Beyond credential stuffing: Password similarity models using neural networks B Pal, T Daniel, R Chatterjee, T Ristenpart 2019 IEEE Symposium on Security and Privacy (SP), 417-434, 2019 | 116 | 2019 |
Protocols for checking compromised credentials L Li, B Pal, J Ali, N Sullivan, R Chatterjee, T Ristenpart Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 88 | 2019 |
Sok: Authentication in augmented and virtual reality S Stephenson, B Pal, S Fan, E Fernandes, Y Zhao, R Chatterjee 2022 IEEE Symposium on Security and Privacy (SP), 267-284, 2022 | 55 | 2022 |
Might I get pwned: A second generation compromised credential checking service B Pal, M Islam, MS Bohuk, N Sullivan, L Valenta, T Whalen, C Wood, ... 31st USENIX Security Symposium (USENIX Security 22), 1831-1848, 2022 | 22 | 2022 |
To transfer or not to transfer: Misclassification attacks against transfer learned text classifiers B Pal, S Tople arXiv preprint arXiv:2001.02438, 2020 | 9 | 2020 |
Pre-launch survey report of insurance awareness campaign A Sinha, R Jaiswal, BD Pal, K Shuk Delhi, India: National Council of Applied Economic Research 127, 2011 | 5 | 2011 |
Might I Get Pwned: A second generation password breach alerting service B Pal, M Islam, M Sanusi, N Sullivan, L Valenta, T Whalen, C Wood, ... USENIX Security, 2022 | 3 | 2022 |
Private outsourced translation for medical data T Morrison, S Scheffler, B Pal, A Viand Protecting Privacy through Homomorphic Encryption, 107-116, 2021 | 2 | 2021 |
A stochastic greedy heuristic algorithm for the orienteering problem M Verma, M Gupta, B Pal, KK Shukla 2014 International Conference on Computer and Communication Technology …, 2014 | 1 | 2014 |
From Attack to Defense: Building Systems Secure against Breached Credentials B Pal Cornell University, 2022 | | 2022 |
Roulette Wheel Selection based Heuristic Algorithm for the Orienteering Problem M Verma, M Gupta, B Pal, KK Shukla | | |