See also: Google scholar profile ★ = Peer reviewed | ||
Book
|
AI Snake Oil: What Artificial Intelligence Can Do, What It Can’t, and How to Tell the Difference
Arvind Narayanan, Sayash Kapoor Princeton University Press, 2024. |
★ |
Draft
|
AI Agents That Matter
Sayash Kapoor, Benedikt Stroebl, Zachary S Siegel, Nitya Nadgir, Arvind Narayanan Manuscript, 2024. |
|
Draft
|
The Responsible Foundation Model Development Cheatsheet: A Review of Tools & Resources
Shayne Longpre, Stella Biderman, Alon Albalak, Hailey Schoelkopf, Daniel McDuff, Sayash Kapoor, Kevin Klyman, Kyle Lo, Gabriel Ilharco, Nay San, Maribeth Rauh, Aviya Skowron, Bertie Vidgen, Laura Weidinger, Arvind Narayanan, Victor Sanh, David Adelani, Percy Liang, Rishi Bommasani, Peter Henderson, Sasha Luccioni, Yacine Jernite, Luca Soldaini Manuscript, 2024. |
|
Draft
|
AI Risk Management Should Incorporate Both Safety and Security
Xiangyu Qi, Yangsibo Huang, Yi Zeng, Edoardo Debenedetti, Jonas Geiping, Luxi He, Kaixuan Huang, Udari Madhushani, Vikash Sehwag, Weijia Shi, Boyi Wei, Tinghao Xie, Danqi Chen, Pin-Yu Chen, Jeffrey Ding, Ruoxi Jia, Jiaqi Ma, Arvind Narayanan, Weijie J Su, Mengdi Wang, Chaowei Xiao, Bo Li, Dawn Song, Peter Henderson, Prateek Mittal Manuscript, 2024. |
|
Journal
|
REFORMS: Consensus-based Recommendations for Machine-learning-based Science
Sayash Kapoor, Emily Cantrell, Kenny Peng, Thanh Hien Pham, Christopher A. Bail, Odd Erik Gundersen, Jake M. Hofman, Jessica Hullman, Michael A. Lones, Momin M. Malik, Priyanka Nanayakkara, Russell A. Poldrack, Inioluwa Deborah Raji, Michael Roberts, Matthew J. Salganik, Marta Serra-Garcia, Brandon M. Stewart, Gilles Vandewiele, Arvind Narayanan. Science Advances, 2024. |
★ |
Conference
|
A safe harbor for AI evaluation and red teaming
Shayne Longpre, Sayash Kapoor, Kevin Klyman, Ashwin Ramaswami, Rishi Bommasani, Borhane Blili-Hamelin, Yangsibo Huang, Aviya Skowron, Zheng-Xin Yong, Suhas Kotha, Yi Zeng, Weiyan Shi, Xianjun Yang, Reid Southen, Alexander Robey, Patrick Chao, Diyi Yang, Ruoxi Jia, Daniel Kang, Sandy Pentland, Arvind Narayanan, Percy Liang, Peter Henderson International Conference on Machine Learning (ICML), 2024. |
★ |
Conference
|
On the Societal Impact of Open Foundation Models
Sayash Kapoor, Rishi Bommasani, Kevin Klyman, Shayne Longpre, Ashwin Ramaswami, Peter Cihon, Aspen Hopkins, Kevin Bankston, Stella Biderman, Miranda Bogen, Rumman Chowdhury, Alex Engler, Peter Henderson, Yacine Jernite, Seth Lazar, Stefano Maffulli, Alondra Nelson, Joelle Pineau, Aviya Skowron, Dawn Song, Victor Storchan, Daniel Zhang, Daniel E. Ho, Percy Liang, Arvind Narayanan International Conference on Machine Learning (ICML), 2024. |
★ |
Draft
|
Foundation Model Transparency Reports
Rishi Bommasani, Kevin Klyman, Shayne Longpre, Betty Xiong, Sayash Kapoor, Nestor Maslej, Arvind Narayanan, Percy Liang Manuscript, 2024. |
|
Journal
|
Promises and pitfalls of artificial intelligence for legal applications
Sayash Kapoor, Peter Henderson, Arvind Narayanan Cross-disciplinary research in computational law (forthcoming) |
|
Policy primer
|
Considerations for Governing Open Foundation Models
Rishi Bommasani, Sayash Kapoor, Kevin Klyman, Shayne Longpre, Ashwin Ramaswami, Daniel Zhang, Marietje Schaake, Daniel E. Ho, Arvind Narayanan, Percy Liang. Stanford HAI Issue Brief, 2023 |
|
Textbook
|
Fairness and machine learning: limitations and opportunities
Solon Barocas, Moritz Hardt, Arvind Narayanan. MIT Press, 2023. Related: 21 definitions of fairness and their politics. Talk at FAT* 2018. |
★ |
Letter
|
The limitations of machine learning models for predicting scientific replicability
Molly J. Crockett, Xuechunzi Bai, Sayash Kapoor, Lisa Messeri, Arvind Narayanan. Proceedings of the National Academies of Sciences, 2023. |
|
Online essay
|
How to Prepare for the Deluge of Generative AI on Social Media
Sayash Kapoor, Arvind Narayanan Knight First Amendment Institute, 2023. |
|
Online essay
|
Understanding Social Media Recommendation Algorithms
Arvind Narayanan. Knight First Amendment Institute, 2023. |
|
Journal
|
Manipulative tactics are the norm in political emails: Evidence from 300K emails from the 2020 U.S. election cycle
Arunesh Mathur, Angelina Wang, Carsten Schwemmer, Maia Hamin, Brandon M. Stewart, Arvind Narayanan. Big Data & Society, 2023. Corpus. |
★ |
Public lecture
|
The limits of the quantitative approach to discrimination
Arvind Narayanan. James Baldwin Lecture [transcript], Princeton University, 2022. |
|
Conference
|
Against Predictive Optimization: On the Legitimacy of Decision-Making Algorithms that Optimize Predictive Accuracy
Angelina Wang, Sayash Kapoor, Solon Barocas, Arvind Narayanan. ACM Journal on Responsible Computing 2023. Also presented at the ACM Conference on Fairness, Accountability, and Transparency (FAccT) 2023. |
★ |
Journal
|
Security policy audits: why and how
Kevin Lee, Arvind Narayanan. IEEE Security & Privacy, 2023. |
|
Journal
|
Leakage and the Reproducibility Crisis in ML-based Science
Sayash Kapoor, Arvind Narayanan. Patterns, 2023. |
★ |
Conference
|
How Algorithms Shape the Distribution of Political Advertising: Case Studies of Facebook, Google, and TikTok
Orestis Papakyriakopoulos, Christelle Tessono, Arvind Narayanan, Mihir Kshirsagar. AAAI/ACM Conference on Artificial Intelligence, Ethics, and Society (AIES) 2022. |
★ |
Conference
|
Password policies of most top websites fail to follow best practices
Kevin Lee, Sten Sjöberg, Arvind Narayanan. Symposium on Usable Privacy and Security (SOUPS) 2022. |
★ |
Conference
|
The worst of both worlds: A comparative analysis of errors in learning from data in psychology and machine learning
Jessica Hullman, Sayash Kapoor, Priyanka Nanayakkara, Andrew Gelman, Arvind Narayanan. AAAI/ACM Conference on Artificial Intelligence, Ethics and Society (AIES), 2022. |
★ |
Conference
|
Mitigating dataset harms requires stewardship: Lessons from 1000 papers
Kenny Peng, Arunesh Mathur, Arvind Narayanan. Neural Information Processing Systems (NeurIPS) 2021. Oral presentation. |
★ |
Workshop
|
Simulation as Experiment: An Empirical Critique of Simulation Research on Recommender Systems
Amy A. Winecoff, Matthew Sun, Eli Lucherini, Arvind Narayanan. Workshop on Simulation Methods for Recommender Systems (SimuRec) 2021 |
|
Journal
|
REVISE: A Tool for Measuring and Mitigating Bias in Visual Datasets
Angelina Wang, Alexander Liu, Ryan Zhang, Anat Kleiman, Leslie Kim, Dora Zhao, Iroha Shirai, Arvind Narayanan, Olga Russakovsky. International Journal of Computer Vision, 2022. Extended version of a paper that appeared at ECCV 2020. |
★ |
Draft
|
T-RECS: A Simulation Tool to Study the Societal Impact of Recommender Systems
Eli Lucherini, Matthew Sun, Amy Winecoff, Arvind Narayanan. Manuscript, 2021. |
|
