Somesh Jha - Publications

Affiliations: 
University of Wisconsin, Madison, Madison, WI 
Area:
Computer Science

22 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2018 Haq IU, Chica S, Caballero J, Jha S. Malware lineage in the wild Computers & Security. 78: 347-363. DOI: 10.1016/J.Cose.2018.07.012  0.336
2016 Octeau D, Luchaup D, Jha S, McDaniel P. Composite Constant Propagation and its Application to Android Program Analysis Ieee Transactions On Software Engineering. 42: 999-1014. DOI: 10.1109/Tse.2016.2550446  0.697
2013 Franz M, Deiseroth B, Hamacher K, Jha S, Katzenbeisser S, SchröDer H. Secure computations on non-integer values with applications to privacy-preserving sequence analysis Information Security Technical Report. 17: 117-128. DOI: 10.1016/J.Istr.2012.10.001  0.407
2011 Luchaup D, Smith R, Estan C, Jha S. Speculative parallel pattern matching Ieee Transactions On Information Forensics and Security. 6: 438-451. DOI: 10.1109/Tifs.2011.2112647  0.701
2010 Jha S, Katzenbeisser S, Schallhart C, Veith H, Chenney S. Semantic integrity in large-scale online simulations Acm Transactions On Internet Technology. 10: 2. DOI: 10.1145/1667067.1667069  0.323
2008 Preda MD, Christodorescu M, Jha S, Debray S. A semantics-based approach to malware detection Acm Transactions On Programming Languages and Systems. 30: 25. DOI: 10.1145/1387673.1387674  0.691
2008 Brumley D, Newsome J, Song D, Wang H, Jha S. Theory and techniques for automated generation of vulnerability-based signatures Ieee Transactions On Dependable and Secure Computing. 5: 224-241. DOI: 10.1109/Tdsc.2008.55  0.437
2008 Jha S, Li N, Tripunitara M, Wang Q, Winsborough WH. Toward formal verification of role-based access control policies Ieee Transactions On Dependable and Secure Computing. 5: 242-255. DOI: 10.1109/Tdsc.2007.70225  0.373
2007 Christodorescu M, Jha S, Kinder J, Katzenbeisser S, Veith H. Software transformations to improve malware detection Journal in Computer Virology. 3: 253-265. DOI: 10.1007/S11416-007-0059-8  0.671
2005 Chaki S, Clarke E, Jha S, Veith H. An Iterative Framework for Simulation Conformance Journal of Logic and Computation. 15: 465-488. DOI: 10.1093/Logcom/Exi028  0.632
2004 Jha S, Reps T. Model checking SPKI/SDSI Journal of Computer Security. 12: 317-353. DOI: 10.3233/Jcs-2004-123-402  0.37
2004 Chaki S, Clarke EM, Groce A, Jha S, Veith H. Modular verification of software components in C Ieee Transactions On Software Engineering. 30: 388-402. DOI: 10.1109/Tse.2004.22  0.727
2003 Clarke E, Grumberg O, Jha S, Lu Y, Veith H. Counterexample-guided abstraction refinement for symbolic model checking Journal of the Acm (Jacm). 50: 752-794. DOI: 10.1145/876638.876643  0.639
2001 Chauhan P, Clarke EM, Jha S, Kukula JH, Veith H, Wang D. Using Combinatorial Optimization Methods for Quantification Scheduling Lecture Notes in Computer Science. 293-309. DOI: 10.1007/3-540-44798-9_24  0.615
2001 Clarke EM, Grumberg O, Jha S, Lu Y, Veith H. Progress on the State Explosion Problem in Model Checking Lecture Notes in Computer Science. 176-194. DOI: 10.1007/3-540-44577-3_12  0.608
2000 Clarke EM, Jha S, Marrero W. Verifying security protocols with Brutus Acm Transactions On Software Engineering and Methodology. 9: 443-487. DOI: 10.1145/363516.363528  0.591
1999 Clarke EM, Jha S, Lu Y, Wang D. Abstract BDDs: A Technque for Using Abstraction in Model Checking Lecture Notes in Computer Science. 172-186. DOI: 10.1007/3-540-48153-2_14  0.609
1998 Chalasani P, Jha S, Varikooty A. Accurate approximations for European-style Asian options Journal of Computational Finance. 1: 11-30. DOI: 10.21314/Jcf.1998.017  0.349
1998 Jackson D, Jha S, Damon CA. Isomorph-Free Model Enumeration: A New Method for Checking Relational Specifications Acm Transactions On Programming Languages and Systems. 20: 302-343. DOI: 10.1145/276393.276396  0.344
1998 Dingel J, Garlan D, Jha S, Notkin D. Towards a Formal Treatment of Implicit Invocation Using Rely/Guarantee Reasoning Formal Aspects of Computing. 10: 193-213. DOI: 10.1007/S001650050011  0.371
1997 Clarke EM, Grumberg O, Jha S. Verifying parameterized networks Acm Transactions On Programming Languages and Systems. 19: 726-750. DOI: 10.1145/265943.265960  0.57
1991 Pardalos PM, Jha S. Graph separation techniques for quadratic zero-one programming Computers and Mathematics With Applications. 21: 107-113. DOI: 10.1016/0898-1221(91)90165-Z  0.334
Show low-probability matches.