Carl A. Gunter
University of Illinois at Urbana-Champaign
H-index: 67
North America-United States
Top articles of Carl A. Gunter
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
How to cover up anomalous accesses to electronic health records | Xiaojun Xu Qingying Hao Zhuolin Yang Bo Li David Liebovitz | 2023 | |
A Tagging Solution to Discover IoT Devices in Apartments | Berkay Kaplan Israel J Lopez-Toledo Carl Gunter Jingyu Qian | 2023/12/4 | |
The HandyTech's Coming Between 1 and 4: Privacy Opportunities and Challenges for the IoT Handyperson | Denise Anthony Carl A Gunter Weijia He Mounib Khanafer Susan Landau | 2023/11/26 | |
Edog: Adversarial edge detection for graph neural networks | Xiaojun Xu Hanzhang Wang Alok Lal Carl A Gunter Bo Li | 2023/2/8 | |
Evaluating user behavior in smartphone security: a psychometric perspective | Hsiao-Ying Huang Soteris Demetriou Muhammad Hassan Güliz Seray Tuncay Carl A Gunter | 2023 | |
Coordinated Science Laboratory 70th Anniversary Symposium: The Future of Computing | arXiv preprint arXiv:2210.08974 | Klara Nahrstedt Naresh Shanbhag Vikram Adve Nancy Amato Romit Roy Choudhury | 2022/10/4 |
Methods and apparatuses for performing article singulation | 2022/8/9 | ||
Familial Searches, the Fourth Amendment, and Genomic Control | Southern California law review | Jacob S Sherkow Natalie Ram Carl A Gunter | 2022 |
G-pate: Scalable differentially private data generator via private aggregation of teacher discriminators | Yunhui Long Boxin Wang Zhuolin Yang Bhavya Kailkhura Aston Zhang | 2021/5/21 | |
Container dumping module | 2021/7/20 | ||
Detecting ai trojans using meta neural analysis | Xiaojun Xu Qi Wang Huichen Li Nikita Borisov Carl A Gunter | 2021/5/24 | |
On Building the Data-Oblivious Virtual Environment | Tushar M Jois Hyun Bin Lee Christopher W Fletcher Carl A Gunter | 2021/2/25 | |
DOVE: A data-oblivious virtual environment | arXiv preprint arXiv:2102.05195 | Hyun Bin Lee Tushar M Jois Christopher W Fletcher Carl A Gunter | 2021/2/10 |
Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection | arXiv preprint arXiv:2112.11986 | George Gunter Huichen Li Avesta Hojjati Matthew Nice Matthew Bunting | 2021/12/22 |
WSEmail: An architecture and system for secure Internet messaging based on web services | Service Oriented Computing and Applications | Michael J May Kevin D Lux Carl A Gunter | 2020/3 |
Workshop Organizers | Workshop Date | Kevin Fu Tadayoshi Kohno Avi Rubin Ben Adida Denise Anthony | 2020/10 |
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. | Qi Wang Wajih Ul Hassan Ding Li Kangkook Jee Xiao Yu | 2020/2 | |
A pragmatic approach to membership inferences on machine learning models | Yunhui Long Lei Wang Diyue Bu Vincent Bindschaedler Xiaofeng Wang | 2020/9/7 | |
See no evil: phishing for permissions with false transparency | Güliz Seray Tuncay Jingyu Qian Carl A Gunter | 2020 | |
Smartphone security behavioral scale: a new psychometric measurement for smartphone security | arXiv preprint arXiv:2007.01721 | Hsiao-Ying Huang Soteris Demetriou Rini Banerjee Güliz Seray Tuncay Carl A Gunter | 2020/7/3 |