogeneous Labels. ECML/PKDD (1) 2014: 640-655 - 2013
- [j9]Bart Blaner, Bülent Abali, Brian M. Bass, Suresh Chari, Ronald N. Kalla, Steven R. Kunkel, Kenneth Lauricella, Ross Leavens, John J. Reilly, Peter A. Sandon:
IBM POWER7+ processor on-chip accelerators for cryptography and active memory expansion. IBM J. Res. Dev. 57(6) (2013) - [c23]Suresh Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken:
Ensuring continuous compliance through reconciling policy with usage. SACMAT 2013: 49-60 - [c22]Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken:
A bigData platform for analytics on access control policies and logs. SACMAT 2013: 185-188 - [i3]Shandian Zhe, Yuan Qi, Youngja Park, Ian M. Molloy, Suresh Chari:
DinTucker: Scaling up Gaussian process models on multidimensional arrays with billions of elements. CoRR abs/1311.2663 (2013) - 2012
- [c21]Youngja Park, Zijie Qi, Suresh Chari, Ian M. Molloy:
Generating Balanced Classifier-Independent Training Samples from Unlabeled Data. PAKDD (1) 2012: 266-281 - [c20]Ian M. Molloy, Youngja Park, Suresh Chari:
Generative models for access control policies: applications to role mining over logs with attribution. SACMAT 2012: 45-56 - [c19]Suresh Chari, Jorge Lobo, Ian M. Molloy:
Practical risk aggregation in RBAC models. SACMAT 2012: 117-118 - 2011
- [c18]Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema:
Composable Security Analysis of OS Services. ACNS 2011: 431-448 - [c17]Ian M. Molloy, Jorge Lobo, Suresh Chari:
Adversaries' Holy Grail: access control analytics. BADGERS@EuroSys 2011: 54-61 - [c16]Youngja Park, Stephen C. Gates, Wilfried Teiken, Suresh Chari:
System for automatic estimation of data sensitivity with applications to access control and other applications. SACMAT 2011: 145-146 - [i2]Suresh Chari, Charanjit S. Jutla, Arnab Roy:
Universally Composable Security Analysis of OAuth v2.0. IACR Cryptol. ePrint Arch. 2011: 526 (2011) - 2010
- [c15]Suresh Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin, Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Michael Steiner, David C. Toll:
Designing a Side Channel Resistant Random Number Generator. CARDIS 2010: 49-64 - [c14]Suresh Chari, Shai Halevi, Wietse Z. Venema:
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation. NDSS 2010 - [i1]Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema:
Composable Security Analysis of OS Services. IACR Cryptol. ePrint Arch. 2010: 213 (2010)
2000 – 2009
- 2008
- [c13]Frederik De Keukelaere, Sumeer Bhola, Michael Steiner, Suresh Chari, Sachiko Yoshihama:
SMash: secure component model for cross-domain mashups on unmodified browsers. WWW 2008: 535-544 - 2007
- [j8]Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng:
Improving the resilience of content distribution networks to large scale distributed denial of service attacks. Comput. Networks 51(10): 2753-2770 (2007) - 2005
- [c12]Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng:
Protecting content distribution networks from denial of service attacks. ICC 2005: 830-836 - 2003
- [j7]Suresh Chari, Pau-Chen Cheng:
BlueBoX: A policy-driven, host-based intrusion detection system. ACM Trans. Inf. Syst. Secur. 6(2): 173-200 (2003) - 2002
- [c11]Suresh Chari, Josyula R. Rao, Pankaj Rohatgi:
Template Attacks. CHES 2002: 13-28 - [c10]James Giles, Reiner Sailer, Dinesh C. Verma, Suresh Chari:
Authentication for Distributed Web Caches. ESORICS 2002: 126-145 - [c9]Suresh Chari, Pau-Chen Cheng:
BlueBox: A Policy-Driven, Host-Based Intrusion Detection System. NDSS 2002 - 2001
- [c8]Suresh Chari, Parviz Kermani, Sean W. Smith, Leandros Tassiulas:
Security Issues in M-Commerce: A Usage-Based Taxonomy. E-Commerce Agents 2001: 264-282 - 2000
- [j6]Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan:
Improved Algorithms via Approximations of Probability Distributions. J. Comput. Syst. Sci. 61(1): 81-107 (2000)
1990 – 1999
- 1999
- [c7]Suresh Chari, Charanjit S. Jutla, Josyula R. Rao, Pankaj Rohatgi:
Towards Sound Approaches to Counteract Power-Analysis Attacks. CRYPTO 1999: 398-412 - 1996
- [j5]Suresh Chari, Pankaj Rohatgi:
On Completeness Under Random Reductions. J. Comput. Syst. Sci. 53(3): 545-555 (1996) - 1995
- [j4]Jin-yi Cai, Suresh Chari:
On the Impossibility of Amplifying the Independence of Random Variables. Random Struct. Algorithms 7(4): 301-310 (1995) - [j3]Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan:
Randomness-Optimal Unique Element Isolation with Applications to Perfect Matching and Related Problems. SIAM J. Comput. 24(5): 1036-1050 (1995) - 1994
- [b1]Suresh Chari:
Randomness as a Computational Resource: Issues in Efficient Computation. Cornell University, USA, 1994 - [c6]Juris Hartmanis, Suresh Chari:
On the Intellectual Terrain Around NP. CIAC 1994: 1-11 - [c5]Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan:
Improved algorithms via approximations of probability distributions (extended abstract). STOC 1994: 584-592 - 1993
- [j2]Desh Ranjan, Suresh Chari, Pankaj Rohatgi:
Improving Known Solutions is Hard. Comput. Complex. 3: 168-185 (1993) - [c4]Suresh Chari, Pankaj Rohatgi:
On Completeness under Random Reductions. SCT 1993: 176-184 - [c3]Suresh Chari, Pankaj Rohatgi, Aravind Srinivasan:
Randomness-optimal unique element isolation, with applications to perfect matching and related problems. STOC 1993: 458-467 - [p1]Juris Hartmanis, Richard Chang, Suresh Chari, Desh Ranjan, Pankaj Rohatgi:
Relativization: a Revisionistic Retrospective. Current Trends in Theoretical Computer Science 1993: 537-548 - 1992
- [j1]Richard Chang, Suresh Chari, Desh Ranjan, Pankaj Rohatgi:
Relativization: a revisionistic retrospective. Bull. EATCS 47: 144-153 (1992) - [c2]Suresh Chari, Desh Ranjan, Pankaj Rohatgi:
On the Complexity of Incremental Computation. MFCS 1992: 172-180 - 1991
- [c1]Desh Ranjan, Suresh Chari, Pankaj Rohatgi:
Improving Known Solutions is Hard. ICALP 1991: 381-392
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-29 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint