Ashish Gehani
Ashish Gehani
Verified email at - Homepage
Cited by
Cited by
DNA-based Cryptography
A Gehani, T LaBean, J Reif
Aspects of Molecular Computing, Lecture Notes in Computer Science 2950, 2004
SPADE: Support for Provenance Auditing in Distributed Environments
A Gehani, D Tariq
13th ACM/IFIP/USENIX International Middleware Conference, 2012
Performance and Extension of User Space File Systems
A Rajgarhia, A Gehani
25th ACM Symposium on Applied Computing (SAC), 2010
Transcoding Characteristics of Web Images
S Chandra, A Gehani, C Ellis, A Vahdat
Multimedia Computing and Networking (MMCN) 4312, 2001
RheoStat: Real-time Risk Management
A Gehani, G Kedem
7th International Symposium on Recent Advances in Intrusion Detection (RAID …, 2004
MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation
Y Kwon, F Wang, W Wang, KH Lee, WC Lee, S Ma, X Zhang, D Xu, S Jha, ...
25th Annual Network and Distributed System Security Symposium (NDSS), 2018
Trimmer: Application Specialization for Code Debloating
H Sharif, M Abubakar, A Gehani, F Zaffar
33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018
Towards Automated Collection of Application-Level Data Provenance
D Tariq, M Ali, A Gehani
4th USENIX Workshop on the Theory and Practice of Provenance (TaPP …, 2012
Microflow Biomolecular Computation
A Gehani, J Reif
Biosystems, Journal of Biological and Information Processing Sciences 52 (1-3), 1999
Kernel-Supported Cost-Effective Audit Logging for Causality Tracking
S Ma, J Zhai, Y Kwon, KH Lee, X Zhang, G Ciocarlie, A Gehani, ...
29th USENIX Annual Technical Conference (ATC), 2018
Data Mining-based Ethereum Fraud Detection
E Jung, M Le Tilly, A Gehani, Y Ge
2nd IEEE International Conference on Blockchain, 2019
Smartphone Security Limitations: Conflicting Traditions
N Husted, H Saidi, A Gehani
2nd Workshop on Governance of Technology, Information, and Policies …, 2011
Automated Categorization of Onion Sites for Analyzing the Darkweb Ecosystem
S Ghosh, A Das, P Porras, V Yegneswaran, A Gehani
23rd ACM International Conference on Knowledge Discovery and Data Mining (KDD), 2017
Tracking and Sketching Distributed Data Provenance
T Malik, L Nistor, A Gehani
6th IEEE International Conference on e-Science, 2010
Automated Software Winnowing
G Malecha, A Gehani, N Shankar
30th ACM Symposium on Applied Computing (SAC), 2015
Sketching Distributed Data Provenance
T Malik, A Gehani, D Tariq, F Zaffar
Data Provenance and Data Management for eScience, Studies in Computational …, 2013
Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps
C Yang, G Yang, A Gehani, V Yegneswaran, D Tariq, G Gu
11th International Conference on Security and Privacy in Communication …, 2015
Bonsai: Balanced Lineage Authentication
A Gehani, U Lindqvist
23rd Annual Computer Security Applications Conference (ACSAC), 2007
ICEMAN: A System for Efficient, Robust and Secure Situational Awareness at the Network Edge
S Wood, J Mathewson, J Joy, MO Stehr, M Kim, A Gehani, M Gerla, ...
32nd IEEE Military Communications Conference (MILCOM), 2013
PIDGIN: Privacy-Preserving Interest and Content Sharing in Opportunistic Networks
R Asghar, A Gehani, B Crispo, G Russello
9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014
The system can't perform the operation now. Try again later.
Articles 1–20