| Conclave: secure multi-party computation on big data N Volgushev, M Schwarzkopf, B Getchell, M Varia, A Lapets, A Bestavros Proceedings of the Fourteenth EuroSys Conference 2019, 1-18, 2019 | 226 | 2019 |
| Accessible privacy-preserving web-based data analysis for assessing and addressing economic inequalities A Lapets, F Jansen, KD Albab, R Issa, L Qin, M Varia, A Bestavros Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018 | 90 | 2018 |
| Verifiably-safe software-defined networks for CPS RW Skowyra, A Lapets, A Bestavros, A Kfoury Proceedings of the 2nd ACM international conference on High confidence …, 2013 | 65 | 2013 |
| User-centric distributed solutions for privacy-preserving analytics A Bestavros, A Lapets, M Varia Communications of the ACM 60 (2), 37-39, 2017 | 53 | 2017 |
| Secure MPC for analytics as a web application A Lapets, N Volgushev, A Bestavros, F Jansen, M Varia 2016 IEEE Cybersecurity Development (SecDev), 73-74, 2016 | 53 | 2016 |
| A verification platform for SDN-enabled applications R Skowyra, A Lapets, A Bestavros, A Kfoury 2014 IEEE International Conference on Cloud Engineering, 337-342, 2014 | 52 | 2014 |
| From usability to secure computing and back again L Qin, A Lapets, F Jansen, P Flockhart, KD Albab, I Globus-Harris, ... Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), 191-210, 2019 | 33 | 2019 |
| Safe compositional network sketches: formal framework A Bestavros, A Kfoury, A Lapets, MJ Ocean Proceedings of the 13th ACM international conference on Hybrid systems …, 2010 | 30 | 2010 |
| A user-friendly interface for a lightweight verification system A Lapets, A Kfoury Electronic Notes in Theoretical Computer Science 285, 29-41, 2012 | 27 | 2012 |
| The filter-placement problem and its application to minimizing information multiplicity D Erdös, V Ishakian, A Lapets, E Terzi, A Bestavros arXiv preprint arXiv:1201.6565, 2012 | 22 | 2012 |
| Safe compositional network sketches: tool & use cases A Bestavros, A Kfoury, A Lapets, M Ocean Boston University Computer Science Department, 2009 | 20 | 2009 |
| Safe compositional equation-based modeling of constrained flow networks N Soule, A Bestavros, A Kfoury, A Lapets Computer Science Department, Boston University, 2011 | 18 | 2011 |
| QuaFL: a typed DSL for quantum programming A Lapets, MP da Silva, M Thome, A Adler, J Beal, M Rötteler Proceedings of the 1st annual workshop on Functional programming concepts in …, 2013 | 17 | 2013 |
| Formal verification of SLA transformations V Ishakian, A Lapets, A Bestavros, A Kfoury 2011 IEEE World Congress on Services, 540-547, 2011 | 16 | 2011 |
| Improving the accessibility of lightweight formal verification systems A Lapets Boston University Computer Science Department, 2009 | 16 | 2009 |
| Role-based ecosystem for the design, development, and deployment of secure multi-party data analytics applications A Lapets, KD Albab, R Issa, L Qin, M Varia, A Bestavros, F Jansen 2019 IEEE Cybersecurity Development (SecDev), 129-140, 2019 | 14 | 2019 |
| Web-based multi-party computation with application to anonymous aggregate compensation analytics A Lapets, E Dunton, K Holzinger, F Jansen, A Bestavros Computer Science Department, Boston University, 2015 | 12 | 2015 |
| Verification with Natural Contexts: Soundness of Safe Compositional Network Sketches A Lapets, A Kfoury Boston University Computer Science Department, 2009 | 11 | 2009 |
| Tutorial: Deploying secure multi-party computation on the web using JIFF KD Albab, R Issa, A Lapets, P Flockhart, L Qin, I Globus-Harris 2019 IEEE Cybersecurity Development (SecDev), 3-3, 2019 | 10 | 2019 |
| Integrating mpc in big data workflows N Volgushev, M Schwarzkopf, A Lapets, M Varia, A Bestavros Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 10 | 2016 |