Conference
|
Resurrecting Address Clustering in Bitcoin
Malte Möser, Arvind Narayanan. Financial Cryptography and Data Security, 2022. |
★ |
Manuscript
|
Research on dark patterns: a case study of the Princeton CITP formula
Arvind Narayanan. Manuscript, 2021. |
|
Conference
|
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States
Kevin Lee, Arvind Narayanan. Symposium on electronic crime research (eCrime) 2021. Best student paper award. |
★ |
Conference
|
Virtual Classrooms and Real Harms: Remote Learning at US Universities
Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, Madelyn Sanfilippo. Symposium on Usable Privacy and Security (SOUPS) 2021. |
★ |
Conference
|
Privacy Policies over Time: Curation and Analysis of a Million-Document Dataset
Ryan Amos, Gunes Acar, Elena Lucherini, Mihir Kshirsagar, Arvind Narayanan, Jonathan Mayer. The Web Conference, 2021. |
★ |
Conference
|
REVISE: A Tool for Measuring and Mitigating Bias in Image Datasets
Angelina Wang, Arvind Narayanan, Olga Russakovsky. European Conference on Computer Vision (ECCV) 2020. Spotlight presentation. |
★ |
Journal
|
No boundaries: data exfiltration by third parties embedded on web pages
Gunes Acar, Steven Englehardt, Arvind Narayanan. Proceedings on Privacy Enhancing Technologies (PoPETs) 2020. Runner up for the 2020 CNIL-Inria Award for Privacy Protection. |
★ |
Conference
|
BlockSci: Design and applications of a blockchain analysis platform
Harry Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan. Usenix Security Symposium, 2020. Blog post. |
★ |
Magazine
|
Dark Patterns: Past, Present, and Future
Arvind Narayanan, Arunesh Mathur, Marshini Chetty, Mihir Kshirsagar. ACM Queue, 2020. (Also appeared in CACM, 2020.) |
|
Journal
|
Measuring the predictability of life outcomes with a scientific mass collaboration
Matthew J. Salganik et al. Proceedings of the National Academy of Sciences 2020. |
★ |
Conference
|
An Empirical Study of Wireless Carrier Authentication for SIM Swaps
Kevin Lee, Ben Kaiser, Jonathan Mayer, Arvind Narayanan. Symposium on Usable Privacy and Security (SOUPS) 2020. |
★ |
Draft
|
Effective Cryptocurrency Regulation Through Blacklisting
Malte Moeser, Arvind Narayanan. Manuscript, 2019. |
|
Conference
|
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices
Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan. ACM Conference on Computer and Communications Security 2019. Runner up for the Caspar Bowden Award for Outstanding Research in Privacy Enhancing Technologies. |
★ |
Conference
|
Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites
Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan Mayer, Marshini Chetty, Arvind Narayanan. ACM Conference on Computer-Supported Cooperative Work and Social Computing, 2019. FPF Privacy Papers for Policy Makers Award. |
★ |
Workshop
|
The Impact of User Location on Cookie Notices (Inside and Outside of the European Union)
Rob van Eijk, Hadi Asghari, Philipp Winter, Arvind Narayanan. Workshop on Technology and Consumer Protection (ConPro) 2019. |
★ |
Manuscript
|
Robust de-anonymization of large sparse datasets: a decade later
Arvind Narayanan, Vitaly Shmatikov. Manuscript, 2019. |
|
Conference
|
Formal Barriers to Longest-Chain Proof-of-Stake Protocols
Jonah Brown-Cohen, Arvind Narayanan, Christos-Alexandros Psomas, ACM Conference on Economics and Computation 2019. |
★ |
Journal
|
Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping
Noah Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, Nick Feamster. Proceedings on Privacy Enhancing Technologies (PoPETs) 2019. |
★ |
Draft
|
Identification of anonymous DNA using genealogical triangulation
Paul Ellenbogen, Arvind Narayanan. Manuscript, 2019. |
|
Conference
|
Endorsements on Social Media: An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest
Arunesh Mathur, Arvind Narayanan, Marshini Chetty. ACM Conference on Computer-Supported Cooperative Work and Social Computing 2018. Best paper award. Blog post. |
★ |
Journal
|
Privacy, ethics, and data access: A case study of the Fragile Families Challenge
Ian Lundberg, Arvind Narayanan, Karen Levy, Matthew J. Salganik. Socius 2019. Blog post. |
★ |
Conference
|
Characterizing the Use of Browser-Based Blocking Extensions To Prevent Online Tracking
Arunesh Mathur, Jessica Vitak, Arvind Narayanan, Marshini Chetty. Symposium on Usable Privacy and Security (SOUPS) 2018. |
★ |
Workshop
|
Web-based Attacks to Discover and Control Local IoT Devices
Gunes Acar, Danny Yuxing Huang, Frank Li, Arvind Narayanan, Nick Feamster. SIGCOMM Workshop on IoT Security and Privacy, 2018. Blog post. |
★ |
Journal
|
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies
Steven Goldfeder, Harry Kalodner, Dillon Reisman, Arvind Narayanan. Proceedings on Privacy Enhancing Technologies (PoPETs) 2018. Blog post. |
★ |
Workshop
|
An Empirical Study of Affiliate Marketing Disclosures on YouTube and Pinterest
Arunesh Mathur, Arvind Narayanan, Marshini Chetty. Workshop on Technology and Consumer Protection (ConPro) 2018. Blog post. |
★ |
Journal
|
An Empirical Analysis of Linkability in the Monero Blockchain
Malte Möser, Kyle Soska, Ethan Heilman, Kevin Lee, Henry Heffan, Shashvat Srivastava, Kyle Hogan, Jason Hennessey, Andrew Miller, Arvind Narayanan, Nicolas Christin. Proceedings on Privacy Enhancing Technologies (PoPETs) 2018. Demo. |
★ |
Journal
|
Semantics derived automatically from language corpora contain human-like biases
Aylin Caliskan, Joanna J. Bryson, Arvind Narayanan. Science, 2017. Open access author copy. |
★ |
Journal
|
I never signed up for this! Privacy implications of email tracking
Steven Englehardt, Jeffrey Han, Arvind Narayanan. Proceedings on Privacy Enhancing Technologies (PoPETs) 2018. Blog post. |
★ |
Magazine
|
Bitcoin's Academic Pedigree
Arvind Narayanan, Jeremy Clark. ACM Queue, 2017. (Also appeared in CACM, 2017.) |
|
Draft
|
The future of ad blocking: An analytical framework and new techniques
Grant Storey, Dillon Reisman, Jonathan Mayer, Arvind Narayanan. Manuscript, 2017. Blog post. |
|
Workshop
|
Obfuscation in Bitcoin: Techniques and Politics
Arvind Narayanan, Malte Möser. International Workshop on Obfuscation: Science, Technology, and Theory, 2017. |
|
Journal
|
Ten simple rules for responsible big data research
Matthew Zook, Solon Barocas, danah boyd, Kate Crawford, Emily Keller, Seeta Peña Gangadharan, Alyssa Goodman, Rachelle Hollander, Barbara A. Koenig, Jacob Metcalf, Arvind Narayanan, Alondra Nelson, Frank Pasquale. PLoS Computational Biology 2017. |
★ |
Workshop
|
Battery Status Not Included: Assessing Privacy in Web Standards
Lukasz Olejnik, Steven Englehardt, Arvind Narayanan. International Workshop on Privacy Engineering 2017. Best paper award. |
★ |
Conference
|
Escrow protocols for cryptocurrencies: How to buy physical goods using Bitcoin
Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan. Financial Cryptography and Data Security 2017. Blog post. |
★ |
Book chapter
|
The Princeton Web Transparency and Accountability Project
Arvind Narayanan, Dillon Reisman. In "Transparent data mining for Big and Small Data". Editors: Tania Cerquitelli, Daniele Quercia, Frank Pasquale. Springer. 2017. |
★ |
Magazine
|
Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts
Arvind Narayanan, Andrew Miller. ACM Queue, 2017. |
|
Conference
|
De-anonymizing Web Browsing Data with Social Networks
Jessica Su, Ansh Shukla, Sharad Goel, Arvind Narayanan. World Wide Web Conference 2017. |
★ |
Conference
|
On the instability of Bitcoin without the block reward
Miles Carlsten, Harry Kalodner, S. Matthew Weinberg, Arvind Narayanan. ACM Conference on Computer and Communications Security, 2016. Blog post. |
★ |
Conference
|
Online tracking: A 1-million-site measurement and analysis
Steven Englehardt, Arvind Narayanan. ACM Conference on Computer and Communications Security, 2016. FPF Privacy Papers for Policy Makers Award. |
★ |
Book
|
Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction
Arvind Narayanan, Joseph Bonneau, Edward Felten, Princeton University Press, 2016. Runner up for the 2017 PROSE Award in Computing and Information Sciences, Association of American Publishers. Draft version free to the public. |
★ |
Conference
|
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
Rosario Gennaro, Steven Goldfeder, Arvind Narayanan. Applied Cryptography and Network Security 2016. |
★ |
Conference
|
When coding style survives compilation: De-anonymizing programmers from executable binaries
Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan. Network and Distributed System Security Symposium 2018. Blog post. |
★ |
Journal
|
No Encore for Encore? Ethical Questions for Web-Based Censorship Measurement
Arvind Narayanan, Bendert Zevenbergen. Technology Science, 2015. |
★ |
Conference
|
An empirical study of Namecoin and lessons for decentralized namespace design
Harry Kalodner, Miles Carlsten, Paul Ellenbogen, Joseph Bonneau, Arvind Narayanan. WEIS 2015. Blog post. |
★ |
Conference
|
A Precautionary Approach to Big Data Privacy
Arvind Narayanan, Joanna Huey, Edward Felten. Computers, Privacy & Data Protection 2015. FPF Privacy Papers for Policy Makers Award. Talk video / Blog post. |
★ |
Draft
|
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
Steven Goldfeder, Rosario Gennario, Harry Kalodner, Joseph Bonneau, Edward W. Felten, Joshua A. Kroll, Arvind Narayanan. Manuscript, 2015. Blog post. |
|
Conference
|
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten. IEEE Security and Privacy (Oakland) 2015. ePrint version with minor differences. |
★ |
Conference
|
De-anonymizing Programmers via Code Stylometry
Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, Rachel Greenstadt. USENIX security symposium, 2015. Blog post. |
★ |
Conference
|
Cookies that give you away: Evaluating the surveillance implications of web tracking
Steven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman, Jonathan Mayer, Arvind Narayanan, Edward Felten. WWW 2015. Blog post. |
★ |
Journal
|
Redefining Genomic Privacy: Trust and Empowerment
Yaniv Erlich, James B Williams, David Glazer, Kenneth Yocum, Nita Farahany, Maynard Olson, Arvind Narayanan, Lincoln D Stein, Jan A Witkowski, Robert C Kain PLoS Biology, 2014. |
★ |
Conference
|
The Web never forgets: Persistent tracking mechanisms in the wild
Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, Claudia Diaz. ACM Conference on Computer and Communications Security, 2014. |
★ |
No silver bullet: De-identification still doesn’t work
Arvind Narayanan, Edward W. Felten. Manuscript, 2014. |
||
Workshop
|
Privacy concerns of implicit secondary factors for web authentication
Joseph Bonneau, Edward W. Felten, Prateek Mittal, Arvind Narayanan Adventures in Authentication: WAY Workshop, 2014. |
★ |
Draft
|
Web Privacy Measurement: Scientific principles, engineering platform, and new results
Steven Englehardt, Christian Eubank, Peter Zimmerman, Dillon Reisman, Arvind Narayanan. Manuscript, 2014. |
|
Conference
|
On Decentralizing Prediction Markets and Order Books
Jeremy Clark, Joseph Bonneau, Edward W. Felten, Joshua A. Kroll, Andrew Miller, Arvind Narayanan WEIS 2014. Blog post. |
★ |
Conference
|
Mixcoin: Anonymity for Bitcoin with accountable mixes
Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten. Financial Cryptography 2014. |
★ |
Journal
|
Why software engineering courses should include ethics coverage
Arvind Narayanan, Shannon Vallor. Communications of the ACM, 2014. |
★ |
Journal
|
Routes for breaching and protecting genetic privacy
Yaniv Erlich, Arvind Narayanan. Nature Reviews Genetics, 2014. PDF: Sci-Hub | Author manuscript. |
★ |
Law review online
|
Privacy substitutes
Jonathan Mayer, Arvind Narayanan. Special issue of Stanford Law Review Online, 2013. |
|
Workshop
|
Privacy technologies: An annotated syllabus
Arvind Narayanan HotPETs 2013. |
|
Conference
|
A Scanner Darkly: Protecting User Privacy from Perceptual Applications
Suman Jana, Arvind Narayanan, Vitaly Shmatikov. IEEE Security and Privacy (Oakland) 2013. 2014 Privacy Enhancing Technologies award. |
★ |
Workshop
|
Shining the Floodlights on Mobile Web Tracking — A Privacy Survey
Christian Eubank, Marcela Melara, Diego Perez-Botero, Arvind Narayanan. Web 2.0 Security & Privacy (W2SP) 2013. |
★ |
Journal
|
What Happened to the Crypto Dream?
Arvind Narayanan. IEEE Security and Privacy Magazine 2013. Part 2. Blog post. |
|
Journal
|
Unlikely Outcomes? A Distributed Discussion on Decentralized Personal Data Architectures
Solon Barocas, Seda Gürses, Arvind Narayanan, Vincent Toubiana. Institute of Network Cultures — Unlike Us Reader 2013. Blog post. |
|
Policy
|
Privacy considerations of online behavioural tracking
Claude Castelluccia and Arvind Narayanan. European Network and Information Security Agency (ENISA) expert report, 2012. |
|
Haha
|
33 Bits of Entropy: Myths and Fallacies of “Personally Identifiable Information”
Arvind Narayanan. Volume 1 of Tiny Transactions on Computer Science, 2012. ("The premier venue for computer science research of 140 characters or less.") |
|
Workshop
|
A Critical Look at Decentralized Personal Data Architectures
Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh. Data Usage Management on the Web Workshop 2012. |
★ |
Conference
|
On the Feasibility of Internet-Scale Author Identification
Arvind Narayanan, Hristo Paskov, Neil Gong, John Bethencourt, Emil Stefanov, Richard Shin, Dawn Song. IEEE Security and Privacy (Oakland) 2012. Blog post |
★ |
Report
|
An Adversarial Analysis of the Reidentifiability of the Heritage Health Prize Dataset.
