TensorFlow: a system for large-scale machine learning. M Abadi, P Barham, J Chen, Z Chen, A Davis, J Dean, M Devin, ... OSDI 16, 265-283, 2016 | 31878 | 2016 |
TensorFlow: large-scale machine learning on heterogeneous distributed systems M Abadi, A Agarwal, P Barham, E Brevdo, Z Chen, C Citro, GS Corrado, ... arXiv preprint arXiv:1603.04467 172, 2015 | 25061* | 2015 |
Deep learning with differential privacy M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 6118 | 2016 |
A logic of authentication M Burrows, M Abadi, R Needham Proc. R. Soc. Lond. A 426 (1871), 233-271, 1989 | 5497 | 1989 |
Control-Flow Integrity: Principles, Implementations, and Applications M Abadi, M Budiu, Ú Erlingsson, J Ligatti ACM Transactions on Information and System Security-TISSEC 13 (1), 2009 | 2572 | 2009 |
A calculus for cryptographic protocols: The spi calculus M Abadi, AD Gordon Proceedings of the 4th ACM Conference on Computer and Communications …, 1997 | 2106 | 1997 |
A theory of objects M Abadi, L Cardelli Springer, 1996 | 2028* | 1996 |
The existence of refinement mappings M Abadi, L Lamport Theoretical Computer Science 82 (2), 253-284, 1991 | 1505 | 1991 |
Mobile values, new names, and secure communication M Abadi, C Fournet ACM Sigplan Notices 36 (3), 104-115, 2001 | 1248 | 2001 |
Explicit substitutions M Abadi, L Cardelli, PL Curien, JJ Lévy Journal of Functional Programming 6 (2), 299-327, 1996 | 1221* | 1996 |
Authentication in distributed systems: Theory and practice B Lampson, M Abadi, M Burrows, E Wobber ACM Transactions on Computer Systems (TOCS) 10 (4), 265-310, 1992 | 1157 | 1992 |
Semi-supervised knowledge transfer for deep learning from private training data N Papernot, M Abadi, U Erlingsson, I Goodfellow, K Talwar arXiv preprint arXiv:1610.05755, 2016 | 1120 | 2016 |
Naiad: a timely dataflow system DG Murray, F McSherry, R Isaacs, M Isard, P Barham, M Abadi Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems …, 2013 | 1112 | 2013 |
Prudent engineering practice for cryptographic protocols M Abadi, R Needham IEEE transactions on Software Engineering 22 (1), 6-15, 1996 | 1044 | 1996 |
Adversarial patch TB Brown, D Mané, A Roy, M Abadi, J Gilmer arXiv preprint arXiv:1712.09665, 2017 | 952 | 2017 |
A calculus for access control in distributed systems M Abadi, M Burrows, B Lampson, G Plotkin ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (4), 706-734, 1993 | 830 | 1993 |
Composing specifications M Abadi, L Lamport ACM Transactions on Programming Languages and Systems (TOPLAS) 15 (1), 73-132, 1993 | 815 | 1993 |
Conjoining specifications M Abadi, L Lamport ACM Transactions on Programming Languages and Systems (TOPLAS) 17 (3), 507-535, 1995 | 666 | 1995 |
A semantics for a logic of authentication M Abadi, MR Tuttle Proceedings of the tenth annual ACM symposium on Principles of distributed …, 1991 | 599* | 1991 |
XFI: Software guards for system address spaces U Erlingsson, M Abadi, M Vrable, M Budiu, GC Necula Proceedings of the 7th symposium on Operating systems design and …, 2006 | 572 | 2006 |