default search action
Joseph P. Near
Person information
- affiliation: University of Vermont, Burlington, VT, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Christian Skalka, Joseph P. Near:
Language-Based Security for Low-Level MPC. PPDP 2024: 16:1-16:14 - [c19]Ivoline C. Ngong, Nicholas Gibson, Joseph P. Near:
Olympia: A Simulation Framework for Evaluating the Concrete Scalability of Secure Aggregation Protocols. SaTML 2024: 534-551 - [c18]Farzana Akhter, Joseph P. Near:
Energy Efficient Data Routing for IoT Networks Using Genetic Algorithm. SmartNets 2024: 1-8 - [c17]Ivoline C. Ngong, Brad Stenger, Joseph P. Near, Yuanyuan Feng:
Evaluating the Usability of Differential Privacy Tools with Data Practitioners. SOUPS @ USENIX Security Symposium 2024: 21-40 - [i25]Mako Bates, Joseph P. Near:
DT-SIM: Property-Based Testing for MPC Security. CoRR abs/2403.04991 (2024) - [i24]Mako Bates, Joseph P. Near:
We Know I Know You Know; Choreographic Programming With Multicast and Multiply Located Values. CoRR abs/2403.05417 (2024) - [i23]Mako Bates, Syed Jafri, Joseph P. Near:
MultiChor: Census Polymorphic Choreographic Programming with Multiply Located Values. CoRR abs/2406.13716 (2024) - [i22]Christian Skalka, Joseph P. Near:
Language-Based Security for Low-Level MPC. CoRR abs/2407.16504 (2024) - [i21]Ekaterina Verbitskaia, Joseph P. Near:
Proceedings of the 2024 miniKanren and Relational Programming Workshop. CoRR abs/2409.06505 (2024) - [i20]Ivoline C. Ngong, Joseph P. Near, Niloofar Mireshghallah:
Differentially Private Learning Needs Better Model Initialization and Self-Distillation. CoRR abs/2410.17566 (2024) - [i19]Krystal Maughan, Joseph P. Near, Christelle Vincent:
Foldable, Recursive Proofs of Isogeny Computation with Reduced Time Complexity. IACR Cryptol. ePrint Arch. 2024: 1219 (2024) - 2023
- [j8]Matías Toro, David Darais, Chike Abuah, Joseph P. Near, Damián Árquez, Federico Olmedo, Éric Tanter:
Contextual Linear Types for Differential Privacy. ACM Trans. Program. Lang. Syst. 45(2): 8:1-8:69 (2023) - [i18]Ivoline C. Ngong, Nicholas Gibson, Joseph P. Near:
OLYMPIA: A Simulation Framework for Evaluating the Concrete Scalability of Secure Aggregation Protocols. CoRR abs/2302.10084 (2023) - [i17]Ivoline C. Ngong, Brad Stenger, Joseph P. Near, Yuanyuan Feng:
Evaluating the Usability of Differential Privacy Tools with Data Practitioners. CoRR abs/2309.13506 (2023) - 2022
- [j7]Chike Abuah, David Darais, Joseph P. Near:
Solo: a lightweight static analysis for differential privacy. Proc. ACM Program. Lang. 6(OOPSLA2): 699-728 (2022) - [c16]Timothy Stevens, Christian Skalka, Christelle Vincent, John H. Ring, Samuel Clark, Joseph P. Near:
Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors. USENIX Security Symposium 2022: 1379-1395 - [c15]Lun Wang, Usmann Khan, Joseph P. Near, Qi Pang, Jithendaraa Subramanian, Neel Somani, Peng Gao, Andrew Low, Dawn Song:
PrivGuard: Privacy Regulation Compliance Made Easier. USENIX Security Symposium 2022: 3753-3770 - [i16]Timothy Stevens, Joseph P. Near, Christian Skalka:
Secret Sharing Sharing For Highly Scalable Secure Aggregation. CoRR abs/2201.00864 (2022) - [i15]Krystal Maughan, Ivoline C. Ngong, Joseph P. Near:
Prediction Sensitivity: Continual Audit of Counterfactual Fairness in Deployed Classifiers. CoRR abs/2202.04504 (2022) - [i14]Krystal Maughan, Joseph P. Near:
Improving Utility for Privacy-Preserving Analysis of Correlated Columns using Pufferfish Privacy. CoRR abs/2209.10908 (2022) - 2021
- [j6]John H. Ring, Colin Michael Van Oort, Samson Durst, Vanessa White, Joseph P. Near, Christian Skalka:
Methods for Host-based Intrusion Detection with Deep Learning. DTRAP 2(4): 26:1-26:29 (2021) - [j5]Joseph P. Near, Xi He:
Differential Privacy for Databases. Found. Trends Databases 11(2): 109-225 (2021) - [c14]Zhiyong Fang, David Darais, Joseph P. Near, Yupeng Zhang:
Zero Knowledge Static Program Analysis. CCS 2021: 2951-2967 - [c13]Chike Abuah, Alex Silence, David Darais, Joseph P. Near:
DDUO: General-Purpose Dynamic Analysis for Differential Privacy. CSF 2021: 1-15 - [i13]Chike Abuah, Alex Silence, David Darais, Joe Near:
DDUO: General-Purpose Dynamic Analysis for Differential Privacy. CoRR abs/2103.08805 (2021) - [i12]Chike Abuah, David Darais, Joseph P. Near:
Solo: Enforcing Differential Privacy Without Fancy Types. CoRR abs/2105.01632 (2021) - [i11]Gonzalo Munilla Garrido, Joseph P. Near, Aitsam Muhammad, Warren He, Roman Matzutt, Florian Matthes:
Do I Get the Privacy I Need? Benchmarking Utility in Differential Privacy Libraries. CoRR abs/2109.10789 (2021) - [i10]Timothy Stevens, Christian Skalka, Christelle Vincent, John H. Ring, Samuel Clark, Joseph P. Near:
Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors. CoRR abs/2112.06872 (2021) - 2020
- [c12]Noah M. Johnson, Joseph P. Near, Joseph M. Hellerstein, Dawn Song:
Chorus: a Programming Framework for Building Scalable Differential Privacy Mechanisms. EuroS&P 2020: 535-551 - [i9]Krystal Maughan, Joseph P. Near:
Towards a Measure of Individual Fairness for Deep Learning. CoRR abs/2009.13650 (2020) - [i8]Phillip Nguyen, Alex Silence, David Darais, Joseph P. Near:
DuetSGX: Differential Privacy with Secure Hardware. CoRR abs/2010.10664 (2020) - [i7]Matías Toro, David Darais, Chike Abuah, Joe Near, Federico Olmedo, Éric Tanter:
Contextual Linear Types for Differential Privacy. CoRR abs/2010.11342 (2020) - [i6]Ivoline C. Ngong, Krystal Maughan, Joseph P. Near:
Towards Auditability for Fairness in Deep Learning. CoRR abs/2012.00106 (2020) - [i5]Usmann Khan, Lun Wang, Jithendaraa Subramanian, Joseph P. Near, Dawn Song:
PrivFramework: A System for Configurable and Automated Privacy Policy Compliance. CoRR abs/2012.05291 (2020)
2010 – 2019
- 2019
- [j4]Aleksandar Milicevic, Joseph P. Near, Eunsuk Kang, Daniel Jackson:
Alloy*: a general-purpose higher-order relational constraint solver. Formal Methods Syst. Des. 55(1): 1-32 (2019) - [j3]Joseph P. Near, David Darais, Chike Abuah, Tim Stevens, Pranav Gaddamadugu, Lun Wang, Neel Somani, Mu Zhang, Nikhil Sharma, Alex Shan, Dawn Song:
Duet: an expressive higher-order language and linear type system for statically enforcing differential privacy. Proc. ACM Program. Lang. 3(OOPSLA): 172:1-172:30 (2019) - [c11]Roger Iyengar, Joseph P. Near, Dawn Song, Om Thakkar, Abhradeep Thakurta, Lun Wang:
Towards Practical Differentially Private Convex Optimization. IEEE Symposium on Security and Privacy 2019: 299-316 - [c10]Lun Wang, Joseph P. Near, Neel Somani, Peng Gao, Andrew Low, David Dao, Dawn Song:
Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations. Poly/DMAH@VLDB 2019: 3-23 - [i4]Lun Wang, Joseph P. Near, Neel Somani, Peng Gao, Andrew Low, David Dao, Dawn Song:
Data Capsule: A New Paradigm for Automatic Compliance with Data Privacy Regulations. CoRR abs/1909.00077 (2019) - [i3]Joseph P. Near, David Darais, Chike Abuah, Tim Stevens, Pranav Gaddamadugu, Lun Wang, Neel Somani, Mu Zhang, Nikhil Sharma, Alex Shan, Dawn Song:
Duet: An Expressive Higher-order Language and Linear Type System for Statically Enforcing Differential Privacy. CoRR abs/1909.02481 (2019) - 2018
- [j2]Noah M. Johnson, Joseph P. Near, Dawn Song:
Towards Practical Differential Privacy for SQL Queries. Proc. VLDB Endow. 11(5): 526-539 (2018) - [i2]Noah M. Johnson, Joseph P. Near, Joseph M. Hellerstein, Dawn Song:
Chorus: Differential Privacy via Query Rewriting. CoRR abs/1809.07750 (2018) - 2017
- [i1]Noah M. Johnson, Joseph P. Near, Dawn Xiaodong Song:
Practical Differential Privacy for SQL Queries Using Elastic Sensitivity. CoRR abs/1706.09479 (2017) - 2016
- [c9]Joseph P. Near, Daniel Jackson:
Finding security bugs in web applications using a catalog of access control patterns. ICSE 2016: 947-958 - 2015
- [b1]Joseph P. Near:
Finding security bugs in web applications using domain-specific static analysis. Massachusetts Institute of Technology, Cambridge, MA, USA, 2015 - [c8]Aleksandar Milicevic, Joseph P. Near, Eunsuk Kang, Daniel Jackson:
Alloy*: A General-Purpose Higher-Order Relational Constraint Solver. ICSE (1) 2015: 609-619 - 2014
- [c7]Joseph P. Near, Daniel Jackson:
Derailer: interactive security analysis for web applications. ASE 2014: 587-598 - 2013
- [j1]Emina Torlak, Mana Taghdiri, Greg Dennis, Joseph P. Near:
Applications and extensions of Alloy: past, present and future. Math. Struct. Comput. Sci. 23(4): 915-933 (2013) - 2012
- [c6]Joseph P. Near, Daniel Jackson:
Rubicon: bounded verification of web applications. SIGSOFT FSE 2012: 60 - 2011
- [c5]Joseph P. Near, Aleksandar Milicevic, Eunsuk Kang, Daniel Jackson:
A lightweight code analysis and its role in evaluation of a dependability case. ICSE 2011: 31-40 - 2010
- [c4]Joseph P. Near, Daniel Jackson:
An Imperative Extension to Alloy. ASM 2010: 118-131 - [c3]Joseph P. Near:
From Relational Specifications to Logic Programs. ICLP (Technical Communications) 2010: 144-153
2000 – 2009
- 2009
- [c2]Derek Rayside, Zev Benjamin, Rishabh Singh, Joseph P. Near, Aleksandar Milicevic, Daniel Jackson:
Equality and hashing for (almost) free: Generating implementations from abstraction functions. ICSE 2009: 342-352 - 2008
- [c1]Joseph P. Near, William E. Byrd, Daniel P. Friedman:
alpha-leanTAP: A Declarative Theorem Prover for First-Order Classical Logic. ICLP 2008: 238-252
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-28 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint