Robust de-anonymization of large sparse datasets A Narayanan, V Shmatikov Security and Privacy, 2008. SP 2008. IEEE Symposium on, 111-125, 2008 | 3827* | 2008 |
Semantics derived automatically from language corpora contain human-like biases A Caliskan, JJ Bryson, A Narayanan Science 356 (6334), 183-186, 2017 | 3302 | 2017 |
Bitcoin and cryptocurrency technologies: A comprehensive introduction A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder Princeton University Press, 2016 | 3054 | 2016 |
Fairness and Machine Learning: Limitations and Opportunities S Barocas, M Hardt, A Narayanan MIT Press. https://fairmlbook.org, 2023 | 2155* | 2023 |
De-anonymizing social networks A Narayanan, V Shmatikov IEEE Symposium on Security and Privacy 2009, 2009 | 1810 | 2009 |
Research perspectives and challenges for Bitcoin and cryptocurrencies J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten Security and Privacy (SP), 2015 IEEE Symposium on, 104-121, 2015 | 1780* | 2015 |
The Web never forgets: Persistent tracking mechanisms in the wild G Acar, C Eubank, S Englehardt, M Juarez, A Narayanan, C Diaz ACM SIGSAC Conference on Computer and Communications Security, 674-689, 2014 | 1029 | 2014 |
Online tracking: A 1-million-site measurement and analysis S Englehardt, A Narayanan ACM Conference on Computer and Communications Security, 2016 | 959 | 2016 |
Mixcoin: Anonymity for bitcoin with accountable mixes J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 622 | 2014 |
Fast dictionary attacks on passwords using time-space tradeoff A Narayanan, V Shmatikov Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 594 | 2005 |
Dark patterns at scale: Findings from a crawl of 11K shopping websites A Mathur, G Acar, MJ Friedman, E Lucherini, J Mayer, M Chetty, ... Proceedings of the ACM on human-computer interaction 3 (CSCW), 1-32, 2019 | 584 | 2019 |
Myths and fallacies of personally identifiable information A Narayanan, V Shmatikov Communications of the ACM 53 (6), 24-26, 2010 | 514 | 2010 |
Routes for breaching and protecting genetic privacy Y Erlich, A Narayanan Nature Reviews Genetics 15 (6), 409-421, 2014 | 500 | 2014 |
Adnostic: Privacy preserving targeted advertising V Toubiana, A Narayanan, D Boneh, H Nissenbaum, S Barocas 17th Network and Distributed System Security Symposium, 2010 | 481 | 2010 |
Location Privacy via Private Proximity Testing A Narayanan, N Thiagarajan, M Lakhani, M Hamburg, D Boneh 18th Network and Distributed System Security Symposium, 2011 | 464 | 2011 |
On the instability of Bitcoin without the block reward M Carlsten, H Kalodner, SM Weinberg, A Narayanan ACM Conference on Computer and Communications Security, 2016 | 453 | 2016 |
Keeping the Smart Home Private with Smart (er) IoT Traffic Shaping N Apthorpe, DY Huang, D Reisman, A Narayanan, N Feamster Proceedings on Privacy Enhancing Technologies 2019, 2019 | 441* | 2019 |
Bitcoin's academic pedigree A Narayanan, J Clark Communications of the ACM 60 (12), 36-45, 2017 | 436* | 2017 |
“You Might Also Like:” Privacy Risks of Collaborative Filtering JA Calandrino, A Kilzer, A Narayanan, EW Felten, V Shmatikov Security and Privacy (SP), 2011 IEEE Symposium on, 231-246, 2011 | 424 | 2011 |
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security R Gennaro, S Goldfeder, A Narayanan Applied Cryptography and Network Security, 13, 2016 | 410* | 2016 |