Arvind Narayanan. Manuscript, 2011. |
|
Conference
|
“You Might Also Like:” Privacy Risks of Collaborative Filtering
Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov. IEEE Security and Privacy (Oakland) 2011. Blog post. |
★ |
Conference
|
Link Prediction by De-anonymization: How We Won the Kaggle Social Network Challenge
Arvind Narayanan, Elaine Shi, Benjamin I. P. Rubinstein. International Joint Conference on Neural Networks 2011. Blog post. |
★ |
Policy
|
Do Not Track: A Universal Third-Party Web Tracking Opt Out
Jonathan Mayer, Arvind Narayanan, Sid Stamm. IETF Internet-Draft, 2011. |
|
Conference
|
Location Privacy via Private Proximity Testing
Arvind Narayanan, Narendran Thiagarajan, Mugdha Lakhani, Mike Hamburg, Dan Boneh. Network and Distributed Security Symposium 2011. Distinguished paper award. Blog post. |
★ |
Workshop
|
SocialKeys: Transparent Cryptography via Key Distribution over Social Networks
Arvind Narayanan. IAB/IETF/W3C Internet Privacy workshop position paper, 2010. |
|
Journal
|
Myths and Fallacies of “Personally Identifiable Information”
Arvind Narayanan, Vitaly Shmatikov. Communications of the ACM, 2010. Blog post. |
★ |
Conference
|
Adnostic: Privacy Preserving Targeted Advertising
Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas. Network and Distributed System Security Symposium 2010. |
★ |
Conference
|
De-anonymizing Social Networks
Arvind Narayanan, Vitaly Shmatikov. IEEE Security and Privacy 2009. Blog post. |
★ |
Conference
|
Robust De-anonymization of Large Sparse Datasets
Arvind Narayanan, Vitaly Shmatikov. IEEE Security and Privacy (Oakland) 2008. 2008 Privacy Enhancing Technologies award. 2019 IEEE Security & Privacy Test of Time Award. |
★ |
Book chapter
|
Uncircumventable Enforcement of Privacy Policies via Cryptographic Obfuscation
Arvind Narayanan, Vitaly Shmatikov. In Digital Privacy: Theory, Technologies and Practices". Editors: A. Acquisti et al. Auerbach Publications 2007. In Digital Privacy: Theory, Technologies and Practices". Editors: A. Acquisti et al. Auerbach Publications 2007. This is an expanded version of "Obfuscated Databases and Group Privacy" below. |
★ |
Workshop
|
Domain extensions for random oracles: beyond the birthday-paradox bound
Ilya Mironov, Arvind Narayanan. ECRYPT Hash Workshop 2007. |
|
Draft
|
On the Limits of Point Function Obfuscation
Arvind Narayanan, Vitaly Shmatikov. Manuscript, 2006. |
|
Conference
|
Obfuscated Databases and Group Privacy
Arvind Narayanan, Vitaly Shmatikov. ACM Conference on Computer and Communications Security 2005. |
★ |
Conference
|
Fast Dictionary Attacks on Passwords Using Time-Space Tradeoff
Arvind Narayanan, Vitaly Shmatikov. ACM Conference on Computer and Communications Security 2005. |
★ |
Journal
|
Perfectly Reliable Message Transmission
Arvind Narayanan, Kannan Srinathan, C. Pandu Rangan. Information Processing Letters 100:1, pages 23--28, 2006. [Abstract] |
★ |
Conference
|
Optimal Perfectly Secure Message Transmission.
Kannan Srinathan, Arvind Narayanan, C. Pandu Rangan. Advances in Cryptology -- CRYPTO 2004, volume 3152 of LNCS, pages 545--561. [Download: Postscript] |
★ |
Conference
|
On the power of Computational Secret Sharing.
Vinod Vaikuntanathan, Arvind Narayanan, Kannan Srinathan, C. Pandu Rangan, Kwangjo Kim. Indocrypt 2003, volume 2904 of LNCS, pages 162--176. |
★ |
Conference
|
Practical Pay TV Schemes
Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim. Australasian Conference on Information Security and Privacy (ACISP) 2003, volume 2727 of LNCS, pages 192--203. |
★ |
Book
|
AI Snake Oil: What Artificial Intelligence Can Do, What It Can’t, and How to Tell the Difference
Arvind Narayanan, Sayash Kapoor Princeton University Press, 2024. |
★ |